Patents by Inventor Ritesh Kumar

Ritesh Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140254439
    Abstract: The herein disclosed apparatus, systems, and methods use Almost Blank Subframes (ABS) to manage interference between D2D and WAN transmissions. In particular, an eNodeB is disclosed comprising a controller module operable to obtain an indicator of a need for a quiescent subframe, and to select responsively thereto a subframe of a communication frame, and allocate the selected subframe as an Almost Blank Subframe (ABS). The base station includes a transceiver module operable to communicate the ABS over an air interface, and to send a misinformation signal to another eNodeB device indicating the ABS is not almost blank.
    Type: Application
    Filed: May 22, 2014
    Publication date: September 11, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Ritesh Kumar Madan, Shailesh Patil
  • Publication number: 20140138176
    Abstract: A vehicle bonnet structure for pedestrian protection. The vehicle bonnet has outer panel between front end and wind shield of vehicle. An inner panel disposed and secured along the entire region of a reverse surface of the outer panel. A plurality of semi-spherical configurations having plurality of cuts on the periphery are provided on the inner panel of the bonnet. A bead is provided on the top of each of the semispherical structures. The semi-spherical structure with bead accommodated between the inner panel and outer panel.
    Type: Application
    Filed: September 4, 2013
    Publication date: May 22, 2014
    Inventors: Sudesh Kumar KAISARE, Suresh Raghunath KALE, Ritesh Kumar JAIN
  • Patent number: 8712462
    Abstract: An apparatus and method are disclosed for determining the optimal bandwidth fractions for all the users in each frequency band in a wireless communication system to maximize the net sum of user utilities. User utilities are functions of average rates of users, where different averaging rules can be used for different users. The standard approach of computing an optimal scheduler strategy involves the solution of a convex optimization problem that has a complexity on the order of O(N3) for N flows. This approach is not feasible for online implementation having a large number of flows. The method of the present work employs an efficient computational algorithm that obtains the optimal bandwidth fractions in O(N) time. This feature makes the method suitable for implementation in wideband cellular systems like LTE (Long Term Evolution) and UMB (Ultra Mobile Broadband).
    Type: Grant
    Filed: June 19, 2010
    Date of Patent: April 29, 2014
    Assignee: QUALCOMM Incorporated
    Inventors: Ritesh Kumar Madan, Siddharth Ray, Niranjan N. Ratnakar, Arnab Das
  • Publication number: 20130295027
    Abstract: The present invention relates to an oral care composition and a method of disinfecting the oral cavity. So far synthetic material (e.g. Triclosan) has been used which is believed by many consumers to be harsh on them. Consumers, more and more prefer using products that contain natural materials. Further, in many countries, culturally or otherwise, people are reluctant to using alcohol in their mouthwashes. The present inventors have been working on solving these problems and have come up with an oral care composition which includes natural materials that are found to interact synergistically with certain metal salts in killing S. mutans, a bacterium responsible for tooth decay.
    Type: Application
    Filed: November 17, 2011
    Publication date: November 7, 2013
    Inventors: Maya Treesa Saji, Ritesh Kumar Sinha
  • Publication number: 20130280180
    Abstract: The invention relates to a transparent/translucent liquid antimicrobial mouthwash composition that is substantially free of low molecular weight alcohol. It is a problem to include antimicrobial actives of natural origin (essential oils) which are generally substantially water insoluble materials in an aqueous composition that is transparent or translucent. One way of including such oils in water while ensuring transparency is to formulate them in a microemulsion composition. However microemulsion compositions generally require high amounts of surfactants and solvents especially low molecular weight alcohol. It is thus a challenge to formulate a mouthwash composition that is on the one hand effective in killing microbes while on the other hand has a transparent/translucent appearance while being substantially free of low molecular weight alcohol.
    Type: Application
    Filed: November 15, 2011
    Publication date: October 24, 2013
    Inventors: Deeleep Kumar Rout, Maya Treesa Saji, Ritesh Kumar Sinha
  • Patent number: 8527629
    Abstract: A method is disclosed for determining attributes of a client connection configured for use with a telecommunications network; comparing determined attributes with location definition information stored in a configuration file; determining at least one user-defined location in the location definition information associated with the client connection based on the comparison; wherein the method is performed by one or more computing devices.
