Patents by Inventor Rajneesh Kumar
Rajneesh Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12293980Abstract: A package comprising a substrate, a first antenna device, and an integrated device. The substrate comprising a first surface and a second surface, where the substrate comprises a plurality of interconnects. The first antenna device is coupled to the first surface of the substrate, through a first plurality of solder interconnects. The integrated device is coupled to the second surface of the substrate. The package may include an encapsulation layer located over the second surface of the substrate, where the encapsulation layer encapsulates the integrated device. The package may include a shield formed over a surface of the encapsulation layer, where the shield includes an electromagnetic interference (EMI) shield.Type: GrantFiled: May 8, 2020Date of Patent: May 6, 2025Assignee: QUALCOMM INCORPORATEDInventors: Jaehyun Yeon, Suhyung Hwang, Chin-Kwan Kim, Rajneesh Kumar, Darryl Sheldon Jessie
-
Publication number: 20250133081Abstract: A server for detecting fraudulent user authentication requests is caused to receive, by a plurality of machine learning (ML) models, a dataset including user data specific to a user logging into an account during an authentication request and device data specific to a computing device used by the user to log into the account during the authentication request, generate, with the plurality of ML models configured to detect a plurality of different fraud types, a response based on the dataset, the response including at least one ML score representing a probability of at least one of the plurality of different fraud types occurring during the authentication request, and generate an authentication denial response for the authentication request based on the ML score and a threshold. Other example servers, systems, apparatuses, methods, and non-transitory computer readable medium for detecting fraudulent user authentication requests are also disclosed.Type: ApplicationFiled: September 3, 2024Publication date: April 24, 2025Applicant: Charles Schwab & Co., Inc.Inventors: Rajneesh KUMAR, Pete IKUSZ, William WALKER, Bashar ABOUSEIDO
-
Publication number: 20250125244Abstract: In an aspect, an integrated circuit (IC) package includes a base structure, an IC component disposed on the base structure, a plurality of interposer connection structures disposed on the base structure, and an interposer structure disposed over the IC component and the plurality of interposer connection structures. The plurality of interposer connection structures is configured to connect the base structure and the interposer structure. Each interposer connection structure of the plurality of interposer connection structures includes a bond ball portion that is connected to the interposer structure, and a bond wire portion that is coupled to the bond ball portion and extends toward the base structure. A width of the bond ball portion is greater than a width of the bond wire portion.Type: ApplicationFiled: March 14, 2024Publication date: April 17, 2025Inventors: Manuel ALDRETE, Rajneesh KUMAR, Zhijie WANG, Aniket PATIL, Srikanth KULKARNI
-
Publication number: 20250125234Abstract: In an aspect, an integrated circuit (IC) package includes a base structure, an IC component disposed on the base structure, a plurality of interposer connection structures disposed on the base structure, and an interposer structure disposed over the IC component and the plurality of interposer connection structures. The plurality of interposer connection structures is configured to connect the base structure and the interposer structure. Each interposer connection structure of the plurality of interposer connection structures includes a bond ball portion that is connected to the base structure, and a bond wire portion that is coupled to the bond ball portion and extends toward the interposer structure. A width of the bond ball portion is greater than a width of the bond wire portion.Type: ApplicationFiled: October 13, 2023Publication date: April 17, 2025Inventors: Manuel ALDRETE, Rajneesh KUMAR, Zhijie WANG, Aniket PATIL, Srikanth KULKARNI
-
Publication number: 20250096051Abstract: A package comprising a first substrate; a first integrated device coupled to the first substrate through at least a first plurality of solder interconnects; a second substrate coupled to the first substrate through at least a second plurality of solder interconnects, wherein the second substrate includes a cavity; and an encapsulation layer located at least between the first substrate and the second substrate, wherein the encapsulation layer is coupled to the first substrate, the second substrate and the first integrated device.Type: ApplicationFiled: September 20, 2023Publication date: March 20, 2025Inventors: Jaehyun YEON, Kun FANG, Suhyung HWANG, Sang-Jae LEE, Rajneesh KUMAR, Manuel ALDRETE, Zhijie WANG, Seongho KIM
