Patents by Inventor Rajesh

Rajesh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080125349
    Abstract: This invention relates to compositions for the sustained release of biologically active polypeptides, and methods of forming and using said compositions, for the sustained release of biologically active polypeptides. The sustained release compositions of this invention comprise a biocompatible polymer having dispersed therein, a biologically active polypeptide and a sugar.
    Type: Application
    Filed: July 16, 2007
    Publication date: May 29, 2008
    Applicant: Alkermes, Inc.
    Inventors: Steven G. Wright, Troy Christensen, Thean Yeah, Michael E. Rickey, Joyce M. Hotz, Rajesh Kumar, Henry R. Costantino
  • Publication number: 20080125351
    Abstract: This invention relates to compositions for the sustained release of biologically active polypeptides, and methods of forming and using said compositions, for the sustained release of biologically active polypeptides. The sustained release compositions of this invention comprise a biocompatible polymer having dispersed therein, a biologically active polypeptide and a sugar.
    Type: Application
    Filed: July 20, 2007
    Publication date: May 29, 2008
    Applicant: Alkermes, Inc.
    Inventors: Steven G. Wright, Troy Christensen, Thean Yeoh, Michael E. Rickey, Joyce M. Hotz, Rajesh Kumar, Henry R. Costantino
  • Publication number: 20080123859
    Abstract: There is provided a method for encrypting a data stream using multiple algorithms. In one embodiment, a first portion of the data stream is encrypted with a first algorithm utilizing a first key to generate a first encrypted portion. The first algorithm can be, for example, a Triple Data Encryption Algorithm (TDEA). Data indicating the first algorithm and the first key is then transmitted. Then, the first encrypted portion of the data stream is transmitted. Thereafter, a second portion of the data stream is encrypted with a second algorithm utilizing a second key to generate a second encrypted portion. The second algorithm can be, for example, a Single Data Encryption Algorithm (SDEA). Next, data indicating the second algorithm and the second key is transmitted. Thereafter, the first encrypted portion of the data stream is transmitted.
    Type: Application
    Filed: November 27, 2006
    Publication date: May 29, 2008
    Inventor: Rajesh Mamidwar
  • Publication number: 20080125126
    Abstract: Techniques for load balancing across different access networks based on procedures initiated by a wireless terminal or mobile station and examples of using load balancing within the same access network to hand off a mobile station from one base station to another based on procedures initiated by the mobile station.
    Type: Application
    Filed: November 27, 2007
    Publication date: May 29, 2008
    Inventors: Yonggang Fang, Rajesh Bhalla
  • Publication number: 20080126302
    Abstract: A system and method for tracking and restoring computer configuration are disclosed. In one aspect, the system and method monitors for a series of changes in watched one or more computer configuration variables. The changes are registered into a series of saved states. The one or more computer configuration variables may be restored to a desired saved state using the registry of saved states. In one aspect, the system and method monitors the changes by intercepting system calls, determining which system calls affect the one or more computer configuration variables, and logging the system calls and the results of the system calls that affect the one or more computer configuration variables. A recovery script may be dynamically generated to restore to a saved state.
    Type: Application
    Filed: August 31, 2006
    Publication date: May 29, 2008
    Applicant: International Business Machines Corporation
    Inventors: Frederic Mora, Rajesh Pericherla
  • Publication number: 20080126941
    Abstract: A system receives a design document, parses the design document into voice extensible markup language (VXML) elements, and creates a VXML document from the parsed VXML elements.
    Type: Application
    Filed: September 1, 2006
    Publication date: May 29, 2008
    Applicant: MCI Network Services Inc.
    Inventor: Rajesh Sharma
  • Patent number: 7380002
    Abstract: A new network load balancing/firewall node for use in a system including multiple network load balancing/firewall nodes is disclosed. The network load balancing/firewall applies bi-directional load balancing affinity with regard to requests from external clients and corresponding responses from internal network servers. An external network load balancing adapter executes a load-balancing algorithm to determine whether a received client request is accepted by the network load balancing/firewall node. A firewall utility processes the received client request and maintains state information associated with the received client request. An internal network load balancing adapter ensures that the same network load balancing/firewall node accepts a response from an internal network server corresponding to the received client request.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: May 27, 2008
    Assignee: Microsoft Corporation
    Inventors: Sean B. House, Joseph Joy, Rajesh Dadhia
  • Patent number: 7377170
    Abstract: The present invention presents a novel application of a wavelet-based multiscale method in a nanomachining process chemical mechanical planarization (CMP) of wafer fabrication. The invention involves identification of delamination defects of low-k dielectric layers by analyzing the nonstationary acoustic emission (AE) signal collected during copper damascene (Cu-low k) CMP processes. An offline strategy and a moving window-based strategy for online implementation of the wavelet monitoring approach are developed.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: May 27, 2008
    Assignee: University of South Florida
    Inventors: Rajesh Ganesan, Tapas K. Das, Arun K. Sikder, Ashok Kumar
  • Patent number: 7380156
    Abstract: A system and method for managing a time-limited long-running process that acts upon disks of a disk array is based upon a general rule of acting upon each disk in an order based upon the length of time from when it was last acted-upon. Disks having the greatest last acted-upon time value (e.g. were processed the longest-time ago) are queued first by the process for acting-upon in the present run. The greatest last acted-upon time includes disks that have no prior last acted-upon time (e.g. newly added/mounted disks). A registry key entry is maintained in a registry file for each of the RAID groups that includes the volume's file system identifier (FSID) and particular RAID group identifier (RGID). The RGID includes the last acted-upon time for the RAID group. This is set to a positive time number if the process has last acted-upon the group to completion.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: May 27, 2008
    Assignee: Network Appliance, Inc.
