Patents by Inventor Tarun Gupta
Tarun Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11893772Abstract: Learning iterations, individual ones of which include a respective bucket group selection phase and a class boundary refinement phase, are performed using a source data set whose records are divided into buckets. In the bucket group selection phase of an iteration, a bucket is selected for annotation based on output obtained from a classification model trained in the class boundary refinement phase of an earlier iteration. In the class boundary refinement phase, records of buckets annotated as positive-match buckets for a target class in the bucket group selection phase are selected for inclusion in a training set for a new version of the model using a model enhancement criterion. The trained version of the model is stored.Type: GrantFiled: December 6, 2019Date of Patent: February 6, 2024Assignee: Amazon Technologies, Inc.Inventors: Sedat Gokalp, Tarun Gupta
-
Patent number: 11842180Abstract: A method comprises receiving data corresponding to execution of one or more applications, accessing at least one function from a codes as a service source, and training the at least one function based, at least in part, on one or more parameters, wherein the training is performed using a first portion of the data. In the method, a deployment version of the at least one function is generated based, at least in part, on the training, and the deployment version of the at least one function is applied to a second portion of the data to perform at least one service.Type: GrantFiled: January 14, 2022Date of Patent: December 12, 2023Assignee: Dell Products L.P.Inventors: Jatin Thakkar, Manikandan Pammal Rathinavelu, Pradeepta Ranjan Choudhury, Matthew C. Frank, Sabu K. Syed, Adam Mahram, Khadeer Ahmed Shaikh, Tarun Gupta, Sejal Mohata, Hung Dinh
-
Publication number: 20230344850Abstract: Various embodiments of the present disclosure are directed to automatic improved network architecture generation. In this regard, embodiments may process data representing a network architecture to generate an improved network architecture that resolves one or more vulnerabilities associated with the network architecture.Type: ApplicationFiled: May 1, 2023Publication date: October 26, 2023Inventors: Tarun GUPTA, Anusha CHALLA, Chetan SIDDAPURA KALLAPPA
-
Publication number: 20230306786Abstract: A method for identifying a user of an electronic device, includes: capturing at least one image frame of a portion of the user’s face; extracting facial descriptors from the at least one image frame of the portion of the user’s face; generating first facial descriptor coordinates by using the facial descriptors; determining a first distance between the first facial descriptor coordinates and second facial descriptor coordinates; resizing the first facial descriptor coordinates at least one of radially and angularly based on the first distance between the first facial descriptor coordinates and the second facial descriptor coordinates, and a weight associated with the facial descriptors used to generate the first facial descriptor coordinates.Type: ApplicationFiled: May 18, 2023Publication date: September 28, 2023Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Pankaj CHANCHLANI, Saurabh Kumar SHRIVATSAVA, Ashwini Kumar KULSHRESTHA, Tarun GUPTA, Prabhat Kumar GUPTA
-
Publication number: 20230229411Abstract: A method comprises receiving data corresponding to execution of one or more applications, accessing at least one function from a codes as a service source, and training the at least one function based, at least in part, on one or more parameters, wherein the training is performed using a first portion of the data. In the method, a deployment version of the at least one function is generated based, at least in part, on the training, and the deployment version of the at least one function is applied to a second portion of the data to perform at least one service.Type: ApplicationFiled: January 14, 2022Publication date: July 20, 2023Inventors: Jatin Thakkar, Manikandan Pammal Rathinavelu, Pradeepta Ranjan Choudhury, Matthew C. Frank, Sabu K. Syed, Adam Mahram, Khadeer Ahmed Shaikh, Tarun Gupta, Sejal Mohata, Hung Dinh
-
Patent number: 11706244Abstract: Various embodiments of the present disclosure are directed to automatic network architecture configuration maintenance. A network architecture for a particular organization, user, or other entity, may include various networked devices, any of which may be vulnerable to one or more cyberattacks due to outdated software, hardware, and/or firmware configurations. Embodiments include apparatuses, computer program products, and methods for retrieving an updated device configurations data object, identifying a vulnerable networked device set based at least in part on the updated device configurations data object and a detected networked device set, and generating a device cyber risk score data object set that may be output and/or otherwise provided to one or more systems, devices, or the like.Type: GrantFiled: February 4, 2022Date of Patent: July 18, 2023Assignee: Honeywell International Inc.Inventors: Tarun Gupta, Prasanna Patil, Chandrakanth Vittal S, Manjunath Basavaraj Kama
-
Patent number: 11698658Abstract: A method system, and apparatus for adjusting skew in a circuit comprising feeding an input clock into a first push-pull source follower stage, feeding an inverse of an input clock bar into a first CMOS inverter stage, creating an output clock based on an equal contribution of the input clock of the first push-pull follower stage and the inverse of the input clock bar of the first CMOS invert stage, feeding the input clock bar into a first push-pull source follower stage, feeding an inverse of the input clock into a first CMOS inverter stage, and creating an output clock based on an equal contribution of the input clock bar of the first push-pull follower stage and the inverse of the input clock bar of the first CMOS invert stage.Type: GrantFiled: June 6, 2022Date of Patent: July 11, 2023Assignee: Acacia Communications, Inc.Inventors: Gavin Allen, Ian Dedic, Bo Yang, Tarun Gupta
