Patents by Inventor Sanjay
Sanjay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250147832Abstract: Computer-implemented systems and methods including language models for explaining and resolving code errors. A computer-implemented method may include: receiving or accessing a log comprising an error message, the error message indicating an error in code; determining the error message from the log; determining a context associated with the error; generating a prompt for a large language model (“LLM”), the prompt comprising at least: the error message, and the context associated with the error; transmitting the prompt to the LLM; and receiving an output from the LLM in response to the prompt, the output comprising at least: an explanation of the error message, and a suggested fix for the error.Type: ApplicationFiled: June 5, 2024Publication date: May 8, 2025Inventors: Akshay Agrawal, Ndeye Fatou Diop, Frauke Hein, Christopher Jeganathan, Oleh Igorovych Busko, Claudia Rafaela Rogoz, Dauren Abdykaparov, Philipp Shchekin, Ryan Norris, Sudarshan Sanjay Ruikar
-
Publication number: 20250150141Abstract: Systems, methods, apparatuses, and computer program products for supporting periodic and SP reporting on PUCCH. One method may include a UE receiving, from a network entity, at least one LTM CSI reporting configuration via radio resource configuration; receiving, from the network entity, at least one control message configured to activate or deactivate at least one of the at least one LTM CSI reporting configuration, and transmitting, to the network entity, L1 measurement reporting according to at least one of the at least one control message.Type: ApplicationFiled: October 29, 2024Publication date: May 8, 2025Inventors: Sanjay GOYAL, Timo KOSKELA
-
Publication number: 20250147925Abstract: A secure data storage management “recovery system” operates in a cloud computing environment that is apart from a source system and source data being protected. A “recovery manager” in the cloud computing environment is responsible for restoring secondary copies that were generated by the source system. The recovery manager gains knowledge (metadata) about the secondary copies by restoring, for its own use, a management database of, and backed up by, the source system. The recovery manager initiates out-of-place restores of the secondary copies to “recovery clients” in the recovery cloud. The recovery system restores, to the recovery cloud, secondary copies from any cloud platform and/or from non-cloud data centers, including secondary copies stored locally, off-cloud by the source system. The recovery manager comprises new features that enforce its isolation from the source system and they act to protect the integrity of the secondary copies generated by the source system.Type: ApplicationFiled: November 21, 2023Publication date: May 8, 2025Inventors: Abhinaw KUMAR, Sanjay Harakhchand KRIPALANI, Sachin Dattatraya DHORAGE, Satya Narayan MOHANTY
-
Publication number: 20250147812Abstract: Systems and methods for determining and assigning identities to workloads in a cloud-based system. Various embodiments include monitoring traffic in a cloud-based system; extracting identification information from one or more payloads originating from one or more workloads operating in the cloud-based system; assigning an identity to each of the one or more workloads based on the identification information; and enforcing policies on the one or more workloads and traffic associated therewith based on the assigned identity.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Applicant: Zscaler, Inc.Inventors: Arvind Nadendla, Subramanian Srinivasan, Sanjay Kalra, Murat Bog
-
Publication number: 20250147572Abstract: A system and method are described herein for estimating power usage of various components of a CPU and controlling voltage regulators based on the estimated power usage. The power estimates may be based on digital power meter readings at each component, on voltage information from a voltage regulator, and on other power information. This power information is transmitted over a mesh interconnect disposed throughout the CPU such that power estimation can be accurately calculated and used to control voltage regulators without being limited by external bus speeds. More of the power management processes and components may be disposed on the CPU and connected to the mesh interconnect. These power management processes include various calibrations, adjustments, and limits so as efficiently manage and use the more rapidly processed power estimations.Type: ApplicationFiled: January 8, 2025Publication date: May 8, 2025Inventors: Sarthak RAINA, Sanjay Bhikhubhai PATEL, Hoan TRAN, Mitrajit CHATTERJEE, Abhishek NIRAJ, Anuradha RAGHUNATHAN
