Patents by Inventor Rajesh Sharma
Rajesh Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250022105Abstract: A computing device is provided. The computing device may include a first camera configured to capture a primary image sequence of a scene, and a second camera configured to substantially concurrently capture a secondary image sequence of the scene. The computing device may include a processor configured to execute instructions stored in memory to obtain a depth map for an image of the primary image sequence, and based on the depth map, generate a reference frame of background pixels from the primary image sequence. The processor may be configured to execute the instructions to detect an intrusive object in the secondary image sequence, replace the intrusive object in the primary image sequence with corresponding background pixels of the reference frame to generate a modified primary image sequence, and output on a display at least one image of the modified primary image sequence.Type: ApplicationFiled: September 27, 2024Publication date: January 16, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Chandrasekhar NANJEGOWD, Rajesh YADAV, Naveen Kumar YADAV, Dimple SHARMA
-
Patent number: 12144410Abstract: A nail display device comprising a display configured to be removably mounted relative to a nail of a user, and at least one control board associated with the display to control media displayed on the display.Type: GrantFiled: March 11, 2022Date of Patent: November 19, 2024Assignee: CAPTIVATIUN LIMITEDInventor: Rajesh Sharma
-
Publication number: 20240380778Abstract: A method includes: accessing an attack record defining actions representing a previous known attack on a second computer network; initializing an attack graph; for each action, defining a set of behaviors-analogous to the action and executable by an asset on a target network to emulate an effect of the action on the second computer network—and storing the set of behaviors in a node in the attack graph; connecting nodes in the attack graph according to an order of actions in the known attack; scheduling the asset to selectively execute analogous behaviors stored in the set of nodes in the attack graph; accessing alerts generated by a set of security tools deployed on the target network; and characterizing vulnerability of the target network based on alerts, in the set of alerts, indicating detection and prevention of behaviors executed by the asset according to the attack graph.Type: ApplicationFiled: July 24, 2024Publication date: November 14, 2024Inventors: Rajesh Sharma, Jeremy Miller, Stephan Chenette, Albert Lopez, Shubhi Mittal, Andres Gazzoli
-
Patent number: 12081580Abstract: A method includes: accessing an attack record defining actions representing a previous known attack on a second computer network; initializing an attack graph; for each action, defining a set of behaviors—analogous to the action and executable by an asset on a target network to emulate an effect of the action on the second computer network—and storing the set of behaviors in a node in the attack graph; connecting nodes in the attack graph according to an order of actions in the known attack; scheduling the asset to selectively execute analogous behaviors stored in the set of nodes in the attack graph; accessing alerts generated by a set of security tools deployed on the target network; and characterizing vulnerability of the target network based on alerts, in the set of alerts, indicating detection and prevention of behaviors executed by the asset according to the attack graph.Type: GrantFiled: May 1, 2023Date of Patent: September 3, 2024Assignee: AttackIQ, Inc.Inventors: Rajesh Sharma, Jeremy Miller, Stephan Chenette, Albert Lopez, Shubhi Mittal, Andres Gazzoli
-
Publication number: 20240158355Abstract: In one aspect, the present disclosure provides compounds which inhibit bromodomain testis (BRDT). In some embodiments, the compounds inhibit bromodomain-2 of BRDT. In another aspect, the present disclosure provides a method of inhibiting BRDT in a male subject, the method comprising administering to the male subject a therapeutically effective amount of a compound of the disclosure. In some embodiments, the method provides a contraceptive effect in the male subject.Type: ApplicationFiled: January 19, 2022Publication date: May 16, 2024Inventors: Martin Matzuk, Zhifeng Yu, Angela Ku, Justin Anglin, Feng Li, Damian Young, Ying-Chu Chen, Melek Ucisik, John Faver, Stephen Palmer, Rajesh Sharma, Choel Kim
-
Publication number: 20240137305Abstract: This disclosure describes techniques for enabling interoperability between asymmetric and symmetric Integrated Routing and Bridging (IRB) modes. An interfacing component may be configured to receive a first route advertisement from a first edge node in a Layer-2 (L2) fabric. The first route advertisement may correspond to an asymmetric format route, for instance. The interfacing component may be further configured to receive a second route advertisement from a second edge node in a L2/Layer-3 (L3) fabric. The second edge node may be configured for symmetric integrated routing and bridging (IRB). The interfacing component may be configured to re-originate the first route and the second route such that the interfacing component is included as a hop in the resultant routes between the L2 fabric and the L2/L3 fabric.Type: ApplicationFiled: December 29, 2023Publication date: April 25, 2024Inventors: Samir D Thoria, Ali Sajassi, Rajesh Sharma, Kesavan Thiruvenkatasamy, Aparna Pattekar, Lukas Krattiger, Neeraj Malhotra
-
