Patents by Inventor Rakesh Agarwal

Rakesh Agarwal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11954157
    Abstract: The present disclosure provides user-interface methods and systems for submitting search requests to search engines and presenting search results therefrom customized using content preferences learned about a user, comprising sending query information to at least two search engines, including a query identifying desired content, and user information, including context information describing the environment in which the query information is being sent, and a user signature representing content preferences learned about the user; receiving at least one set of a search result and auxiliary information from the at least one search engine in response to sending the query information, including information describing attributes of the search result that led to the search result being chosen by the at least one search engine; ordering the at least one search result based at least in part on the auxiliary information; and presenting the ordered search results to the user.
    Type: Grant
    Filed: July 23, 2021
    Date of Patent: April 9, 2024
    Assignee: VEVEO, INC.
    Inventors: Rakesh Barve, Pankaj Garg, Sashikumar Venkataraman, Murali Aravamudan, Keyur Vallabhbhai Faldu, Vineet Agarwal, Apurv Anand
  • Patent number: 11928114
    Abstract: Systems and methods for query generation based on a logical data model with one-to-one joins are described. For example, methods may include accessing a join graph representing tables in a database; receiving a first query; selecting a connected subgraph of the join graph that includes the two or more tables referenced in the first query; accessing an indication that a directed edge of the connected subgraph corresponds to a one-to-one join; modifying the connected subgraph based on the indication to obtain a modified subgraph; generating one or more leaf queries based on the modified subgraph; generating a query graph that specifies joining of results from queries based on the one or more leaf queries; invoking a transformed query on the database that is based on the query graph and the queries based on the one or more leaf queries.
    Type: Grant
    Filed: April 21, 2020
    Date of Patent: March 12, 2024
    Assignee: ThoughtSpot, Inc.
    Inventors: Naman Shah, Rakesh Kothari, Vaibhav Agarwal
  • Publication number: 20240069935
    Abstract: Systems, computer program products, and methods are described herein for providing data analysis and processing using graphical user interface position mapping identification is provided. The method includes receiving a plurality of data packets from a plurality of data sources. The data packets contain one or more data metrics associated with an entity. The method also includes causing a rendering of a user interface that presents one or more selectable icons for selecting data to use from the plurality of data packets. The method further includes receiving one or more user selections of the one or more selectable icons. The one or more user selections indicate one or more of the plurality of data sources to use for a generation of a report. The method further includes generating the report based on one of more of the plurality of data packets from the selected data sources of the plurality of data sources.
    Type: Application
    Filed: August 29, 2022
    Publication date: February 29, 2024
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Rajneesh Acharya, Ganesh Agrawal, Vikash Agarwal, Laura A. Bertarelli Hamilton, Rakesh Shah, Suresh Solomon, Susmitha Nalluri, Trishaun Tajae Blake, Mark Labbancz, Mohal Mukundbhai Sayani, Rahul Tandon, Akhil Kudal, Anju Jha, Priyanka Jyoti
  • Publication number: 20240068095
    Abstract: Gas distribution apparatuses described herein include a mixing plate adjacent a back plate of a showerhead. The mixing plate has a back surface and a front surface defining a thickness of the mixing plate. The mixing plate has a mixing channel comprising a top portion and a bottom portion defining a mixing channel length and at least two gas inlets in fluid communication with the top portion of the mixing channel. The gas distribution apparatus also includes a mixer disposed within the thickness of the mixing plate in the top portion of the mixing channel. The mixer has a top plate and a mixer stem extending from the top plate and a plurality of blades positioned along the mixer stem length. Also provided are processing chambers including the gas distribution apparatuses described herein.
    Type: Application
    Filed: August 29, 2022
    Publication date: February 29, 2024
    Applicant: Applied Materials, Inc.
    Inventors: Youngki Chang, Dhritiman Subha Kashyap, Rakesh Ramadas, Ashutosh Agarwal, Shashidhara Patel H B, Muhannad Mustafa, Sanjeev Baluja
  • Publication number: 20230281598
    Abstract: There are provided systems and methods for an interface widget tool for automatic QR code generation and display without application launching. A user may engage in a transaction with another user, such as a purchase of goods, services, or other items a merchant at a merchant location using machine-readable codes. A machine-readable code may be provided via a mobile device of a user. In order to provide faster and more efficient code generation, an interface widget or other tool may be provided, which, on selection, may execute API calls to a server of a transaction processor. The transaction processor may generate a code without requiring the user to go through a code generation and processing flow in a corresponding application. The code may be limited in validity and may be presented via the widget. Once scanned, the code may provide encoded data for a financial instrument.
