Patents by Inventor Praveen Kumar
Praveen Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11564885Abstract: Pharmaceutical formulation comprising centanafadine or a pharmaceutically acceptable salt thereof and an excipient, and related methods of manufacture and use, are disclosed.Type: GrantFiled: February 22, 2022Date of Patent: January 31, 2023Assignee: OTSUKA PHARMACEUTICAL CO, LTD.Inventors: Syed Asfar Mateen, Praveen Kumar Mididoddi, Shailly Mehrotra, Susan Elizabeth Shoaf, Salin Gupta, Kai Suzuki, Masahiro Hasegawa
-
Patent number: 11567930Abstract: Methods and systems are disclosed for data retrieval, from databases to clients, in an environment requiring runtime authorization. In response to a request for T data records, a learning module provides a prediction R of a suitable number of data records to retrieve from a database. Following retrieval of R records or record identifiers, authorization is sought from an authorization service, resulting in A of the records being authorized. The A authorized records are returned to the requesting client, and, if more records are needed, T is decremented and the cycle is repeated. A performance notification is provided to the learning module for training, with respect to providing values of prediction R. The performance notification can be based on a measure of authorization service performance, the number A of authorized records, latency, communication or resource costs, a measure of resource congestion, or other parameters. Variants are disclosed.Type: GrantFiled: April 25, 2017Date of Patent: January 31, 2023Assignee: SAP SEInventors: Apoorv Bhargava, Madathiveetil Bipin, Markus Schmidt-Karaca, Ismail Basha, Gonda Marcusse, Vishnu Kare, Praveen Kumar, Neenu Vincent
-
Patent number: 11567893Abstract: The present disclosure relates to a mirrored serial interface (MSI) for accessing peripherals through four wire serial interface. More particularly, the present disclosure is related to serial peripheral protocol with looped back mechanism in which contents of source data line are looped back onto the destination line and compared at every clock edge to ensure data sanity and to assert presence of slave and master device during and between cycles.Type: GrantFiled: May 15, 2017Date of Patent: January 31, 2023Assignee: CENTRE FOR DEVELOPMENT OF TELEMATICS (C-DOT)Inventors: Kashish Anand, Ashok Gupta, Atul Kumar Gupta, Praveen Kumar Mathur, Vipin Tyagi
-
Patent number: 11567792Abstract: An instruction to generate a cloud instantiation of a secondary storage system is provided. One or more secondary storage clusters are virtually rebuilt in the cloud instantiation of the secondary storage system. A new cloud instance of a user virtual machine is deployed based on at least a portion of data stored in the one or more rebuilt secondary storage clusters of the cloud instantiation of the secondary storage system. A version of at least the portion of the data of the one or more rebuilt secondary storage clusters is provided to a cloud deployment server.Type: GrantFiled: September 10, 2020Date of Patent: January 31, 2023Assignee: Cohesity, Inc.Inventors: Venkata Ranga Radhanikanth Guturi, Tushar Mahata, Praveen Kumar Yarlagadda, Vipin Gupta
-
Publication number: 20230028389Abstract: Disclosed is a system for generating personalized recommendations based on dynamic and customized content selections and modeling of the content selections. The system may receive a request with an identifier and a query, and may obtain a particular recommendation configuration based the identifier and the query. The system may retrieve a set of content that satisfies the query and that is identified with at least one content prioritization parameter specified in the particular recommendation configuration, may generate a set of models of one or more model types that model relevance between the set of content and a different event specified in the particular recommendation configuration, and may compute a score for each content in each model based on the modeled relevance. The system may present recommended content in a different order than the set of content based on aggregate scores compiled for each content from the set of models.Type: ApplicationFiled: July 21, 2021Publication date: January 26, 2023Applicant: Verizon Patent and Licensing Inc.Inventors: Vamshi Gillipalli, Haripriya Srinivasaraghavan, Yogalakshmi Narayanasamy, Praveen Kumar Bandaru, Sirisha Sripathi, Abhishek A. Desai, Zhiqun Wang
-
