Patents by Inventor Ravi Krishnan

Ravi Krishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190184880
    Abstract: A vehicle seat is equipped with a seatback having a mounting portion, a headrest having a headrest frame and an electric component, a first connector, and a second connector. The first connector has an engaging portion engaged with a hole of the headrest frame, a protrusion engaging the second connector, and a first connector terminal electrically connected to a lead wire of the electric component. The second connector has a first engaging piece engaged with a hole of the guide bracket from the outside of the guide bracket, a second engaging piece engaged with the protrusion of the first connector from the outside of the first connector, and a second connector terminal electrically connected to a lead wire wired in the seatback and the first connector terminal. The engagement between the hole of the mounting portion and the first engaging piece of the second connector can be released irreversibly.
    Type: Application
    Filed: December 19, 2017
    Publication date: June 20, 2019
    Inventors: Yasuo KAKISHIMA, Rengith Francis Xavier, Ravi KRISHNAN, Avijit Gopalakrishnan
  • Publication number: 20190184881
    Abstract: A headrest includes: (a) a headrest frame, (b) a speaker unit supported by the headrest frame and having a speaker box, a speaker attached to the speaker box, and a megaphone-shaped tube attached to the speaker box, (c) a cushion material, (d) a skin material having an opening, sewed into a pouch shape, and covering the headrest frame, the speaker unit, and the cushion material, and (e) a ring-shaped member securing the entire opening-side end portion of the skin material sandwiched between the ring-shaped member and the megaphone-shaped tube.
    Type: Application
    Filed: December 19, 2017
    Publication date: June 20, 2019
    Inventors: Yasuo KAKISHIMA, Ravi KRISHNAN, Dave HAMEL, Barry McLEAN, Seiji KAWAKAMI
  • Publication number: 20190173903
    Abstract: A user state tracking and anomaly detector for multi-tenant SaaS applications operates in association with a log management solution, such as a SIEM. A given SaaS application has many user STATES, and the applications often have dependencies on one another that arise, for example, when a particular application makes a request (typically on behalf of a user) to take some action with respect to another application. The detector includes a mapper that maps the large number of user STATES to a reduced number of mapped states (e.g., “red” and “green”), and a dependency module that generates user-resource dependency graphs. Using a dependency graph, a SaaS modeler in the detector checks whether a particular dependency-based request associated with a SaaS application is valid. State and dependency information generated by the mapper and dependency module are reported back to the log management solution to facilitate improved logging and anomaly detection.
    Type: Application
    Filed: February 4, 2019
    Publication date: June 6, 2019
    Applicant: International Business Machines Corporation
    Inventors: Ravi Krishnan Muthukrishnan, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Nataraj Nagaratnam
  • Patent number: 10244002
    Abstract: A cloud infrastructure security assurance service is enhanced to facilitate bursting of cloud applications into other cloud infrastructures. The security assurance service provides a mechanism to enable creation and management of secure application zones within a cloud infrastructure. When the security assurance service receives an indication that a workload associated with a cloud application triggers a cloud burst, the service is extended into a new cloud infrastructure. Once the security assurance service is instantiated in the new cloud infrastructure, it identifies the broad security requirements of the application, as well as the security capabilities of the new environment. Using this information, the security assurance service computes a minimal security environment needed by the cloud application for the burst operation.
    Type: Grant
    Filed: December 25, 2017
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporaion
    Inventors: Jeffrey Robert Hoy, Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer
  • Patent number: 10237064
    Abstract: This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. Without knowledge of (a) the physical object itself, (b) how the physical object characteristic is converted (to a digital representation), and (c) the uniqueness value, an attacker cannot reproduce the key generator seed (or the key(s) generated from that seed).
    Type: Grant
    Filed: December 25, 2017
    Date of Patent: March 19, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Publication number: 20190046575
    Abstract: The present disclosure provides methods of treating or preventing respiratory condition and/or for treating an IgE-mediated allergy and/or for reducing an allergic response to an allergen and/or for inducing anergy to an allergen in a subject and/or improving lung function in a subject suffering from an allergy comprising administering to a subject a population of cells enriched for STRO-1+ cells and/or progeny thereof and/or soluble factors derived therefrom.
    Type: Application
    Filed: July 16, 2018
    Publication date: February 14, 2019
    Applicant: Mesoblast, Inc.
