Patents by Inventor Santosh Kumar
Santosh Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
CONNECTION ESTABLISHMENT USING SHARED CERTIFICATE IN GLOBAL SERVER LOAD BALANCING (GSLB) ENVIRONMENT
Publication number: 20250119418Abstract: Example methods and systems for connection establishment in a global server load balancer (GSLB) environment are described. In one example, a computer system may establish a first connection with a first entity and a second connection with the second entity. The first connection may be established based on first parameter information that includes a shared certificate and a first identifier (ID). The second connection may be established based on second parameter information that includes the shared certificate and a second ID. The shared certificate may be shared by multiple entities that include the first entity and a second entity. In response to receiving a first request, a first response may be generated and sent towards the first entity via the first connection. In response to receiving a second request, a second response may be generated and sent towards the second entity via the second connection.Type: ApplicationFiled: October 8, 2023Publication date: April 10, 2025Applicant: VMware, Inc.Inventors: Ravi Kumar Reddy KOTTAPALLI, Sudarshana KANDACHAR SRIDHARA RAO, Venkata Swamy Babu BUDUMURU, Dinesh Kumar KAMALAKANNAN, Prasanna Kumar SUBRAMANYAM, Vidya KOTEESWARAN, Prashant MISHRA, Santosh SINGH -
Publication number: 20250117265Abstract: Example methods and systems for dynamic site selection in a global server load balancer (GSLB) environment are described. In one example, a computer system may obtain first health information from a first entity and second health information from a second entity. The first health information may be generated based on multiple first traffic flows between (a) multiple first client devices and (b) a first pool of backend servers. The second health information may be generated based on multiple second traffic flows between (a) multiple second client devices and (b) a second pool of backend servers. In response to receiving a request to access the service, the computer may select a selected site based on the first health information and/or second health information. A response may be generated and sent to cause a third client device to access the service by directing a third traffic flow towards the selected site.Type: ApplicationFiled: October 8, 2023Publication date: April 10, 2025Inventors: Ravi Kumar Reddy KOTTAPALLI, Sudarshana KANDACHAR SRIDHARA RAO, Venkata Swamy Babu BUDUMURU, Dinesh Kumar KAMALAKANNAN, Prasanna Kumar SUBRAMANYAM, Vidya KOTEESWARAN, Prashant MISHRA, Santosh SINGH
-
Patent number: 12273229Abstract: Disclosed is a system that includes a plurality of regional cloud exchange platforms coupled to a distributed alert triaging engine. A system can include a first regional cloud exchange platform and a second regional cloud exchange platform, each of which includes a regional cloud services monitoring engine and a regional cloud exchange monitoring engine, and an alert triaging engine that provides a triaged alert, or portion thereof, to an appropriate audience.Type: GrantFiled: April 19, 2023Date of Patent: April 8, 2025Assignee: ALKIRA, INC.Inventors: Sudarvannan Sivakumar, Sanchit Lodha, Santosh Kumar Dornal, Veera Raghavendra Prasad Ravinutala, Bharath Chakravarthy
-
Patent number: 12261775Abstract: Systems and methods for support server high availability with network link bonding for cloud overlay networks are disclosed herein. The method can include selecting a compute instance, identifying a plurality of Network Virtualization Devices (“NVD”) for association with the compute instance, and creating a number of Virtualized Network Interface Cards (“VNIC”), each of which VNICs can reside in one of the plurality of NVDs. The method can include overlaying an IP address of the compute instance to each of the VNICs, such that each of the VNICs share a common IP address, designating a network path formed by one of the VNICs in one of the NVDs as an active network path and another of the network paths as an inactive network path, and activating the inactive network path when the active network path fails.Type: GrantFiled: March 31, 2021Date of Patent: March 25, 2025Assignee: Oracle International CorporationInventors: Santosh Narayan Shilimkar, Bryce Eugene Bockman, Steven Chervets, Jagwinder Singh Brar, Raman Kumar Sonkhla
-