-
Patent number: 11693543Abstract: A method for optimizing a UI of an application in an electronic device is provided. The method includes detecting, by the electronic device, at least one first application installed in the electronic device, determining, by the electronic device, at least one data item associated with at least one UI of the at least one first application to be modified, modifying, by the electronic device, the at least one data item associated with the at least one UI of the at least one first application based on a level of proficiency of a user with an already used application in the electronic device, and displaying, by the electronic device, the at least one UI with the at least one modified data item of the at least one first application.Type: GrantFiled: June 25, 2021Date of Patent: July 4, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Ramendra Singh Bhadouriya, Abhishek Mishra, Vaibhav Mishra, Ashutosh Gupta, Tarun Gupta, Gaurav Sikarwar, Sai Hemanth Kasaraneni
-
Patent number: 11677768Abstract: Various embodiments of the present disclosure are directed to automatic improved network architecture generation. In this regard, embodiments may process data representing a network architecture to generate an improved network architecture that resolves one or more vulnerabilities associated with the network architecture.Type: GrantFiled: October 22, 2019Date of Patent: June 13, 2023Assignee: Honeywell International Inc.Inventors: Tarun Gupta, Anusha Challa, Chetan Siddapura Kallappa
-
Publication number: 20230156030Abstract: Various embodiments described herein relate to an asset discovery engine with a deep vulnerabilities scanner with respect to assets in an industrial network. In an embodiment, a request to perform an asset vulnerability assessment of one or more assets within a network is received, the request comprising an asset descriptor describing the one or more assets. In response to the request, aggregated asset property data associated with the one or more assets is obtained based on the asset descriptor. Furthermore, the asset vulnerability assessment is performed based on the aggregated asset property data and asset vulnerability signature data stored in an asset vulnerability signature repository. In response to determining that the asset vulnerability assessment satisfies a defined criterion, one or more actions associated with the network are performed.Type: ApplicationFiled: August 31, 2022Publication date: May 18, 2023Inventors: Atul Bassi, Tarun Gupta, Rohit Jain, Anusha C, Israel Rozenblit
-
Publication number: 20230130777Abstract: A method for generating voice in an ongoing call session based on artificial intelligent techniques is provided. The method includes extracting a plurality of features from a voice input through an artificial neural network (ANN); identifying one or more lost audio frames within the voice input; predicting by the ANN, for each of the one or more lost audio frames, one or more features of the respective lost audio frame; and superposing the predicted features upon the voice input to generate an updated voice input.Type: ApplicationFiled: October 25, 2022Publication date: April 27, 2023Applicant: SAMSUNG ELECTRONICS CO., LTD.Inventors: Sandeep Singh SPALL, Tarun GUPTA, Narang Lucky MANOHARLAL
-
Patent number: 11617008Abstract: Methods, systems, and computer-readable media for media classification using local and global audio features are disclosed. A media classification system determines local features of an audio input using an audio event detector model that is trained to detect a plurality of audio event classes descriptive of objectionable content. The local features are extracted using maximum values of audio event scores for individual audio event classes. The media classification system determines one or more global features of the audio input using the audio event detector model. The global feature(s) are extracted using averaging of clip-level descriptors of a plurality of clips of the audio input. The media classification system determines a content-based rating for media comprising the audio input based (at least in part) on the local features of the audio input and based (at least in part) on the global feature(s) of the audio input.Type: GrantFiled: March 30, 2021Date of Patent: March 28, 2023Assignee: Amazon Technologies, Inc.Inventors: Tarun Gupta, Mayank Sharma, Xiang Hao, Muhammad Raffay Hamid, Zhitao Qiu
-
Patent number: 11611562Abstract: There is a need for more effective and efficient network security coordination. This need can be addressed by, for example, techniques for network asset vulnerability detection. In one example, a method includes detecting network assets within a monitored computer network; and for each network asset: determining a vulnerability profile, determining a connectivity profile, determining a vulnerability designation based on the vulnerability profile for the network asset and a network vulnerability documentation repository, determining whether the vulnerability designation for the network asset indicates a positive vulnerability designation, and in response to determining that the vulnerability designation indicates the positive vulnerability designation, decoupling the network asset from the monitored computer network using the connectivity profile for the network asset.Type: GrantFiled: March 17, 2021Date of Patent: March 21, 2023Assignee: Honeywell International Inc.Inventors: Sapna Tiwari, Tarun Gupta, Anusha C, Chandrika Rout, Atul Bassi
-
