Patents by Inventor Ravigopal Vennelakanti

Ravigopal Vennelakanti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8063738
    Abstract: An RFID system includes a pair of guide tracks located on opposite boundaries of at least one zone. A channel is movably attached to the guide tracks and is configured to move along the guide tracks through the at least one zone. A mobile RFID reader is movably attached to the channel and the mobile RFID reader is paused at a plurality of read points to scan for RFID tags located. The read points are determined by an arrangement of a plurality of hexagonal areas which are grouped together to create a combined area, where the combined area is aligned with the predefined area to define locations of the plurality of hexagonal areas, and where substantially central locations of each hexagonal area represent the plurality of read points.
    Type: Grant
    Filed: September 11, 2008
    Date of Patent: November 22, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ravigopal Vennelakanti, Manish Gupta
  • Patent number: 7970143
    Abstract: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: June 28, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Patent number: 7970142
    Abstract: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: June 28, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Patent number: 7895121
    Abstract: A system and method for tracking conversions. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. The method determines that the user has performed an action. A unique payment option is associated with the action, wherein the unique payment option is generated in response to the action. Notification is received that the user has made a payment to an online merchant using the unique payment option. The payment is associated with a conversion of the action without cooperation of the online merchant.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: February 22, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Rajan Mathew Lukose, Ravigopal Vennelakanti
  • Publication number: 20100325206
    Abstract: To provide collaborative business intelligence in an enterprise, an analytics platform is provided to receive an event associated with the enterprise and to perform analysis in response to the event. A virtual collaboration platform is provided to enable plural users to interact with each other and to use resources of the analytics platform.
    Type: Application
    Filed: June 18, 2009
    Publication date: December 23, 2010
    Inventors: UMESHWAR DAYAL, Ravigopal Vennelakanti, Ratnesh Kumar Sharma, Maria G. Gastellanos, Ming C. Hao, Chandrakant Patel, Sangamesh S. Bellad, Manish Gupta
  • Publication number: 20100138908
    Abstract: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired
    Type: Application
    Filed: June 28, 2005
    Publication date: June 3, 2010
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20100110937
    Abstract: Systems and methods for improving multicast communications for media services in a network are provided. In this regard, a representative method, among others, includes receiving information related to consumers and at least one routing algorithm associated with the network; generating a multi-hop packet propagation tree based on the receive information related to the consumers and the at least one routing algorithm; receiving a data packet related to the network media services; and encoding the data packet with the multi-hop packet propagation tree.
    Type: Application
    Filed: October 31, 2008
    Publication date: May 6, 2010
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Ravigopal Vennelakanti, Gupta Manish
  • Publication number: 20090195358
    Abstract: An RFID system includes a pair of guide tracks located on opposite boundaries of at least one zone. A channel is movably attached to the guide tracks and is configured to move along the guide tracks through the at least one zone. A mobile RFID reader is movably attached to the channel and the mobile RFID reader is paused at a plurality of read points to scan for RFID tags located. The read points are determined by an arrangement of a plurality of hexagonal areas which are grouped together to create a combined area, where the combined area is aligned with the predefined area to define locations of the plurality of hexagonal areas, and where substantially central locations of each hexagonal area represent the plurality of read points.
    Type: Application
    Filed: September 11, 2008
    Publication date: August 6, 2009
    Inventors: Ravigopal Vennelakanti, Manish Gupta
  • Publication number: 20080258915
    Abstract: A method for determining locations in a predefined area for placing a Radio Frequency Identification (RFID) reader in order to obtain a full coverage of the predefined area is provided. The method includes arranging a plurality of hexagonal area to form a combined area until the total area of the combined area is equal or larger than the predefined area, aligning the predefined area within the combined area, and determining the hexagonal area which is fully or partially covered by the predefined area. Each hexagonal area represents an area of coverage of the RFID reader, and the center of the hexagonal area which is determined to be fully or partially covered by the predefined area corresponds to one of the locations for placing the RFID reader.