Publication number: 20250090702Abstract: An air gasper knob system for an overhead Passenger Service Unit (PSU) includes an annular gasper knob of a UV transparent material. The annular gasper knob defines an air passage therethrough, and extends about the air passage from a first annular end face to a second annular end face. The system also includes a UV illuminator mounted to the gasper knob, oriented to transmit UV illumination through the UV transparent material to sanitize exterior surfaces of the gasper knob. A method of sanitizing an air gasper knob comprises illuminating a gasper knob in an overhead PSU using UV illumination to destroy infectious agents on surfaces of the gasper knob.Type: ApplicationFiled: November 27, 2024Publication date: March 20, 2025Applicant: B/E Aerospace, Inc.Inventors: John John Kocherry, Santosh Kumar Tripathy
-
Publication number: 20250097878Abstract: Various aspects of the present disclosure generally relate to wireless communication. In some aspects, a user equipment (UE), such as a roadside unit (RSU), located in an area of limited or no global navigation satellite system (GNSS) coverage may circulate sidelink synchronization signal (SLSS) neighbor information, such as in the form of an SLSS neighbors list (SNL). The SLSS neighbor information may include one or more of an index number, an SLSS identifier (ID), a timing source in-coverage flag, an RSU ID, a hop ID, a geographic location, a transmission synchronization offset, a synchronization source, and/or a coordinated universal time (UTC) time.Type: ApplicationFiled: September 14, 2023Publication date: March 20, 2025Inventors: Sundervelu Palanivelu TANDALAM, Ahmed SADEQUE, Cheol Hee PARK, Santosh Kumar RONGALA, Praveen Kumar APPANI, Sean Vincent MASCHUE, Srinivasan RAJAGOPALAN
-
Publication number: 20250092049Abstract: The present invention relates to heteroalicyclic compounds represented by the general formula (I), or their isotopic forms, stereoisomers, or pharmaceutically acceptable salts thereof. The present invention also describes a method of making such compounds, pharmaceutical compositions comprising such compounds and their use for the treatment or prevention of central nervous system related disorders.Type: ApplicationFiled: January 11, 2023Publication date: March 20, 2025Applicant: SUVEN LIFE SCIENCES LIMITEDInventors: Ramakrishna NIROGI, Abdul Rasheed MOHAMMED, Anil Karbhari SHINDE, Narsimha BOGARAJU, Vinod Kumar GOYAL, Santosh Kumar PANDEY, Vijay Sidram BENADE, Pradeep JAYARAJAN, Ramkumar SUBRAMANIAN, Venkateswarlu JASTI
-
Publication number: 20250097011Abstract: A system and method are provided for enabling generation of Subscription Concealed Identifier (SUCI) in 5G network. The system performs encryption of a plain text associated with Subscription Permanent Identifier (SUPI) based on an Authenticated Encryption with Associated Data (AEAD)-Advanced Encryption Standard in Galois/Counter Mode (AES-GCM), an Initialization Vector (IV), and Additional authenticated data (AAD). The system obtains public key, cipher text and Message Authentication Code (MAC) tag in parallel process by the AEAD AES-GCM and Elliptic Curve Integrated Encryption Scheme (ECIES) process along with one or more parameters for enabling generation of the SUCI in the 5G network. The one or more parameters comprise at least one of a SUPI type, a Mobile Country Code (MCC), a Mobile Network Code (MNC), or/and a protection scheme ID. Finally, system transmits the generated SUCI in response to GET IDENTITY command received by the UICC.Type: ApplicationFiled: September 10, 2024Publication date: March 20, 2025Inventors: Ankit PANDEY, Santosh Kumar MISHRA
-
Publication number: 20250096010Abstract: The system includes a primary vacuum chamber and a secondary vacuum chamber connected to the primary vacuum chamber via a gate valve. The gate valve operates between an open position in which the secondary vacuum chamber is in fluid communication with the primary vacuum chamber and a closed position in which the secondary vacuum chamber is sealed from the primary vacuum chamber. A heat exchanger cools the secondary vacuum chamber to adsorb contaminants from the primary vacuum chamber into the secondary vacuum chamber when the gate valve is in the open position. A gas source injects a carrier gas into the secondary vacuum chamber when the gate valve is in the closed position. The heat exchanger also heats the carrier gas in the secondary vacuum chamber to desorb the contaminants into a gas sample with the carrier gas. A sample container collects the gas sample from the secondary vacuum chamber.Type: ApplicationFiled: August 22, 2024Publication date: March 20, 2025Inventors: Santosh Kumar Sankar, Makfir Sefa
-
