Patents by Inventor Ram Swaminathan
Ram Swaminathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230297098Abstract: The present disclosure describes a method, apparatus, and computer readable medium for Surface Mount Technology (SMT). The system comprising a Data Integration (DI) platform configured to collate data from one or more units in an assembly line, an Artificial Intelligence (AI) platform configured to process the collated data, using one or more machine learning techniques, to generate predictive and preventive analysis for the one or more units present in the assembly line. The system further disclose a Digital Twin Simulation (DTS) platform configured to simulate an exact replica of all the units present in the assembly line, provide visual representation, allow the one or more operators in the assembly line to take at least one action and provide the at least one action taken by the one or more operators in the assembly line as feedback signal to AI platform to improve prediction rate of said system.Type: ApplicationFiled: March 15, 2022Publication date: September 21, 2023Applicant: CLARITRICS INC. d.b.a BUDDI AIInventors: Ram SWAMINATHAN, Harinath KRISHNAMOORTHY, Mohammed SHARAFATH, Praveen Kumar SURESH, Sriram RAJKUMAR, Sudarsun SANTHIAPPAN
-
Patent number: 11373736Abstract: A method performed by a processing system includes identifying a first node in a metadata tree of a patient that corresponds to an encrypted electronic health record in an encrypted data store and preventing a portion of the first node from being decrypted with a node key of a first healthcare participant in response to a second node of the metadata tree including key rotation information that indicates that the node key has been revoked by a second healthcare participant.Type: GrantFiled: September 12, 2012Date of Patent: June 28, 2022Assignee: Micro Focus LLCInventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Patent number: 10489310Abstract: Determining cache value currency using persistent markers is disclosed herein. In one example, a cache entry is retrieved from a local cache memory device. The cache entry includes a key, a value to be used by the computing device, and a marker flag to determine whether the cache entry is current. The local cache memory device also includes a marker location that indicates a location of a marker in a shared persistent fabric-attached memory (FAM). Using a marker location, the marker is retrieved from the shared persistent FAM. From the marker and the marker flag, it is determined whether the cache entry is current. The shared FAM pool is connected to the local cache memory devices of multiple computing devices.Type: GrantFiled: October 20, 2017Date of Patent: November 26, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Kimberly Keeton, Yupu Zhang, Haris Volos, Ram Swaminathan, Evan R. Kirshenbaum
-
Publication number: 20190121750Abstract: Determining cache value currency using persistent markers is disclosed herein. In one example, a cache entry is retrieved from a local cache memory device. The cache entry includes a key, a value to be used by the computing device, and a marker flag to determine whether the cache entry is current. The local cache memory device also includes a marker location that indicates a location of a marker in a shared persistent fabric-attached memory (FAM). Using a marker location, the marker is retrieved from the shared persistent FAM. From the marker and the marker flag, it is determined whether the cache entry is current. The shared FAM pool is connected to the local cache memory devices of multiple computing devices.Type: ApplicationFiled: October 20, 2017Publication date: April 25, 2019Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Kimberly Keeton, Yupu Zhang, Haris Volos, Ram Swaminathan, Evan R. Kirshenbaum
-
Patent number: 10025903Abstract: A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator.Type: GrantFiled: September 12, 2012Date of Patent: July 17, 2018Assignee: ENTIT SOFTWARE, LLCInventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Patent number: 9940469Abstract: A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record based on the location and a provider key corresponding to a provider, the provider key generated from a patient key corresponding to the patient, encrypting the electronic health record using the record key to generate a encrypted record, and providing the encrypted record to an encrypted data store.Type: GrantFiled: August 30, 2012Date of Patent: April 10, 2018Assignee: EntIT Software LLCInventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Publication number: 20150312107Abstract: A method of generating a set of composite services is provided herein. The method includes receiving standardized service descriptions of a set of component services from service providers. The standardized description of a component service may be translated to an automaton-based description. A specified goal associated with the set of component services may be received. The set of composite services may be generated based on the automaton-based description and the specified goal. Each of the generated composite services may accomplish the specified goal.Type: ApplicationFiled: March 6, 2015Publication date: October 29, 2015Inventors: Yin Wang, Hamid Reza Motahari Nezhad, Ram Swaminathan, Sharad Singhal
