Patents by Inventor Prateek Mishra

Prateek Mishra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12174878
    Abstract: A method comprises receiving a request to log at least one operation of a plurality operations, wherein the request includes one or more features of the at least one operation. The one or more features are analyzed using one or more machine learning algorithms. The method further comprises selecting, based at least in part on the analyzing, a log provider of a plurality of log providers to log the at least one operation, and interfacing with the log provider to enable logging of the at least one operation.
    Type: Grant
    Filed: March 22, 2023
    Date of Patent: December 24, 2024
    Assignee: Dell Products L.P.
    Inventors: Bijan Kumar Mohanty, Hung Dinh, Prateek Mishra
  • Publication number: 20240408639
    Abstract: A dispensing system for dispensing a material to a deposition point, the dispensing system including: a nozzle configured to dispense the material; a doser in fluid communication with the nozzle, the doser configured to control flow of the material to the nozzle; and a material conditioning assembly in fluid communication with the nozzle and configured to decrease viscosity of the material. The material conditioning assembly including: a conditioning chamber configured to receive the material therein; a drive member movable within the conditioning chamber to apply shear stress to the material within the conditioning chamber; and an actuator configured to move the drive member.
    Type: Application
    Filed: June 6, 2023
    Publication date: December 12, 2024
    Inventors: Dalong GAO, Prateek Mishra, Paul E. Crittenden, Ryan Gergely
  • Publication number: 20240403436
    Abstract: The present disclosure relates generally to a security workbench and, more particularly, to a system, method and computer program product which integrates different scanner types into a single, integrated security tool. The method, for example, includes: integrating, by a computer system, a plurality of scanner types into a single tool; and displaying, by the computer system, an output of any of the plurality of scanner types run on software code in a standardized format in a graphical user interface of the tool.
    Type: Application
    Filed: May 31, 2023
    Publication date: December 5, 2024
    Applicant: ADP, INC.
    Inventors: Prateek Mishra, Jonathan S. Wright, Peter Faria, Carl C. Pereira, Kenneth D. Atkins, Gaurav Bhargava, Seena A. Iype
  • Publication number: 20240320255
    Abstract: A method comprises receiving a request to log at least one operation of a plurality operations, wherein the request includes one or more features of the at least one operation. The one or more features are analyzed using one or more machine learning algorithms. The method further comprises selecting, based at least in part on the analyzing, a log provider of a plurality of log providers to log the at least one operation, and interfacing with the log provider to enable logging of the at least one operation.
    Type: Application
    Filed: March 22, 2023
    Publication date: September 26, 2024
    Inventors: Bijan Kumar Mohanty, Hung Dinh, Prateek Mishra
  • Publication number: 20240210449
    Abstract: A power sensing circuit in a first voltage domain senses an input voltage from a second voltage domain and provides a power OK signal. The maximum supply voltage of the first voltage domain is above a maximum tolerance for devices in the first voltage domain. Accordingly, protection techniques are employed to ensure that the potential difference between any two terminals of devices in the power sensing circuit does not exceed the maximum tolerance limit. The protection techniques utilize reference voltage-based techniques including level shifting and use of protection devices in transistor stacks. An over-voltage tolerant Schmitt trigger circuit is also employed in the power sensing circuit. A trip point device on the input of the power sensing circuit utilizes a programmable bias voltage to adjust the trip point of the power sensing circuit to accommodate different maximum input voltages from the second voltage domain.
    Type: Application
    Filed: December 27, 2022
    Publication date: June 27, 2024
    Inventors: Thanapandi Ganesan, Prateek Mishra, Pramod Baliga Kokkada, Rajesh Mangalore Anand, Aniket Bharat Waghide, Animesh Jain, Girish Anathahally Singrigowda, Dhruvin Devangbhai Shah
  • Patent number: 11923852
    Abstract: A voltage level-shifting circuit for an integrated circuit includes an input terminal receiving a voltage signal referenced to an input/output (I/O) voltage level. A transistor overvoltage protection circuit includes a first p-type metal oxide semiconductor (PMOS) transistor includes a source coupled to the second voltage supply, a gate receiving an enable signal, and a drain connected to a central node. A first n-type metal oxide semiconductor (NMOS) transistor includes a drain connected to the central node, a gate connected to the input terminal, and a source connected to an output terminal. A second NMOS transistor includes a drain connected to the input terminal, a gate connected to the central node, and a source connected to the output terminal.