Publication number: 20230015002Abstract: A method of memory reset includes precharging bit lines of a memory array, asserting a signal at a reset node to remove the precharge voltage, and selecting write drivers associated with the bit lines associated with columns of the memory array that contain memory cells to be reset, with the assertion of the signal at the reset node also resulting in application of desired logic states to inputs of the selected write drivers to cause those selected write drivers to change a logic state of the bit lines associated with those write drivers. The method continues with asserting each word line associated with a row of the memory that contains memory cells to be reset to write desired logic states to all of the memory cells of the columns and rows of the memory to be reset during a single clock cycle, and then deasserting those word lines.Type: ApplicationFiled: June 29, 2022Publication date: January 19, 2023Applicant: STMicroelectronics International N.V.Inventors: Harsh RAWAT, Praveen Kumar VERMA
-
Publication number: 20230018420Abstract: A method of corrupting contents of a memory array includes asserting a signal at a reset node to thereby cause starving of current supply to the memory array, and selecting bit lines and complementary bit lines associated with desired columns of the memory array that contain memory cells to have their contents corrupted. For each desired column, a logic state of its bit line and complementary bit line are forced to a same logic state. Each word line associated with desired rows of the memory array that contains memory cells to have their contents corrupted is simultaneously asserted, and then simultaneously deasserted to thereby place each memory cell to have its contents corrupted into a metastable state during a single clock cycle.Type: ApplicationFiled: June 29, 2022Publication date: January 19, 2023Applicant: STMicroelectronics International N.V.Inventors: Praveen Kumar VERMA, Promod KUMAR, Harsh RAWAT
-
Patent number: 11551391Abstract: Digital image dynamic shadow generation is described as implemented by a dynamic shadow system using one or more computing devices. The dynamic shadow system is configured to generate shadow objects based on one or more source objects included in a digital image (e.g., a two-dimensional digital image), automatically and without user intervention. The shadow object is based on a shape of the source object that is to “cast” the shadow and thus promotes realism. The shadow object is also generated by the dynamic shadow system to address an environment, in which, the shadow object is disposed within the digital image.Type: GrantFiled: February 15, 2021Date of Patent: January 10, 2023Assignee: Adobe Inc.Inventors: Rakesh Baidya, Praveen Kumar Dhanuka, Nitin Sharma, Arushi Jain
-
Publication number: 20230006717Abstract: In one embodiment, a method includes sending SRS received from a plurality of UEs associated with the base station to a DU associated with the base station, receiving information regarding a subset of the plurality of UEs selected for downlink data transmissions for an RBG, multi-user data to be transmitted to UEs in the subset, and identities of selected beams among a plurality of pre-determined beams to be associated with the UEs in the subset from the DU, where each of the plurality of pre-determined beams corresponds to a DFT vector, computing a precoding matrix for the RBG based on IDFT vectors corresponding to the selected beams, preparing pre-coded multi-user data by applying the precoding matrix to the multi-user data, and transmitting the pre-coded multi-user data to the UEs in the subset for the RBG using MIMO technologies.Type: ApplicationFiled: September 13, 2022Publication date: January 5, 2023Inventors: Mustafa Emin Sahin, Brett Eric Schein, Djordje Tujkovic, Krishna Srikanth Gomadam, Po Han Huang, Praveen Kumar Gopala
-
Publication number: 20230005195Abstract: In implementations for free form radius editing, a computing device implements a radius editing system, such as may be integrated with an image editing application. The radius editing system can determine the edge segments for outlines of image objects depicted in a digital image, where the edge segments include corner segments of the image objects. The radius editing system can also determine the radius values of the corner segments of the image objects, and the radius values of the corner segments are maintained in a cache as part of object data corresponding to the image objects depicted in the digital image. The radius editing system can also identify one or more similar corner segments of the image objects that have an equivalent radius value as a selected corner segment responsive to an editing input of a radius of the selected corner segment of an image object.Type: ApplicationFiled: June 30, 2021Publication date: January 5, 2023Applicant: Adobe Inc.Inventors: Arushi Jain, Praveen Kumar Dhanuka, Gaurav Jain
-
