Patents by Inventor Sandeep Jain

Sandeep Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060133173
    Abstract: A method, apparatus, and system to enable a partial refresh scheme for DRAM which includes specifying at least a refresh start value, or a refresh start value and a refresh end value, to reduce the number of rows that must be refreshed during a refresh cycle, thus reducing the amount of power consumed during refresh.
    Type: Application
    Filed: December 21, 2004
    Publication date: June 22, 2006
    Inventors: Sandeep Jain, Animesh Mishra, John Halbert
  • Publication number: 20060067150
    Abstract: In one embodiment, a method is provided. The method comprises upon entering a self-refresh mode, refreshing memory cells in a memory device at a first refresh frequency; and upon a predefined event refreshing the memory cells at a second refresh frequency, while in the self-refresh mode.
    Type: Application
    Filed: September 30, 2004
    Publication date: March 30, 2006
    Inventors: Sandeep Jain, Animesh Mishra, Jun Shi
  • Publication number: 20060066384
    Abstract: A thermal management system is described which may be implemented on a semiconductor die. The system may include a thermal sensor thermally coupled to the die to sense the temperature of the die and generate an output representing the sensed temperature, and an adjustable compensation circuit coupled to the thermal sensor to compensate the thermal sensor output. The adjustable compensation circuit may be applied to the thermal sensor or to a threshold.
    Type: Application
    Filed: September 30, 2004
    Publication date: March 30, 2006
    Inventors: Sandeep Jain, Animesh Mishra, Jun Shi, Pochang Hsu, David Wyatt
  • Publication number: 20060010422
    Abstract: A toolkit for developing user-interfaces for a system administration program. The toolkit has a server-side application-programming interface (API). The server-side has task-registry files that each describe a task group. The toolkit also has a client-side API. A developer can customize product-specific properties files for a specific product and write code that calls the server-side and client-side APIs to create a graphical user interface for the specific product.
    Type: Application
    Filed: September 12, 2005
    Publication date: January 12, 2006
    Inventors: Kirthiga Reddy, Wesley Smith, John Relph, Rebecca Underwood, Jenny Leung, James Orosz, Roger Chickering, Christiaan Beekhuis, Elizabeth Zeller, Sandeep Jain, Delle Maxwell
  • Publication number: 20060002218
    Abstract: In one embodiment, a method is provided. The method comprises periodically charging a capacitor mounted on an electronic component; initializing a timer to count down from a counter value, once the capacitor is charged; determining if the capacitor has discharged before the timer has counted down to zero; and if the capacitor has discharged before the timer has counted down to zero then generating an interrupt.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventor: Sandeep Jain
  • Publication number: 20060004537
    Abstract: In one embodiment a memory controller is provided. The memory controller comprises a predictive logic circuit to predict an increase in a current operating temperature of a memory device coupled to the memory controller, based on memory cycles to be issued to the memory device; and a temperature control circuit to perform a temperature control operation wherein if the sum of the current operating temperature and the predicted increase in temperature is greater than a threshold temperature associated with the memory device, then the number of memory cycles issued to the memory device is reduced.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Sandeep Jain, George Vergis, Animesh Mishra, Jun Shi
  • Patent number: 6971086
    Abstract: A toolkit for developing user-interfaces for a system administration program. The toolkit has a server-side application-programming interface (API). The server-side has task-registry files that each describe a task group. The toolkit also has a client-side API. A developer can customize product-specific properties files for a specific product and write code that calls the server-side and client-side APIs to create a graphical user interface for the specific product.
    Type: Grant
    Filed: March 16, 2001
    Date of Patent: November 29, 2005
    Assignee: Silicon Graphics, Inc.
    Inventors: Kirthiga Reddy, Wesley Scott Smith, John Michael Relph, Rebecca Underwood, Jenny Leung, James B. Orosz, Roger Chickering, Christiaan Willem Beekhuis, Elizabeth Caroline Zeller, Sandeep Jain, Delle Maxwell
  • Publication number: 20040005873
    Abstract: Methods and systems are disclosed for managing wireless devices in an enterprise. A first exemplary method manages the physical access points of a wireless network in an enterprise. A second exemplary method manages the assets of wireless devices in an enterprise. A third exemplary method enables virus detection within wireless devices. A fourth exemplary method manages wireless device data backup.
    Type: Application
    Filed: April 21, 2003
    Publication date: January 8, 2004
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Johan Van de Groenendaal, Michael Fry, Sandeep Jain, Andrzej Zalewski, Ralf Saborowski, Davanum Srinivas
  • Publication number: 20020107811
    Abstract: Techniques are provided for utilizing time-stamps and digital signatures to be sent with the messages communicated between partners of a trading community. In one embodiment, upon a transaction is initiated, a time-stamp is automatically embedded in a message of the transaction. A digital signature of the sender also accompanies the message for the message recipient to authenticate that the transaction is initiated by an authentic sender, and not an imposter. As soon as the message is propagated, a monitor process monitors activities acted upon the message. The monitor process receives receipt acknowledgement and consumption acknowledgment from each site that receives the message. Based on the initiated time-stamp and relevant times, the monitor process determines whether the message is received or consumed within a predetermined time limit.