-
Publication number: 20250144183Abstract: The present disclosure relates to methods, compositions and kits for modulating the expression of LPA gene and for treating lipoprotein-related diseases, for example cardiovascular diseases, in a subject by gene editing.Type: ApplicationFiled: September 20, 2024Publication date: May 8, 2025Inventors: Sanjay D'SOUZA, Laura SERWER, Jonathan TERRETT, John KULMAN
-
Publication number: 20250149164Abstract: A system comprising a pair of devices to enable communication between a first person and a second person; a body-suit to be worn by the first person; and a model replica of the body-suit configured to receive the tactile stimuli and/or the electrical stimuli from the second person and to convert the tactile stimuli and/or the electrical stimuli into the electrical signals which are conveyed to the body-suit over a network; wherein the body-suit is configured to replicate the tactile stimuli and/or the electrical stimuli of the model replica and convey the tactile stimuli and/or the electrical stimuli to the first person; and wherein the system allows a human to send a physical sensation of touch remotely to another human.Type: ApplicationFiled: January 13, 2025Publication date: May 8, 2025Inventors: Neil S. DAVEY, Sonya DAVEY, Samir DEVALARAJA, Sanjay KUNCHAKARRA
-
Publication number: 20250144291Abstract: Embodiments relate to device, system and methods for personalised drug dosing via a device, the device comprising a first chamber comprising a drug reservoir unit; a second chamber comprising an electronic unit comprising a control component; a third chamber comprising a drug delivery unit and a flow control component controlled via the electronic unit; wherein the device is fully implanted in a subject during its intended operational modes, and wherein the device releases a body temperature stable drug formulation into the subject at a flow rate such that a variation in the flow rate is within ±15% by volume.Type: ApplicationFiled: July 23, 2024Publication date: May 8, 2025Applicant: Manta Implant LLCInventors: Raju S. DAVE, Kenta ALTEN, Sanjay DALVI, Neil DAVEY, Sonya DAVEY, Eric FRISCHE, Aadi GANNAVARAM, Tri Le, Ray RADAR, Xing SU, Sudhish SWAIN, Sujay SWAIN, Palamadai VENKATRAMAN, Himanshu VERMA, Sachi VERMA
-
Publication number: 20250150455Abstract: Systems and methods for generating sub-identities for workloads in a cloud-based system. Various embodiments include receiving a key from an external system; generating one or more sub-identities from the key; assigning the one or more sub-identities to one or more workloads; and enforcing policies on the one or more workloads and traffic associated therewith based on the one or more sub-identities.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Applicant: Zscaler, Inc.Inventors: Arvind Nadendla, Subramanian Srinivasan, Sanjay Kalra, Murat Bog
-
Publication number: 20250150348Abstract: A method of cross-domain policy orchestration may include executing, with a cross-domain automation (CDA) controller, a macro-segmentation of a plurality of domains based at least in part on metadata defining a mapping to a corresponding plurality of domain controllers, and executing, with the CDA controller, a micro-segmentation of policies within a group based at least in part on a merged policy matrix obtained from policies of the domain controllers.Type: ApplicationFiled: November 3, 2023Publication date: May 8, 2025Applicant: Cisco Technology, Inc.Inventors: Sanjay Kumar Hooda, MASSIMILIANO ARDICA, DARRIN JOSEPH MILLER, ELANGO GANESAN, IAN MCDOWELL CAMPBELL, SARAVANAN RADHAKRISHNAN
-
Publication number: 20250150410Abstract: Aspects of the subject disclosure may include, for example, obtaining a request pertaining to an onboarding of an application supporting a communication network or system, based on the obtaining of the request, establishing a profile for the application, selecting first resources of a first cloud computing network to support the application, based on the selecting of the first resources, configuring at least one resource of the first resources based on the profile, and deploying a first instance of the application to utilize the first resources. Other embodiments are disclosed.Type: ApplicationFiled: November 2, 2023Publication date: May 8, 2025Applicants: AT&T Intellectual Property I, L.P., Interwise Ltd.Inventors: Michael Fafore, Kashif Eijaz, Sanjay Agraharam, Steven Polston, David Khanin
-
