Patents by Inventor Rahul Kumar
Rahul Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250260893Abstract: This disclosure provides methods, components, devices and systems for composite content capture across multiple wireless devices. Some aspects more specifically relate to establishing or action performed in a wireless network including a primary wireless device and one or more secondary wireless devices. In some examples, each secondary wireless devices may transmit images to the primary wireless device based on an indication of one or more content capture parameters. The primary wireless device may determine an alignment between the images of the primary wireless device and the one or more secondary wireless devices, and may transmit adjustment information indicating one or more respective adjustment parameters (such as rotate, tilt, move, or the like) to at least some of the secondary wireless devices. In some examples, the primary wireless device may generate a composition of the adjusted images of each of the secondary devices and the image of the primary wireless device.Type: ApplicationFiled: February 14, 2024Publication date: August 14, 2025Inventors: Akash SAMBHANGI, Surendrareddy TIPPAREDDY, Rahul Kumar POSANAGIRI
-
Publication number: 20250247794Abstract: Methods and Wi-Fi devices that utilize the target wake time (TWT) feature of the Wi-Fi specification along with delayed TCP acknowledgment are disclosed. When using TWT and delayed TCP acknowledgment, the low power Wi-Fi device checks to see if the size of the payload is less than a predetermined value. By checking the size of the payload, the low power Wi-Fi device can quickly determine whether the received packet may be related to TCP connection/Application protocol connection maintenance. Based on this determination, if necessary, the low power Wi-Fi device can transmit an acknowledgment during the same TWT service period, thereby minimizing the chance that the TCP connection will be terminated.Type: ApplicationFiled: January 30, 2024Publication date: July 31, 2025Inventors: Rahul Kumar Gurram, Atul Suresh Joshi, Satish Nallamalla, Venkatesh Vinjamuri
-
Publication number: 20250247878Abstract: A system can, for respective user equipment (UE) of a group of UE for which broadband cellular communications are being facilitated via a network comprising the system, determine respective establishment causes, determine respective bearer types, and determine respective priority levels, wherein a first weight associated with the respective establishment causes is greater than a second weight associated with the respective bearer types, which is greater than a third weight associated with a priority level. The system can rank the respective UE based on the respective establishment causes, the respective bearer types, the respective priority levels, the first weight, the second weight, and the third weight to produce respective rankings of the respective user equipment. The system can, in response to determining that a serving-capacity criterion is satisfied with respect to the group of UE and based on the respective rankings, prioritize service offered to the respective UE.Type: ApplicationFiled: January 25, 2024Publication date: July 31, 2025Inventors: Chethan Kumar Thandramaradahalli Earappa, Devang Manoj Sharma, Rahul Kumar Mishra, Manbir Kaur, Ravi Sharma, Satish Venkob
-
Publication number: 20250240299Abstract: Embodiments of the present invention provide a system for generating masked virtual resource credentials for processing resource interactions. The system is configured for generating a masked virtual resource credential for a resource pool associated with a user, wherein the user is associated with an entity that is associated with the resource pool, displaying the masked virtual resource credential, via a user interface of an entity application associated with the entity, receiving a resource interaction from a third party entity system initiated by the user using the masked virtual resource credential at a third party entity location, wherein the resource interaction comprises the masked virtual resource credential, processing the resource interaction based on the masked virtual resource credential received from the third party, and completing the resource interaction by transferring of resources from the resource pool of a user to a third party resource pool associated with the third party entity.Type: ApplicationFiled: January 24, 2024Publication date: July 24, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Malinda Mae Kieffer, Kiran Boosetty, Gerard P. Gay, Andrzej Grabski, Rahul Kumar Mishra, Samuel M. Moiyallah, JR., Susan Moss, Donna Lee Phillips, Robert Ronald Rosseland, Jr., Ravinder Kaur Sodhi, Tanya A. Wilson
-
Patent number: 12368691Abstract: Systems, computer program products, and methods are described herein for generating alternative information formats using advanced computational models for data analysis and automated processing.Type: GrantFiled: October 24, 2023Date of Patent: July 22, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Malinda Kieffer, Tanya A. Wilson, Susan J. Moss, Andrzej Grabski, Kiran Boosetty, Donna Lee Phillips, Gerard P. Gay, Robert Ronald Rosseland, Jr., Ravinder Kaur Sodhi, Rahul Kumar Mishra, Samuel M. Moiyallah, Jr.
