Patents by Inventor Rohit

Rohit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200305306
    Abstract: In one embodiment, a method includes detecting reverse rotation of a fan inserted into a modular electronic system comprising at least one other fan, wherein the reverse rotation of the fan is caused by a back pressure generated by the other fan rotating in a forward direction, applying current pulses to stop reverse rotation of the inserted fan and start rotation of the fan in a forward direction, and operating all of the fans with rotation in the forward direction.
    Type: Application
    Filed: March 21, 2019
    Publication date: September 24, 2020
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Paolo Sironi, Emanuele Umberto Giacometti, Rohit Dev Gupta, Joel Richard Goergen
  • Publication number: 20200301974
    Abstract: A client instance provides search suggestions based on a partial search query. The search suggestions include user search suggestions based on previous search queries performed by the user and instance search suggestions based on previous search queries performed on the instance. The client instance filters the instance search suggestions based on filter criteria associated with the user, such as an interface used by the user, a search context, user group that the user belongs to, domain used by the user, and so on. The client instance may remove the search suggestions that include blacklisted terms. The client instance may rank the search suggestions (e.g., based on frequency and/or recency) and enable the user to select those ranked search suggestions that meet or exceed a threshold.
    Type: Application
    Filed: March 19, 2019
    Publication date: September 24, 2020
    Inventors: Eugene Aaron Shtilkind, Rohit Katta, Kai Guo, Andrii Kovalenko, Jeffrey Michael Cooper, Wei Rui, Dwayne Lavon Love
  • Publication number: 20200304390
    Abstract: An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be associated with various components of a network and can describe expected behavior of these various components. A system performing this method can then choose a nodes or nodes to generate traffic according to the pattern and send an instruction accordingly. After this synthetic traffic is generated, the system can compare the behavior of the components with the expected behavior. An alert can then be created to notify an administrator or otherwise remedy any problems.
    Type: Application
    Filed: June 5, 2020
    Publication date: September 24, 2020
    Inventors: Rohit Chandra Prasad, Bharathwaj Sankara Viswanathan, Hoang Viet Nguyen, Vimalkumar Jeyakumar, Roberto Fernando Spadaro, Varun Sagar Malhotra, Navindra Yadav
  • Publication number: 20200304984
    Abstract: Apparatuses, systems, and methods for a dual subscriber identity module (SIM) dual standby (DSDS) capable user equipment (UE) devices to perform data operations with a first SIM that is not capable of or preferred for packet switched (PS) services and a second SIM that is capable of or preferred for PS services. A timer may be initiated upon radio frequency (RF) chain handover from the first SIM to the second SIM, whereupon a first connection associated with the first SIM is maintained in an idle state while the timer is running. Upon expiration of the timer, the UE may determine whether to send a scheduling request to maintain or release the first connection. The timer may be utilized when a call is dropped over the first connection, to increase the likelihood of successfully receiving a callback. The timer may be shortened in duration to reduce reception of spam messaging.
    Type: Application
    Filed: March 22, 2019
    Publication date: September 24, 2020
    Inventors: Muthukumaran Dhanapal, Vijay Venkataraman, Lakshmi N. Kavuri, Srinivasan Nimmala, Rangakrishna Nallandigal, Alosious Pradeep Prabhakar, Tsun Sang Cheong, Rohit R. Matolia, Yaoqi Yan, Chaitanya R. Kaliki, Navjot Thakral, Ajinkya Satish Godbole
  • Patent number: 10785634
    Abstract: Methods and systems for End-to-End (E2E) User Equipment (UE) trajectory network automation are herein provided. According to one aspect, a network node for E2E UE trajectory network automation, such as a Network Data Analytics Function (NWDAF), receives, from a requesting entity, information identifying a future E2E UE trajectory, the E2E UE trajectory comprising a start location, an end location, and zero or more intermediate locations between the start location and the end location; calculates a E2E mobility trajectory prediction for the identified future E2E UE trajectory; and sends, to the requesting entity, the calculated E2E mobility trajectory prediction. The requesting entity may be a trusted entity or an untrusted entity, such as a Third Party Provider (3PP) outside of the trusted domain of the network. If the requesting entity selects a mobility trajectory, the network node sends mobility management and optimization information to a Radio Access Network node.
