Patents by Inventor Rohit

Rohit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9692789
    Abstract: Systems and methods for cloud security monitoring and threat intelligence in accordance with embodiments of the invention are disclosed. In one embodiment, a process for monitoring and remediation of security threats includes generating a threat model using a first portion of activity data, identifying, based upon the threat model, a threat using a second portion of activity data, selecting a security policy to implement in response to the identified threat, identifying cloud security controls in a remotely hosted cloud application server system to modify in accordance with the selected security policy, establishing a secure connection to the remotely hosted cloud application server system using login credentials associated with a tenant account with the cloud application, and sending instructions to the remotely hosted cloud application server system to set the identified cloud security controls with respect to the tenant account in accordance with the selected security policy.
    Type: Grant
    Filed: October 24, 2014
    Date of Patent: June 27, 2017
    Assignee: Oracle International Corporation
    Inventors: Ganesh Kirti, Rohit Gupta, Kamalendu Biswas, Ramana Rao Satyasai Turlapati
  • Publication number: 20170181043
    Abstract: A communication device and a method for circuit switched fallback (CSFB) configured to conduct inter radio access technology (RAT) measurements upon receipt of a CSFB notification and later use the information obtained from the measurements to intelligently conduct a cell selection procedure if redirection to the target RAT frequency indicated by the Evolved Universal Terrestrial Radio Access Network (EUTRAN) in a CSFB redirection request fails.
    Type: Application
    Filed: December 21, 2015
    Publication date: June 22, 2017
    Inventors: Rohit MANN, Ranganadh KARELLA
  • Publication number: 20170175556
    Abstract: A turbomachine includes a plurality of nozzles, and each nozzle has an airfoil. The turbomachine has opposing walls defining a pathway into which a fluid flow is receivable to flow through the pathway. A throat distribution is measured at a narrowest region in the pathway between adjacent nozzles, at which adjacent nozzles extend across the pathway between the opposing walls to aerodynamically interact with the fluid flow. The airfoil defines the throat distribution, and the throat distribution is defined by values set forth in Table 1, where the throat distribution values are within a +/?10% tolerance of the values set forth in Table 1. The throat distribution reduces aerodynamic loss and improves aerodynamic loading on each airfoil.
    Type: Application
    Filed: December 8, 2016
    Publication date: June 22, 2017
    Inventors: Sumeet SONI, Rohit CHOUHAN, Ross James GUSTAFSON, Matthew Peter SCOFFONE
  • Publication number: 20170177881
    Abstract: Dynamic security questions. In an embodiment of the invention, a security question and one or more rules for generating an answer to the security question are received. The security question and the rules for generating and answer to the security question are associated with security credentials of a user. For authentication, a first answer to a security question associated with a user is received. One or more rules for generating an answer to the security question are retrieved. A second answer to the security question is generated, based on the retrieved rules. The first answer is compared with the second answer, and the user is authenticated, based on the first answer matching the second answer.
    Type: Application
    Filed: December 17, 2015
    Publication date: June 22, 2017
    Inventors: Hariharan Krishna, Arun Ramakrishnan, Ashrith Setty, Rohit Shetty
  • Publication number: 20170178159
    Abstract: A method for optimizing an item descriptor and item value combination is provided. The method includes receiving initial data, locating one or more previous transaction data points, and creating a plurality of candidate opportunity variants and, for each candidate opportunity variant determining a first deviation, identifying a first set of first previous transaction data points and a second set of previous transaction data point, and forecasting one or more new transaction data points at at least one future date, each new transaction data point includes a forecast merchant identifier. The method further includes selecting the candidate opportunity variant that provides an optimized item descriptor and item value combination based on the selected candidate opportunity variant.
    Type: Application
    Filed: December 15, 2016
    Publication date: June 22, 2017
    Inventors: Rohit Modi, Shuvam Sengupta, Ashutosh Kumar Gupta
  • Publication number: 20170177856
    Abstract: Providing access to electronic information. A first password string and a rule for configuring and generating a second password string from the first password string, are received from a user. The rule specifies a dynamic element to insert at a position in the first password string, based on first contextual information associated with the user. The value of the specified dynamic element is determined based on second contextual information associated with the user. Upon receiving a third password string, the second password string is configured and generated from the first password string, based on the rule, by: selecting the specified dynamic element based on the first contextual information; inserting the selected dynamic element in the first password string; and determining the value of the selected dynamic element based on the second contextual information. If the third password string matches the second password string, access to the electronic information is granted.