-
Publication number: 20250224946Abstract: Systems, computer program products, and methods are described herein for determining module interdependency using advanced computational models for data analysis and automated processing.Type: ApplicationFiled: January 4, 2024Publication date: July 10, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Malinda Kieffer, Tanya A. Wilson, Susan J. Moss, Andrzej Grabski, Kiran Boosetty, Donna Lee Phillips, Robert Ronald Rosseland, JR., Ravinder Kaur Sodhi, Rahul Kumar Mishra, Samuel M. Moiyallah, JR., Gerard P. Gay
-
Patent number: 12335418Abstract: Systems, computer program products, and methods are described herein for monitoring an artificial intelligence (AI) engine. The present invention is configured to receive, from a first network device, a first set of decision parameters associated with an AI engine; encrypt the first set of decision parameters, generating an encrypted dataset; store the encrypted dataset on a transaction object; receive, from a second network device, an output associated with the AI engine; update the transaction object based on the output associated with the AI engine; and transmit a notification to the first network device, wherein the notification comprises a decrypted dataset.Type: GrantFiled: October 10, 2022Date of Patent: June 17, 2025Assignee: BANK OF AMERICA CORPORATIONInventors: Sanjeev J. Nair, Rahul Kumar Mishra, Pushkar Gahlaut
-
Patent number: 12326950Abstract: Methods, system, and non-transitory processor-readable storage medium for a policy proposal system are provided herein. An example method includes applying at least one policy to data stored on a storage system to identify matched data, where the matched data is data to be moved from the storage system to a secondary storage system. The policy proposal system identifies unmatched data stored on the storage system, where the unmatched data is data that is not identified as the data to be moved from the storage system to the secondary storage system. The policy proposal system trains a machine learning system with the matched data and the unmatched data. The policy proposal system predicts at least one new policy, where application of at least one new policy identifies at least a subset of the unmatched data to be moved from the storage system to the secondary storage system.Type: GrantFiled: February 4, 2022Date of Patent: June 10, 2025Assignee: Dell Products L.P.Inventors: Priyamrita Ghosh, Anurag Bhatnagar, Parimal Patil, Rahul Kumar Pathak
-
Publication number: 20250175343Abstract: An embedded system includes hash message authentication code (HMAC) hardware. The HMAC hardware receives data in separate data transfers to compute a hash. The HMAC hardware receives data of unaligned lengths in at least one of the separate data transfers. The data of unaligned lengths includes fewer valid bytes than the transfer size. The HMAC hardware responds to a residue indication indicating valid bytes associated with the data transfer to fill in the residue from a subsequent data transfer. For each data transfer the HMAC hardware receives an indication of whether the data is final data or if more data will be transferred for computation of the hash. The embedded system loads a linear buffer directly from scatter buffers, which contain encrypted data from a network. Decrypted data in the linear buffer is sent to a host using a direct memory access (DMA) operation responsive to a host request.Type: ApplicationFiled: November 27, 2023Publication date: May 29, 2025Inventors: Venkatesh Vinjamuri, Subba Reddy Kallam, Atul Suresh Joshi, Venkata Siva Prasad Pulagam, Satish Nallamalla, Rahul Kumar Gurram
-
Publication number: 20250173640Abstract: Systems, computer program products, and methods are described herein for the implementation of an alternative data management system. The method includes dividing a process into one or more tasks, including a first task, to be completed. The method also includes determining a first task availability status for the first task. The first task availability status indicates whether the first task can be started by a user. The first task availability is designated as waiting in an instance in which at least one prerequisite task exists for the first task. The method includes causing the first task availability status to be changed from waiting to ready in an instance in which at least a portion of the prerequisite task(s) is completed. The method further includes assigning the first task to a first user in an instance in which the first user finishes one of the one or more tasks.Type: ApplicationFiled: November 27, 2023Publication date: May 29, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Tanya A. Wilson, Malinda Kieffer, Ravinder Kaur Sodhi, Robert Ronald Rosseland, JR., Donna Lee Phillips, Rahul Kumar Mishra, Kiran Boosetty, Gerard P. Gay, Samuel M. Moiyallah, JR., Susan J. Moss, Andrzej Grabski