    Type: Grant
    Filed: March 8, 2019
    Date of Patent: September 22, 2020
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Virgilio Fiorese, Saulo Almeida Montenegro de Sa, Rakesh Bajpai, Vinicius Samuel Landi Fiorese, Tushar Sabharwal, Nipun Sharma, Rohit Shukla
  • Patent number: 10785711
    Abstract: A mobile terminal and a network access method for a mobile terminal roaming service are disclosed. The mobile terminal according to the present invention comprises a control unit for: identifying a roaming area/country corresponding to a current location of a terminal body, on the basis of information included in PLMNs searched for in the terminal body, in response to the detection of a total failure in searching of the terminal body, a wireless communication unit, a lastly registered PLMN, a home PLMN, and PLMNs stored in a SIM; and controlling the wireless communication unit so as to connect to one of PLMNs having been successfully camped in the identified roaming area/country.
    Type: Grant
    Filed: December 12, 2016
    Date of Patent: September 22, 2020
    Assignee: LG ELECTRONICS INC.
    Inventors: Aby Kanneath Abraham, Rohit Gupta
  • Publication number: 20200294257
    Abstract: In various examples, a two-dimensional (2D) and three-dimensional (3D) deep neural network (DNN) is implemented to fuse 2D and 3D object detection results for classifying objects. For example, regions of interest (ROIs) and/or bounding shapes corresponding thereto may be determined using one or more region proposal networks (RPNs)—such as an image-based RPN and/or a depth-based RPN. Each ROI may be extended into a frustum in 3D world-space, and a point cloud may be filtered to include only points from within the frustum. The remaining points may be voxelated to generate a volume in 3D world space, and the volume may be applied to a 3D DNN to generate one or more vectors. The one or more vectors, in addition to one or more additional vectors generated using a 2D DNN processing image data, may be applied to a classifier network to generate a classification for an object.
    Type: Application
    Filed: March 13, 2020
    Publication date: September 17, 2020
    Inventors: Innfarn Yoo, Rohit Taneja
  • Patent number: 10776119
    Abstract: An example embodiment combines use of a branch predictor with cache-like storage of previously executed branch targets to improve processor performance while minimizing hardware cost. The branch predictor is configured to predict both conditional branch and indirect branch targets and includes a combined predictor table configured to store at least one tagged conditional branch prediction in combination with at least one tagged indirect branch target prediction. The at least one tagged indirect branch target prediction is configured to include a predicted partial target address of a complete target address, the complete target address associated with an indirect branch instruction of a processor. The predictor includes prediction logic configured to use the predicted partial target address to produce a predicted complete target address of the complete target address for use by the processor prior to execution of the indirect branch instruction.
    Type: Grant
    Filed: June 15, 2018
    Date of Patent: September 15, 2020
    Assignee: MARVELL ASIA PTE, LTD.
    Inventors: Edward J. McLellan, David A. Carlson, Rohit P. Thakar
  • Patent number: 10777036
    Abstract: An electronic gaming machine includes a display, a player input device, a credit input mechanism, and a processor programmed to perform operations comprising: (i) display a search pattern matrix to a player on the display, the search pattern matrix includes a plurality of cells that are selectable by the player; (ii) receive an input selection of cells of the search pattern matrix from the player; (iii) search a pay table associated with a wagering game provided by the gaming machine for winning patterns included within the pay table and having at least the same plurality of cells daubed as are indicated by the search pattern matrix; and (iv) display the winning patterns identified by the searching to the player via the display, the displaying including presenting the winning patterns in a matrix display format identifying one or more daubed cells of the associated winning patterns within the matrix display.
    Type: Grant
    Filed: September 19, 2018
    Date of Patent: September 15, 2020
    Assignee: Aristocrat Technologies Australia Pty Limited
    Inventors: Rajat Rajput, Sunil Mohan, Rohit Kumar Jain
  • Patent number: 10777029
    Abstract: A first user associated with a structure (e.g., a home, a building, etc.) may authorize a second user to access the structure when the first user is not present. The second user may request to access the structure via a text message that includes an access code that was previously provided. The second user may be verified/authenticated based on the telephone number in which the text message was received, the access code, and/or an access schedule that indicates when the second user is authorized to access the structure. The second user may send a second text message indicating a desire to lock/unlock a structure entrance (e.g., a door) to the structure that contains a smart lock. Upon receiving the second text message, a service provider sends an instruction to the smart lock, causing the structure entrance to become locked/unlocked, and allowing the second user to access or secure the structure.