    Type: Application
    Filed: January 26, 2017
    Publication date: June 22, 2017
    Inventors: Ashrith Shetty, Rohit Shetty
  • Publication number: 20170175529
    Abstract: A turbomachine includes a plurality of blades, and each blade has an airfoil. The turbomachine includes opposing walls that define a pathway into which a fluid flow is receivable to flow through the pathway. A throat distribution is measured at a narrowest region in the pathway between adjacent blades, at which adjacent blades extend across the pathway between the opposing walls to aerodynamically interact with the fluid flow. The airfoil defines the throat distribution, and the throat distribution reduces aerodynamic loss and improves aerodynamic loading on each airfoil.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Rohit Chouhan, Sumeet Soni, Ross James Gustafson, Nicholas Alvin Hogberg
  • Publication number: 20170175555
    Abstract: A turbomachine includes a plurality of nozzles, and each nozzle has an airfoil. The turbomachine includes opposing walls defining a pathway into which a fluid flow is receivable to flow through the pathway. A throat distribution is measured at a narrowest region in the pathway between adjacent nozzles, at which adjacent nozzles extend across the pathway between the opposing walls to aerodynamically interact with the fluid flow. The airfoil defines the throat distribution, and the throat distribution reduces aerodynamic loss and improves aerodynamic loading on each airfoil.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Rohit Chouhan, Gunnar Leif Siden, Andre Borisenko, Ibrahim Sezer
  • Publication number: 20170175557
    Abstract: A gas turbine having a seal sealing a trench cavity defined between a stator inboard face and rotor inboard face. The seal may include a stator overhang that extends axially toward the rotor inboard face. The stator overhang may include an overhang topside, an overhang underside, and an overhang face that is defined therebetween. The trench cavity seal may include a platform lip extending axially from the rotor inboard face toward the stator inboard face and circumferentially spaced turbulators extending axially from the rotor inboard face. An outboard edge and an inboard edge of the stator overhang axially jut such that, therebetween, a recessed pocket on the overhang face is formed. The platform lip may radially overlaps the recessed pocket on the overhang face so to form a multiple switch-back flowpath.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Rohit Chouhan, Manjunath Bangalore Chengappa, Soumyik Kumar Bhaumik
  • Publication number: 20170175535
    Abstract: A turbine rotor blade that includes: an airfoil defined between a pressure face and a suction face; a tip shroud that includes a seal rail projecting from an outboard surface and, formed thereon, a cutter tooth; and a cooling configuration that includes a cooling channel for receiving and directing a coolant through an interior of the rotor blade. The cooling channel may include fluidly connected segments, in which: a supply segment extends radially through the airfoil; a cutter tooth segment is formed within the cutter tooth of the seal rail; and branching segments formed within at least one of the tip shroud and an outboard region of the airfoil. Each of the branching segments may extend between an upstream port, which connects to the cutter tooth segment, and an outlet port, which is formed on a target surface area, so that the branching segment bisects a target interior region.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Rohit Chouhan, Randall Richard Good, Hiteshkumar Rameshchandra Mistry, Shashwat Swami Jaiswal
  • Publication number: 20170177857
    Abstract: Providing access to electronic information. A first password string associated with a user is received. A second password string associated with the user and a rule for configuring and generating a third password string from the second password string is retrieved from a database. The rule specifies a dynamic element to insert in the second password string based on first contextual information associated with the user. The value of the specified dynamic element is determined based on second contextual information associated with the user. Based on the rule, the third password string is configured and generated from the second password string. It is determined that the first password string matches the third password string. Access to the electronic information is granted.
    Type: Application
    Filed: January 27, 2017
    Publication date: June 22, 2017
    Inventors: Ashrith Shetty, Rohit Shetty
  • Publication number: 20170175536
    Abstract: A turbine rotor blade that includes an airfoil defined between a concave pressure face and a laterally opposed convex suction face, and a cooling configuration that includes a cooling channel for receiving and directing a coolant through an interior of the rotor blade. The cooling channel may include fluidly connected segments, in which: a supply segment extends radially through the airfoil; an outlet segment discharges the coolant from the rotor blade at a shallow angle relative to a flow direction of a working fluid through the turbine; and an elbow segment connects the supply segment to the outlet segment and is positioned near the outboard tip of the airfoil. The elbow segment may be configured for accommodating a change of direction between the supply segment and the outlet segment.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Shashwat Swami Jaiswal, Rohit Chouhan
  • Publication number: 20170175530
    Abstract: A blade has an airfoil, and the blade is configured for use with a turbomachine. The airfoil has a throat distribution measured at a narrowest region in a pathway between adjacent blades, at which adjacent blades extend across the pathway between opposing walls to aerodynamically interact with fluid flow. The airfoil defines the throat distribution, and the throat distribution reduces aerodynamic loss and improves aerodynamic loading on the airfoil. The airfoil has a linear trailing edge profile.