Publication number: 20250147893Abstract: Techniques for coherent processor cache control are disclosed. A plurality of processor cores is accessed. Each processor of the plurality of processor cores includes a shared local cache, and the plurality of processor cores implements special cache coherency operations. An evict buffer is coupled to the plurality of processor cores. The evict buffer is shared among the plurality of processor cores, and the evict buffer enables delayed writes. Evict buffer writes are monitored. The monitoring evict buffer writes identifies a special cache coherency operation. The special cache coherency operation that was identified comprises a global snoop operation. The global snoop operation is initiated from a non-local agent within a globally coherent system. An evict buffer entry is marked. The marking corresponds to the special cache coherency operation that was identified, and the marking enables management of cache evict duplication.Type: ApplicationFiled: November 5, 2024Publication date: May 8, 2025Applicant: Akeana, Inc.Inventor: Sanjay Patel
-
Publication number: 20250148788Abstract: Various aspects of the disclosure relate to automated monitoring of content associated with an individual for indicators that the content may be a deepfake. A deepfake analysis training device trains artificial intelligence-based models based on validated content associated with one or more profiles. Each profile is associated with an individual. A deepfake analysis engine may be installed on computing devices to monitor access to content (e.g., multimedia content) for deepfakes associated with the one or more profiles, as configured. The deepfake analysis engine may be stand-alone application, an application extension, or may be integrated into third-party applications via application programming interface functions. Analyzed content is assigned a likelihood score that is compared to threshold values that indicates a likelihood that the content is a deepfake. When identified, deepfake content initiates an alert generation and/or blocking of the content otherwise the content is presented to a user.Type: ApplicationFiled: November 7, 2023Publication date: May 8, 2025Applicant: Bank of America CorporationInventors: Dylan Bellinger, Sanjay Lohar, Kyle Mayers, Amado Martinez Suarez, Cody Searl, Rachel Howze
-
Publication number: 20250149428Abstract: A method for dimensioning a land grid array pad can include forming an initial landing area of a land grid array pad, wherein the initial landing area is dimensioned to cause at least a majority of a landing surface of one or more socket pins to land off of the initial landing area prior to actuation of one or more sockets including the one or more socket pins. The method can also include forming a final landing area of the land grid array pad, wherein the final landing area is dimensioned to maintain electrical contact with the landing surface of the one or more socket pins after actuation of the one or more sockets including the one or more socket pins. Various other methods and systems are also disclosed.Type: ApplicationFiled: November 6, 2023Publication date: May 8, 2025Applicant: Advanced Micro Devices, Inc.Inventors: ChangWei Liang, Sanjay Dandia
-
Patent number: 12294512Abstract: This technology enables directed broadcasts in network fabrics. A control plane node is configured to resolve directed broadcast addresses by mapping the directed broadcast address to a subnet address. A fabric border node receives a directed broadcast, extracts a destination address, and transmits a request to the control plane node to resolve the destination address. The control plane node retrieves the stored mapping and generates a map reply with a multicast destination. The fabric border node encapsulates and forwards the directed broadcast to fabric edge nodes, which decapsulate the directed broadcast and deliver a data set from the directed broadcast to appropriate end point devices. Each fabric edge node may be enabled to determine if the fabric edge node may be connected to a silent host and, based on that determination, request the fabric border node to be added to the multicast destination to receive the directed broadcast.Type: GrantFiled: February 15, 2022Date of Patent: May 6, 2025Assignee: Cisco Technology, Inc.Inventors: Kedar Sudhir Karmarkar, Shyamsundar N. Maniyar, Sanjay Kumar Hooda
-
Patent number: 12292867Abstract: An improved query system in which registered sex offender information published in state and territory databases is obtained using an improved data scraper, merged, cleaned, and/or enriched to remove inaccuracies is described herein. Users can then perform a single search or multiple searches simultaneously (e.g., perform batch searches) and view the results in a single content page. The improved query system can use the merged and/or cleaned data to generate a more limited set of search results, reducing the amount of mismatched or inaccurate information that a user may have to navigate through. Thus, users can perform one or more searches and view accurate search results without having to navigate through many different windows or content pages or perform additional navigational steps to identify relevant information.Type: GrantFiled: October 19, 2023Date of Patent: May 6, 2025Assignee: KnowPeds, LLCInventors: Namita Magoon, Sanjay Magoon