    Inventors: Silviu Itescu, Ravi Krishnan, Peter Ghosh
  • Patent number: 10200387
    Abstract: A user state tracking and anomaly detector for multi-tenant SaaS applications operates in association with a log management solution, such as a SIEM. A given SaaS application has many user STATES, and the applications often have dependencies on one another that arise, for example, when a particular application makes a request (typically on behalf of a user) to take some action with respect to another application. The detector includes a mapper that maps the large number of user STATES to a reduced number of mapped states (e.g., “red” and “green”), and a dependency module that generates user-resource dependency graphs. Using a dependency graph, a SaaS modeler in the detector checks whether a particular dependency-based request associated with a SaaS application is valid. State and dependency information generated by the mapper and dependency module are reported back to the log management solution to facilitate improved logging and anomaly detection.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: February 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Ravi Krishnan Muthukrishnan, Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Nataraj Nagaratnam
  • Patent number: 10159696
    Abstract: The present disclosure provides methods of treating or preventing obesity or causing weight loss or treating or preventing metabolic syndrome comprising administering to a subject a population of cells enriched for STRO-1+ cells and/or progeny thereof and/or soluble factors derived therefrom.
    Type: Grant
    Filed: June 8, 2016
    Date of Patent: December 25, 2018
    Assignee: MESOBLAST, INC.
    Inventors: Ravi Krishnan, Silviu Itescu
  • Patent number: 10142293
    Abstract: A method, apparatus and computer program product manage a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment. A method in a first VPN agent manages a first VPN tunnel in a plurality of VPN tunnels between a first cloud and a second cloud in a hybrid cloud environment. The VPN agent receives a request from a VPN manager. The request includes a first set of requirements for the first VPN tunnel in the plurality of VPN tunnels. The VPN agent creates the first VPN tunnel according to the first set of requirements. The VPN agent tunes the first VPN tunnel according to a second set of requirements. The tuning of the first VPN tunnel can include merging the first VPN tunnel with a second VPN tunnel, or splitting the first VPN tunnel into a first and second VPN tunnel.
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: November 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 10028979
    Abstract: The present disclosure provides methods of treating or preventing respiratory condition and/or for treating an IgE-mediated allergy and/or for reducing an allergic response to an allergen and/or for inducing anergy to an allergen in a subject and/or improving lung function in a subject suffering from an allergy comprising administering to a subject a population of cells enriched for STRO-1+ cells and/or progeny thereof and/or soluble factors derived therefrom.
    Type: Grant
    Filed: December 12, 2013
    Date of Patent: July 24, 2018
    Assignee: MESOBLAST, INC.
    Inventors: Silviu Itescu, Ravi Krishnan, Peter Ghosh
  • Patent number: 10028139
    Abstract: A technique to enforce a physical security constraint leverages a user's mobile device while at the same time enabling the user to continue use of the device for appropriate purposes within a restricted area. A user's access to a restricted area with his or her mobile device in effect is “conditioned” upon installation (on the device) of an endpoint agent that controls features of the mobile device based on one or more factors, such as the user's role, a current location of the user within the restricted area, and other criteria as defined in a security policy. Preferably, the agent is instantiated automatically when the user enters the restricted area, with the device then restored to its prior state when the user leaves the restricted area. The particular features of the mobile device that are controlled may be varied, even within particular zones of the restricted area itself.
    Type: Grant
    Filed: March 28, 2015
    Date of Patent: July 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Sreekanth Ramakrishna Iyer, Jeffrey Robert Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 9968640
    Abstract: The present invention provides a method for improving pancreatic function in a subject in need thereof, the method comprising administering to the subject STRO-1+ cells and/or progeny cells thereof and/or soluble factors derived therefrom. The method of the invention is useful for treating and/or preventing and/or delaying the onset or progression of a disorder resulting from or associated with pancreatic dysfunction, e.g., resulting from abnormal endocrine or exocrine function of the pancreas.
    Type: Grant
    Filed: October 27, 2016
    Date of Patent: May 15, 2018
    Assignee: MESOBLAST, INC.