    Inventors: Steven H. Rodrigues, Rajesh Sundaram
  • Patent number: 7378439
    Abstract: The present invention discloses a novel process and novel intermediates for the Preparation of 4-[2-(di-n-propyl amino) ethyl]-1,3-dihydro-2H-indol-2-one, commonly known as Ropinirole (I) and pharmaceutical composition comprising the same. Further the present invention also discloses a method of treatment for cardiovascular disorders and Parkinson's disease.
    Type: Grant
    Filed: July 9, 2004
    Date of Patent: May 27, 2008
    Assignee: USV, Ltd.
    Inventors: Venkatasubramanian Radhakrishna Tarur, Dhananjay Govind Sathe, Harish Kashinath Mondkar, Rajesh Ganpat Bhopalkar, Samadhan Daulat Patil
  • Publication number: 20080120251
    Abstract: A method of operating a computer system includes storing, in the computer system, a database containing performance measure data regarding performance measures of a plurality of items. The method further includes inputting into the computer system a plurality of performance measure constraints. The method also includes modeling the performance measure constraints with a set of equations. The equations include a plurality of variables. Each of the variables corresponds to a respective one of the items. Each variable is, for example, to be assigned either the value “1” or the value “0”. The value “1” may represent a recommendation to take an action relative to the corresponding item in the portfolio and the value “0” may represent a recommendation to take another action. The computer system is used to solve the set of equations to generate one or more solutions that satisfy the performance measure constraints.
    Type: Application
    Filed: March 27, 2007
    Publication date: May 22, 2008
    Inventors: Rajesh Tyagi, Kete Chalermkraivuth, Marc Anthony Garbiras, John Andrew Ellis, Matthew Allen, James G. Russo
  • Publication number: 20080120717
    Abstract: The present invention generally relates to a computer security system for use in the identification and authentication of a user prior to an on-line transaction. In one aspect, a method for enrolling a user in a system configured to identify and authenticate the user is provided. The method includes collecting a username and password to identify the user. The method further includes extracting device data from a user machine to uniquely identify the machine. The method also includes generating a user profile based upon the device data and the username and password. Additionally, the method includes transmitting the user profile to a server machine to be stored. In another aspect, a computer-readable medium including a set of instructions that when executed by a processor cause the processor to enroll a user in a system configured to identify and authenticate the user is the provided. In yet a further aspect, a system for identifying and authenticating a user is provided.
    Type: Application
    Filed: November 21, 2006
    Publication date: May 22, 2008
    Inventor: Rajesh G. Shakkarwar
  • Publication number: 20080116542
    Abstract: The present invention provides a gate dielectric having a flat nitrogen profile, a method of manufacture therefor, and a method of manufacturing an integrated circuit including the flat nitrogen profile. In one embodiment, the method of manufacturing the gate dielectric includes forming a gate dielectric layer (410) on a substrate (310), and subjecting the gate dielectric layer (410) to a nitrogen containing plasma process (510), wherein the nitrogen containing plasma process (510) has a ratio of helium to nitrogen of 3:1 or greater.
    Type: Application
    Filed: January 24, 2008
    Publication date: May 22, 2008
    Applicant: Texas Instruments Incorporated
    Inventors: Hiroaki Niimi, Husam Alshareef, Rajesh Khamankar, Toan Tran
  • Publication number: 20080120507
    Abstract: The present invention generally relates to a computer security system for use in the authentication of a user prior to setting up an on-line account. In one aspect, a method for authenticating a user in a system configured to identify and authenticate the user is provided. The method includes prompting the user to answer at least one initial question. The method further includes obtaining data about the user from a data source based on the answer to the at least one initial question. The method also includes reviewing the data from the data source and generating at least one specific personal question based on the data from the data source. Additionally, the method includes prompting the user to answer the at least one specific personal question and verifying the answer to the at least one specific personal question.