    Type: Grant
    Filed: August 26, 2011
    Date of Patent: September 3, 2013
    Assignee: Cisco Technology, Inc.
    Inventors: Michael Manning, Chen Yehezkel Burshan, Nathan John Sowatskey, Ritesh Kumar, Gregory John Wilkins
  • Publication number: 20130159769
    Abstract: Embodiments of the present invention relate to detecting and rectifying corruption in a distributed clock in a distributed system. Aspects may include receiving a sequence number used as part of the distributed clock at a node and determining if the sequence number is corrupt. In order to provide an effective mechanism for determining a sequence number is corrupt and taking corrective actions, a valid sequence number range may be determined, a propagation count associated with the sequence number may be evaluated, an estimated sequence number may be calculated, and an epoch number associated with the sequence number may be evaluated. Additionally, in exemplary aspects node with a corrupt trusted sequence values may self diagnosis and terminate associated processes to prevent further propagation of the corrupt sequence number.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: GARRET J. BUBAN, RITESH KUMAR
  • Publication number: 20120166928
    Abstract: A program and corresponding method allow for the enablement of customizable extension fields into a form template, independent of the field type of the extension field. New extension fields corresponding to section headers of the form template can be created and added to a user interface. A new extension field can drive the form template and be added to all applicable section headers in the form template from the user interface.
    Type: Application
    Filed: December 23, 2010
    Publication date: June 28, 2012
    Applicant: SAP AG
    Inventors: Andre Stern, Saikrishna Gollapudi, Frank Erle, Uwe Schlarb, Visvapriya Sathiyam, Vinit Kumar, Ritesh Kumar Dokania, Christoph Birkenhauer, Stefan Baeuerle, Bernhard Thimmel, Matthias Lehr, Sathish Babu Krishna Vihar, Karsten Fanghänel
  • Patent number: 8127008
    Abstract: A method is disclosed for determining a location of a client session in a telecommunications network by comparing attributes of the client session connection to location definition information stored in a configuration file. A method of handling requests from proxy and non-proxy client connections in a telecommunications network by redirecting requests from unauthenticated proxy clients to a transparent proxy port on a captive portal such that the captive portal proxies the requests is also disclosed. The request may be directed to a service, such as a destination IP address and optional port number. A method for a proxy server to identify an edge session through an out-of-band request containing proxy metadata to a web portal for secure (HTTPS) requests is also disclosed. The edge session is identified for the web portal through a hostkey determined by the proxy server.
    Type: Grant
    Filed: April 19, 2005
    Date of Patent: February 28, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Michael Manning, Chen Yehezkel Burshan, Nathan John Sowatskey, Ritesh Kumar, Gregory John Wilkins
  • Publication number: 20120014269
    Abstract: Methods and apparatus for contention-based access in a wireless communication system are disclosed. A base station may determine a contention-based resource allocation comprising a subset of available system resources. Information related to the contention-based resources may be sent to a user device. In addition, state information may be provided to the UE. The UE may generate and send a contention-based uplink transmission consistent with the allocated resources and state information.
    Type: Application
    Filed: January 10, 2011
    Publication date: January 19, 2012
    Applicant: QUALCOMM Incorporated
    Inventors: Siddharth Ray, Ashwin Sampath, Ritesh Kumar Madan
  • Publication number: 20110314149
    Abstract: A method is disclosed for determining attributes of a client connection configured for use with a telecommunications network; comparing determined attributes with location definition information stored in a configuration file; determining at least one user-defined location in the location definition information associated with the client connection based on the comparison; wherein the method is performed by one or more computing devices.