-
Patent number: 9165158Abstract: An encryption key fragment is divided into a number of encryption key fragments. Requests to store different ones of the encryption key fragments are transmitted to different computer memory storage systems. An individual request to store an encryption key fragment includes one of the encryption key fragments and bears an access control hallmark for regulating access to the encryption key fragment.Type: GrantFiled: August 17, 2010Date of Patent: October 20, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jun Li, Ram Swaminathan, Alan H. Karp
-
Publication number: 20150278450Abstract: A method performed by a processing system includes identifying a first node in a metadata tree of a patient that corresponds to an encrypted electronic health record in an encrypted data store and preventing a portion of the first node from being decrypted with a node key of a first healthcare participant in response to a second node of the metadata tree including key rotation information that indicates that the node key has been revoked by a second healthcare participant.Type: ApplicationFiled: September 12, 2012Publication date: October 1, 2015Applicant: Hewlett-Packard Development Company, LPInventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Publication number: 20150242570Abstract: A method performed by an electronic healthcare record (EHR) system with customizable compliance policies includes invoking a first data management process for a first data management operation, the first data management process defining a first set of compliance policies of a first healthcare participant for the first data management operation, and invoking a second data management process for the first data management operation, the second data management process defining a second set of compliance policies of a second healthcare participant for the first data management operation that differs from the first set of compliance policies.Type: ApplicationFiled: September 9, 2012Publication date: August 27, 2015Inventors: Jun Li, Jovan Stevovic, Ram Swaminathan, Hamid Reza Motahari-Nezhad
-
Publication number: 20150242641Abstract: A method performed by a processing system includes reconstructing a metadata tree of a patient from a metadata tree journal, the metadata tree including a plurality of references to a corresponding plurality of encrypted electronic health records of the patient in an encrypted data store, and validating the metadata tree by comparing first integrity information of the metadata tree to second integrity information corresponding to the metadata tree journal provided by a metadata integrity validator.Type: ApplicationFiled: September 12, 2012Publication date: August 27, 2015Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Publication number: 20150220746Abstract: A method performed by a processing system includes determining a location in a metadata tree of a patient for an electronic health record, generating a record key for the electronic health record based on the location and a provider key corresponding to a provider, the provider key generated from a patient key corresponding to the patient, encrypting the electronic health record using the record key to generate a encrypted record, and providing the encrypted record to an encrypted data store.Type: ApplicationFiled: August 30, 2012Publication date: August 6, 2015Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Publication number: 20150213570Abstract: A method performed by a processing system includes encrypting an electronic health record of a patient using a record key, encrypting a portion of a node of a metadata tree of the patient with a node key, the portion including a reference to the encrypted record in an encrypted data store, and updating the metadata tree for the patient to include the encrypted node and a node key lockbox with the node key.Type: ApplicationFiled: September 19, 2012Publication date: July 30, 2015Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Patent number: 9021094Abstract: Plural sets of items corresponding to plural tiers of a multi-tiered system are defined, where the items represent amounts of resources to allocate to the tiers. Items from respective sets are selected based on a response time constraint and a target cost. Information is provided pertaining to allocation of amounts of resources to the respective tiers based on the selected items.Type: GrantFiled: April 28, 2005Date of Patent: April 28, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Yunhong Zhou, Anshul Kothari, Ram Swaminathan, Robert E. Tarjan
-