    Type: Application
    Filed: January 5, 2001
    Publication date: August 8, 2002
    Inventors: Sandeep Jain, Sudheer Thakur, Yat-Chi (Andy) Yeung
  • Publication number: 20020106085
    Abstract: Techniques for handling a breach in security are disclosed. According to one technique, prior to the breach, a first party sends to a second party data that identifies a plurality of public keys, including a current public key that corresponds to a current private key. The second party uses the current public key and the first party uses the current private key to exchange electronic messages securely. Other keys, including a session key, may also be used to ensure the security of the exchange. According to one technique, digital signatures are attached to every outgoing message during the secure exchange, and verified on every incoming message. In response to a breach involving the current private key, (1) the first party invalidates the current private key, (2) the first party sends a message to the second party to instruct the second party to invalidate the current public key, and to establish another public key in the plurality of public keys as a new current public key.
    Type: Application
    Filed: January 5, 2001
    Publication date: August 8, 2002
    Inventors: Sandeep Jain, Sudheer Thakur, Kevin Darryl Jeu, Sanjay Ghatare
  • Publication number: 20020087862
    Abstract: Mechanism are provided for a trusted intermediary partner to mange the encryption/decryption keys of trading partners in a trading community. As the trusted intermediary manages the public signature decryption keys for each potential sender, the recipient does not have to manage these keys. In one embodiment, a recipient receives a message from a sender via the trusted intermediary, knowing that the message originates from an authentic sender, but not from an imposter. The sender sends the message together with a digital signature of the sender, which is created from the private signature creation key of the sender, to the trusted intermediary. The trusted intermediary, having the public signature decryption key associated with the private signature creation key of the sender, uses this public signature decryption key to authenticate the sender, i.e., verifying that the message originates from a real sender, and not an imposter.
    Type: Application
    Filed: January 4, 2001
    Publication date: July 4, 2002
    Inventors: Sandeep Jain, Sudheer Thakur, Kevin Darryl Jeu
  • Publication number: 20020073091
    Abstract: Techniques are provided for accessing data stored in XML documents using objects defined in object-oriented languages, such as Java. In one embodiment, a translation tool identifies the data nodes in an XML DTD associated with an XML document. The translation tool converts each of the identified nodes to a corresponding Java class in which a top-level data node in the XML DTD corresponds to a top-level Java class. From the Java classes and data in the XML document, a Java object is instantiated. The Java object thus can be used to advantageously access the data in the XML document in the Java language domain.
    Type: Application
    Filed: January 5, 2001
    Publication date: June 13, 2002
    Inventors: Sandeep Jain, Sudheer Thakur
  • Publication number: 20020069121
    Abstract: Techniques are provided for checking product availability from various suppliers so that purchase orders may be automatically generated upon a determination that all desired products are available. In accordance with one embodiment, a “customer” program converts the business objects that create the product demand for the desired products into various supply assurance requests. The customer program then sends each of the supply assurance requests to a respective supplier to query the product availability. After sending the supply assurance requests, the customer program waits until it receives all of the supply assurance replies corresponding to the supply assurance requests. If the supply assurance replies indicate that all the desired products can be provided by the supplier, then the customer program generates one purchase order to each of the suppliers that received a supply assurance request, to place orders for the desired products.
    Type: Application
    Filed: January 5, 2001
    Publication date: June 6, 2002
    Inventors: Sandeep Jain, Harry Sun, Vincent Wing Sang Chong
  • Publication number: 20020059559
    Abstract: A toolkit for developing user-interfaces for a system administration program. The toolkit has a server-side application-programming interface (API). The server-side has task-registry files that each describe a task group. The toolkit also has a client-side API. A developer can customize product-specific properties files for a specific product and write code that calls the server-side and client-side APIs to create a graphical user interface for the specific product.
    Type: Application
    Filed: March 16, 2001
    Publication date: May 16, 2002
    Inventors: Kirthiga Reddy, Wesley Scott Smith, John Michael Relph, Rebecca Underwood, Jenny Leung, James B. Orosz, Roger Chickering, Christiaan Willem Beekhuis, Elizabeth Caroline Zeller, Sandeep Jain, Delle Maxwell
  • Patent number: 6058389
    Abstract: An advanced message queuing system is integrated into a database system. A queue is an ordered list of messages. Messages are requests for processing by an application. Messages are database objects and can represent events or data. Messages comprise user data and control information such as a queue name. Each queue is part of a table in a relational database. A queue table holds a set of queues. Dictionary tables store configuration information describing queues and queue tables. Messages are entered into a queue by instructing the database system using an enqueuing command attached to a message and control information. The control information describes how to order, schedule, and execute the message, and can include a result queue name into which a result message is written after execution. The system responds to a dequeuing command by delivering a copy of a message from the queue. A user can define message order within a queue, message delay factors, and exception processing.