    Type: Grant
    Filed: March 13, 2020
    Date of Patent: September 15, 2020
    Assignee: Amazon Technologies, Inc.
    Inventors: Margaret Ren, Unyoung Kim, Kristine Anne Hanson, Priti Marappan, Jenish Shah, Rohit Shrivastava, Tian Yu, Jing Zhu
  • Patent number: 10778888
    Abstract: A camera selection system and method for automatically selecting an appropriate camera to use for capturing photos and videos is provided. The method includes the steps of detecting that a camera application has been opened, activating a first camera and a second camera of the mobile device, analyzing a feed received from the first camera and a feed received from the second camera to detect whether a face is present in a field of view of the first camera or the second camera, determining that the user intends to use the first camera based on a detection of the face in the field of view of the first camera, deactivating the second camera in response to the determining and displaying the feed received from the first camera on the main display of the mobile device for viewing by the user while using the camera application.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: September 15, 2020
    Assignee: International Business Machines Corporation
    Inventors: Nixon Cheaz, Anthony M. Diaz, Richard A. Gebhardt, Rohit Shetty
  • Patent number: 10776175
    Abstract: A processing device receives a first cluster management operation request, wherein the first cluster management operation request is for a deployment operation of a first cluster and comprises a cluster template, a specified number of nodes to deploy and a configuration. The processing device determines a plurality of constraints from at least one of the cluster template or the configuration. The processing device deterministically solves for and outputs a first cluster layout comprising the specified number of nodes, each of the specified number of nodes comprising a hardware type, an image type and one or more services, wherein the first cluster layout satisfies the plurality of constraints.
    Type: Grant
    Filed: June 3, 2019
    Date of Patent: September 15, 2020
    Assignee: Google LLC
    Inventors: Albert Yen Shau, Christopher Gianelloni, Derek Lewis Wood, Jonathan Michael Gray, Nitin Motgi, Poorna Chandra Gowda Bannikkuppe Ramachandra, Rohit Sarma Nistala
  • Patent number: 10772759
    Abstract: The invention relates to a method of central nervous system pathology treatment through selective hypothermia. Brain and spinal cord cooling is achieved through a closed loop catheter system inserted directly into the cerebrospinal fluid space. The catheter comprises of a portion that dilates in a pulsatile or peristaltic fashion and facilitates circulation of the cooled cerebrospinal fluid.
    Type: Grant
    Filed: August 2, 2017
    Date of Patent: September 15, 2020
    Inventor: Rohit Khanna
  • Patent number: 10776796
    Abstract: Systems and methods including one or more processing modules and one or more non-transitory storage modules storing computing instructions configured to run on the one or more processing modules and perform acts of receiving an external catalog comprising external attributes for each product of a plurality of products, mapping the external attributes from the external catalog to internal attributes for each product of the plurality of products in an internal catalog for an online retailer using an ensemble learning technique comprising a plurality of algorithms, incorporating the external attributes of the external catalog into the internal attributes in the internal catalog as mapped, and coordinating displaying of the external attributes and the internal attributes on a website of the online retailer.
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: September 15, 2020
    Assignee: WALMART APOLLO, LLC
    Inventors: Abilash Amarthaluri, Chandni Jain, Zuzar Fakhruddin Nafar, Rohit Deep
  • Publication number: 20200285756
    Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes.
    Type: Application
    Filed: May 22, 2020
    Publication date: September 10, 2020
    Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
  • Publication number: 20200285327
    Abstract: Systems and processes for operating an intelligent automated assistant are provided. An example process includes initiating a virtual assistant session responsive to receiving user input. In accordance with initiating the virtual assistant session, the process includes determining, based on data obtained using one or more sensors of the electronic device, whether one or more criteria representing expressed user disinterest are satisfied. In accordance with determining that the one or more criteria representing expressed user disinterest are satisfied prior to a first time, the process includes automatically deactivating the virtual assistant session prior to the first time. The first time is defined by a setting of the electronic device. In accordance with determining that the one or more criteria representing expressed user disinterest are not satisfied prior to the first time, the process includes automatically deactivating the virtual assistant session at the first time.
