Patents by Inventor Rajesh

Rajesh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12130906
    Abstract: State of the art authentication mechanisms have limitations when used by Basic Emergent User (BEU). Embodiments herein provide method and system for recognition based multi-skill-multi-sensory passwords with dynamic identification of sensor combination based on end user skill, specifically for the BEU. The method disclosed generates user profile using a task-based technique to determine skill and capability of the user associated with each of a plurality of sensory categories used for generating a multi-skill-multi-sensory password. Each of the plurality of sensory categories are graded is descending order based on user's skill and capability and user is offered to select each password entry from a particular sensor category in accordance with the identified grade in each iteration. Thus, the entropy of password generation in the context of user is split among the sensor categories.
    Type: Grant
    Filed: October 31, 2022
    Date of Patent: October 29, 2024
    Assignee: TATA CONSULTANCY SERVICES LIMITED
    Inventors: Pankaj Doke, Karan Rajesh Bhavsar, Srinivasu Pappula, Akhilesh Srivastava, Sujit Shinde, Sanjay Kimbahune
  • Patent number: 12131985
    Abstract: According to various embodiments described herein, an article comprises a glass or glass-ceramic substrate having a first major surface and a second major surface opposite the first major surface, and a via extending through the substrate from the first major surface to the second major surface over an axial length in an axial direction. The article further comprises a helium hermetic adhesion layer disposed on the interior surface; and a metal connector disposed within the via, wherein the metal connector is adhered to the helium hermetic adhesion layer. The metal connector coats the interior surface of the via along the axial length of the via to define a first cavity from the first major surface to a first cavity length, the metal connector comprising a coating thickness of less than 12 ?m at the first major surface.
    Type: Grant
    Filed: September 9, 2021
    Date of Patent: October 29, 2024
    Assignee: Corning Incorporated
    Inventors: Mandakini Kanungo, Prantik Mazumder, Chukwudi Azubuike Okoro, Ah-Young Park, Scott Christopher Pollard, Rajesh Vaddi
  • Patent number: 12131446
    Abstract: Systems/techniques that facilitate self-supervised deblurring are provided. In various embodiments, a system can access an input image generated by an imaging device. In various aspects, the system can train, in a self-supervised manner based on a point spread function of the imaging device, a machine learning model to deblur the input image. More specifically, the system can append to the model one or more non-trainable convolution layers having a blur kernel that is based on the point spread function of the imaging device. In various aspects, the system can feed the input image to the model, the model can generate a first output image based on the input image, the one or more non-trainable convolution layers can generate a second output image by convolving the first output image with the blur kernel, and the system can update parameters of the model based on a difference between the input image and the second output image.
    Type: Grant
    Filed: July 6, 2021
    Date of Patent: October 29, 2024
    Assignee: GE Precision Healthcare LLC
    Inventors: Rajesh Veera Venkata Lakshmi Langoju, Prasad Sudhakara Murthy, Utkarsh Agrawal, Bhushan D. Patil, Bipul Das
  • Patent number: 12129486
    Abstract: Provided herein are methods for the efficient in vitro differentiation of somatic cell-derived pluripotent stem cells to hematopoietic precursor cells, and the further differentiation of the hematopoietic precursor cells into immune cells of various myeloid or lymphoid lineages, particularly T cells, NK cells, and dendritic cells. The pluripotent cells may be maintained and differentiated under defined conditions; thus, the use of mouse feeder cells or serum is not required in certain embodiments for the differentiation of the hematopoietic precursor cells.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: October 29, 2024
    Assignee: FUJIFILM Cellular Dynamics, Inc.
    Inventors: Maksym A. Vodyanyk, Xin Zhang, Andrew J. Brandl, Deepika Rajesh, Bradley Swanson, Christie Munn, Sarah A. Burton, Wen Bo Wang
  • Publication number: 20240354411
    Abstract: Solutions for rapid ransomware detection and recovery include: receiving a first set of in-memory changed data blocks; identifying, within the first set of in-memory changed data blocks, a second set of in-memory changed data blocks addressed for storage within a file index for a virtual machine (VM) disk; determining, relative to a change history of the file index, an anomalous condition; based on at least determining the anomalous condition, identifying a third set of blocks within the file index that are changed between two versions of the VM disk; determining that changes in the third set of blocks indicate ransomware; and based on at least determining that changes in the third set of blocks indicate ransomware, generating an alert. Machine learning (ML) models may perform anomaly/ransomware detection. Remediation activities may include disk restoration storing the VM memory.
