Patents by Inventor Sanjay Agarwal

Sanjay Agarwal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140023424
    Abstract: A hygienic modular writing utensil and method of using for eliminating or minimizing the spread of germs, bacteria and the like between a first and a second user. The utensil has an External Protective Shield with a first holding area for use by the first user and a removable Internal Writing Utensil with a second holding area for use by the second user. The External Protective Shield has an internal cleaning element and the Internal Writing Utensil has a removable cap on its outer end, whereby when the first user pulls the Internal Writing Utensil out from the External Protective Shield or reinserts the Internal Writing Utensil back into the External Protective Shield by grasping the exterior surface of the removable cap, an outer surface of the Internal Writing Utensil, including the second holding area is cleaned.
    Type: Application
    Filed: March 15, 2013
    Publication date: January 23, 2014
    Inventors: James M. Anderson, Sanjay Agarwal
  • Patent number: 8539545
    Abstract: An example network system includes a plurality of endpoint computing resources, a business policy graph of a network that includes a set of the plurality of endpoint computing resources configured as a security domain, a set of policy enforcement points (“PEPs”) configured to enforce network policies, and a network management module (“NMM”). The NMM is configured to receive an indication of a set of network policies to apply to the security domain, automatically determine a subset of PEPs of the set of PEPs are required to enforce the set of network policies based on physical network topology information readable by the NMM that includes information about the location of the endpoint computing resources and the set of PEPs within the network, and apply the network policies to the subset of PEPs in order to enforce the network policies against the set of endpoint computing resources of the security domain.
    Type: Grant
    Filed: July 22, 2010
    Date of Patent: September 17, 2013
    Assignee: Juniper Networks, Inc.
    Inventors: Anoop Kartha, Kamil Imtiaz, Ahzam Ali, Amarnath Bachhu Satyan, Firdousi Zackariya, Nadeem Khan, Sanjay Agarwal
  • Publication number: 20120074832
    Abstract: Techniques described herein generally relate to methods of manufacturing devices and devices including a filament having therein or coated with a catalyst and carbon nanotubes. The device may be configured to produce light with a luminary characteristic having a value higher than a value of the luminary characteristic of a device having an uncoated filament at a same operating condition. The luminary characteristic may include one or more of device irradiance or light efficiency. The filament may be a tungsten filament, and the carbon nanotubes may include multiwall carbon nanotubes or single wall carbon nanotubes. The filament may be coated with the carbon nanotubes using one or more deposition techniques including electric arc discharge, laser ablation and chemical vapor deposition (CVD). The filament may be coated with the catalyst using a method including one or more of electroless plating, electroplating, dip coating, spin coating, and radio frequency (RF) sputtering.
    Type: Application
    Filed: January 31, 2011
    Publication date: March 29, 2012
    Inventors: Kamal Krishna Kar, Raghunandan Sharma, Ariful Rahman, Sanjay Agarwal
  • Publication number: 20120023546
    Abstract: An example network system includes a plurality of endpoint computing resources, a business policy graph of a network that includes a set of the plurality of endpoint computing resources configured as a security domain, a set of policy enforcement points (“PEPs”) configured to enforce network policies, and a network management module (“NMM”). The NMM is configured to receive an indication of a set of network policies to apply to the security domain, automatically determine a subset of PEPs of the set of PEPs are required to enforce the set of network policies based on physical network topology information readable by the NMM that includes information about the location of the endpoint computing resources and the set of PEPs within the network, and apply the network policies to the subset of PEPs in order to enforce the network policies against the set of endpoint computing resources of the security domain.
    Type: Application
    Filed: July 22, 2010
    Publication date: January 26, 2012
    Applicant: JUNIPER NETWORKS, INC.
    Inventors: Anoop V. Kartha, Kamil Imtiaz, Ahzam Ali, Amarnath Bachhu Satyan, Firdousi Zackariya, Nadeem Khan, Sanjay Agarwal
  • Patent number: 7836028
    Abstract: A versioned relational database system (VRDBS) in which versions of data contained in a relational database system are accessed by means of workspaces. Metadata in the VRDBS permits a workspace to have multiple parents. The multi-parented VRDBS performs operations including specifying that a workspace be made an additional parent of another workspace or that an additional parent be removed as a parent of the other workspace. The fact that a workspace may have multiple parents affects the manner in which merge and refresh operations are performed and the manner in which system-enforced constraints such as primary key constraints, unique key constraints, and referential integrity constraints are handled. The metadata for the VRDBMS includes a multi-parent graph for each workspace that has multiple parents. The multi-parent graph is used in the performance of the merge and refresh operations and in determining constraint violations.
    Type: Grant
    Filed: July 25, 2002
    Date of Patent: November 16, 2010
    Assignee: Oracle International Corporation
    Inventors: Sanjay Agarwal, Ramkrishna Chatterjee
  • Publication number: 20100099441
    Abstract: Methods and systems for mobile advertising that include receiving an advertisement banner from an advertiser, incorporating identifying information in to the advertisement banner to produce a modified advertisement banner, and displaying the modified advertisement banner on a display of a mobile device are disclosed.
    Type: Application
    Filed: October 17, 2008
    Publication date: April 22, 2010
    Inventors: Sanjay Agarwal, Jennifer Liu Low, Daniel T. Erat, Jennifer W. Lin, Sridhar Venkatakrishnan
  • Patent number: 7593334
    Abstract: According to one embodiment, a method of regulating traffic at a network hardware machine is disclosed. The method includes receiving a data packet, calculating a time stamp difference value, determining whether a maximum token bucket value has been exceeded by the time stamp difference value and determining whether there are enough tokens to transmit the packet.