Patent number: 11599140Abstract: In a first and second embodiment, an apparatus and system comprising a set of voltage controlled oscillators (VCOs); wherein each VCO of the set of VCOs has an LC tank; wherein each VCO of the set of VCOs is connected via a transmission line. In a third embodiment, a method comprising connecting each VCO in a set of VCOs by connecting each respective LC tank of each VCO of the set of VCOs with a transmission line.Type: GrantFiled: September 30, 2019Date of Patent: March 7, 2023Assignee: Acacia Communications, Inc.Inventors: Ian Dedic, David Enright, Tarun Gupta
-
Patent number: 11563428Abstract: A method and apparatus for determining a set of cascading clock cycles, the method comprising inputting a set of phase changes of a set of clocks into a set of input circuits; wherein the set of phase changes are either falling phase changes or rising phase changes; wherein two phase changes of the set of clocks are fed into each input circuit of the set of input circuits, determining for each input circuit of the set of input circuits a duty cycle, storing the duty cycle for each input circuit of the input circuits in a set of duty cycles, calculating skew between the set of clocks using the duty cycles, and adjusting a delay to lower the skew between the set of clocks.Type: GrantFiled: June 22, 2020Date of Patent: January 24, 2023Assignee: Acacia Communications, Inc.Inventors: Ramesh K. Singh, Tarun Gupta, Guojun Ren, Richard Castell
-
Patent number: 11543850Abstract: An apparatus and system for a clock buffer. The clock buffer comprises a source follower, and the source follower comprises a voltage source and a resistor.Type: GrantFiled: January 31, 2020Date of Patent: January 3, 2023Assignee: Acacia Communications, Inc.Inventors: Ian Dedic, Gavin Allen, David Enright, Bo Yang, Tarun Gupta
-
Patent number: 11514171Abstract: A method includes receiving code for computer programming, determining whether at least a portion of the code comprises at least one vulnerability, and comparing at least the portion of the code comprising the at least one vulnerability to a knowledge base. The knowledge base comprises (i) a plurality of code fragments comprising a plurality of vulnerabilities; and (ii) a plurality of solutions to prevent corresponding ones of the plurality of vulnerabilities. The method further includes identifying, based on the comparing, a code fragment of the plurality of code fragments matching at least the portion of the code comprising the at least one vulnerability, and executing a solution of the plurality of solutions corresponding to the identified code fragment to prevent the at least one vulnerability in at least the portion of the code.Type: GrantFiled: October 29, 2019Date of Patent: November 29, 2022Assignee: Dell Products L.P.Inventors: Hung Dinh, Reshma Nair, Gaurav Suwal, Vishnu Prabhu Sundarrajan, Farook Shaik, Nilay Mishra, Manikandan Rathinavelu, Muhammed R. Mohiuddin, Tarun Gupta
-
Patent number: 11460313Abstract: Various embodiments of the present disclosure are directed to field device maintenance request management associated with one or more faulty field devices. Non-limiting example systems in which embodiments function include control system in communication with a plurality of field devices and associated sensors, and at least one client device. Embodiments include apparatuses, computer program products, and methods for retrieving monitoring data, identifying faults, retrieving request handling information, generating a corresponding field device maintenance request, and transmitting the maintenance request to one or more client devices, as well as optionally setting one or more operational modes for field devices, and/or processing a response from the client device.Type: GrantFiled: October 16, 2019Date of Patent: October 4, 2022Assignee: HONEYWELL INTERNATIONAL INC.Inventors: Tarun Gupta, Chetan Siddapura Kallappa
-
Publication number: 20220303304Abstract: Various embodiments of the present disclosure are directed to automatic network architecture configuration maintenance. A network architecture for a particular organization, user, or other entity, may include various networked devices, any of which may be vulnerable to one or more cyberattacks due to outdated software, hardware, and/or firmware configurations. Embodiments include apparatuses, computer program products, and methods for retrieving an updated device configurations data object, identifying a vulnerable networked device set based at least in part on the updated device configurations data object and a detected networked device set, and generating a device cyber risk score data object set that may be output and/or otherwise provided to one or more systems, devices, or the like.Type: ApplicationFiled: February 4, 2022Publication date: September 22, 2022Inventors: Tarun GUPTA, Prasanna PATIL, Chandrakanth VITTAL S, Manjunath Basavaraj KAMA
-
Publication number: 20220164088Abstract: A method for optimizing a UI of an application in an electronic device is provided. The method includes detecting, by the electronic device, at least one first application installed in the electronic device, determining, by the electronic device, at least one data item associated with at least one UI of the at least one first application to be modified, modifying, by the electronic device, the at least one data item associated with the at least one UI of the at least one first application based on a level of proficiency of a user with an already used application in the electronic device, and displaying, by the electronic device, the at least one UI with the at least one modified data item of the at least one first application.Type: ApplicationFiled: June 25, 2021Publication date: May 26, 2022Inventors: Ramendra Singh BHADOURIYA, Abhishek MISHRA, Vaibhav MISHRA, Ashutosh GUPTA, Tarun GUPTA, Gaurav SIKARWAR, Sai Hemanth KASARANENI