-
Patent number: 12314700Abstract: An example method of upgrading an application in a software-defined data center (SDDC) includes: deploying, by lifecycle management software executing in the SDDC, a second appliance, a first appliance executing services of the application at a first version, the second appliance having services of the application at a second version, the services in the first appliance being active and the services in the second appliance being inactive; setting, by the lifecycle management software, the first and second appliances as a preemptive pair, where the first appliance is protected and the second appliance is unprotected by fault domain management (FDM) software executing in the SDDC; performing, by the lifecycle management software, a switchover to stop the services of the first appliance and start the services of the second appliance; and setting, by the lifecycle management software, the first appliance as unprotected and the second appliance as protected by the FDM software.Type: GrantFiled: November 3, 2022Date of Patent: May 27, 2025Assignee: VMware LLCInventors: Sandeep Sinha, Aniket Avinash Sakhardande, Rahul Kumar Singh, Chandrika Mutalik, Akash Kodenkiri, Vasantha Kumari Tammana
-
Publication number: 20250165605Abstract: Systems and methods are provided for enforcement of validated operations of hardware components installed in an IHS (Information Handling System), such as a rack-mounted server. During factory provisioning of the IHS, a factory-signed inventory certificate is uploaded to the IHS that identifies its factory-installed hardware and also identifies validated firmware used to operate each factory-installed hardware component. This inventory certificate is used to validate that the detected hardware and firmware of the IHS are genuine. When a firmware discrepancy is detected during these validations, further operation of the IHS may be halted until the factory-provisioned firmware is restored, as determined based on the inventory certificate, thus enforcing operation of the factory-installed hardware to operation using factory-provisioned firmware.Type: ApplicationFiled: November 16, 2023Publication date: May 22, 2025Applicant: Dell Products, L.P.Inventors: A Anis Ahmed, Jason Matthew Young, AVS SashiKiran, Sivakumar Boopathirajan, Rahul Kumar Pandey
-
Patent number: 12299468Abstract: Described herein are systems, methods, and software to manage resources for networking operations on a host computing system. In one implementation, a hypervisor on a host computing system, may monitor computing resources used by a networking process provided by the hypervisor. The hypervisor further determines that the one or more computing resources used by the networking process satisfy at least one criterion and, in response to determining that the computing resources satisfy at least one criterion, notifies one or more virtual machines supported by the hypervisor to modify one or more execution parameters associated with at least one application in each of the one or more virtual machines.Type: GrantFiled: March 17, 2020Date of Patent: May 13, 2025Assignee: VMWare LLCInventors: Shivali Sharma, Vasantha Kumar Dhanasekar, Rahul Kumar, Rayanagouda Bheemanagouda Patil
-
Publication number: 20250136610Abstract: The present disclosure encompasses solid state forms of Trilaciclib and Trilaciclib citrate salt, in embodiments poly-morphs of Trilaciclib and Trilaciclib citrate salt, processes for preparation thereof, pharmaceutical compositions and uses thereof.Type: ApplicationFiled: February 28, 2023Publication date: May 1, 2025Inventors: Anantha Rajmohan Muthusamy, Rahul Kumar Reddy Putikum, Prathap Rengaraj, Amit Singh, Rushikesh Vilasrao Kadu, Satnam Singh
-
Publication number: 20250133045Abstract: Systems, computer program products, and methods are described herein for generating alternative information formats using advanced computational models for data analysis and automated processing.Type: ApplicationFiled: October 24, 2023Publication date: April 24, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Malinda Kieffer, Tanya A. Wilson, Susan J. Moss, Andrzej Grabski, Kiran Boosetty, Donna Lee Phillips, Gerard P. Gay, Robert Ronald Rosseland, JR., Ravinder Kaur Sodhi, Rahul Kumar Mishra, Samuel M. Moiyallah, JR.