Patent number: 11546379Abstract: Examples provided herein describe a method for providing security for Internet of Things (IoT) devices. For example, a data packet from an IoT device may be received at an edge device. A signature associated with the IoT device may be accessed at the edge device, where the signature includes network layer information about the IoT device. A set of rules may be applied by the edge device to validate the IoT device based on the accessed signature. Responsive to the IoT device being validated based on the accessed signature, received data packet, and the applied set of rules, the edge device may process the data packet from the IoT device.Type: GrantFiled: January 31, 2018Date of Patent: January 3, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Ramlakhan Patel, Ankit Kumar Sinha, Praveen Kumar Arora, Rangaprasad Sampath
-
Patent number: 11544683Abstract: Systems, methods, and computer program products for a contactless automated teller machine (ATM) experience receive, from a telephone number, a first short message service (SMS) message including a unique identifier associated with an ATM terminal; in response to receiving the first SMS message, communicate, to the ATM terminal, a first password associated with the telephone number and the unique identifier; receive, from the telephone number, a second SMS message including the first password; verify the first password; in response to verifying the first password, transmit, to the telephone number, a third SMS message including an option to withdraw cash from the ATM terminal; receive, from the telephone number, a fourth SMS message including a selection of the option to withdraw the cash from the ATM terminal; and communicate, to the ATM terminal, a cash dispense command that causes the ATM terminal to dispense the cash.Type: GrantFiled: October 26, 2020Date of Patent: January 3, 2023Assignee: Visa International Service AssociationInventors: Praveen Kumar Suresh Guggarigoudar, Vahini Mohan
-
Patent number: 11537414Abstract: An executable application's architecture may be mapped by executing the executable application, inputting a series of request data sets into the executable application, receiving one or more responses from the executable application, and performing an evaluation based on the responses. One or more indications of an architectural component may be extracted from metadata associated with the one or more received responses and associated with a corresponding request data set of the series of request data sets. The one or more indications of an architectural component may be associated with processing by the executable application of the corresponding request data set of the series of request data sets. An architecture of the executable application may be determined based on the one or more indications of an architectural component.Type: GrantFiled: June 4, 2020Date of Patent: December 27, 2022Assignee: Bank of America CorporationInventors: Srikanth Vemula, Sasidhar Purushothaman, Austin J. Fernandez, Praveen Kumar Kondabathini
-
Patent number: 11537574Abstract: Techniques are disclosed relating to performing database defragmentation operations by autonomously rebuilding index objects stored in one or more tablespaces of a database. In various embodiments, the disclosed techniques include autonomously performing defragmentation operations for one or more tablespaces in a database in an online manner such that a server system may continue to service data access requests while performing the defragmentation operations. In one non-limiting embodiment, for example, the disclosed techniques include selecting a first tablespace to defragment based on its level of fragmentation (e.g., relative to the other tablespaces). The server system may then rebuild index objects, from the first tablespace, to a new tablespace such that the index objects are stored in the new tablespace without fragmentation.Type: GrantFiled: July 20, 2020Date of Patent: December 27, 2022Assignee: salesforce.com, inc.Inventors: Suresh Nagayanallur Subramanian, Manzoor Ahamed Sulthan, Yoram Tal, Kranthi Baddepuri, Subramanian Sathasivam, Dinesh reddy Parvata reddy, Praveen Kumar Rotam
-
Patent number: 11538051Abstract: Techniques are described for machine learning-based generation of target segments is leveraged in a digital medium environment. A segment targeting system generates training data to train a machine learning model to predict strength of correlation between a set of users and a defined demographic. Further, a machine learning model is trained with visit statistics for the users to predict the likelihood that the users will visit a particular digital content platform. Those users with the highest predicted correlation with the defined demographic and the highest likelihood to visit the digital content platform can be selected and placed within a target segment, and digital content targeted to the defined demographic can be delivered to users in the target segment.Type: GrantFiled: October 23, 2018Date of Patent: December 27, 2022Assignee: Adobe Inc.Inventors: Praveen Kumar Goyal, Piyush Gupta, Nikaash Puri, Balaji Krishnamurthy, Arun Kumar, Atul Kumar Shrivastava
-