Patent number: 11962516Abstract: Techniques to eliminate duplicate packets from a stream of packets. A method includes receiving a packet, hashing elements of the packet to obtain a packet partial signature, generating an action data value by appending, to the packet partial signature, unhashed packet information, accessing a hash store location in a hash store based on the action data value, determining, based on data stored at the hash store location, whether the packet is a duplicate of a previously-received packet, and based on whether the packet is a duplicate of a previously-received packet, one of allowing and preventing one of the packet and a copy of the packet to reach a downstream network node.Type: GrantFiled: January 31, 2023Date of Patent: April 16, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Ayan Banerjee, Saikat Bhattacharya, Ramesh Sivakolundu, Ravikanth Nasika, Rajesh Sharma
-
Patent number: 11924083Abstract: This disclosure describes techniques for enabling interoperability between asymmetric and symmetric Integrated Routing and Bridging (IRB) modes. An interfacing component may be configured to receive a first route advertisement from a first edge node in a Layer-2 (L2) fabric. The first route advertisement may correspond to an asymmetric format route, for instance. The interfacing component may be further configured to receive a second route advertisement from a second edge node in a L2/Layer-3 (L3) fabric. The second edge node may be configured for symmetric integrated routing and bridging (IRB). The interfacing component may be configured to re-originate the first route and the second route such that the interfacing component is included as a hop in the resultant routes between the L2 fabric and the L2/L3 fabric.Type: GrantFiled: June 9, 2021Date of Patent: March 5, 2024Assignee: CISCO TECHNOLOGY, INC.Inventors: Samir Thoria, Neeraj Malhotra, Lukas Krattiger, Ali Sajassi, Rajesh Sharma, Kesavan Thiruvenkatasamy, Aparna Pattekar
-
Publication number: 20240056470Abstract: A method includes: generating a transition probability matrix defining a set of transition probabilities for a set of techniques, each transition probability representing a probability of transitioning from a technique i to a technique j; defining a set of emission probability vectors corresponding to the set of techniques, each emission probability vector representing a probability of detecting a technique i and a probability of preventing a technique i; defining an initial technique vector representing an initial probability distribution of techniques; generating a hidden Markov model correlating a target sequence of observations with a hidden state sequence of techniques based on the transition probability matrix, the set of emission probability vectors, and the initial technique vector; and calculating a sequence of techniques, based on the hidden Markov model, exhibiting greatest probability to yield, for each technique in the sequence of techniques, absence of detection or prevention of the technique.Type: ApplicationFiled: August 10, 2023Publication date: February 15, 2024Inventors: Stephen Lincoln, Rajesh Sharma, Jeremy Miller, Stephan Chenette, Albert Lopez
-
Publication number: 20230381232Abstract: The present disclosure relates to genetically modified T cells comprising a transgene encoding an engineered antigen specific receptor, wherein expression of an endogenous gene selected from MNK1, MNK2, or both are inhibited in the genetically modified T cell in order to enhance central memory T cell subsets in cellular immunotherapy compositions.Type: ApplicationFiled: January 24, 2023Publication date: November 30, 2023Inventors: Kevin R. WEBSTER, Rajesh SHARMA, Gary CHIANG
-
Publication number: 20230269266Abstract: A method includes: accessing an attack record defining actions representing a previous known attack on a second computer network; initializing an attack graph; for each action, defining a set of behaviors—analogous to the action and executable by an asset on a target network to emulate an effect of the action on the second computer network—and storing the set of behaviors in a node in the attack graph; connecting nodes in the attack graph according to an order of actions in the known attack; scheduling the asset to selectively execute analogous behaviors stored in the set of nodes in the attack graph; accessing alerts generated by a set of security tools deployed on the target network; and characterizing vulnerability of the target network based on alerts, in the set of alerts, indicating detection and prevention of behaviors executed by the asset according to the attack graph.Type: ApplicationFiled: May 1, 2023Publication date: August 24, 2023Inventors: Rajesh Sharma, Jeremy Miller, Stephan Chenette, Albert Lopez, Shubhi Mittal, Andres Gazzoli
-
Patent number: 11677775Abstract: A method includes: accessing an attack record defining actions representing a previous known attack on a second computer network; initializing an attack graph; for each action, defining a set of behaviors—analogous to the action and executable by an asset on a target network to emulate an effect of the action on the second computer network—and storing the set of behaviors in a node in the attack graph; connecting nodes in the attack graph according to an order of actions in the known attack; scheduling the asset to selectively execute analogous behaviors stored in the set of nodes in the attack graph; accessing alerts generated by a set of security tools deployed on the target network; and characterizing vulnerability of the target network based on alerts, in the set of alerts, indicating detection and prevention of behaviors executed by the asset according to the attack graph.Type: GrantFiled: June 3, 2022Date of Patent: June 13, 2023Assignee: AttackIQ, Inc.Inventors: Rajesh Sharma, Jeremy Miller, Stephan Chenette, Albert Lopez, Shubhi Mittal, Andres Gazzoli
-