Patent number: 9009281Abstract: A method of generating a set of composite services is provided herein. The method includes receiving standardized service descriptions of a set of component services from service providers. The standardized description of a component service may be translated to an automaton-based description. A specified goal associated with the set of component services may be received. The set of composite services may be generated based on the automaton-based description and the specified goal. Each of the generated composite services may accomplish the specified goal.Type: GrantFiled: July 1, 2011Date of Patent: April 14, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Yin Wang, Hamid Reza Motahari Nezhad, Ram Swaminathan, Sharad Singhal
-
Patent number: 8990270Abstract: A network file system includes at least one unmodified client and at least one unmodified physical file server (PFS). Each PFS has at least one file that is identified by an associated physical file handle (PFH). The network file system includes virtual file servers (VFSs) in a data path between the client(s) and the PFS(s). The network file system also includes a virtualized name space that is mapped to the PFS(s) and is provided to the client(s) by the VFS(s). The network file system further includes a virtualized ID space that is established in response to a request from a client. Within the ID space, each file is identified by a physical file handle (PFH) on a PFS. The PFH and PFS pair are mapped to provide a virtual file handle (VFH), and the map of the VFHs is allocated among the VFSs.Type: GrantFiled: August 3, 2006Date of Patent: March 24, 2015Assignee: Hewlett-Packard Development Company, L. P.Inventors: Mustafa Uysal, Ram Swaminathan, Junwen Lai
-
Patent number: 8917872Abstract: Systems, methods, and machine-readable and executable instructions are provided for encryption key storage. Encryption key storage may include associating each of a plurality of identifiers with a different one of a plurality of key fragment stores, determining a plurality of indexes, where each of the plurality of indexes is based upon a handle provided by a customer, an authorization token provided by the customer, and a different one of the plurality of identifiers, partitioning an encryption key provided by the customer into a number of encryption key fragments, and distributing the plurality of indexes and the number of encryption key fragments to the plurality of key fragment stores. The handle can be a uniform resource identifier, for instance.Type: GrantFiled: July 6, 2011Date of Patent: December 23, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jun Li, Ram Swaminathan, Sharad Singhal
-
Patent number: 8538029Abstract: An encryption key may be fragmented into n encryption key fragments such that k<n fragments are sufficient for reconstructing the encryption key. The encryption key fragments may be distributed across data stores located within first and second geographic regions. For example, at least k of the encryption key fragments may be distributed across data stores realized at N different availability zones within the first geographic region such that less than k of the encryption key fragments are distributed to each of the N availability zones within the first geographic region. Similarly, at least k of the encryption key fragments may be distributed across data stores realized at M different availability zones within the second geographic region such that less than k of the encryption key fragments are distributed to each of the M availability zones within the second geographic region.Type: GrantFiled: March 24, 2011Date of Patent: September 17, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jun Li, Sharad Singhal, Ram Swaminathan, Bryan Stephenson
-
Patent number: 8533478Abstract: In accordance with an embodiment of the invention, a method of writing and reading redundant data is provided. Data is written by storing a copy of the data along with a timestamp and a signature at each of a set of storage devices. The data is read by retrieving the copy of the data, the timestamp and the signature from each of a plurality of the set of data storage devices. One of the copies of the data is selected to be provided to a requestor of the data. Each of the storage devices of the set is requested to certify the selected copy of the data. Provided that a proof of certification of the selected copy of the data is valid, the storage devices of the set are instructed to store the selected copy of the data along with a new timestamp.Type: GrantFiled: October 24, 2008Date of Patent: September 10, 2013Assignee: Hewlett-Packard Development Company, L. P.Inventors: Marcos K. Aguilera, Ram Swaminathan
-
Patent number: 8514776Abstract: A wireless network metric region in a wireless network is determined using a node metric region and a performance metric. The node metric region, which includes a boundary of the node metric region, for each node is estimated and the performance metric for the node metric region for each node is measured. The boundary of the node metric region for each node is adjusted based on the measured performance metric and then the wireless network metric region for the wireless network is determined based on the adjusted boundaries of the node metric region for each node.Type: GrantFiled: April 30, 2009Date of Patent: August 20, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Joshua P. Robinson, Ram Swaminathan