-
Patent number: 12294603Abstract: Live and legitimate user traffic is used with in depth knowledge of the business logic for an API specification to perform security testing on a set of APIs. The present system intercepts and analyzes application program interface (API) traffic, identifies user session data, and identifies traffic suitable to duplicate. The identified traffic is duplicated and modified by addition of malicious code. The modified code is then sent to its intended API destination, where it is processed as normal. The resulting response and other traffic as well as the API system and optionally other systems, such as datastore systems, are analyzed to determine if the malicious code resulted in a valid attack. Results from the modified code attack attempts are reported to a user.Type: GrantFiled: January 8, 2022Date of Patent: May 6, 2025Assignee: TRACEABLE INCInventors: Inon Shkedy, Roshan Piyush, Sanjay Nagaraj, Satish Kumar Mittal, Juan Pablo Tosso Alvarez
-
Patent number: 12294359Abstract: An integrated circuit (IC) includes one or more active transistors and multiple series-coupled dummy transistors. The dummy transistors are coupled between two active transistors and/or at the ends of each active transistor. When the dummy transistors are coupled between two active transistors, apart from two conductive regions that are coupled to two active transistors, each remaining conductive region of the dummy transistors is maintained in a floating state to control a leakage current between the two active transistors. Similarly, when the dummy transistors are coupled at an end of one active transistor, apart from one conductive region that is coupled to the active transistor, each remaining conductive region of the dummy transistors is maintained in the floating state to control a leakage current between the active transistor and the dummy transistors.Type: GrantFiled: May 5, 2022Date of Patent: May 6, 2025Assignee: NXP B.V.Inventors: Sanjay Kumar Wadhwa, Divya Tripathi, Saurabh Goyal, Alvin Leng Sun Loke, Manish Kumar Upadhyay
-
Patent number: 12293210Abstract: A native cloud-based VM in a cloud computing environment of choice is live-mounted without requiring nesting techniques. All operating system data needed to live-mount the VM is accessed over ISCSI. The disclosed technology: supports both Windows and Unix-like (e.g., Linux) operating systems; handles any number of partitions of the root file system without repeated mounting, exporting, and unmounting; and uses only internet protocols (e.g., HTTP, (SCSI) to live-mount the VM. The live-mounted VM gains access to a variety of secondary copies, e.g., made with file-level techniques or with block-level techniques, made within or outside the public cloud computing environment, made from other VMs having the same or a different hypervisor than the public cloud computing environment, and/or made from non-virtualized sources. Access to snapshots as a data source for the live-mounted VM is also disclosed. Thus, a streamlined and source-agnostic technology is disclosed for live-mounting VMs in a public cloud.Type: GrantFiled: March 18, 2022Date of Patent: May 6, 2025Assignee: Commvault Systems, Inc.Inventor: Sanjay Kumar
-
Patent number: 12293321Abstract: A method including collating data from a plurality of data sources into a first data repository; identifying, using a machine-learning model, class clusters and relationship clusters of the collated data in the first data repository; generating a domain-specific semantic model as a graph-structured data model based on the identified class clusters and relationship clusters; generating a data object model using the domain-specific semantic model and the collated data in the first data repository; creating a first domain-specific knowledge graph by associating the data object model with the domain-specific semantic model; creating a cross-domain analytics knowledge graph for deriving insights involving cross-domain analytics by merging the first domain-specific knowledge graph with a second domain-specific knowledge graph created from a second data repository; and deriving insights corresponding to performance of one or more of an asset or a process in a facility based on utilization of the cross-domain analytiType: GrantFiled: November 21, 2022Date of Patent: May 6, 2025Assignee: HONEYWELL INTERNATIONAL, INC.Inventors: Nagarjuna Reddy Chevuru, Sanjay Baronia