Patents by Inventor Venkata Ramanan

Venkata Ramanan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170177417
    Abstract: In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Applicant: McAfee, Inc.
    Inventors: Howard C. Herbert, Jennifer Eligius Mankin, Simon Hunt, Venkata Ramanan Sambandam, Mark E. Scott-Nash, Katalin Klara Bartfai-Walcott, Rameshkumar Illikkal
  • Patent number: 9678687
    Abstract: In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within the enclave; receive a scope directive to indicate that the buffer is in scope; and protect the buffer from swapping to the swap file while the buffer is in scope. There is further disclosed an method of providing a memory management engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing the memory management engine.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 13, 2017
    Assignee: McAfee, Inc.
    Inventors: Carl D. Woodward, Venkata Ramanan Sambandam, Dmitri Rubakha
  • Patent number: 9674803
    Abstract: Methods and apparatus are described for synchronizing compression for communication between a user equipment (UE) and a serving node. The methods and apparatus include determining that a compressor memory of a compressor and a decompressor memory of a decompressor are out-of-synchronization based on a checksum failure. Further, the methods and apparatus include resetting the compressor memory and the decompressor memory to a predetermined state in response to determining that the compressor memory and the decompressor memory are out-of-synchronization, wherein the compressor memory and the decompressor memory are synchronized at the predetermined state.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: June 6, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Srinivasa Rao Eravelli, Sitaramanjaneyulu Kanamarlapudi, Rohit Kapoor, Sivaram Srivenkata Palakodety, Venkata Ramanan Venkatachalam Jayaraman, Murtuza Taheri Chhatriwala, Sumanth Govindappa, Pamela Ann Cereck
  • Publication number: 20170134985
    Abstract: The present disclosure presents a method and an apparatus for managing performance of a user equipment (UE). For example, the disclosure presents a method for managing performance of a UE by computing, at a user equipment (UE), a first capacity estimate over a Wi-Fi interface in response to initiating of a new connection at the UE; detecting, at the UE, that the first capacity estimate is below an aggregation threshold; computing, at the UE, a second capacity estimate over a cellular interface in response to detecting that the first capacity estimate is below the aggregation threshold; and assigning the new connection initiated at the UE to the Wi-Fi interface or the cellular interface based at least on the first capacity estimate or the second capacity estimate. As such, performance of a UE may be managed.
    Type: Application
    Filed: August 11, 2016
    Publication date: May 11, 2017
    Inventors: Venkata Ramanan VENKATACHALAM JAYARAMAN, Prashanth MYSORE, Murtuza Taheri CHHATRIWALA, Vinod MENON
  • Publication number: 20170093572
    Abstract: This disclosure describes systems and methods related to utilizing hardware assisted protection for media content. In some embodiments, a provided method comprises: receiving, from a content server and by a computing device processor of a secure enclave of a device, first encrypted media content; decrypting, by the computing device processor, the first encrypted media content using a first decryption key; generating, by the computing device processor, a second decryption key; encrypting, by the computing device processor, the first decrypted media content using the second key, thereby resulting in second encrypted media content; and sending, by the computing device processor and to one or more graphical processing units (GPUs) comprised in a graphics component of the device, the second encrypted media content and the second decryption key.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Inventors: Simon Hunt, Venkata Ramanan Sambandam
  • Publication number: 20170090821
    Abstract: In an example, there is disclosed a computing apparatus, including a processor, including a trusted execution instruction set; a memory having an enclave portion, wherein the enclave is accessible only via the trusted execution instruction set; a swap file; and a memory management engine operable to: allocate a buffer within the enclave; receive a scope directive to indicate that the buffer is in scope; and protect the buffer from swapping to the swap file while the buffer is in scope. There is further disclosed an method of providing a memory management engine, and one or more computer-readable storage mediums having stored thereon executable instructions for providing the memory management engine.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Applicant: McAfee, Inc.
