Patents by Inventor Prateek Mishra
Prateek Mishra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12174878Abstract: A method comprises receiving a request to log at least one operation of a plurality operations, wherein the request includes one or more features of the at least one operation. The one or more features are analyzed using one or more machine learning algorithms. The method further comprises selecting, based at least in part on the analyzing, a log provider of a plurality of log providers to log the at least one operation, and interfacing with the log provider to enable logging of the at least one operation.Type: GrantFiled: March 22, 2023Date of Patent: December 24, 2024Assignee: Dell Products L.P.Inventors: Bijan Kumar Mohanty, Hung Dinh, Prateek Mishra
-
Publication number: 20240408639Abstract: A dispensing system for dispensing a material to a deposition point, the dispensing system including: a nozzle configured to dispense the material; a doser in fluid communication with the nozzle, the doser configured to control flow of the material to the nozzle; and a material conditioning assembly in fluid communication with the nozzle and configured to decrease viscosity of the material. The material conditioning assembly including: a conditioning chamber configured to receive the material therein; a drive member movable within the conditioning chamber to apply shear stress to the material within the conditioning chamber; and an actuator configured to move the drive member.Type: ApplicationFiled: June 6, 2023Publication date: December 12, 2024Inventors: Dalong GAO, Prateek Mishra, Paul E. Crittenden, Ryan Gergely
-
Publication number: 20240403436Abstract: The present disclosure relates generally to a security workbench and, more particularly, to a system, method and computer program product which integrates different scanner types into a single, integrated security tool. The method, for example, includes: integrating, by a computer system, a plurality of scanner types into a single tool; and displaying, by the computer system, an output of any of the plurality of scanner types run on software code in a standardized format in a graphical user interface of the tool.Type: ApplicationFiled: May 31, 2023Publication date: December 5, 2024Applicant: ADP, INC.Inventors: Prateek Mishra, Jonathan S. Wright, Peter Faria, Carl C. Pereira, Kenneth D. Atkins, Gaurav Bhargava, Seena A. Iype
-
Publication number: 20240320255Abstract: A method comprises receiving a request to log at least one operation of a plurality operations, wherein the request includes one or more features of the at least one operation. The one or more features are analyzed using one or more machine learning algorithms. The method further comprises selecting, based at least in part on the analyzing, a log provider of a plurality of log providers to log the at least one operation, and interfacing with the log provider to enable logging of the at least one operation.Type: ApplicationFiled: March 22, 2023Publication date: September 26, 2024Inventors: Bijan Kumar Mohanty, Hung Dinh, Prateek Mishra
-
Publication number: 20240210449Abstract: A power sensing circuit in a first voltage domain senses an input voltage from a second voltage domain and provides a power OK signal. The maximum supply voltage of the first voltage domain is above a maximum tolerance for devices in the first voltage domain. Accordingly, protection techniques are employed to ensure that the potential difference between any two terminals of devices in the power sensing circuit does not exceed the maximum tolerance limit. The protection techniques utilize reference voltage-based techniques including level shifting and use of protection devices in transistor stacks. An over-voltage tolerant Schmitt trigger circuit is also employed in the power sensing circuit. A trip point device on the input of the power sensing circuit utilizes a programmable bias voltage to adjust the trip point of the power sensing circuit to accommodate different maximum input voltages from the second voltage domain.Type: ApplicationFiled: December 27, 2022Publication date: June 27, 2024Inventors: Thanapandi Ganesan, Prateek Mishra, Pramod Baliga Kokkada, Rajesh Mangalore Anand, Aniket Bharat Waghide, Animesh Jain, Girish Anathahally Singrigowda, Dhruvin Devangbhai Shah
-
Patent number: 11923852Abstract: A voltage level-shifting circuit for an integrated circuit includes an input terminal receiving a voltage signal referenced to an input/output (I/O) voltage level. A transistor overvoltage protection circuit includes a first p-type metal oxide semiconductor (PMOS) transistor includes a source coupled to the second voltage supply, a gate receiving an enable signal, and a drain connected to a central node. A first n-type metal oxide semiconductor (NMOS) transistor includes a drain connected to the central node, a gate connected to the input terminal, and a source connected to an output terminal. A second NMOS transistor includes a drain connected to the input terminal, a gate connected to the central node, and a source connected to the output terminal.Type: GrantFiled: September 28, 2021Date of Patent: March 5, 2024Assignee: Advanced Micro Devices, Inc.Inventors: Prateek Mishra, Thanapandi G, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Girish Anathahalli Singrigowda, Animesh Jain