    Type: Application
    Filed: July 23, 2007
    Publication date: October 23, 2008
    Inventors: Ravigopal Vennelakanti, Manish Gupta
  • Publication number: 20080232598
    Abstract: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.
    Type: Application
    Filed: August 5, 2005
    Publication date: September 25, 2008
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20080212781
    Abstract: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
    Type: Application
    Filed: August 5, 2005
    Publication date: September 4, 2008
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20080209221
    Abstract: A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.
    Type: Application
    Filed: August 5, 2005
    Publication date: August 28, 2008
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20080103971
    Abstract: A system and method for tracking conversions. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. The method determines that the user has performed an action. A unique payment option is associated with the action, wherein the unique payment option is generated in response to the action. Notification is received that the user has made a payment to an online merchant using the unique payment option. The payment is associated with a conversion of the action without cooperation of the online merchant.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Inventors: Rajan Mathew Lukose, Ravigopal Vennelakanti
  • Patent number: 7313816
    Abstract: A system and method for authenticating a client having a privilege server, a head end server, and a web adapter performs the steps of negotiating an authentication scheme between the server proxy and the privilege server. User information is presented to the web adapter. The user information is provided to the head end server and in turn presents the information to the web adapter. The user is validated in accordance with the authentication scheme. When the user is validated a ticket is generated for the user. The ticket is presented to the client privilege server proxy that decrypts the ticket. A token is formed from the ticket and the client user identification. The token from the client is provided to the privilege server. A packet is formed having a sequence number and session key encrypted with the ticket. The packet is provided to the head end server which in turn authenticates the user.
    Type: Grant
    Filed: December 17, 2001
    Date of Patent: December 25, 2007
    Assignee: One Touch Systems, Inc.
    Inventors: Bhaskar Sinha, Ravigopal Vennelakanti, Goplnath Rebala
  • Publication number: 20070285235
    Abstract: A method for managing items distributed in a global supply chain is provided. The method includes sending an identification query to an identification tag attached to an item, receiving identification data from the identification tag, determining a home address corresponding to the identification data, assigning a current address for the identification tag, sending the current address to a home agent at the determined home address, and associating the current address with the home address by the agent. According the current address of the identification tag is returned in response to a request on the location of the identification tag.
    Type: Application
    Filed: June 7, 2006
    Publication date: December 13, 2007
    Inventors: Ravigopal VENNELAKANTI, John Rhoton
  • Publication number: 20060015335
    Abstract: A technique to link an audio enabled device with a speech driven application without specifying the specific ones of the audio enabled device-independent, speech driven application-independent, and speech application platform independent parameters. In one example embodiment, this is accomplished by using voice framework that receives and transmits digitized speech audio without specifying the specific ones of the audio enabled device-independent and speech application platform-independent parameters. The voice framework then converts the received digital speech audio to computer readable text. Further, the voice framework receives and transmits the computer readable text to the speech driven application without specifying the specific ones of the speech driven application-independent and speech application platform-independent parameters. The voice framework then converts the computer readable text to the digital speech audio.
    Type: Application
    Filed: July 13, 2004
    Publication date: January 19, 2006
    Inventors: Ravigopal Vennelakanti, Tushar Agarwal
  • Publication number: 20030115341
    Abstract: A system and method for authenticating a client having a privilege server, a head end server, and a web adapter performs the steps of negotiating an authentication scheme between the server proxy and the privilege server. User information is presented to the web adapter. The user information is provided to the head end server and in turn presents the information to the web adapter. The user is validated in accordance with the authentication scheme. When the user is validated a ticket is generated for the user. The ticket is presented to the client privilege server proxy that decrypts the ticket. A token is formed from the ticket and the client user identification. The token from the client is provided to the privilege server. A packet is formed having a sequence number and session key encrypted with the ticket. The packet is provided to the head end server which in turn authenticates the user.
    Type: Application
    Filed: December 17, 2001
    Publication date: June 19, 2003
    Inventors: Bhaskar Sinha, Ravigopal Vennelakanti, Goplnath Rebala