    Type: Grant
    Filed: October 31, 1997
    Date of Patent: May 2, 2000
    Assignee: Oracle Corporation
    Inventors: Sashikanth Chandra, Dieter Gawlick, Sandeep Jain, Hasan Rizvi, Premal Shah, Alvin To
  • Patent number: 5926819
    Abstract: An in-line trigger is a modular, compiled, template trigger, which defines a series of actions to be performed when an operation is applied to a body of data. The series of actions to be performed when an in-line trigger fires are compiled into machine language instructions that receive three kinds of parameters: trigger-type specific parameters, operational metadata, and operational data. Trigger-type specific parameters are loaded into a section of run-time memory once for multiple firings of the same trigger. Operational metadata and operational data are loaded each time the trigger fires.
    Type: Grant
    Filed: May 30, 1997
    Date of Patent: July 20, 1999
    Assignee: Oracle Corporation
    Inventors: Lip Boon Doo, Sandeep Jain, Mark Ramacher
  • Patent number: 5870761
    Abstract: A method and system are provided for duplicating at a destination site changes made to data at a source site. According to the method a plurality of streams are established between the source site and the destination site. The plurality of streams are used in parallel to propagate changes made at the source site to the destination site. A record of transactions that made changes that need to be propagated from the source site to the destination site is maintained at the source site. Before propagating changes made by a transaction to the destination site on a stream of the plurality of streams, the record of transactions is inspected to identify a set of transactions whose changes are not known to have been made permanent at the destination site. It is then determined whether the transaction could possibly depend on any transaction in the set of transactions.
    Type: Grant
    Filed: December 19, 1996
    Date of Patent: February 9, 1999
    Assignee: Oracle Corporation
    Inventors: Alan Demers, James Stamos, Sandeep Jain, Brian Oki, Roger J. Bamford
  • Patent number: 5870760
    Abstract: A method and system are provided for processing records from a set of records, where records are repeatedly being added to the set of records, and where each record in the set of records has to be processed once for each of a plurality of entities. According to the method, each record that is added to the set of records is marked with a default batch value. For each entity of the plurality of entities, a batch of the records is processed by performing the steps of: reading a last batch value associated with the entity, processing the records in the set of records that are marked with batch values that are more recent than the last batch value associated with the entity, and updating the last batch value associated with the entity to a most recent batch value of the records processed for the entity.
    Type: Grant
    Filed: December 19, 1996
    Date of Patent: February 9, 1999
    Assignee: Oracle Corporation
    Inventors: Alan Demers, Sandeep Jain
  • Patent number: 5806075
    Abstract: The present invention provides the ability to replicate modifications made at a local site to multiple remote sites in a peer-to-peer environment. Information regarding these replicated modifications (e.g., insert, delete, or update) are contained in a set of replication tables. Thus, modifications can be duplicated at other sites immediately after the original modification, or deferred until the remote site is available. The replication tables of the present invention include a transactions table, transaction nodes table, calls table, call nodes table, and an exceptions table. The present invention further provides a logic-oriented procedure-level replication. Procedure-level replication modifies a remote site based on the logical operations used to modify the data at the originating site. Procedure-level replication provides the ability to identify conflicting updates as well. Information concerning conflicts identified by the present invention can be retained in the replication tables.
    Type: Grant
    Filed: January 14, 1997
    Date of Patent: September 8, 1998
    Assignee: Oracle Corporation
    Inventors: Sandeep Jain, Dean Daniels
  • Patent number: 5781912
    Abstract: A method and system are provided for recovering after a failure in a data replication environment. According to the method, a transaction is executed at a source site that makes changes that must be replicated at a destination site. The changes are made permanent at the source site. The changes are made permanent at the source site without the source site being informed as to whether the changes were successfully applied at the destination site. The changes are sent to the destination site. The changes are applied at the destination site. If the changes are successfully applied before the failure, then the changes are made permanent at the destination site and a record is added to a set of records at the destination site. The record indicates that the changes where made permanent at the destination site. After a failure, the set of records at the destination site are used to determine which changes must be sent from the source site to the destination site after the failure.
    Type: Grant
    Filed: December 19, 1996
    Date of Patent: July 14, 1998
    Assignee: Oracle Corporation
    Inventors: Alan Demers, Sandeep Jain