-
Publication number: 20240042704Abstract: A reconditioning device includes: a first shearing plate; a second shearing plate; and a housing. The housing includes: a first member configured to hold the first shearing plate and comprising an input for receiving a material; a second member connected to the first member to form an inner cavity, a portion of the inner cavity is located in a gap between the first shearing plate and the second shearing plate; and an output member connected to a pipeline of a production applicator and configured to output the material subsequent to shearing. The shaft extends through the second member, is connected to the second shearing plate, and is configured to be rotated to shear the material disposed in the gap between the first shearing plate and the second shearing plate.Type: ApplicationFiled: August 3, 2022Publication date: February 8, 2024Inventors: Dalong GAO, Ryan GERGELY, Prateek MISHRA, Paul E. CRITTENDEN
-
Publication number: 20230098336Abstract: A voltage level-shifting circuit for an integrated circuit includes an input terminal receiving a voltage signal referenced to an input/output (PO) voltage level. A transistor overvoltage protection circuit includes a first p-type metal oxide semiconductor (PMOS) transistor includes a source coupled to the second voltage supply, a gate receiving an enable signal, and a drain connected to a central node. A first n-type metal oxide semiconductor (NMOS) transistor includes a drain connected to the central node, a gate connected to the input terminal, and a source connected to an output terminal. A second NMOS transistor includes a drain connected to the input terminal, a gate connected to the central node, and a source connected to the output terminal.Type: ApplicationFiled: September 28, 2021Publication date: March 30, 2023Applicant: Advanced Micro Devices, Inc.Inventors: Prateek Mishra, Thanapandi G, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Girish Anathahalli Singrigowda, Animesh Jain
-
Patent number: 11526824Abstract: Systems and methods for determining whether a particular feature or change implemented in at least one test store causes a significant change as compared to one or more control stores are discussed. More particularly, techniques for using a time-series clustering algorithm to identify comparable sister stores to a store in which a feature change is being considered are described. Once the sister stores are identified a testing module can perform an A/B testing so as to validate whether a particular feature change being implemented in the test store causes a significant change as compared to the control stores.Type: GrantFiled: May 13, 2020Date of Patent: December 13, 2022Assignee: Walmart Apollo, LLCInventors: Paridhi Kabra, Prateek Mishra, Jingying Zhang, Nitin Kapoor
-
Publication number: 20220368536Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.Type: ApplicationFiled: June 23, 2022Publication date: November 17, 2022Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
-
Patent number: 11463084Abstract: A level shifting output circuit converts a signal from a core voltage to an I/O voltage without causing voltage overstress on transistor terminals in the level shifting output circuit. The output circuit includes protection transistors to protect various transistors in the output circuit from overvoltage conditions including those transistors coupled to I/O power supply nodes.Type: GrantFiled: September 1, 2021Date of Patent: October 4, 2022Assignee: Advanced Micro Devices, Inc.Inventors: Thanapandi Ganesan, Prateek Mishra, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Animesh Jain, Girish Anathahalli Singrigowda
-
Patent number: 11405216Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.Type: GrantFiled: May 7, 2020Date of Patent: August 2, 2022Assignee: ADP, Inc.Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
-
Patent number: 11398900Abstract: Embodiments are directed to managing cryptographic keys in a multi-tenant cloud based system. Embodiments receive from a client a request for a wrapped data encryption key (“DEK”). Embodiments generate a random key and fetch encryption context that corresponds to the client. Embodiments generate the wrapped DEK including the random key and the encryption context encoded in the wrapped DEK. Embodiments then return the wrapped DEK to the client.Type: GrantFiled: February 7, 2019Date of Patent: July 26, 2022Assignee: Oracle International CorporationInventors: Sirish V. Vepa, Prateek Mishra, Sreedhar Katti, Varanasi Kumar Ravi, Harold William Lockhart, Rakesh Keshava
-
Publication number: 20210351935Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.Type: ApplicationFiled: May 7, 2020Publication date: November 11, 2021Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
-
