Patents by Inventor Savio Fernandes
Savio Fernandes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12267257Abstract: Methods, systems and computer program products for deploying a virtualization system onto cloud computing infrastructure. Virtual machines of a virtualization system are deployed onto computing nodes that are interconnected via a cloud provider's networking infrastructure. When migrating a virtual machine from a source computing node to a target computing node that is also interconnected to the cloud provider's networking infrastructure, the addressing of the to-be-migrated virtual machine changes. Dynamically-updated media access control translation tables are maintained at the computing nodes. The media access control translation tables are populated with cloud provider media access control addresses received from the cloud provider. A virtual switch at each computing node modifies incoming and outgoing packets of a to-be-migrated virtual machine based on contents of that node's media access control translation table.Type: GrantFiled: January 31, 2020Date of Patent: April 1, 2025Assignee: Nutanix, Inc.Inventors: Nitin Parab, Aaron Dean Brown, Anupama Ashok Lolage, Binny Sher Gill, Blinston Savio Fernandes
-
Publication number: 20240211028Abstract: Examples of wearable systems and methods can use multiple inputs (e.g., gesture, head pose, eye gaze, voice, and/or environmental factors (e.g., location)) to determine a command that should be executed and objects in the three-dimensional (3D) environment that should be operated on. The multiple inputs can also be used by the wearable system to permit a user to interact with text, such as, e.g., composing, selecting, or editing text.Type: ApplicationFiled: March 5, 2024Publication date: June 27, 2024Inventors: James M. Powderly, Savannah Niles, Jennifer M.R. Devine, Adam C. Carlson, Jeffrey Scott Sommers, Praveen Babu J D, Ajoy Savio Fernandes, Anthony Robert Sheeder
-
Patent number: 11960636Abstract: Examples of wearable systems and methods can use multiple inputs (e.g., gesture, head pose, eye gaze, voice, and/or environmental factors (e.g., location)) to determine a command that should be executed and objects in the three-dimensional (3D) environment that should be operated on. The multiple inputs can also be used by the wearable system to permit a user to interact with text, such as, e.g., composing, selecting, or editing text.Type: GrantFiled: December 22, 2021Date of Patent: April 16, 2024Assignee: MAGIC LEAP, INC.Inventors: James M. Powderly, Savannah Niles, Jennifer M. R. Devine, Adam C. Carlson, Jeffrey Scott Sommers, Praveen Babu J D, Ajoy Savio Fernandes, Anthony Robert Sheeder
-
Patent number: 11438280Abstract: Methods, systems and non-transitory computer readable media for handling IP network addresses in a virtualization system. Embodiments are configured to receive, from a cloud provider, a cloud provider media access control address to assign to a network interface of a computing node. Also received from the cloud provider is a cloud provider's IP address associated with the cloud provider's media access control address. A virtual machine on the computing node is configured such that the cloud provider's IP address serves as an IP address of the virtual machine and such that a virtualization system media access control address serves as a MAC address of the virtual machine. The virtualization system correlates the cloud provider's media access control address to the IP address of the virtual machine. In some cases, the cloud provider's media access control address stored in a virtual switch of a hypervisor.Type: GrantFiled: January 31, 2020Date of Patent: September 6, 2022Assignee: Nutanix, Inc.Inventors: Nitin Parab, Aaron Dean Brown, Anupama Ashok Lolage, Binny Sher Gill, Blinston Savio Fernandes
-
Publication number: 20220171453Abstract: Examples of wearable systems and methods can use multiple inputs (e.g., gesture, head pose, eye gaze, voice, and/or environmental factors (e.g., location)) to determine a command that should be executed and objects in the three-dimensional (3D) environment that should be operated on. The multiple inputs can also be used by the wearable system to permit a user to interact with text, such as, e.g., composing, selecting, or editing text.Type: ApplicationFiled: December 22, 2021Publication date: June 2, 2022Inventors: James M. Powderly, Savannah Niles, Jennifer M.R. Devine, Adam C. Carlson, Jeffrey Scott Sommers, Praveen Babu J D, Ajoy Savio Fernandes, Anthony Robert Sheeder
-