    Type: Grant
    Filed: September 28, 2021
    Date of Patent: March 5, 2024
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Prateek Mishra, Thanapandi G, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Girish Anathahalli Singrigowda, Animesh Jain
  • Publication number: 20240042704
    Abstract: A reconditioning device includes: a first shearing plate; a second shearing plate; and a housing. The housing includes: a first member configured to hold the first shearing plate and comprising an input for receiving a material; a second member connected to the first member to form an inner cavity, a portion of the inner cavity is located in a gap between the first shearing plate and the second shearing plate; and an output member connected to a pipeline of a production applicator and configured to output the material subsequent to shearing. The shaft extends through the second member, is connected to the second shearing plate, and is configured to be rotated to shear the material disposed in the gap between the first shearing plate and the second shearing plate.
    Type: Application
    Filed: August 3, 2022
    Publication date: February 8, 2024
    Inventors: Dalong GAO, Ryan GERGELY, Prateek MISHRA, Paul E. CRITTENDEN
  • Publication number: 20230098336
    Abstract: A voltage level-shifting circuit for an integrated circuit includes an input terminal receiving a voltage signal referenced to an input/output (PO) voltage level. A transistor overvoltage protection circuit includes a first p-type metal oxide semiconductor (PMOS) transistor includes a source coupled to the second voltage supply, a gate receiving an enable signal, and a drain connected to a central node. A first n-type metal oxide semiconductor (NMOS) transistor includes a drain connected to the central node, a gate connected to the input terminal, and a source connected to an output terminal. A second NMOS transistor includes a drain connected to the input terminal, a gate connected to the central node, and a source connected to the output terminal.
    Type: Application
    Filed: September 28, 2021
    Publication date: March 30, 2023
    Applicant: Advanced Micro Devices, Inc.
    Inventors: Prateek Mishra, Thanapandi G, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Girish Anathahalli Singrigowda, Animesh Jain
  • Patent number: 11526824
    Abstract: Systems and methods for determining whether a particular feature or change implemented in at least one test store causes a significant change as compared to one or more control stores are discussed. More particularly, techniques for using a time-series clustering algorithm to identify comparable sister stores to a store in which a feature change is being considered are described. Once the sister stores are identified a testing module can perform an A/B testing so as to validate whether a particular feature change being implemented in the test store causes a significant change as compared to the control stores.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: December 13, 2022
    Assignee: Walmart Apollo, LLC
    Inventors: Paridhi Kabra, Prateek Mishra, Jingying Zhang, Nitin Kapoor
  • Publication number: 20220368536
    Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
    Type: Application
    Filed: June 23, 2022
    Publication date: November 17, 2022
    Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
  • Patent number: 11463084
    Abstract: A level shifting output circuit converts a signal from a core voltage to an I/O voltage without causing voltage overstress on transistor terminals in the level shifting output circuit. The output circuit includes protection transistors to protect various transistors in the output circuit from overvoltage conditions including those transistors coupled to I/O power supply nodes.
    Type: Grant
    Filed: September 1, 2021
    Date of Patent: October 4, 2022
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Thanapandi Ganesan, Prateek Mishra, Jagadeesh Anathahalli Singrigowda, Dhruvin Devangbhai Shah, Animesh Jain, Girish Anathahalli Singrigowda
  • Patent number: 11405216
    Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: August 2, 2022
    Assignee: ADP, Inc.
    Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
  • Patent number: 11398900
    Abstract: Embodiments are directed to managing cryptographic keys in a multi-tenant cloud based system. Embodiments receive from a client a request for a wrapped data encryption key (“DEK”). Embodiments generate a random key and fetch encryption context that corresponds to the client. Embodiments generate the wrapped DEK including the random key and the encryption context encoded in the wrapped DEK. Embodiments then return the wrapped DEK to the client.
    Type: Grant
    Filed: February 7, 2019
    Date of Patent: July 26, 2022
    Assignee: Oracle International Corporation
    Inventors: Sirish V. Vepa, Prateek Mishra, Sreedhar Katti, Varanasi Kumar Ravi, Harold William Lockhart, Rakesh Keshava
  • Publication number: 20210351935
    Abstract: A method, apparatus, system, and computer program product are provided for managing the usage of verified credentials. An issuer of credentials receives a request from a person for a credential. The issuer identifies the credential from information that is controlled by the issuer. The issuer identifies a decentralized identifier (DID) record for an audit engine from a blockchain network. The DID record for the audit engine includes a public key of that is associated with the audit engine. The issuer identifies a DID record for the person from the blockchain network. The DID record for the person includes a public key that is associated with the person. The issuer generates an encrypted credential by encrypting the credential and the DID record for the person based on the public key associated with the audit engine. The issuer sends the encrypted credential to the person.