    Type: Application
    Filed: March 4, 2022
    Publication date: September 7, 2023
    Inventors: Gurinder Singh, Kevin Daniel Ireland, Ankit Rakesh Agarwal, Anthony Frank Aiello, Nadezhda Ionova
  • Patent number: 11531803
    Abstract: A static timing analysis system for finding and reporting timing violations in a digital circuit design prior to circuit fabrication, and associated methods, use exhaustive path-based analysis (EPBA) that is informed by infinite-depth path-based analysis (IPBA) to provide analysis results that are driven full-depth, in contrast to conventional EPBA systems and methods, which can terminate after reaching a maximum depth of analysis as a way of avoiding prolonged or infinite runtimes. The IPBA-driven full-depth EPBA functions for hold-mode as well as setup-mode analysis and achieves reduced pessimism as compared to systems or methods employing IPBA alone, and more complete analysis of designs as compared to systems or methods employing EPBA alone. Improved IPBA signal merging using multidimensional zones for thresholding of signal clustering mitigates the occasional optimism of IPBA.
    Type: Grant
    Filed: April 16, 2021
    Date of Patent: December 20, 2022
    Assignee: CADENCE DESIGN SYSTEMS, INC.
    Inventors: Umesh Gupta, Naresh Kumar, Marut Agarwal, Rakesh Agarwal
  • Patent number: 11379385
    Abstract: Mechanisms to protect the integrity of memory of a virtual machine are provided. The mechanisms involve utilizing certain capabilities of the hypervisor underlying the virtual machine to monitor writes to memory pages of the virtual machine. A guest integrity driver communicates with the hypervisor to request such functionality. Additional protections are provided for protecting the guest integrity driver and associated data, as well as for preventing use of these mechanisms by malicious software. These additional protections include an elevated execution mode, termed “integrity mode,” which can only be entered from a specified entry point, as well as protections on the memory pages that store the guest integrity driver and associated data.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: July 5, 2022
    Assignee: VMware, Inc.
    Inventors: Alok Nemchand Kataria, Wei Xu, Radu Rugina, Jeffrey W. Sheldon, James S. Mattson, Rakesh Agarwal, David Dunn
  • Publication number: 20210124824
    Abstract: In a computer system operable at more than one privilege level, an interrupt security module handles interrupts without exposing a secret value of a register to virtual interrupt handling code that executes at a lower privilege level than the interrupt security module. The interrupt security module is configured to intercept interrupts generated while executing code at lower privilege levels. Upon receiving such an interrupt, the interrupt security module overwrites the secret value of the register with an unrelated constant. Subsequently, the interrupt security module generates a virtual interrupt corresponding to the interrupt and forwards the virtual interrupt to the virtual interrupt handling code. Advantageously, although the virtual interrupt handling code is able to determine the value of the register and consequently the unrelated constant, the virtual interrupt handling code is unable to determine the secret value.
    Type: Application
    Filed: January 5, 2021
    Publication date: April 29, 2021
    Inventors: Wei XU, Alok Nemchand KATARIA, Rakesh AGARWAL, Martim CARBONE
  • Patent number: 10922402
    Abstract: In a computer system operable at more than one privilege level, an interrupt security module handles interrupts without exposing a secret value of a register to virtual interrupt handling code that executes at a lower privilege level than the interrupt security module. The interrupt security module is configured to intercept interrupts generated while executing code at lower privilege levels. Upon receiving such an interrupt, the interrupt security module overwrites the secret value of the register with an unrelated constant. Subsequently, the interrupt security module generates a virtual interrupt corresponding to the interrupt and forwards the virtual interrupt to the virtual interrupt handling code. Advantageously, although the virtual interrupt handling code is able to determine the value of the register and consequently the unrelated constant, the virtual interrupt handling code is unable to determine the secret value.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: February 16, 2021
    Assignee: VMware, Inc.