Patent number: 12248494Abstract: In an example implementation consistent with the features disclosed herein, high availability of a stateful application is achieved by orchestrating multiple computing clusters. A stateful application is deployed at a first application operator and a second application operator of a first computing cluster and a second computing cluster, respectively. The first application operator includes a first control loop that changes the first computing cluster based on first resources of the first computing cluster. The second application operator includes a second control loop that changes the second computing cluster based on second resources of the second computing cluster. Synchronization of the first resources with the second resources is configured, such as via an object storage service. The first application operator and the second application operator are scaled to, respectively, nonzero and zero. A load balancer is configured to route requests to the first computing cluster.Type: GrantFiled: June 15, 2023Date of Patent: March 11, 2025Assignee: Hewlett Packard Enterprise Development LPInventors: Pradeep Kumar Achi Vasudevan, Sonu Sudhakaran, Santosh Nagaraj, Hardik Dhirendra Parekh
-
Publication number: 20250066383Abstract: Compounds having activity as modulators of phosphodiesterase 7 (PDE 7) are provided. The compounds have the following Structures (I) or (II): as a stereoisomer, enantiomer, or tautomer thereof or a mixture thereof; or a pharmaceutically acceptable salt, solvate or prodrug thereof, wherein each of R1, R2, R3, R4a, R4b, ring A, ring B, ring A? and ring B? (i.e., {circle around (A)}, {circle around (B)}, , and as shown in Structure (I) and (II), respectively) are as defined herein. Methods associated with preparation and use of such compounds, pharmaceutical compositions comprising such compounds and methods to modulate the activity of phosphodiesterase 7 (PDE 7) are also provided.Type: ApplicationFiled: August 21, 2024Publication date: February 27, 2025Inventors: Neil S. CUTSHALL, Mark A. HADD, Santosh Kumar KESHIPEDDY, Robert H. LEMUS, Markus METZ
-
Publication number: 20250069035Abstract: A system and method are disclosed to locate one or more data anomalies in a supply chain network comprising two or more supply chain entities. Embodiments receive supply chain data comprising a plurality of data points. Embodiments select categories and measures by which to cluster the supply chain data points. Embodiments cluster the data points into intersection clusters as measured by the selected categories and measures. Embodiments generate time interval clusters that divide the intersection clusters into one or more time intervals. Embodiments generate K-values for the plurality of data points in relation to the number of time interval clusters. Embodiments generate local outlier factors for the plurality of data points using the generated K-values.Type: ApplicationFiled: November 11, 2024Publication date: February 27, 2025Inventors: Swapnil Santosh Kumar Bhure, Sunil Morajkar
-
Publication number: 20250068412Abstract: Provided are a system and a method for updating a software application in a multitenant cloud network. The system may receive a request to execute an update of the software application on a tenant node associated with the multi-tenant cloud network. Responsive to receiving the request, the system may cause to install the updated version on the tenant node. The updated version relates to a micro-service of the software application. Further, the system may obtain operational parameters relating to the tenant node, and provision the updated version on the tenant node while the tenant node is executing instances of the software application during the provisioning of the updated version based on the operational parameters and the high availability architecture. The operational parameters comprise at least operation timing and operational traffic data.Type: ApplicationFiled: August 20, 2024Publication date: February 27, 2025Inventors: Santosh Kumar Dornal, Sudarvannan Sivakumar, Sanchit Lodha, Veera Raghavendra Prasad Ravinutala, Bharath Chakravarthy
-
Publication number: 20250070965Abstract: A method is for generating, in a UICC, a 5G subscriber concealed identifier, SUCI, for a 5G mobile communication network. The method includes the steps executed in a processing entity comprised in the UICC: (1) generation of a public/private key pair or an ECC public/private key pair; (2) DH or ECDH derivation of an Ephemeral shared key from the generated or ECC public/private key pair; (3) derivation of a symmetric encryption key from the Ephemeral shared key; (4) concealment of at least a part of a subscriber permanent identifier, SUPI, with the generated symmetric key to compute the SUCI. Steps (1, 2) are triggered by a deterministic event at the UICC, and storing the generated or ECC public/private key pair and Ephemeral shared key to a key memory provided in the UICC; and subsequently steps (3, 4) are triggered by receipt of a GET IDENTITY command.Type: ApplicationFiled: August 14, 2024Publication date: February 27, 2025Inventors: Santosh Kumar MISHRA, Ankit PANDEY