    Type: Application
    Filed: December 18, 2015
    Publication date: June 22, 2017
    Inventors: Sumeet Soni, Ross James Gustafson, Rohit Chouhan, Jason Adam Neville
  • Publication number: 20170173141
    Abstract: Methods and assays are disclosed for treating a subject with a hantavirus infection using an agent that binds to proto cadhenn-1 (PCDH1) or inhibits expression of protocadherin-1 (PCDH1).
    Type: Application
    Filed: February 25, 2015
    Publication date: June 22, 2017
    Applicant: ALBERT EINSTEIN COLLEGE OF MEDICINE, INC.
    Inventors: Kartik Chandran, Thijin R. Brummelkamp, Lucas T. Jae, Rohit K. Jangra
  • Patent number: 9681988
    Abstract: A method is disclosed for clearing effusion from an ear. The method may include applying liquid to an ear canal, which is proximal to a perforated tympanic membrane, which is proximal to a middle ear containing effusion, applying an ear device to seal and pressurize the liquid inside the ear canal, the ear device regulating the amount of pressure inside the ear canal, and inducing a Eustachian tube, which is distal to the middle ear, to open, which causes the fluid to displace the effusion into the Eustachian tube.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: June 20, 2017
    Assignee: Acclarent, Inc.
    Inventors: John H. Morriss, Greg Liu, Rohit Girotra, Tom Thanh Vo, Richard Roy Newhauser, Jr., Thomas R. Jenkins, Joshua Makower
  • Patent number: 9686798
    Abstract: A method is provided in one example embodiment and may include ranking a plurality of downlink control information (DCI) messages according to a first rank criterion; ranking a plurality of allowable resource sets for each ranked DCI message according to a second rank criterion; and allocating resources for each ranked DCI message based, at least in part, on whether particular resources, which are to be allocated for a particular ranked DCI message, are collided, at least in part, with previously allocated resources for one or more other DCI messages.
    Type: Grant
    Filed: January 14, 2015
    Date of Patent: June 20, 2017
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Qing Zhao, Kedar Durgadas Shirali, Rohit Umesh Nabar
  • Publication number: 20170171148
    Abstract: A network device may be configured to cause one or more network address allocation communications broadcast in a network to be communicated as directed unicast communications. More particularly, in a Local Area Network, a routing device such as a switch may be modified to receive broadcast communications for network address allocation, and instead of propagating the broadcast communications as broadcast communications, the routing device may route the network address allocation communications as directed unicast communications in the Local Area Network.
    Type: Application
    Filed: December 9, 2015
    Publication date: June 15, 2017
    Inventors: Ankit Singh, Rohit Kumar Arehalli, Shekar Babu Suryananarayana
  • Publication number: 20170169635
    Abstract: A method and system for visitor access control management is disclosed. In one embodiment of the present disclosure, the system comprises a resident user device, a security user device, a visitor user device associated with a visitor and a management server, wherein the management server is configured for generating a token in response to a request received from the resident user device, communicating the token to at least the plurality of security user device and the visitor user device, validating the visitor through the security user device by matching the token communicated to the visitor user device and communicating at least one of an ingress or egress of the visitor to the resident user device.
    Type: Application
    Filed: December 12, 2016
    Publication date: June 15, 2017
    Inventor: Rohit Karlupia
  • Publication number: 20170169080
    Abstract: Analyzing log data. The method includes obtaining a first bucket of a log data. The first bucket of log data includes a plurality of log lines. The method further includes analyzing the first bucket of log data to identify different sets of similar log lines. The method further includes providing to a user in a user interface one or more summaries of the different sets of similar lines. The summary comprises at least one user selectable indicator representing differences in log lines in a set of similar log lines that when selected by a user in the user interface reveals specific differences in the log lines in the set of similar log lines.
    Type: Application
    Filed: April 15, 2016
    Publication date: June 15, 2017
    Inventors: Srivatsan Parthasarathy, Rohit Bhardwaj, Chirag Gupta, Vipul Malhotra, Evan Herschel Brodie Hissey
  • Publication number: 20170171043
    Abstract: A device may select an enterprise content management (ECM) system for monitoring. The ECM system may include a set of subsystems. The device may monitor the set of subsystems of the ECM system based on selecting the ECM system for monitoring. The device may perform a set of health checks on the set of subsystems based on monitoring the set of subsystems. The set of health checks may include a validation of a set of network addresses associated with the set of subsystems, an analysis of a set of log files associated with the set of subsystems, and a determination of a set of metrics associated with the set of subsystems. The device may generate a health check report based on the set of health checks. The device may provide the health check report.
    Type: Application
    Filed: December 10, 2015
    Publication date: June 15, 2017
    Inventors: Vijay H. GURDASANI, Rohit JAIN, Sumit Kumar GHOSH, Neelam VED, Rajnee MAHESHWARI, Ravi RANJAN