    Inventors: Wei Xu, Alok Nemchand Kataria, Rakesh Agarwal, Martim Carbone
  • Patent number: 10915685
    Abstract: The present embodiments relate to static timing analysis (STA) of circuits. The STA can include determining graph based analysis (GBA) delays of timing paths within the circuit. Path based analysis (PBA) delays of a subset of timing paths can be determined to generate circuit stage credit values for circuit stages in the circuit. The circuit stage credit values can be used to adjust GBA delays of the timing paths. Prediction functions can be utilized to predict or estimate PBA delays of timing paths thereby avoiding the determination of actual PBA delays of the timing paths.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: February 9, 2021
    Assignee: Cadence Design Systems, Inc.
    Inventors: Umesh Gupta, Naresh Kumar, Rakesh Agarwal, Sukriti Khanna, Jayant Sharma, Ritika Govila
  • Patent number: 9875333
    Abstract: The present disclosure relates to a system and method for electronic design automation. Embodiments may include receiving, using at least one processor, an electronic design and determining one or more graph based analysis (“GBA”) violating nodes associated with the electronic design. Embodiments may include identifying a non-covered violating node from the GBA violating nodes and determining a worst timing path through the non-covered violating node. Embodiments may further include invoking a path-based analysis (“PBA”) on the worst timing path and determining if the worst timing path satisfies the PBA analysis.
    Type: Grant
    Filed: January 19, 2016
    Date of Patent: January 23, 2018
    Assignee: Cadence Design Systems, Inc.
    Inventors: Sourabh Kumar Verma, Naresh Kumar, Ajay Tomar, Rakesh Agarwal, Umesh Gupta, Manish Bansal, Kaustav Guha, Prashant Sethia
  • Patent number: 9870324
    Abstract: A hypervisor provides a guest operating system with a plurality of protection domains, including a root protection domain and one or more secure protection domains, and mechanisms for controlling the transitions between the protection domains. The guest physical memory region of a secure protection domain, which is mapped to host physical memory by secure nested page tables, stores secure guest code and data, and guest page tables for the secure guest code. When executing secure guest code, the guest page tables stored in the secure protection domain region are used for guest virtual to guest physical address translations, and the secure nested page tables are used for guest physical to host physical address translations.
    Type: Grant
    Filed: July 14, 2015
    Date of Patent: January 16, 2018
    Assignee: VMware, Inc.
    Inventors: James S. Mattson, Jr., Rakesh Agarwal, Alok Nemchand Kataria, Wei Xu, Frederick Joseph Jacobs
  • Publication number: 20170300430
    Abstract: Mechanisms to protect the integrity of memory of a virtual machine are provided. The mechanisms involve utilizing certain capabilities of the hypervisor underlying the virtual machine to monitor writes to memory pages of the virtual machine. A guest integrity driver communicates with the hypervisor to request such functionality. Additional protections are provided for protecting the guest integrity driver and associated data, as well as for preventing use of these mechanisms by malicious software. These additional protections include an elevated execution mode, termed “integrity mode,” which can only be entered from a specified entry point, as well as protections on the memory pages that store the guest integrity driver and associated data.
    Type: Application
    Filed: February 28, 2017
    Publication date: October 19, 2017
    Inventors: ALOK NEMCHAND KATARIA, WEI XU, RADU RUGINA, JEFFREY W. SHELDON, JAMES S. MATTSON, RAKESH AGARWAL, DAVID DUNN
  • Publication number: 20160299851
    Abstract: A hypervisor provides a guest operating system with a plurality of protection domains, including a root protection domain and one or more secure protection domains, and mechanisms for controlling the transitions between the protection domains. The guest physical memory region of a secure protection domain, which is mapped to host physical memory by secure nested page tables, stores secure guest code and data, and guest page tables for the secure guest code. When executing secure guest code, the guest page tables stored in the secure protection domain region are used for guest virtual to guest physical address translations, and the secure nested page tables are used for guest physical to host physical address translations.
    Type: Application
    Filed: July 14, 2015
    Publication date: October 13, 2016
    Inventors: James S. Mattson, JR., Rakesh Agarwal, Alok Nemchand Kataria, Wei Xu, Frederick Joseph Jacobs
  • Patent number: 9411979
    Abstract: In a computer system operable at more than one privilege level, an application is securely customized to use secret data without disclosing the secret data to a managing operating system. In operation, an integrity module executes at a higher privilege level than both the managing operating system and the application. After the managing operating system loads the application executable code, the integrity module injects the secret data directly into the instruction stream of the application executable code and then sets the memory location of the secret data as executable-only. As the application executes at the assigned privilege level, the instruction in the application directly accesses the secret data without performing any indirect memory access, thereby protecting the secret data from malicious attempts to read the secret data at a privilege level lower than the integrity module.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: August 9, 2016
    Assignee: VMware, Inc.
    Inventor: Rakesh Agarwal
  • Patent number: 9398019
    Abstract: In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection domain without disclosing the secret data to a managing operating system. In operation, a security module executes at a higher privilege level than both the managing operating system and the confidential code. After the managing operating system loads the executable of the confidential code, the security module injects the secret data directly into an authorization instruction and a verification instruction included in the confidential code and then sets both the authorization instruction and the verification instruction as executable-only. As the confidential code executes at the assigned privilege level, the authorization instruction and the verification instruction use the secret data to distinguish between unauthorized and authorized execution of the confidential code.
    Type: Grant
    Filed: September 29, 2014
    Date of Patent: July 19, 2016
    Assignee: VMware, Inc.
    Inventor: Rakesh Agarwal
  • Publication number: 20160147993
    Abstract: In a computer system operable at more than one privilege level, an interrupt security module handles interrupts without exposing a secret value of a register to virtual interrupt handling code that executes at a lower privilege level than the interrupt security module. The interrupt security module is configured to intercept interrupts generated while executing code at lower privilege levels. Upon receiving such an interrupt, the interrupt security module overwrites the secret value of the register with an unrelated constant. Subsequently, the interrupt security module generates a virtual interrupt corresponding to the interrupt and forwards the virtual interrupt to the virtual interrupt handling code. Advantageously, although the virtual interrupt handling code is able to determine the value of the register and consequently the unrelated constant, the virtual interrupt handling code is unable to determine the secret value.
    Type: Application
    Filed: November 21, 2014
    Publication date: May 26, 2016
    Inventors: Wei XU, Alok Nemchand KATARIA, Rakesh AGARWAL, Martim CARBONE
  • Publication number: 20160044041
    Abstract: In a computer system operable at more than one privilege level, confidential code is securely customized to use secret data to establish a code protection domain without disclosing the secret data to a managing operating system. In operation, a security module executes at a higher privilege level than both the managing operating system and the confidential code. After the managing operating system loads the executable of the confidential code, the security module injects the secret data directly into an authorization instruction and a verification instruction included in the confidential code and then sets both the authorization instruction and the verification instruction as executable-only. As the confidential code executes at the assigned privilege level, the authorization instruction and the verification instruction use the secret data to distinguish between unauthorized and authorized execution of the confidential code.
    Type: Application
    Filed: September 29, 2014
    Publication date: February 11, 2016
    Inventor: Rakesh AGARWAL
  • Publication number: 20160042195
    Abstract: In a computer system operable at more than one privilege level, an application is securely customized to use secret data without disclosing the secret data to a managing operating system. In operation, an integrity module executes at a higher privilege level than both the managing operating system and the application. After the managing operating system loads the application executable code, the integrity module injects the secret data directly into the instruction stream of the application executable code and then sets the memory location of the secret data as executable-only. As the application executes at the assigned privilege level, the instruction in the application directly accesses the secret data without performing any indirect memory access, thereby protecting the secret data from malicious attempts to read the secret data at a privilege level lower than the integrity module.
    Type: Application
    Filed: September 29, 2014
    Publication date: February 11, 2016
    Inventor: Rakesh AGARWAL
  • Patent number: 8438003
    Abstract: A method of improved simulator processing is provided. The method according to the current invention includes grouping frequently accessed data into one set id to improve memory hierarchy performance. The method further includes simulating predication in a non-predicated architecture to improve CPU performance. The simulated predication includes pseudo-predicated implementation of read-operation vector element access pseudo-predicated implementation of write-operation vector element access, and predicated implementation of multi-way branches with assignment statements having a same left-hand-side (lhs). The method further includes determining a selection path in a multi-sensitive “always” block to reduce taken branches. The multi-sensitive “always” block selection path determination includes generating instance-specific code to save port allocation storage, and generating inlined instance-specific code to combine sensitive actions.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: May 7, 2013
    Assignee: Cadence Design Systems, Inc.
    Inventors: Rakesh Agarwal, Oana Baltaretu