-
Publication number: 20250066430Abstract: Disclosed herein are novel vegetative insecticidal proteins (Vip) from Bacillus thuringiensis, nucleotide sequences encoding the proteins, and primers for the identification of the genes encoding the said proteins active against insect pests. The Vip proteins disclosed herein exhibits activity against a wide range of insect pests including, but not limited to the insect pests belonging to Lepidoptera. The nucleotide sequences encoding the said Vip proteins can be used to transform various prokaryotic and eukaryotic organisms including plants to express one or more Vip proteins. These recombinant organisms can be used to control a wide range of insect pests including but not limited to lepidopteran insects.Type: ApplicationFiled: January 5, 2023Publication date: February 27, 2025Applicant: DCM SHRIRAM LIMITEDInventors: Santosh Kumar DODDA, Lavanya SEELAM, Dwarkesh Singh PARIHAR, Paresh Kumar VERMA
-
Publication number: 20250071096Abstract: Provided are a system and a method for testing virtual private network server. The system is configured to receive a request for a VPN server, the request indicating a number of test operations associated with the VPN server and a computation resource requirement for performing the test operations. Further configure a master node and a set of worker nodes based on the computation resource requirement and cause the set of worker nodes to perform the test operations to generate traffic data. Further, validate a load of the VPN server based on the generated traffic data and resources of the VPN server. Further, to validate the load of the VPN server, identify a time taken by the VPN server to process the traffic data. Further, on determining the time to be greater than a threshold, cause to identify that VPN server is unable to process the load of the traffic data.Type: ApplicationFiled: August 20, 2024Publication date: February 27, 2025Inventors: Santosh Kumar Dornal, Sudarvannan Sivakumar, Sanchit Lodha, Veera Raghavendra Prasad Ravinutala, Bharath Chakravarthy
-
Publication number: 20250068550Abstract: Provided are a system and a method for validating a user-interface (UI). The system is configured to cause to make a change to a document object model (DOM) of a software application. The DOM of the software application is associated with the UI of the software application.Type: ApplicationFiled: August 20, 2024Publication date: February 27, 2025Inventors: Santosh Kumar Dornal, Sudarvannan Sivakumar, Sanchit Lodha, Veera Raghavendra Prasad Ravinutala, Bharath Chakravarthy
-
Patent number: 12232444Abstract: A cleaning fan on an agricultural harvester generates airflow along an airflow path through a fan duct. A movable flap is mounted relative to the fan duct and controlled to divert the airflow path in a side-to-side transverse direction relative to a front-to-back longitudinal axis of the agricultural harvester.Type: GrantFiled: August 6, 2021Date of Patent: February 25, 2025Assignee: Deere & CompanyInventors: Rana Shakti Singh, Mehul Bhavsar, Santosh Khadasare, Abhishek Kumar Roy
-
Publication number: 20250061926Abstract: Memory driver circuitry for driving a memory cell or cells of a memory device includes first driver path circuitry and selection circuitry. The first driver path circuitry includes driver circuitry that outputs a first signal and selection circuitry that receives the first signal and a second signal, and outputs a first selected signal. The first selected signal is a selected one of the first signal and the second signal. The selection circuitry of the memory driver circuitry receives a third signal and a fourth signal, and outputs a bias voltage signal to header circuitry of a memory cell. The bias voltage signal is a selected one of the third signal and the fourth signal. The third signal corresponds to the first selected signal.Type: ApplicationFiled: August 18, 2023Publication date: February 20, 2025Inventors: Santosh YACHARENI, Sree Rama Krishna Chaithnya SARASWATULA, Shidong ZHOU, Anil Kumar KANDALA, Narendra Kumar PULIPATI
-
Publication number: 20250063337Abstract: A method, in a SIM hosted in a mobile radio communication device, is for switching connectivity between a first mobile radio network and a second mobile radio network. The method includes a first ADFUSIM entry and a second ADFUSIM entry in the same profile; the switch of connectivity from the first to the second mobile radio network is performed by switching a configuration of the profile from using the first ADFUSIM entry and to using the second ADFUSIM entry.Type: ApplicationFiled: August 12, 2024Publication date: February 20, 2025Inventor: Santosh Kumar Mishra