    Type: Application
    Filed: June 15, 2023
    Publication date: October 24, 2024
    Inventors: Zhe WANG, Wenguang WANG, Enning XIANG, Jianhan ZHAN, Rajesh JOSEPH, Bing JIAO
  • Publication number: 20240356983
    Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.
    Type: Application
    Filed: March 28, 2024
    Publication date: October 24, 2024
    Applicant: ColorTokens Inc.
    Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
  • Publication number: 20240356979
    Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.
    Type: Application
    Filed: March 28, 2024
    Publication date: October 24, 2024
    Applicant: ColorTokens Inc.
    Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
  • Publication number: 20240354762
    Abstract: An authentication platform for authenticating an online user is provided. The authentication platform includes a memory device and at least one processor coupled to the memory device. The at least one processor is programmed to generate an authentication model using historical data. The at least one processor is further configured to receive, from a merchant computing device, an authentication request message for a current transaction, the authentication request message including consumer identity data for the current transaction and extract the consumer identity data from the authentication request message. The at least one processor is further configured to generate, based on the extracted consumer identity data, identity insight result data using the authentication model, inject the identity insight result data into an authorization request message to generate an enhanced authorization request message, and transmit the enhanced authorization request message to an issuer computing device.
    Type: Application
    Filed: April 14, 2023
    Publication date: October 24, 2024
    Inventors: Rajesh Janu, Hemani Shringi, Valerie Matusiak
  • Publication number: 20240354010
    Abstract: A method for controlling access to a disk device connected to an execution platform that includes reserving a first region of the disk device and storing an unique disk label in said first region, wherein said first region is not encrypted, encrypting a second region of the disk device, wherein the second region includes user data and file information, said method further comprises providing a cipher agent running on said execution platform and carrying out the following steps in case an opening of the disk device is requested, reading the unique disk label stored in the first region, retrieving a protection policy for the disk device based on the unique disk label and handling the further access to the disk device based on the protection policy.
    Type: Application
    Filed: August 26, 2022
    Publication date: October 24, 2024
    Applicant: THALES DIS CPL USA, INC.
    Inventors: Rajesh GUPTA, Peter SCOTT, Jeff BROMBERGER, Rohan NANDODE
  • Publication number: 20240350053
    Abstract: The present invention relates to the field of wearable smart devices for monitoring key vital parameters of the user. Specifically, it pertains to a device which effectively calculates the amount of time that the individual is meditating and mindful. The present invention is more specifically pertains to the device which effectively calculates the amount of time that the individual is meditating and mindful regardless of the form of meditation that the user chooses to meditate.
    Type: Application
    Filed: November 22, 2022
    Publication date: October 24, 2024
    Inventors: Bhairav SHANKAR, Vimal CHANDRU, Rajesh CHANDRASHEKAR, Hari KEERTHIPATI
  • Publication number: 20240351039
    Abstract: A device includes at least one well to receive a polymerase chain reaction (PCR) mixture and including a bottom. The bottom includes an electrically resistive sheet which has a relative magnetic permeability no greater than about 1.01, wherein the resistive sheet is to receive a signal from a signal source to cause the resistive sheet to generate heat to form a pulse-controlled amplification, thermal cycling zone in close thermal proximity to the bottom.
    Type: Application
    Filed: August 5, 2021
    Publication date: October 24, 2024
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Rajesh Kelekar, Napoleon J. Leoni, Omer Gila
  • Publication number: 20240356887
    Abstract: A service-specific DNS indicator or rule on a user computing system identifies a service-specific DNS server that can be accessed for service-specific DNS requests. The service-specific DNS server responds to the server-specific DNS request that is received directly from the user computing system, without accessing a service-independent recursive DNS service.
    Type: Application
    Filed: July 29, 2022
    Publication date: October 24, 2024
    Inventors: Rajesh MASKARA, Boyang ZHENG, Bradley RUTKOWSKI, Zhenguo YANG
  • Publication number: 20240356981
    Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.
    Type: Application
    Filed: March 28, 2024
    Publication date: October 24, 2024
    Applicant: ColorTokens Inc.