    Type: Application
    Filed: May 7, 2020
    Publication date: November 11, 2021
    Inventors: Prateek Mishra, Frank Villavicencio, Merajuddin Mohammad
  • Patent number: 11088993
    Abstract: An embodiment controls access to a resource, the access controlled by a multi-tenant system. Embodiments receive, at a web server, a request for the resource from a user via a web browser, the request including a Uniform Resource Locator (“URL”) associated with the resource and an identity of a tenant corresponding to the user. Embodiments determine an access policy for authenticating the user that is associated with the resource, the access policy based in part on the identity of the tenant. Embodiments then authenticate the user based on the determined access policy.
    Type: Grant
    Filed: August 12, 2019
    Date of Patent: August 10, 2021
    Assignee: Oracle International Corporation
    Inventors: Stephan Wardell, Andrew B Folkins, Vadim Lander, Prateek Mishra, Rich Levinson, Cory Womacks, Dino E. Cuthbert
  • Publication number: 20200402648
    Abstract: Examples provide a workforce manager that analyzes historical pharmacy transaction data to generate a set of forecasted future prescriptions for a selected pharmacy. The forecasted future prescriptions are divided into predicted new prescriptions and predicted refill prescriptions. The predicted refill prescriptions are classified into a set of high confidence refills and a set of low confidence refills. The labor demand associated with the set of high confidence refills are redistributed within a range of pickup dates associated with each high confidence refill prescription to smooth labor demand minimizing variation within a selected time-period. A number of personnel are identified for each day in the selected time-period based on the smoothed labor demand. A schedule is published assigning at least a portion of the forecasted future prescriptions and the number of personnel to each day in the selected time-period is output.
    Type: Application
    Filed: August 5, 2019
    Publication date: December 24, 2020
    Inventors: Shreyan Ghosh, Akash Verma, Prateek Mishra
  • Publication number: 20200364644
    Abstract: Systems and methods for determining whether a particular feature or change implemented in at least one test store causes a significant change as compared to one or more control stores are discussed. More particularly, techniques for using a time-series clustering algorithm to identify comparable sister stores to a store in which a feature change is being considered are described. Once the sister stores are identified a testing module can perform an A/B testing so as to validate whether a particular feature change being implemented in the test store causes a significant change as compared to the control stores.
    Type: Application
    Filed: May 13, 2020
    Publication date: November 19, 2020
    Inventors: Paridhi Kabra, Prateek Mishra, Jingying Zhang, Nitin Kapoor
  • Patent number: 10581820
    Abstract: Key generation and roll over is provided for a cloud based identity management system. A key set is generated that includes a previous key and expiration time, a current key and expiration time, and a next key and expiration time, and stores the key set in a database table and a memory cache associated with the database table. At the current key expiration time, the key set is rolled over, including retrieving the key set from the database table, updating the previous key and expiration time with the current key and expiration time, updating the current key and expiration time with the next key and expiration time, generating a new key and expiration time, updating the next key and expiration time with the new key and expiration time, and updating the key set in the database table and the memory cache.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: March 3, 2020
    Assignee: Oracle International Corporation
    Inventors: Rakesh Keshava, Sreedhar Katti, Sirish Vepa, Vadim Lander, Prateek Mishra
  • Publication number: 20190394024
    Abstract: Embodiments are directed to managing cryptographic keys in a multi-tenant cloud based system. Embodiments receive from a client a request for a wrapped data encryption key (“DEK”). Embodiments generate a random key and fetch encryption context that corresponds to the client. Embodiments generate the wrapped DEK including the random key and the encryption context encoded in the wrapped DEK. Embodiments then return the wrapped DEK to the client.
    Type: Application
    Filed: February 7, 2019
    Publication date: December 26, 2019
    Inventors: Sirish V. VEPA, Prateek MISHRA, Sreedhar KATTI, Varanasi Kumar RAVI, Harold William LOCKHART, Rakesh KESHAVA
  • Publication number: 20190364020
    Abstract: An embodiment controls access to a resource, the access controlled by a multi-tenant system. Embodiments receive, at a web server, a request for the resource from a user via a web browser, the request including a Uniform Resource Locator (“URL”) associated with the resource and an identity of a tenant corresponding to the user. Embodiments determine an access policy for authenticating the user that is associated with the resource, the access policy based in part on the identity of the tenant. Embodiments then authenticate the user based on the determined access policy.
    Type: Application
    Filed: August 12, 2019
    Publication date: November 28, 2019
    Inventors: Stephan WARDELL, Andrew B. FOLKINS, Vadim LANDER, Prateek MISHRA, Rich LEVINSON, Cory WOMACKS, Dino E. CUTHBERT