Patent number: 11088993Abstract: An embodiment controls access to a resource, the access controlled by a multi-tenant system. Embodiments receive, at a web server, a request for the resource from a user via a web browser, the request including a Uniform Resource Locator (“URL”) associated with the resource and an identity of a tenant corresponding to the user. Embodiments determine an access policy for authenticating the user that is associated with the resource, the access policy based in part on the identity of the tenant. Embodiments then authenticate the user based on the determined access policy.Type: GrantFiled: August 12, 2019Date of Patent: August 10, 2021Assignee: Oracle International CorporationInventors: Stephan Wardell, Andrew B Folkins, Vadim Lander, Prateek Mishra, Rich Levinson, Cory Womacks, Dino E. Cuthbert
-
Publication number: 20200402648Abstract: Examples provide a workforce manager that analyzes historical pharmacy transaction data to generate a set of forecasted future prescriptions for a selected pharmacy. The forecasted future prescriptions are divided into predicted new prescriptions and predicted refill prescriptions. The predicted refill prescriptions are classified into a set of high confidence refills and a set of low confidence refills. The labor demand associated with the set of high confidence refills are redistributed within a range of pickup dates associated with each high confidence refill prescription to smooth labor demand minimizing variation within a selected time-period. A number of personnel are identified for each day in the selected time-period based on the smoothed labor demand. A schedule is published assigning at least a portion of the forecasted future prescriptions and the number of personnel to each day in the selected time-period is output.Type: ApplicationFiled: August 5, 2019Publication date: December 24, 2020Inventors: Shreyan Ghosh, Akash Verma, Prateek Mishra
-
Publication number: 20200364644Abstract: Systems and methods for determining whether a particular feature or change implemented in at least one test store causes a significant change as compared to one or more control stores are discussed. More particularly, techniques for using a time-series clustering algorithm to identify comparable sister stores to a store in which a feature change is being considered are described. Once the sister stores are identified a testing module can perform an A/B testing so as to validate whether a particular feature change being implemented in the test store causes a significant change as compared to the control stores.Type: ApplicationFiled: May 13, 2020Publication date: November 19, 2020Inventors: Paridhi Kabra, Prateek Mishra, Jingying Zhang, Nitin Kapoor
-
Patent number: 10581820Abstract: Key generation and roll over is provided for a cloud based identity management system. A key set is generated that includes a previous key and expiration time, a current key and expiration time, and a next key and expiration time, and stores the key set in a database table and a memory cache associated with the database table. At the current key expiration time, the key set is rolled over, including retrieving the key set from the database table, updating the previous key and expiration time with the current key and expiration time, updating the current key and expiration time with the next key and expiration time, generating a new key and expiration time, updating the next key and expiration time with the new key and expiration time, and updating the key set in the database table and the memory cache.Type: GrantFiled: May 8, 2017Date of Patent: March 3, 2020Assignee: Oracle International CorporationInventors: Rakesh Keshava, Sreedhar Katti, Sirish Vepa, Vadim Lander, Prateek Mishra
-
Publication number: 20190394024Abstract: Embodiments are directed to managing cryptographic keys in a multi-tenant cloud based system. Embodiments receive from a client a request for a wrapped data encryption key (“DEK”). Embodiments generate a random key and fetch encryption context that corresponds to the client. Embodiments generate the wrapped DEK including the random key and the encryption context encoded in the wrapped DEK. Embodiments then return the wrapped DEK to the client.Type: ApplicationFiled: February 7, 2019Publication date: December 26, 2019Inventors: Sirish V. VEPA, Prateek MISHRA, Sreedhar KATTI, Varanasi Kumar RAVI, Harold William LOCKHART, Rakesh KESHAVA
-
Publication number: 20190364020Abstract: An embodiment controls access to a resource, the access controlled by a multi-tenant system. Embodiments receive, at a web server, a request for the resource from a user via a web browser, the request including a Uniform Resource Locator (“URL”) associated with the resource and an identity of a tenant corresponding to the user. Embodiments determine an access policy for authenticating the user that is associated with the resource, the access policy based in part on the identity of the tenant. Embodiments then authenticate the user based on the determined access policy.Type: ApplicationFiled: August 12, 2019Publication date: November 28, 2019Inventors: Stephan WARDELL, Andrew B. FOLKINS, Vadim LANDER, Prateek MISHRA, Rich LEVINSON, Cory WOMACKS, Dino E. CUTHBERT