-
Patent number: 12255899Abstract: Privileged access is managed by receiving a request for privileged access to a device connected to a network, determining a risk level associated with the request based on a duration of the privileged access, a device identifier, a first user identifier, and a requested privilege level included in the request, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.Type: GrantFiled: March 17, 2022Date of Patent: March 18, 2025Assignee: RAKUTEN SYMPHONY, INC.Inventors: Rajneesh Kumar, Remi Ferreres
-
Publication number: 20250079716Abstract: A package comprising a substrate, an integrated device coupled to a first surface of the substrate through at least a first plurality of solder interconnects; and an antenna device coupled to a second surface of the substrate through at least a second plurality of solder interconnects. The antenna device comprises an antenna device dielectric layer; at least one antenna located on a first surface of the antenna device dielectric layer; a shield located on at least one lateral surface of the antenna device; and a slot opening on the first surface of the antenna device.Type: ApplicationFiled: September 1, 2023Publication date: March 6, 2025Inventors: Jeahyeong HAN, Sang-June PARK, Sanjaya Kumar KHATUA, Darryl Sheldon JESSIE, Rajneesh KUMAR
-
Publication number: 20250079277Abstract: An integrated circuit (IC) device includes a substrate. The substrate includes a first side having a stepped configuration having a first surface that is elevated relative to a second surface. The first surface includes first solder resist openings (SROs), and the second surface includes second SROs. The IC device includes a first set of solder balls electrically connected to a first set of contacts in the first SROs. A solder ball of the first set of solder balls has a first characteristic dimension. The IC device also includes a second set of solder balls electrically connected to a second set of contacts in the second SROs. A solder ball of the second set of solder balls has a second characteristic dimension larger than the first characteristic dimension.Type: ApplicationFiled: August 28, 2023Publication date: March 6, 2025Inventors: Aniket PATIL, Manuel ALDRETE, Zhijie WANG, Piyush GUPTA, Rajneesh KUMAR
-
Publication number: 20250046688Abstract: An integrated device includes a die including active circuitry and a first set of contacts; a first substrate including a second set of contacts and a third set of contacts on a first side of the first substrate and a fourth set of contacts on a second side of the first substrate; a mold compound disposed on the first side of the first substrate and at least partially encapsulating the die; and a set of through mold conductors coupled to the third set of contacts and extending through the mold compound, wherein an upper surface of the mold compound, an upper surface of the die, and an upper surface of each of the set of through mold conductors are coplanar.Type: ApplicationFiled: August 1, 2023Publication date: February 6, 2025Inventors: Zhijie WANG, Rajneesh KUMAR, Manuel ALDRETE, Sang-Jae LEE, Seongho KIM
-
Publication number: 20240425104Abstract: A hydraulic system for a work machine comprising a priority circuit including at least a first priority actuator and a priority control valve for controlling the supply of hydraulic fluid to the first priority actuator and for providing a load sense signal indicative of the load acting on the first priority actuator; an auxiliary circuit including at least a first auxiliary actuator and at least a first auxiliary control valve for controlling the supply of hydraulic fluid to the first auxiliary actuator; at least a first pump for producing a flow of hydraulic fluid; and a priority valve for distributing the flow from the pump to the priority circuit and auxiliary circuit for operating the respective actuators thereof, with priority being given to the priority circuit as a function of the load sense signal.Type: ApplicationFiled: September 3, 2024Publication date: December 26, 2024Applicant: Parker-Hannifin CorporationInventors: Hao Zhang, Raymond Collett, Rajneesh Kumar, Qiang Wang, Miao Zhang, James Howland
-