Patent number: 11636443Abstract: A method for automatically converting note-to-self to action reminders in an electronic device is provided. The method includes receiving an input comprising at least one word from a user of the electronic device, analyzing an anaphora representation or a deictic representation for each of the at least one word, and generating a reminder based on a context from the anaphora representation or the deictic representation.Type: GrantFiled: November 4, 2019Date of Patent: April 25, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Lokendra Shastri, Rohini Nookala, Abhanshu Gupta, Kailash Atal, Rajat Tandon, Gladbin David C, Karishma Rajesh Sharma, Sohini Sengupta, Utkarsh Srivastava, Vidushi Chaudhary, Arun Yadav, Vaibhav, Pratik Vasa, Abhay Goel, Anshuka Rangi, Ashwani Kumar, Kapil Khatke, Nishu Bansal
-
Patent number: 11564947Abstract: The present disclosure relates to genetically modified T cells comprising a transgene encoding an engineered antigen specific receptor, wherein expression of an endogenous gene selected from MNK1, MNK2, or both are inhibited in the genetically modified T cell in order to enhance central memory T cell subsets in cellular immunotherapy compositions.Type: GrantFiled: September 18, 2020Date of Patent: January 31, 2023Assignee: eFFECTOR Therapeutics Inc.Inventors: Kevin R. Webster, Rajesh Sharma, Gary Chiang
-
Publication number: 20220377102Abstract: A method includes: accessing an attack record defining actions representing a previous known attack on a second computer network; initializing an attack graph; for each action, defining a set of behaviors—analogous to the action and executable by an asset on a target network to emulate an effect of the action on the second computer network—and storing the set of behaviors in a node in the attack graph; connecting nodes in the attack graph according to an order of actions in the known attack; scheduling the asset to selectively execute analogous behaviors stored in the set of nodes in the attack graph; accessing alerts generated by a set of security tools deployed on the target network; and characterizing vulnerability of the target network based on alerts, in the set of alerts, indicating detection and prevention of behaviors executed by the asset according to the attack graph.Type: ApplicationFiled: June 3, 2022Publication date: November 24, 2022Inventors: Rajesh Sharma, Jeremy Miller, Stephan Chenette, Albert Lopez, Shubhi Mittal, Andres Gazzoli
-
Publication number: 20220192342Abstract: A nail display device comprising a display configured to be removably mounted relative to a nail of a user, and at least one control board associated with the display to control media displayed on the display.Type: ApplicationFiled: March 11, 2022Publication date: June 23, 2022Inventors: Rajesh Sharma, Shanti Kumari Sharma
-
Publication number: 20210392069Abstract: This disclosure describes techniques for enabling interoperability between asymmetric and symmetric Integrated Routing and Bridging (IRB) modes. An interfacing component may be configured to receive a first route advertisement from a first edge node in a Layer-2 (L2) fabric. The first route advertisement may correspond to an asymmetric format route, for instance. The interfacing component may be further configured to receive a second route advertisement from a second edge node in a L2/Layer-3 (L3) fabric. The second edge node may be configured for symmetric integrated routing and bridging (IRB). The interfacing component may be configured to re-originate the first route and the second route such that the interfacing component is included as a hop in the resultant routes between the L2 fabric and the L2/L3 fabric.Type: ApplicationFiled: June 9, 2021Publication date: December 16, 2021Inventors: Samir Thoria, Neeraj Malhotra, Lukas Krattiger, Ali Sajassi, Rajesh Sharma, Kesavan Thiruvenkatasamy, Aparna Pattekar
-
Publication number: 20210177898Abstract: The present disclosure relates to genetically modified T cells comprising a transgene encoding an engineered antigen specific receptor, wherein expression of an endogenous gene selected from MNK1, MNK2, or both are inhibited in the genetically modified T cell in order to enhance central memory T cell subsets in cellular immunotherapy compositions.Type: ApplicationFiled: September 18, 2020Publication date: June 17, 2021Inventors: Kevin R. WEBSTER, Rajesh SHARMA, Gary CHIANG
-
Patent number: 11025539Abstract: Presented herein are techniques to support service chains in a network, such as a spine-leaf switch fabric network, that also uses overlay networking technology. More specifically, in accordance with the techniques presented herein, a linecard at an ingress network node for an overlay network is configured to receive a packet. Using information obtained from the packet, a hardware lookup is performed at the linecard to identify a service chain with which the packet is associated. An entry corresponding to the identified service chain is identified within a memory location of the linecard, where the entry includes overlay network information for forwarding packets along the identified service chain via an overlay network. Using the overlay network information included in the identified entry, the packet is encapsulated with an overlay packet header for use in forwarding the packet via the overlay network.Type: GrantFiled: August 14, 2018Date of Patent: June 1, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Samar Sharma, Rajesh Sharma
-
Patent number: 10780119Abstract: The present disclosure relates to genetically modified T cells comprising a transgene encoding an engineered antigen specific receptor, wherein expression of an endogenous gene selected from MNK1, MNK2, or both are inhibited in the genetically modified T cell in order to enhance central memory T cell subsets in cellular immunotherapy compositions.Type: GrantFiled: May 24, 2018Date of Patent: September 22, 2020Assignee: eFFECTOR Therapeutics Inc.Inventors: Kevin R. Webster, Rajesh Sharma, Gary Chiang