    Type: Application
    Filed: August 26, 2011
    Publication date: December 22, 2011
    Inventors: Michael Manning, Chen Yehezkel Burshan, Nathan John Sowatskey, Ritesh Kumar, Gregory John Wilkins
  • Publication number: 20110312360
    Abstract: An apparatus and method are disclosed for determining the optimal bandwidth fractions for all the users in each frequency band in a wireless communication system to maximize the net sum of user utilities. User utilities are functions of average rates of users, where different averaging rules can be used for different users. The standard approach of computing an optimal scheduler strategy involves the solution of a convex optimization problem that has a complexity on the order of O(N3) for N flows. This approach is not feasible for online implementation having a large number of flows. The method of the present work employs an efficient computational algorithm that obtains the optimal bandwidth fractions in O(N) time. This feature makes the method suitable for implementation in wideband cellular systems like LTE (Long Term Evolution) and UMB (Ultra Mobile Broadband).
    Type: Application
    Filed: June 19, 2010
    Publication date: December 22, 2011
    Applicant: QUALCOMM INCORPORATED
    Inventors: Ritesh Kumar Madan, Siddharth Ray, Niranjan N. Ratnakar, Arnab Das
  • Publication number: 20110182251
    Abstract: Systems and methodologies are described that facilitate adapting wireless device scheduling parameters at least in part by adjusting prioritized bit rates (PBR) of one or more logical channels. The PBRs can be adjusted according to feedback from a media access control layer scheduler or a radio link control layer regarding resource allocations to one or more wireless device, served rate for one or more wireless device, and/or the like. Adjusting the PBRs based on the feedback can increase likelihood that data can be transmitted over substantially all or a specified set of logical channels. Moreover, PBRs can be modified for specific wireless devices based further on resource allocations thereto. Furthermore, PBRs can be modified based at least in part on radio conditions of neighboring access points.
    Type: Application
    Filed: July 27, 2010
    Publication date: July 28, 2011
    Applicant: QUALCOMM Incorporated
    Inventors: Ritesh Kumar Madan, Ashwin Sampath
  • Publication number: 20100293480
    Abstract: System and method for generating documentation for a diagram including states and transitions. The diagram may be received or otherwise stored and may specify a plurality of states and a plurality of transitions between the states. The first diagram also specifies first functionality. User documentation may be automatically generated for the first diagram based on the first diagram. The user documentation may describe the first diagram, e.g., the plurality of states and the plurality of transitions of the first diagram. Automatic generation of the user documentation may be performed without manual user input specifying the user documentation. The user documentation may be displayed on a display and/or stored in a memory medium.
    Type: Application
    Filed: May 14, 2009
    Publication date: November 18, 2010
    Inventors: Praveen Shivananda, Ritesh Kumar Soni, Nicholas G. Neumann
  • Publication number: 20060069782
    Abstract: A method is disclosed for determining whether access to a host requested by a client session connection is permitted. After determining attributes of the client session connection, a list of hosts is selected based on the determined attributes of the client session connection. The list of hosts is then used to determine whether access to the requested host is permitted. The disclosed method can be used to allow for location-specific white lists of free URLs for a user at a wireless network hotspot that the user can access before being authenticated.
    Type: Application
    Filed: September 16, 2004
    Publication date: March 30, 2006
    Inventors: Michael Manning, Chen Burshan, Nathan Sowatskey, Ritesh Kumar, Gregory Wilkins
  • Publication number: 20060056317
    Abstract: A method is disclosed for determining a location of a client session in a telecommunications network by comparing attributes of the client session connection to location definition information stored in a configuration file. A method of handling requests from proxy and non-proxy client connections in a telecommunications network by redirecting requests from unauthenticated proxy clients to a transparent proxy port on a captive portal such that the captive portal proxies the requests is also disclosed. The request may be directed to a service, such as a destination IP address and optional port number. A method for a proxy server to identify an edge session through an out-of-band request containing proxy metadata to a web portal for secure (HTTPS) requests is also disclosed. The edge session is identified for the web portal through a hostkey determined by the proxy server.
    Type: Application
    Filed: April 19, 2005
    Publication date: March 16, 2006
    Inventors: Michael Manning, Chen Burshan, Nathan Sowatskey, Ritesh Kumar, Gregory Wilkins