Publication number: 20240389021Abstract: Embodiments disclosed herein relate to reducing power consumption of an electronic device scanning for wireless communication signals while maintaining or even improving an efficiency of the scanning operations. To do so, the electronic device may include more than one scan core, such as a main core and a receiving core. The receiving core may have limited functionality compared to the main core. For example, the receiving core may only receive wireless signals (including scanning for wireless signals). That is, the receiving core may not support certain operations that consume relative high power that are supported by the main core, such as transmission of signals. In this way, operation of the receiving core, either in place of or in addition to the main core, may reduce power consumption of the electronic device by avoiding high power consuming operations, such as data transmission, while scanning for various signals.Type: ApplicationFiled: July 23, 2024Publication date: November 21, 2024Inventors: Sriram Lakshmanan, Tushar Ramanlal Shah, Udaykumar R. Raval, Bernd Willi Adler, Dongwoon Hahn, Shehla S. Rana, Yang Yu, Rajneesh Kumar, Veerendra Boodannavar, Yann Ly-Gagnon, Duy N. Phan, Karan Sawhney, Rohit Sharma, Sarin S. Mehta
-
Publication number: 20240356945Abstract: A server for detecting anomalies associated with users accessing a network is caused to receive a dataset including static data and dynamic data. The static data includes location data of resources associated with the network and user data, and the dynamic data includes user access events. The server is further caused to detect, with a plurality of unsupervised machine learning models, an anomaly associated with a user accessing the network based on the static data and the dynamic data, determine whether the detected anomaly is critical, and in response to determining the detected anomaly is critical, generate and transmit a security alert specific to the detected anomaly to a security operation center. Other example servers, systems, apparatuses, methods, and non-transitory computer readable medium for detecting anomalies associated with users accessing a network are also disclosed.Type: ApplicationFiled: April 20, 2023Publication date: October 24, 2024Applicant: Charles Schwab & Co., IncInventors: Rajneesh KUMAR, William WALKER, Bashar ABOUSEIDO
-
Publication number: 20240340872Abstract: A wireless device may use a 5 GHz frequency band to support both Wi-Fi and Bluetooth. The 5 GHz frequency band may be divided into two portions (e.g., high sub-band and low sub-band). A Wi-Fi module of the wireless device may perform a roam scan on a first sub-band to determine attempt to find a candidate channel that meets a target criteria. When the candidate channel that meets the target criteria is found on the first sub-band, the Wi-Fi module may join the candidate channel. If no acceptable candidate channel is found, the wireless device may perform a band switch protocol to allow the Wi-Fi module to preform a roam scan on a second sub-band.Type: ApplicationFiled: April 5, 2023Publication date: October 10, 2024Inventors: Shehla S Rana, Rajneesh Kumar, Yang Yu
-
Publication number: 20240323468Abstract: In some aspects, a method includes storing a configuration database at a media platform. The configuration database includes base customization data associated with the media platform and manufacturer customization data associated with a plurality of manufacturers of television devices. The method includes receiving a configuration request from a television device, where the configuration request includes a location and/or a device identifier of the television device. The method includes selecting a portion of the manufacturer customization data that correspond to the location and/or the device identifier of the television device, generating server-based customization data for the television device based on the portion of the manufacturer customization data and the base customization data, and transmitting the server-based customization data to the television device, where the server-based customization data is configured to be used by the television device to customize a user interface of the media platform.Type: ApplicationFiled: March 21, 2023Publication date: September 26, 2024Inventors: Ashwin Kumar Srigiri, Rohit Nigam, Laxmi Kaushik Reddy Mukkamalla, Nipun Asthana, Ashish Agrawal, Rajneesh Kumar, Manoj Mani, Padmaja Ragavendra, Akanksha Kalia
-
Patent number: 12088486Abstract: In some implementations, a network device may determine throughput rate metrics for a plurality of processing units of the network device that are processing network traffic of a network. The network device may maintain the throughput rate metrics in a status table associated with the plurality of processing units. The network device may receive tunnel traffic associated with a particular tunnel of the network. The network device may determine, based on a characteristic of the tunnel traffic, a potential throughput rate associated with processing the tunnel traffic. The network device may direct the tunnel traffic to a particular processing unit, of the plurality of processing units, based on the potential throughput rate and the throughput rate metrics indicated in the status table.Type: GrantFiled: January 31, 2022Date of Patent: September 10, 2024Assignee: Juniper Networks, Inc.Inventors: Rajneesh Kumar, Peyush Gupta
