Patents by Inventor Savio Fernandes

Savio Fernandes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960636
    Abstract: Examples of wearable systems and methods can use multiple inputs (e.g., gesture, head pose, eye gaze, voice, and/or environmental factors (e.g., location)) to determine a command that should be executed and objects in the three-dimensional (3D) environment that should be operated on. The multiple inputs can also be used by the wearable system to permit a user to interact with text, such as, e.g., composing, selecting, or editing text.
    Type: Grant
    Filed: December 22, 2021
    Date of Patent: April 16, 2024
    Assignee: MAGIC LEAP, INC.
    Inventors: James M. Powderly, Savannah Niles, Jennifer M. R. Devine, Adam C. Carlson, Jeffrey Scott Sommers, Praveen Babu J D, Ajoy Savio Fernandes, Anthony Robert Sheeder
  • Patent number: 11438280
    Abstract: Methods, systems and non-transitory computer readable media for handling IP network addresses in a virtualization system. Embodiments are configured to receive, from a cloud provider, a cloud provider media access control address to assign to a network interface of a computing node. Also received from the cloud provider is a cloud provider's IP address associated with the cloud provider's media access control address. A virtual machine on the computing node is configured such that the cloud provider's IP address serves as an IP address of the virtual machine and such that a virtualization system media access control address serves as a MAC address of the virtual machine. The virtualization system correlates the cloud provider's media access control address to the IP address of the virtual machine. In some cases, the cloud provider's media access control address stored in a virtual switch of a hypervisor.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: September 6, 2022
    Assignee: Nutanix, Inc.
    Inventors: Nitin Parab, Aaron Dean Brown, Anupama Ashok Lolage, Binny Sher Gill, Blinston Savio Fernandes
  • Publication number: 20220171453
    Abstract: Examples of wearable systems and methods can use multiple inputs (e.g., gesture, head pose, eye gaze, voice, and/or environmental factors (e.g., location)) to determine a command that should be executed and objects in the three-dimensional (3D) environment that should be operated on. The multiple inputs can also be used by the wearable system to permit a user to interact with text, such as, e.g., composing, selecting, or editing text.
    Type: Application
    Filed: December 22, 2021
    Publication date: June 2, 2022
    Inventors: James M. Powderly, Savannah Niles, Jennifer M.R. Devine, Adam C. Carlson, Jeffrey Scott Sommers, Praveen Babu J D, Ajoy Savio Fernandes, Anthony Robert Sheeder
  • Publication number: 20210067484
    Abstract: Methods, systems and non-transitory computer readable media for handling IP network addresses in a virtualization system. Embodiments are configured to receive, from a cloud provider, a cloud provider media access control address to assign to a network interface of a computing node. Also received from the cloud provider is a cloud provider's IP address associated with the cloud provider's media access control address. A virtual machine on the computing node is configured such that the cloud provider's IP address serves as an IP address of the virtual machine and such that a virtualization system media access control address serves as a MAC address of the virtual machine. The virtualization system correlates the cloud provider's media access control address to the IP address of the virtual machine. In some cases, the cloud provider's media access control address stored in a virtual switch of a hypervisor.
    Type: Application
    Filed: January 31, 2020
    Publication date: March 4, 2021
    Applicant: Nutanix, Inc.
    Inventors: Nitin PARAB, Aaron Dean BROWN, Anupama Ashok LOLAGE, Binny Sher GILL, Blinston Savio FERNANDES
  • Publication number: 20210067466
    Abstract: Methods, systems and computer program products for deploying a virtualization system onto cloud computing infrastructure. Virtual machines of a virtualization system are deployed onto computing nodes that are interconnected via a cloud provider's networking infrastructure. When migrating a virtual machine from a source computing node to a target computing node that is also interconnected to the cloud provider's networking infrastructure, the addressing of the to-be-migrated virtual machine changes. Dynamically-updated media access control translation tables are maintained at the computing nodes. The media access control translation tables are populated with cloud provider media access control addresses received from the cloud provider. A virtual switch at each computing node modifies incoming and outgoing packets of a to-be-migrated virtual machine based on contents of that node's media access control translation table.
    Type: Application
    Filed: January 31, 2020
    Publication date: March 4, 2021
    Applicant: Nutanix, Inc.
    Inventors: Nitin PARAB, Aaron Dean BROWN, Anupama Ashok LOLAGE, Binny Sher GILL, Blinston Savio FERNANDES
  • Publication number: 20170255258
    Abstract: The present disclosure provides an eye-tracked field of view restrictor for a virtual reality, augmented reality, and/or mixed reality system that reduces the effects of virtual reality sickness and/or cybersickness. A field of view restrictor with a soft-edge, hard edge, or arbitrary dynamic aperture is utilized, and the aperture is adjusted to increase and/or decrease the perceived field of view in the augmented reality, virtual reality, and/or mixed reality system. Each field of view restrictor moves in response to the movement of an operator's eyes as tracked by an eye tracking system, such that the eye-tracker can direct the positioning, repositioning, and/or reorientation of the field of view restrictors. The adjustments can be imperceptible to the operator.
    Type: Application
    Filed: March 2, 2017
    Publication date: September 7, 2017
    Applicant: The Trustees Of Columbia University In the City of New York
    Inventors: Steven K. Feiner, Ajoy Savio Fernandes
  • Patent number: 9425958
    Abstract: A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: August 23, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Patent number: 8607108
    Abstract: An electronic system is configured for scan testing, with a clock distribution network going to a plurality of blocks of the system, and a test capture clock being generated locally at each block. Capture clock pulses are optionally generated at different times for different blocks, and are optionally suppressed for some blocks.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: December 10, 2013
    Assignee: Texas Instruments Incorporated
    Inventor: Denzil Savio Fernandes
  • Patent number: 8474031
    Abstract: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired
    Type: Grant
    Filed: June 28, 2005
    Date of Patent: June 25, 2013
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20130038371
    Abstract: An electronic system is configured for scan testing, with a clock distribution network going to a plurality of blocks of the system, and a test capture clock being generated locally at each block. Capture clock pulses may optionally be generated at different times for different blocks, and may optionally be suppressed for some blocks.
    Type: Application
    Filed: August 8, 2011
    Publication date: February 14, 2013
    Applicant: Texas Instruments Incorporated
    Inventor: Denzil Savio Fernandes
  • Patent number: 7970143
    Abstract: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: June 28, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Patent number: 7970142
    Abstract: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: June 28, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20100138908
    Abstract: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desired
    Type: Application
    Filed: June 28, 2005
    Publication date: June 3, 2010
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20080232598
    Abstract: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.
    Type: Application
    Filed: August 5, 2005
    Publication date: September 25, 2008
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20080212781
    Abstract: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
    Type: Application
    Filed: August 5, 2005
    Publication date: September 4, 2008
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Publication number: 20080209221
    Abstract: A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.
    Type: Application
    Filed: August 5, 2005
    Publication date: August 28, 2008
    Inventors: Ravigopal Vennelakanti, Savio Fernandes
  • Patent number: 7380153
    Abstract: A technique for controlling local events in two-phase asynchronous handshake circuits.
    Type: Grant
    Filed: January 21, 2005
    Date of Patent: May 27, 2008
    Assignee: Texas Instruments Incorporated
    Inventors: Sam Brandon Sandbote, Denzil Savio Fernandes