Publication number: 20170255258Abstract: The present disclosure provides an eye-tracked field of view restrictor for a virtual reality, augmented reality, and/or mixed reality system that reduces the effects of virtual reality sickness and/or cybersickness. A field of view restrictor with a soft-edge, hard edge, or arbitrary dynamic aperture is utilized, and the aperture is adjusted to increase and/or decrease the perceived field of view in the augmented reality, virtual reality, and/or mixed reality system. Each field of view restrictor moves in response to the movement of an operator's eyes as tracked by an eye tracking system, such that the eye-tracker can direct the positioning, repositioning, and/or reorientation of the field of view restrictors. The adjustments can be imperceptible to the operator.Type: ApplicationFiled: March 2, 2017Publication date: September 7, 2017Applicant: The Trustees Of Columbia University In the City of New YorkInventors: Steven K. Feiner, Ajoy Savio Fernandes
-
Patent number: 9425958Abstract: A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.Type: GrantFiled: August 5, 2005Date of Patent: August 23, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Ravigopal Vennelakanti, Savio Fernandes
-
Patent number: 8607108Abstract: An electronic system is configured for scan testing, with a clock distribution network going to a plurality of blocks of the system, and a test capture clock being generated locally at each block. Capture clock pulses are optionally generated at different times for different blocks, and are optionally suppressed for some blocks.Type: GrantFiled: August 8, 2011Date of Patent: December 10, 2013Assignee: Texas Instruments IncorporatedInventor: Denzil Savio Fernandes
-
Patent number: 8474031Abstract: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desiredType: GrantFiled: June 28, 2005Date of Patent: June 25, 2013Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Publication number: 20130038371Abstract: An electronic system is configured for scan testing, with a clock distribution network going to a plurality of blocks of the system, and a test capture clock being generated locally at each block. Capture clock pulses may optionally be generated at different times for different blocks, and may optionally be suppressed for some blocks.Type: ApplicationFiled: August 8, 2011Publication date: February 14, 2013Applicant: Texas Instruments IncorporatedInventor: Denzil Savio Fernandes
-
Patent number: 7970143Abstract: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.Type: GrantFiled: August 5, 2005Date of Patent: June 28, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Patent number: 7970142Abstract: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.Type: GrantFiled: August 5, 2005Date of Patent: June 28, 2011Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Publication number: 20100138908Abstract: A method of controlling access to computing resources, comprising providing a first computing device with access to a database containing data indicative of computing resources access to which is controlled by the first computing device and a minimum security capability that a second computing device must possess to access the respective resources, assigning the second computing device a security capability, providing the second computing device with data indicative of the security capability, configuring the first computing device to respond to data indicative of the security capability and data indicative of a desired access from the second computing device by ascertaining the minimum required security capability corresponding to the desired access and by comparing the minimum required security capability with the security capability of the second computing device, and providing the desired access if the security capability of the second computing device meets the minimum security capability for the desiredType: ApplicationFiled: June 28, 2005Publication date: June 3, 2010Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Publication number: 20080232598Abstract: A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.Type: ApplicationFiled: August 5, 2005Publication date: September 25, 2008Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Publication number: 20080212781Abstract: A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.Type: ApplicationFiled: August 5, 2005Publication date: September 4, 2008Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Publication number: 20080209221Abstract: A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.Type: ApplicationFiled: August 5, 2005Publication date: August 28, 2008Inventors: Ravigopal Vennelakanti, Savio Fernandes
-
Patent number: 7380153Abstract: A technique for controlling local events in two-phase asynchronous handshake circuits.Type: GrantFiled: January 21, 2005Date of Patent: May 27, 2008Assignee: Texas Instruments IncorporatedInventors: Sam Brandon Sandbote, Denzil Savio Fernandes