-
Publication number: 20240297886Abstract: Privileged access is managed by receiving a request for privileged access to a device connected to a network, determining a risk level associated with the request based on a duration of the privileged access, a device identifier, a first user identifier, and a requested privilege level included in the request, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.Type: ApplicationFiled: March 17, 2022Publication date: September 5, 2024Inventors: Rajneesh KUMAR, Remi FERRERES
-
Patent number: 12075352Abstract: Embodiments disclosed herein relate to reducing power consumption of an electronic device scanning for wireless communication signals while maintaining or even improving an efficiency of the scanning operations. To do so, the electronic device may include more than one scan core, such as a main core and a receiving core. The receiving core may have limited functionality compared to the main core. For example, the receiving core may only receive wireless signals (including scanning for wireless signals). That is, the receiving core may not support certain operations that consume relative high power that are supported by the main core, such as transmission of signals. In this way, operation of the receiving core, either in place of or in addition to the main core, may reduce power consumption of the electronic device by avoiding high power consuming operations, such as data transmission, while scanning for various signals.Type: GrantFiled: July 12, 2021Date of Patent: August 27, 2024Assignee: Apple Inc.Inventors: Sriram Lakshmanan, Tushar Ramanlal Shah, Udaykumar R. Raval, Bernd Willi Adler, Dongwoon Hahn, Shehla S. Rana, Yang Yu, Rajneesh Kumar, Veerendra Boodannavar, Yann Ly-Gagnon, Duy N. Phan, Karan Sawhney, Rohit Sharma, Sarin S. Mehta
-
Patent number: 12058142Abstract: Centralized privileged access is managed by receiving a request for privileged access to a device connected to a network, the request including a device identifier and a first user identifier, determining a role risk associated with the request based on a requested privilege level included in the request, determining an impact risk associated with the request based on potentially impacted devices other than the device, determining a risk level associated with the request based on the role risk and the impact risk, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.Type: GrantFiled: March 25, 2022Date of Patent: August 6, 2024Assignee: RAKUTEN SYMPHONY SINGAPORE PTE. LTD.Inventors: Rajneesh Kumar, Remi Ferreres
-
Publication number: 20240236110Abstract: Centralized privileged access is managed by receiving a request for privileged access to a device connected to a network, the request including a device identifier and a first user identifier, determining a role risk associated with the request based on a requested privilege level included in the request, determining an impact risk associated with the request based on potentially impacted devices other than the device, determining a risk level associated with the request based on the role risk and the impact risk, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.Type: ApplicationFiled: March 25, 2022Publication date: July 11, 2024Inventors: Rajneesh KUMAR, Remi FERRERES
-
Publication number: 20240137368Abstract: Centralized privileged access is managed by receiving a request for privileged access to a device connected to a network, the request including a device identifier and a first user identifier, determining a role risk associated with the request based on a requested privilege level included in the request, determining an impact risk associated with the request based on potentially impacted devices other than the device, determining a risk level associated with the request based on the role risk and the impact risk, identifying a second user to control authorization of the device based on the risk level, and scheduling, in response to receiving authorization from the second user, a process to modify an entry in a permissions database to associate the first user identifier and the device identifier with the requested privilege level for the duration.Type: ApplicationFiled: March 24, 2022Publication date: April 25, 2024Inventors: Rajneesh KUMAR, Remi FERRERES