    Inventors: Carl D. Woodward, Venkata Ramanan Sambandam, Dmitri Rubakha
  • Publication number: 20170088142
    Abstract: In an example, there is disclosed a computing apparatus, including: a driver identity detector to detect the identity of a driver; and one or more logic elements providing a driver competency engine, operable to: detect the identity of the driver; evaluate the driver's operation of a vehicle; and build a driver competency profile based at least in part on the evaluating. The driver competency engine may further be operable to detect a context of the operation, such as environmental factors. There is also described a method of providing a driver competency engine, and one or more computer readable mediums having stored thereon executable instructions for providing a driver competency engine.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 30, 2017
    Applicant: McAfee, Inc.
    Inventors: Simon Hunt, Venkata Ramanan Sambandam, Prasanna Venkateswaran
  • Publication number: 20170082471
    Abstract: A method, system and apparatus is disclosed for auto-tuning a circuit associated with an upstream transducer (UPT) and a circuit associated with a downstream transducer (DNT) for reciprocal operation in an ultrasonic flowmeter. The method includes exchanging signals between the upstream transducer and the downstream transducer; comparing at least one of respective maximum amplitudes of an upstream signal and a downstream signal and respective center frequencies of a Fast Fourier Transform (FFT) of the upstream signal and the downstream signal; and responsive to determining that at least one of the respective maximum amplitudes and the respective center frequencies do not match, correcting the mismatch.
    Type: Application
    Filed: September 23, 2015
    Publication date: March 23, 2017
    Inventors: R. Venkata Ramanan, Anand Dabak, Amardeep Sathyanarayana
  • Publication number: 20170063815
    Abstract: In an example, there is disclosed a computing apparatus, comprising: a trusted execution environment (TEE); and a security engine operable to: identify a key negotiation for an encrypted connection between a first device and a second device; request a service appliance key for the key negotiation; receive the service appliance key; and perform a service appliance function on traffic between the first device and the second device. There is also disclosed a method of providing the security engine, and a computer-readable medium having stored thereon executable instructions for providing the security engine.
    Type: Application
    Filed: September 25, 2015
    Publication date: March 2, 2017
    Applicant: MCAFEE, INC.
    Inventors: Ned M. Smith, Simon Hunt, Venkata Ramanan Sambandam
  • Publication number: 20170057634
    Abstract: Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as “drones”). In some embodiments, an unmanned aerial vehicle engaged in autonomous flight may determine its location using a satellite-based navigation system. The location may be evaluated against location data obtained from one or more secondary factors, such as public broadcast beacons, cellular towers, wireless network identifiers, visual markers, or any combination thereof. If the location is determined to be invalid, the unmanned aerial vehicle may be instructed to take a mitigation action. Additionally, certain embodiments also include the verification of a flight plan for the unmanned aerial vehicle using secure no-fly logic to verify a flight plan does not violate no-fly zones. If the flight plan is verified, the flight plan may be signed using a cryptographic signature and provided to a navigation module that verifies the signature and executes the flight plan.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 2, 2017
    Inventors: Simon Hunt, Venkata Ramanan Sambandam, Samir Shah
  • Publication number: 20170041330
    Abstract: This disclosure describes systems, methods, and computer-readable media related to phishing and brand protection via copycat detection. In some embodiments, a temporary page profile associated with a webpage may be generated. The temporary page profile may include an image component, a geometry component, a style component, and a link component. One or more baseline page profiles may be retrieved. The temporary page profile and the one or more baseline page profiles may be compared. It may be determined that the temporary page profile does not match the one or more baseline page profiles. An alert may be generated to display to a user indicating that fraud has been detected for the webpage.
    Type: Application
    Filed: August 5, 2015
    Publication date: February 9, 2017
    Inventors: Simon Hunt, Venkata Ramanan Sambandam
  • Patent number: 9565590
    Abstract: Systems and methods for modem control based on feedback are disclosed. In one embodiment, a modem observer module is associated with software within a computing device. The modem observer receives information from the modem relating to uplink bandwidth availability and/or network conditions that may impact uplink bandwidth. Based on the uplink bandwidth availability at the modem, the modem observer may throttle or limit the number of connections that are active by the applications.