    Inventors: Harish Akali, Satyam Tyagi, Syn Owen, Surya Kollimarla, Rajesh Khazanchi
  • Publication number: 20240356982
    Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.
    Type: Application
    Filed: March 28, 2024
    Publication date: October 24, 2024
    Applicant: ColorTokens Inc.
    Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
  • Publication number: 20240356980
    Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.
    Type: Application
    Filed: March 28, 2024
    Publication date: October 24, 2024
    Applicant: ColorTokens Inc.
    Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi
  • Publication number: 20240357121
    Abstract: An apparatus configured to decode video data includes a shared memory and one or more processors configured to execute a plurality of video decoding cores. At least one of the plurality of video decoding cores in communication with the shared memory, and each of plurality of video decoding cores are configured to track completion of decoding samples of one or more regions of a frame of video data, write information to the shared memory, the information indicative of the completion of decoding the samples of the one or more regions of the frame of video data, read, prior to decoding a subsequent region of the frame of video data, the information in the shared memory, and determine whether to decode the subsequent region of the frame of video data based on the information.
    Type: Application
    Filed: June 28, 2024
    Publication date: October 24, 2024
    Inventors: Gaurav Avinash Patil, Kapil Garg, Rajesh Chowdary Chitturi, Prasanth Gomatam
  • Publication number: 20240356064
    Abstract: The present invention relates to sulfide-based solid electrolyte, a preparation method thereof, and an all-solid state battery prepared therefrom, and by doping an Li2S—P2S5—LiX (X is F, Cl, Br or I) or Li2S—P2S5—LiX—LiX? (X and X? are F, Cl, Br or I, X and X? being different elements) sulfide-based solid electrolyte system with a metal or a quasi-metal, the sulfide-based solid electrolyte, which has high ionic conductivity, has stability with respect to a lithium metal negative electrode, and is humidity-stable, may be provided.
    Type: Application
    Filed: April 19, 2022
    Publication date: October 24, 2024
    Applicant: University of Ulsan Foundation for Industry Cooperation
    Inventors: Kwang Sun RYU, Rajesh RAJAGOPAL, Yuvaraj SUBRAMANIAN
  • Publication number: 20240357072
    Abstract: According to an example embodiment, a stereoscopic near-eye display (NED) assembly for a NED device including a pair of NED assemblies is provided, where an input image is subjected to a preprocessing procedure that applies image-area-position dependent preprocessing before providing it for viewing through a lens assembly that comprises a diffractive optical element (DOE) arranged to provide a phase delay that is different through a plurality of positions of its aperture. According to other example embodiments, an apparatus and a method for deriving the preprocessing procedure and the DOE are provided.
    Type: Application
    Filed: April 20, 2023
    Publication date: October 24, 2024
    Inventors: Erdem Sahin, Ugur Akpinar, Atanas Gotchev, Rajesh MENON
  • Publication number: 20240350489
    Abstract: The invention concerns method of treating multiple sclerosis (MS) by administering a therapeutically effective dose of LOU064 or a pharmaceutically acceptable salt thereof.
    Type: Application
    Filed: September 1, 2022
    Publication date: October 24, 2024
    Inventors: Souvik BHATTACHARYA, Bruno BIETH, Bruno CENNI, Peter END, Gordon GRAHAM, Michael JUHNKE, Rajesh Singh KARAN, Allison Donna MANN, Etienne PIGEOLET, Karin RAPP, Kim-Hien SIN, Huixin YU, Ying ZHANG
  • Publication number: 20240356978
    Abstract: Zero trust and micro-segmentation techniques may be collectively used to enhance network security. To establish, refine, and enforce a zero-trust least-privileged policy, the network may be segmented to put each device of the network into a respective network of one, which forces all network traffic to pass through a zero-trust gatekeeper. The gatekeeper may then monitor and analyze the traffic to establish, refine, and enforce the zero-trust least-privileged policy, which reduces network access to only a limited set of network actions and/or paths. Using the gatekeeper, network traffic may be monitored to progressively establish the policy as well as to continually refine the policy. Recommended actions may be determined based on the analysis of the monitored network traffic and provided to the user to allow user feedback on the communication rules of zero-trust policy.
    Type: Application
    Filed: June 28, 2023
    Publication date: October 24, 2024
    Inventors: Harish Akali, Satyam Tyagi, Wyn Owen, Surya Kollimarla, Rajesh Khazanchi