    Type: Application
    Filed: May 27, 2020
    Publication date: September 10, 2020
    Inventors: Musa M. HINDI, Rohit DASARI, Trungtin TRAN
  • Publication number: 20200285757
    Abstract: A system and method for security risk identification in a secure software lifecycle. A knowledge database has a plurality of security elements which are identified for a particular software application depending on software environment and prioritized in a task list. Code vulnerabilities are identified using code scanners, with security requirements updated based on identified vulnerabilities, lack of vulnerabilities for weaknesses covered by a code scanner, potential weaknesses not adequately covered by code scanners, and software environment changes. The system identifies a security requirement that has passed the test of the code scanner, identifies the strength of the code scanner to discover a particular code vulnerability associated with the security requirement, and updates the security requirement to indicate a verified compliance state.
    Type: Application
    Filed: May 22, 2020
    Publication date: September 10, 2020
    Inventors: Nishchal Bhalla, Rohit Kumar Sethi, Ramanan Sivaranjan, Ehsan Foroughi, Geoffrey Charles Whittington
  • Publication number: 20200285226
    Abstract: A sensor management system includes a historical data repository, a building management system (BMS) controller, and a sensor diagnostics system. The historical data repository may store historical data by a plurality of sensors. The BMS controller may control one or more components of a building subsystem based on data provided by one or more sensors. The sensor diagnostic system may receive, from a sensor, sensor data. The sensor diagnostic system may determine at least one fault in the sensor data. The sensor diagnostic system may select, from the historical data repository, substitute sensor data for the sensor based on a comparison of one or more attributes of the sensor data and one or more attributes of the historical data in the data repository. The sensor diagnostic system may provide, in replacement of the sensor data from the sensor, the supplemental sensor data to the BMS controller.
    Type: Application
    Filed: March 6, 2019
    Publication date: September 10, 2020
    Inventors: Abhigyan Chatterjee, Rohit Bhagwan Mansukhani, Rajesh C. Nayak, Moheet Vishwas
  • Publication number: 20200288296
    Abstract: Methods and systems for End-to-End (E2E) User Equipment (UE) trajectory network automation are herein provided. According to one aspect, a network node for E2E U E trajectory network automation, such as a Network Data Analytics Function (NWDAF), receives, from a requesting entity, information identifying a future E2E UE trajectory, the E2E UE trajectory comprising a start location, an end location, and zero or more intermediate locations between the start location and the end location; calculates a E2E mobility trajectory prediction for the identified future E2E UE trajectory; and sends, to the requesting entity, the calculated E2E mobility trajectory prediction. The requesting entity may be a trusted entity or an untrusted entity, such as a Third Party Provider (3PP) outside of the trusted domain of the network. If the requesting entity selects a mobility trajectory, the network node sends mobility management and optimization information to a Radio Access Network node.
    Type: Application
    Filed: March 8, 2019
    Publication date: September 10, 2020
    Inventors: Virgilio Fiorese, Saulo Almeida Montenegro de Sa, Rakesh Bajpai, Vinicius Samuel Landi Fiorese, Tushar Sabharwal, Nipun Sharma, Rohit Shukla
  • Publication number: 20200285558
    Abstract: Systems, computer-implemented methods, and computer program products that can facilitate creating and querying a knowledge base of identified topics, computer code actions, and parameters, are provided. According to an embodiment, a system can comprise a memory that stores computer executable components and a processor that executes the computer executable components stored in the memory. The computer executable components can comprise a parameter component that can identify a result parameter in ones of one or more results, wherein the one or more results comprise topics and computer code actions. The computer executable components can further comprise a result component that can select a result of the one or more results based on a mapping of a query to the one or more results, the mapping being based on the result parameter identified in the result and a criterion.
    Type: Application
    Filed: March 6, 2019
    Publication date: September 10, 2020
    Inventors: Anup Kalia, Muhammed Fatih Bulut, Jinho Hwang, Raghav Batta, Maja Vukovic, Jin Xiao, Rohit Madhukar Khandekar