    Type: Application
    Filed: January 30, 2007
    Publication date: May 22, 2008
    Inventor: Rajesh G. Shakkarwar
  • Publication number: 20080120427
    Abstract: A method and system for maintaining real-time conversations over unreliable connections is provided. The reliable messaging system initiates a conversation from a sending participant to a receiving participant by sending an invitation to join the conversation to the receiving participant. Once a connection is established, the reliable messaging system associates the conversation with the connection. If the connection is lost, then the reliable messaging system attempts to restore the connection by sending an invitation to the participant that was disconnected. If the reliable messaging system is able to restore the connection, then the new connection is associated with the previous conversation, and the conversation can continue.
    Type: Application
    Filed: November 17, 2006
    Publication date: May 22, 2008
    Applicant: Microsoft Corporation
    Inventors: Rajesh Ramanathan, Parag Samdadiya
  • Publication number: 20080120229
    Abstract: The present invention generally relates to a system and a method for establishing a separate session during an on-line session. In one aspect, a method for establishing a session with a server during an on-line transaction session is provided. The method includes detecting an on-line payment page and inserting a code into the on-line payment page, wherein the code is scripted to open a first pop-up window. The method further includes prompting a user via the first pop-up to answer a question, wherein the question is used to determine if a secure payment process is to be used. Additionally, the method includes opening the session with the server via a second pop-up window if the answer to the question is affirmative.
    Type: Application
    Filed: November 21, 2007
    Publication date: May 22, 2008
    Inventors: Sanjaykumar Hanmantrao Patil, Rajesh G. Shakkarwar
  • Publication number: 20080120564
    Abstract: A host having a network interface communicating with a plurality of users and a plurality of target devices, a workbench tool including software development tools, the plurality of users having access to the workbench, at least one user creating a first sensorpoint module using the workbench and a database storing the first sensorpoint module, the host loading the first sensorpoint module onto at least one of the target devices.
    Type: Application
    Filed: November 20, 2006
    Publication date: May 22, 2008
    Inventors: Rajesh Balasubramanian, Aron Sogor, Ka Kay Achacoso, Vijay Natarajan
  • Publication number: 20080119569
    Abstract: This invention relates to compositions for the sustained release of biologically active polypeptides, and methods of forming and using said compositions, for the sustained release of biologically active polypeptides. The sustained release compositions of this invention comprise a biocompatible polymer having dispersed therein, a biologically active polypeptide and a sugar.
    Type: Application
    Filed: July 20, 2007
    Publication date: May 22, 2008
    Applicant: Alkermes, Inc.
    Inventors: Steven G. Wright, Troy Christensen, Thean Yeoh, Michael E. Rickey, Joyce M. Hotz, Rajesh Kumar, Mark Fineman, Christine Smith, John Ong, David M. Lokensgard, Henry R. Costantino
  • Publication number: 20080120195
    Abstract: The present invention generally relates to a computer security system for use in the identification and authentication of a user prior to an on-line transaction. In one aspect, a method for facilitating a secure transaction over a network is provided. The method includes collecting a username and password associated with a user of the machine. The method further includes verifying that the username and password matches a previously collected username and password in an identity profile. The method also includes collecting device data from a user machine to uniquely identify the machine. Additionally, the method includes verifying that the device data matches previously collected device data in the identity profile. In another aspect, a computer-readable medium including a set of instructions that when executed by a processor cause the processor to facilitate a secure transaction over a network is provided. In yet a further aspect, a system for facilitating a secure transaction is provided.
    Type: Application
    Filed: November 21, 2006
    Publication date: May 22, 2008
    Inventor: Rajesh G. Shakkarwar
  • Publication number: 20080117917
    Abstract: Methods and apparatus for managing subscriber profiles are described herein. In one embodiment, the method includes receiving, from a requester, a request to determine an operation to be performed on a data packet. The method also includes determining profile identifiers associated with the requester, wherein the profile identifiers include, a first-level profile identifier associated with a lower-level profile identifier that defines the operation. The method also includes determining, based on the profile identifiers, that the operation should be performed on the data packet and transmitting an indication of the operation to the requestor, wherein the requestor performs the operation on the data packet.
    Type: Application
    Filed: November 18, 2004
    Publication date: May 22, 2008
    Applicant: FORTINET, INC.
    Inventors: Rajesh I. Balay, Chandramouli Sargor, Sachin S. Desai, Francois Lemarchand, Amit K. Khetawat