-
Publication number: 20250121423Abstract: A press system and a method of manufacturing a hot stamped structural component from a sheet blank within a press system is provided. The press system comprises a controlled atmosphere system and a press tool apparatus. The press tool apparatus comprises a lower body member, an upper body member, an upper die member, a lower die member, and a heating device configured to heat a sheet blank. The upper die member and the lower die member are configured to perform hot blanking with stamping and in-die quenching on the heated sheet blank in the atmosphere controlled by the controlled atmosphere system to form the hot stamped structural component. By controlling the atmosphere during formation of the hot stamped structural component generation of oxides scales are suppressed.Type: ApplicationFiled: September 1, 2022Publication date: April 17, 2025Inventors: G. MANIKANDAN, Dasu Venkat RAJU, Rahul Kumar VERMA, Abhishek RAJ
-
Publication number: 20250086664Abstract: A system and a method to determine a technology used by a user is disclosed. The system receives user data comprising job titles, skills, and job summaries. Further, technology categorization data is generated based on the user data. The technology categorization data comprises technology category and technology subcategory mapped to a user department and a user division. The system further extracts a keyword and a set of buffer keywords from the user data. Subsequently, the system determines a context of the user data based on the set of buffer keywords of the keyword. The technology used by the user may be determined upon comparing the keyword and the context with a predefined pattern sheet. The system validates the technology with the technology categorization data.Type: ApplicationFiled: September 9, 2024Publication date: March 13, 2025Inventors: Tarun Bansal, Anurag Bhatt, Rahul Bhattacharya, Deepak Anchala, Gajanan Sabhahit, Sarthak Gupta, Shubham Gupta, Rahul Kumar Singh, Tanuj Prakash
-
Publication number: 20250086202Abstract: Systems, methods and computer-readable memory devices are provided for greater efficiency in the configuration of a database cluster for performing a query workload. A database cluster configuration system is provided that includes a database cluster comprising one or more compute resources configured to perform database queries. A query workload comprising a plurality of queries is received. An initial workload-level configuration is applied. For each query of the query workload, a query-level configuration is generated using a query configuration model corresponding to each query in a contextual Bayesian optimization with centroid learning while also leveraging the query plan for each executing query for query characterization and including application of virtual operators. Query events are collected and used to update the corresponding query configuration model. The workload-level configuration is updated based on the query events and cached for use during a subsequent execution of the workload.Type: ApplicationFiled: September 13, 2023Publication date: March 13, 2025Inventors: Yiwen ZHU, Subramaniam Venkatraman KRISHNAN, Weihan TANG, Tengfei HUANG, Rui FANG, Rahul Kumar CHALLAPALLI, Mo LIU, Long TIAN, Karuna Sagar KRISHNA, Estera Zaneta KOT, Xin HE, Ashit R. GOSALIA, Dario Kikuchi BERNAL, Aditya LAKRA, Arshdeep SEKHON, Sule KAHRAMAN, Carlo Aldo CURINO, Brian Paul KROTH, Rathijit SEN, Andreas Christian MUELLER, Shaily Jignesh FOZDAR, Dhruv Harendra RELWANI, Xiang LI, Sergiy MATUSEVYCH
-
Publication number: 20250068415Abstract: Systems, computer program products, and methods are described herein for advanced computation models for data analysis and automated decision-making for code change scheduling conflicts. The present disclosure is configured to receive a proposed code change associated with an electronic ecosystem from an end user; compile a set of planned code changes within a code change database; compare the proposed code change against the set of planned code changes; determine a set of affected operations by the proposed code change and the set of planned code changes within the electronic ecosystem using the advanced computation models for data analysis and automated decision-making; determine if a code change scheduling conflict exists between the proposed code change and the set of planned code; and transmit a notification to the end user upon determination of the code change scheduling conflict indicating the proposed code change conflicts with the set of planned code changes.Type: ApplicationFiled: August 23, 2023Publication date: February 27, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Susan Moss, Kiran Boosetty, Richard Michael Foster, Richard J. Fulginiti, Jr., Gerard P. Gay, Andrzej Grabski, Malinda Mae Kieffer, Rahul Kumar Mishra, Samuel M. Moiyallah, JR., Donna Lee Phillips, Robert Ronald Rosseland, Jr., Ravinder Kaur Sodhi, Tanya A. Wilson
-
Publication number: 20250068937Abstract: Systems, computer program products, and methods are described herein for determining verification characteristics of an advanced computational model for data analysis and automated decision-making. The present disclosure is configured to receive, from a user device, a user prompt, wherein the user device is associated with a user. Further, the present disclosure is configured to receive one or more verification questions. Further still, the present disclosure is configured to interrogate, in response to receiving the one or more verification questions, an artificial intelligence model. Further still, the present disclosure is configured to receive, in response to interrogating the artificial intelligence model, one or more verification answers. Further still, the present disclosure is configured to analyze the one or more verification answers.Type: ApplicationFiled: August 24, 2023Publication date: February 27, 2025Applicant: BANK OF AMERICA CORPORATIONInventors: Malinda Kieffer, Tanya A. Wilson, Susan J. Moss, Andrzej Grabski, Kiran Boosetty, Donna Lee Phillips, Gerard P. Gay, Robert Ronald Rosseland, Jr., Ravinder Kaur Sodhi, Rahul Kumar Mishra, Samuel M. Moiyallah, Jr.