Patent number: 11531658Abstract: A method and apparatus for criterion-based retention of data object versions are disclosed. In the method and apparatus, a plurality of keys are sorted in accordance with an ordering scheme, whereby a key of the plurality of keys has an associated version of a data object and a timestamp. The key is inspected in accordance with the ordering scheme to determine based at least in part on the timestamp whether a criterion for performing an action on the associated version of the data object is satisfied. If the criterion is satisfied, a marker key is added to the plurality of keys, whereby the marker key precedes the inspected key according to the ordering scheme and indicates that the criterion is satisfied.Type: GrantFiled: December 9, 2019Date of Patent: December 20, 2022Assignee: Amazon Technologies, Inc.Inventors: Praveen Kumar Gattu, Aykud Gonen, Jonathan Jorge Nadal, Abhilasha Seth, Joseph Thomas Selman
-
Publication number: 20220398163Abstract: A high frequency snapshot technique improves data replication in a disaster recovery (DR) environment. A base snapshot is generated from failover data at a primary site and replicated to a placeholder file at a secondary site. Upon commencement of the base snapshot generation and replication, incremental light weight snapshots (LWSs) of the failover data are captured and replicated to the secondary site. A staging file at the secondary site accumulates the replicated LWSs (“high-frequency snapshots”). The staging file is populated with the LWSs in parallel with the replication of the base snapshot at the placeholder file. At a subsequent predetermined time interval, the accumulated LWSs are synthesized to capture a “checkpoint” snapshot by applying and pruning the accumulated LWSs at the staging file. Once the base snapshot is fully replicated, the pruned LWSs are merged to the base snapshot to synchronize the replicated failover data.Type: ApplicationFiled: July 29, 2021Publication date: December 15, 2022Inventors: Angshuman Bezbaruah, Kiran Tatiparthi, Mahesh Venkataramaiah, Pranay Kumar Ega, Praveen Kumar Padia, Ramya Bolla, Sudhir Ravi
-
Publication number: 20220400067Abstract: A network element is herein disclosed. The network element comprises an embedded device having one or more property affecting a function of the embedded device; a computing system having a processor and a memory, the memory being a non-transitory computer-readable medium storing a performance monitoring domain agent, a performance monitoring collector daemon, and a performance monitoring logger. The performance monitoring collector daemon is processor-executable code that when executed by the processor causes the processor to communicate with the embedded device and collect one or more performance information of the embedded device based on the one or more property.Type: ApplicationFiled: June 15, 2022Publication date: December 15, 2022Inventors: Praveen Kumar Pal, Dharmendra Naik, Madhav Kothapalli
-
Patent number: 11525698Abstract: A computer is programmed to allocate respective connectivity quality data of a geographic area to a first map or a second map. The computer is further programmed to assign one of a plurality of subsets of the first map and one of a plurality of subsets of the second map to a first vehicle, identify respective locations of the first and second vehicles and one of the first or second maps that includes the locations of the first and second vehicles. The computer is further programmed to send, to the first and second vehicles, a map dataset that is a result of applying an XOR function to (1) the subset of the identified map that includes the location of the first vehicle assigned to the first vehicle and (2) the subset of the identified map that includes the location of the second vehicle assigned to the second vehicle.Type: GrantFiled: May 22, 2020Date of Patent: December 13, 2022Assignee: FORD GLOBAL TECHNOLOGIES, LLCInventors: Mohsen Bahrami, Navid Tafaghodi Khajavi, Hamed Asadi, Praveen Kumar Yalavarty
-
Patent number: RE49366Abstract: Systems are provided for logging transactions in heterogeneous networks that include a combination of one or more instrumented components and one or more non-instrumented components. The instrumented components are configured to generate impersonated log records for the non-instrumented components involved in the transaction processing hand-offs with the instrumented components. The impersonated log records are persisted with other log records that are generated by the instrumented components in a transaction log that is maintained by a central logging system to reflect a complete flow of the transaction processing performed on the object, including the flow through the non-instrumented component(s).Type: GrantFiled: November 16, 2021Date of Patent: January 10, 2023Assignee: Microsoft Technology Licensing, LLCInventors: David Christopher Wright, Arijit Chatterjee, Qingqing Yuan, Praveen Kumar Barli, Basaveshwar S. Hiremath, Nosheen M. Syed, Autumn Lee Johnson