    Type: Grant
    Filed: May 20, 2002
    Date of Patent: September 22, 2009
    Assignee: Altera Corporation
    Inventors: Neil Mammen, Sanjay Agarwal
  • Patent number: 7277437
    Abstract: According to one embodiment, a network hardware machine is disclosed. The network hardware machine includes a central processing unit (CPU) that processes data packets received at the network hardware machine, and a classifier, coupled to the CPU, that classifies the packets prior to the packets being received at the CPU.
    Type: Grant
    Filed: May 20, 2002
    Date of Patent: October 2, 2007
    Assignee: Altera Corporation
    Inventors: Neil Mammen, Mammen Thomas, Sanjay Agarwal, M. Varghese Ninan
  • Patent number: 7028057
    Abstract: Techniques for doing optimistic constraint checking in a versioned relational database system. The techniques find a subset of the versions of a table that contain all of the rows that need be checked for violation of a constraint when a given version is modified. When the versions of a table are organized into a directed acyclic graph (DAG), the subset for a given version is the ancestry of the given version, that is, the given version plus the ancestors of the given version in the DAG. Within the ancestry, the set of rows that must be checked is termed the version view. A row that belongs to the set has a primary key that is the latest version of the primary key in the given version's ancestry. The technique may be used for constraints including the referential integrity constraint and the unique key constraint. The metadata used to compute the version view is disclosed, as well as the manner in which the constraint checking techniques interact with the workspaces that provide access to the versions.
    Type: Grant
    Filed: July 25, 2002
    Date of Patent: April 11, 2006
    Assignee: Oracle International Corporation
    Inventors: Ramesh Vasudevan, Sanjay Agarwal, Ramkrishna Chatterjee, Benjamin Speckhard
  • Patent number: 6557012
    Abstract: A version control system is described for use in connection with a database management system to facilitate versioning of a database table, the system including a database table and a version control module. The database table comprises a plurality of records, each record including at least one data field for storing user data and at least some of the records including a version control field including version control information. The version control module is configured to, in response to a user query related to the database table and related to a version, generate an augmented query for processing by the database management system, the augmented query relating to the user query and the version control information.
    Type: Grant
    Filed: April 22, 2000
    Date of Patent: April 29, 2003
    Assignee: Oracle Corp
    Inventors: Gopalan Arun, Ramesh Vasudevan, Sanjay Agarwal
  • Publication number: 20020166075
    Abstract: Industrial electronics and many consumer applications need lower cost, lower power consumption, control processing, and some DSP function capability. The technique described implements a system design with industrial and consumer applications in mind. The processor coprocessor architecture with freeze state method to implement power management also provides efficient software programming. Higher number of DSP computations can be programmed as hardware coprocessors functions. Recognizing the completion of DSP computation and implementing power management based on that can be a hardware function. This method of combining DSP computations and power management results in system that can find widespread use in industrial and consumer applications. The technique of using freeze state and implementing power management can also be used in non-battery applications in which power conservation is required.
    Type: Application
    Filed: May 4, 2001
    Publication date: November 7, 2002
    Inventors: Sanjay Agarwal, Sapna Agrawal
  • Publication number: 20020156994
    Abstract: A method for implementing coprocessors for control processors uses synchronous logic design method to achieve low cost and high performance in control processors. The coprocessor comprising of signed two's complement multiplication, signed divide, shift left and shift right, and normalization comprises of most of the math functions required for implementing digital signal processing algorithms. The processor coprocessor architecture uses data dependency to compute the time duration required to perform the math computation. This results in efficient implementation of DSP algorithms and eventually translates to better system level performance. The technique described to implement math computations uses a register file interface, existing instruction set, and existing legacy software development infrastructure to implement DSP systems.
    Type: Application
    Filed: April 24, 2001
    Publication date: October 24, 2002
    Inventors: Sanjay Agarwal, Sapna Agrawal
  • Publication number: 20020147155
    Abstract: Disclosed are methods of treating endometriosis in a woman or of preventing endometriosis in a woman at higher than normal risk of developing or suffering recurrence of endometriosis. The inventive methods involve administering to the woman a pharmaceutically acceptable composition containing an aryl hydrocarbon receptor binding ligand, such as indole-3-carbinol, indole-4-carbinol, indole-5-carbinol, diindolylmethane, tryptophan, tryptamine, indole acetic acid, or glucosinolate compounds.
    Type: Application
    Filed: April 6, 2001
    Publication date: October 10, 2002
    Inventors: Warren G. Foster, Sanjay Agarwal, Claude L. Hughes
  • Publication number: 20020133728
    Abstract: A method for power management and energy conservation in computer networking equipment uses the information on network traffic intensity. The cooling and ventilation provided is directly proportional to network traffic intensity. The traffic intensity information is conveyed to the power management processor, which uses pulse width modulation (PWM) to control cooling and ventilation fans in the equipment. Traffic intensity is proportional to the switching activity in integrated circuits. Switching activity in integrated circuits is proportional to the heat generation in integrated circuits. Higher traffic intensity results in higher heat generation, which correspondingly results in higher cooling and ventilation requirements. The cooling and ventilation should adapt dynamically to the requirements of the system. This adaptation and optimal application of cooling and ventilation in networking equipment provides reduction in power usage in the system equipment.
    Type: Application
    Filed: January 16, 2001
    Publication date: September 19, 2002
    Inventor: Sanjay Agarwal