    Inventors: Silviu Itescu, Ravi Krishnan
  • Publication number: 20180124119
    Abstract: A cloud infrastructure security assurance service is enhanced to facilitate bursting of cloud applications into other cloud infrastructures. The security assurance service provides a mechanism to enable creation and management of secure application zones within a cloud infrastructure. When the security assurance service receives an indication that a workload associated with a cloud application triggers a cloud burst, the service is extended into a new cloud infrastructure. Once the security assurance service is instantiated in the new cloud infrastructure, it identifies the broad security requirements of the application, as well as the security capabilities of the new environment. Using this information, the security assurance service computes a minimal security environment needed by the cloud application for the burst operation.
    Type: Application
    Filed: December 25, 2017
    Publication date: May 3, 2018
    Inventors: Jeffrey Robert Hoy, Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer
  • Publication number: 20180109380
    Abstract: This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. Without knowledge of (a) the physical object itself, (b) how the physical object characteristic is converted (to a digital representation), and (c) the uniqueness value, an attacker cannot reproduce the key generator seed (or the key(s) generated from that seed).
    Type: Application
    Filed: December 25, 2017
    Publication date: April 19, 2018
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 9912477
    Abstract: This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. Without knowledge of (a) the physical object itself, (b) how the physical object characteristic is converted (to a digital representation), and (c) the uniqueness value, an attacker cannot reproduce the key generator seed (or the key(s) generated from that seed).
    Type: Grant
    Filed: August 8, 2017
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Patent number: 9888040
    Abstract: A cloud infrastructure security assurance service is enhanced to facilitate bursting of cloud applications into other cloud infrastructures. The security assurance service provides a mechanism to enable creation and management of secure application zones within a cloud infrastructure. When the security assurance service receives an indication that a workload associated with a cloud application triggers a cloud burst, the service is extended into a new cloud infrastructure. Once the security assurance service is instantiated in the new cloud infrastructure, it identifies the broad security requirements of the application, as well as the security capabilities of the new environment. Using this information, the security assurance service computes a minimal security environment needed by the cloud application for the burst operation.
    Type: Grant
    Filed: July 11, 2015
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer
  • Publication number: 20180027022
    Abstract: This disclosure provides the ability for a cloud application to specify its security requirements, the ability to have those requirements evaluated, e.g., against a specific cloud deployment environment, and the ability to enable the application to control a cloud-based security assurance service to provision additional security technology in the cloud to support deployment (or re-deployment elsewhere) of the application if the environment does not have the necessary topology and security resources deployed. To this end, the application queries the service by passing a set of application-based security rights. If the security capabilities provided by the security assurance service are sufficient or better than the application's security rights, the application functions normally. If, however, the security environment established by the security assurance service is insufficient for the application, the application is afforded one or more remediation options, e.g.
    Type: Application
    Filed: September 11, 2017
    Publication date: January 25, 2018
    Inventors: Nataraj Nagaratnam, Jeffrey Robert Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer
  • Patent number: 9875399
    Abstract: A method, apparatus and computer program product for improving differentiation in a gesture based security system is described. An image based feed from a camera is received by the gesture based security system. The camera has a view of a first secured area. A first gesture within the feed is recognized, producing a first recognized gesture. The first recognized gesture is determined to be an unclassified gesture for the first secured area. Non-gesture metadata is associated with the first recognized gesture. The first recognized gesture and the associated non-gesture metadata are transmitted together for classification of the first recognized gesture. The first recognized gesture is classified as one of the following: an approved gesture within the first secured area, an unapproved gesture within the first secured area or a suspicious gesture within the first secured area.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: January 23, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Publication number: 20170353307
    Abstract: This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value. Without knowledge of (a) the physical object itself, (b) how the physical object characteristic is converted (to a digital representation), and (c) the uniqueness value, an attacker cannot reproduce the key generator seed (or the key(s) generated from that seed).
    Type: Application
    Filed: August 8, 2017
    Publication date: December 7, 2017
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam
  • Publication number: 20170316259
    Abstract: A method, apparatus and computer program product for improving differentiation in a gesture based security system is described. An image based feed from a camera is received by the gesture based security system. The camera has a view of a first secured area. A first gesture within the feed is recognized, producing a first recognized gesture. The first recognized gesture is determined to be an unclassified gesture for the first secured area. Non-gesture metadata is associated with the first recognized gesture. The first recognized gesture and the associated non-gesture metadata are transmitted together for classification of the first recognized gesture. The first recognized gesture is classified as one of the following: an approved gesture within the first secured area, an unapproved gesture within the first secured area or a suspicious gesture within the first secured area.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Jeffrey Robert Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam