Patents by Inventor Ram Swaminathan

Ram Swaminathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230297098
    Abstract: The present disclosure describes a method, apparatus, and computer readable medium for Surface Mount Technology (SMT). The system comprising a Data Integration (DI) platform configured to collate data from one or more units in an assembly line, an Artificial Intelligence (AI) platform configured to process the collated data, using one or more machine learning techniques, to generate predictive and preventive analysis for the one or more units present in the assembly line. The system further disclose a Digital Twin Simulation (DTS) platform configured to simulate an exact replica of all the units present in the assembly line, provide visual representation, allow the one or more operators in the assembly line to take at least one action and provide the at least one action taken by the one or more operators in the assembly line as feedback signal to AI platform to improve prediction rate of said system.
    Type: Application
    Filed: March 15, 2022
    Publication date: September 21, 2023
    Applicant: CLARITRICS INC. d.b.a BUDDI AI
    Inventors: Ram SWAMINATHAN, Harinath KRISHNAMOORTHY, Mohammed SHARAFATH, Praveen Kumar SURESH, Sriram RAJKUMAR, Sudarsun SANTHIAPPAN
  • Patent number: 11373736
    Abstract: A method performed by a processing system includes identifying a first node in a metadata tree of a patient that corresponds to an encrypted electronic health record in an encrypted data store and preventing a portion of the first node from being decrypted with a node key of a first healthcare participant in response to a second node of the metadata tree including key rotation information that indicates that the node key has been revoked by a second healthcare participant.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: June 28, 2022
    Assignee: Micro Focus LLC
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Patent number: 10489310
    Abstract: Determining cache value currency using persistent markers is disclosed herein. In one example, a cache entry is retrieved from a local cache memory device. The cache entry includes a key, a value to be used by the computing device, and a marker flag to determine whether the cache entry is current. The local cache memory device also includes a marker location that indicates a location of a marker in a shared persistent fabric-attached memory (FAM). Using a marker location, the marker is retrieved from the shared persistent FAM. From the marker and the marker flag, it is determined whether the cache entry is current. The shared FAM pool is connected to the local cache memory devices of multiple computing devices.
    Type: Grant
    Filed: October 20, 2017
    Date of Patent: November 26, 2019
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Kimberly Keeton, Yupu Zhang, Haris Volos, Ram Swaminathan, Evan R. Kirshenbaum
  • Publication number: 20190121750
    Abstract: Determining cache value currency using persistent markers is disclosed herein. In one example, a cache entry is retrieved from a local cache memory device. The cache entry includes a key, a value to be used by the computing device, and a marker flag to determine whether the cache entry is current. The local cache memory device also includes a marker location that indicates a location of a marker in a shared persistent fabric-attached memory (FAM). Using a marker location, the marker is retrieved from the shared persistent FAM. From the marker and the marker flag, it is determined whether the cache entry is current. The shared FAM pool is connected to the local cache memory devices of multiple computing devices.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 25, 2019
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Kimberly Keeton, Yupu Zhang, Haris Volos, Ram Swaminathan, Evan R. Kirshenbaum
  • Patent number: 10025903
    Abstract: A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: July 17, 2018
    Assignee: ENTIT SOFTWARE, LLC
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Patent number: 9940469
    Abstract: A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record based on the location and a provider key corresponding to a provider, the provider key generated from a patient key corresponding to the patient, encrypting the electronic health record using the record key to generate a encrypted record, and providing the encrypted record to an encrypted data store.
    Type: Grant
    Filed: August 30, 2012
    Date of Patent: April 10, 2018
    Assignee: EntIT Software LLC
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Publication number: 20150312107
    Abstract: A method of generating a set of composite services is provided herein. The method includes receiving standardized service descriptions of a set of component services from service providers. The standardized description of a component service may be translated to an automaton-based description. A specified goal associated with the set of component services may be received. The set of composite services may be generated based on the automaton-based description and the specified goal. Each of the generated composite services may accomplish the specified goal.
    Type: Application
    Filed: March 6, 2015
    Publication date: October 29, 2015
    Inventors: Yin Wang, Hamid Reza Motahari Nezhad, Ram Swaminathan, Sharad Singhal
  • Patent number: 9165158
    Abstract: An encryption key fragment is divided into a number of encryption key fragments. Requests to store different ones of the encryption key fragments are transmitted to different computer memory storage systems. An individual request to store an encryption key fragment includes one of the encryption key fragments and bears an access control hallmark for regulating access to the encryption key fragment.
    Type: Grant
    Filed: August 17, 2010
    Date of Patent: October 20, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jun Li, Ram Swaminathan, Alan H. Karp
  • Publication number: 20150278450
    Abstract: A method performed by a processing system includes identifying a first node in a metadata tree of a patient that corresponds to an encrypted electronic health record in an encrypted data store and preventing a portion of the first node from being decrypted with a node key of a first healthcare participant in response to a second node of the metadata tree including key rotation information that indicates that the node key has been revoked by a second healthcare participant.
    Type: Application
    Filed: September 12, 2012
    Publication date: October 1, 2015
    Applicant: Hewlett-Packard Development Company, LP
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Publication number: 20150242570
    Abstract: A method performed by an electronic healthcare record (EHR) system with customizable compliance policies includes invoking a first data management process for a first data management operation, the first data management process defining a first set of compliance policies of a first healthcare participant for the first data management operation, and invoking a second data management process for the first data management operation, the second data management process defining a second set of compliance policies of a second healthcare participant for the first data management operation that differs from the first set of compliance policies.
    Type: Application
    Filed: September 9, 2012
    Publication date: August 27, 2015
    Inventors: Jun Li, Jovan Stevovic, Ram Swaminathan, Hamid Reza Motahari-Nezhad
  • Publication number: 20150242641
    Abstract: A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator.
    Type: Application
    Filed: September 12, 2012
    Publication date: August 27, 2015
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Publication number: 20150220746
    Abstract: A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record based on the location and a provider key corresponding to a provider, the provider key generated from a patient key corresponding to the patient, encrypting the electronic health record using the record key to generate a encrypted record, and providing the encrypted record to an encrypted data store.
    Type: Application
    Filed: August 30, 2012
    Publication date: August 6, 2015
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Publication number: 20150213570
    Abstract: A method performed by a processing system includes encrypting an electronic health record of a patient using a record key, encrypting a portion of a node of a metadata tree of the patient with a node key, the portion including a reference to the encrypted record in an encrypted data store, and updating the metadata tree for the patient to include the encrypted node and a node key lockbox with the node key.
    Type: Application
    Filed: September 19, 2012
    Publication date: July 30, 2015
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Patent number: 9021094
    Abstract: Plural sets of items corresponding to plural tiers of a multi-tiered system are defined, where the items represent amounts of resources to allocate to the tiers. Items from respective sets are selected based on a response time constraint and a target cost. Information is provided pertaining to allocation of amounts of resources to the respective tiers based on the selected items.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: April 28, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Yunhong Zhou, Anshul Kothari, Ram Swaminathan, Robert E. Tarjan
  • Patent number: 9009281
    Abstract: A method of generating a set of composite services is provided herein. The method includes receiving standardized service descriptions of a set of component services from service providers. The standardized description of a component service may be translated to an automaton-based description. A specified goal associated with the set of component services may be received. The set of composite services may be generated based on the automaton-based description and the specified goal. Each of the generated composite services may accomplish the specified goal.
    Type: Grant
    Filed: July 1, 2011
    Date of Patent: April 14, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Yin Wang, Hamid Reza Motahari Nezhad, Ram Swaminathan, Sharad Singhal
  • Patent number: 8990270
    Abstract: A network file system includes at least one unmodified client and at least one unmodified physical file server (PFS). Each PFS has at least one file that is identified by an associated physical file handle (PFH). The network file system includes virtual file servers (VFSs) in a data path between the client(s) and the PFS(s). The network file system also includes a virtualized name space that is mapped to the PFS(s) and is provided to the client(s) by the VFS(s). The network file system further includes a virtualized ID space that is established in response to a request from a client. Within the ID space, each file is identified by a physical file handle (PFH) on a PFS. The PFH and PFS pair are mapped to provide a virtual file handle (VFH), and the map of the VFHs is allocated among the VFSs.
    Type: Grant
    Filed: August 3, 2006
    Date of Patent: March 24, 2015
    Assignee: Hewlett-Packard Development Company, L. P.
    Inventors: Mustafa Uysal, Ram Swaminathan, Junwen Lai
  • Patent number: 8917872
    Abstract: Systems, methods, and machine-readable and executable instructions are provided for encryption key storage. Encryption key storage may include associating each of a plurality of identifiers with a different one of a plurality of key fragment stores, determining a plurality of indexes, where each of the plurality of indexes is based upon a handle provided by a customer, an authorization token provided by the customer, and a different one of the plurality of identifiers, partitioning an encryption key provided by the customer into a number of encryption key fragments, and distributing the plurality of indexes and the number of encryption key fragments to the plurality of key fragment stores. The handle can be a uniform resource identifier, for instance.
    Type: Grant
    Filed: July 6, 2011
    Date of Patent: December 23, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
  • Patent number: 8538029
    Abstract: An encryption key may be fragmented into n encryption key fragments such that k<n fragments are sufficient for reconstructing the encryption key. The encryption key fragments may be distributed across data stores located within first and second geographic regions. For example, at least k of the encryption key fragments may be distributed across data stores realized at N different availability zones within the first geographic region such that less than k of the encryption key fragments are distributed to each of the N availability zones within the first geographic region. Similarly, at least k of the encryption key fragments may be distributed across data stores realized at M different availability zones within the second geographic region such that less than k of the encryption key fragments are distributed to each of the M availability zones within the second geographic region.
    Type: Grant
    Filed: March 24, 2011
    Date of Patent: September 17, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jun Li, Sharad Singhal, Ram Swaminathan, Bryan Stephenson
  • Patent number: 8533478
    Abstract: In accordance with an embodiment of the invention, a method of writing and reading redundant data is provided. Data is written by storing a copy of the data along with a timestamp and a signature at each of a set of storage devices. The data is read by retrieving the copy of the data, the timestamp and the signature from each of a plurality of the set of data storage devices. One of the copies of the data is selected to be provided to a requestor of the data. Each of the storage devices of the set is requested to certify the selected copy of the data. Provided that a proof of certification of the selected copy of the data is valid, the storage devices of the set are instructed to store the selected copy of the data along with a new timestamp.
    Type: Grant
    Filed: October 24, 2008
    Date of Patent: September 10, 2013
    Assignee: Hewlett-Packard Development Company, L. P.
    Inventors: Marcos K. Aguilera, Ram Swaminathan
  • Patent number: 8514776
    Abstract: A wireless network metric region in a wireless network is determined using a node metric region and a performance metric. The node metric region, which includes a boundary of the node metric region, for each node is estimated and the performance metric for the node metric region for each node is measured. The boundary of the node metric region for each node is adjusted based on the measured performance metric and then the wireless network metric region for the wireless network is determined based on the adjusted boundaries of the node metric region for each node.
    Type: Grant
    Filed: April 30, 2009
    Date of Patent: August 20, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua P. Robinson, Ram Swaminathan