    Type: Grant
    Filed: January 10, 2014
    Date of Patent: February 7, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: Valeriya Perelman, Venkata Ramanan Venkatachalam Jayaraman, Rohit Kapoor, Rashid Ahmed Akbar Attar, Nela Gurevich, Debesh Kumar Sahu
  • Patent number: 9543972
    Abstract: Circuitry for providing an oscillating output signal. This circuitry includes a transconductance circuit having a first input, a second input, an output. The transconductance also includes a first transistor, a second transistor, and chopping circuitry. The chopping circuitry is for alternatively connecting, in a first clock cycle phase, a first node to a first terminal of the first transistor and a second node to a first terminal of the second transistor and, in a second clock cycle phase, following the first clock cycle phase, the first node to the first terminal of the second transistor and the second node to a first terminal of the first transistor. An oscillator circuit is also included and coupled to receive voltage from the output of the transconductance circuit, wherein the oscillating output signal is responsive to an output of the oscillator circuit.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: January 10, 2017
    Assignee: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Ramamurthy Venkata Ramanan, Venkiteswaran Mahadevan
  • Patent number: 9521113
    Abstract: Technologies for providing electronic security to a first network are disclosed. The system may include a user equipment, a gateway device configured to mediate communication between a first network and a second network for the user equipment, and an electronic security device communicatively coupled to the gateway device. The electronic security device may include a gateway interface module configured to assume an identity associated with the gateway device, a network interface module configured to present the identity to the second network, and a traffic inspection module configured to monitor traffic without substantially affecting a topology of the first network, wherein the electronic security device is configured to identify undesirable traffic; and implement a security policy.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: December 13, 2016
    Assignee: McAfee, Inc.
    Inventors: Jayakrishnan K. Nair, Simon Hunt, Prasanna Venkateswaran, Venkata Ramanan
  • Publication number: 20160322981
    Abstract: Circuitry for providing an oscillating output signal. This circuitry includes a transconductance circuit having a first input, a second input, an output. The transconductance also includes a first transistor, a second transistor, and chopping circuitry. The chopping circuitry is for alternatively connecting, in a first clock cycle phase, a first node to a first terminal of the first transistor and a second node to a first terminal of the second transistor and, in a second clock cycle phase, following the first clock cycle phase, the first node to the first terminal of the second transistor and the second node to a first terminal of the first transistor. An oscillator circuit is also included and coupled to receive voltage from the output of the transconductance circuit, wherein the oscillating output signal is responsive to an output of the oscillator circuit.
    Type: Application
    Filed: October 29, 2015
    Publication date: November 3, 2016
    Inventors: Ramamurthy Venkata Ramanan, Venkiteswaran Mahadevan
  • Patent number: 9473416
    Abstract: Techniques of Transmission Control Protocol (TCP) packet transmission for wireless communication are provided for a user equipment (UE). The UE receives a plurality of TCP packets on a downlink channel from a network. In response, the UE generates a plurality of TCP Acknowledgment (ACK) packets corresponding to the plurality of received TCP packets. The plurality of TCP ACK packets is prioritized based on certain criteria. A TCK ACK packet with a highest priority among the plurality of TCP ACK packets is selected. The selected highest priority TCP ACK packet is then sent to the network on an uplink channel.
    Type: Grant
    Filed: August 19, 2014
    Date of Patent: October 18, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Sitaramanjaneyulu Kanamarlapudi, Nela Gurevich, Venkata Ramanan Venkatachalam Jayaraman, Valeriya Perelman
  • Publication number: 20160234720
    Abstract: Methods, systems, and devices are described for estimating wireless local area network (WLAN) capacity. In accordance with the present disclosure, one or more applications associated with a mobile device may request WLAN capacity estimation in order to maximize the use of available network resources. In some examples, the mobile device may obtain WLAN information from a WLAN modem driver associated with a WLAN modem via an application program interface (API) to calculate the WLAN capacity. The WLAN capacity may include capacity of an access point (AP) associated with the mobile device to support additional users or data over one or more downlink and/or uplink channels. Accordingly, the mobile device may optimize data download or upload times by efficiently managing the available resources.
    Type: Application
    Filed: September 10, 2015
    Publication date: August 11, 2016
    Inventors: Peter BARANY, Dan ZHANG, Venkata Ramanan VENKATACHALAM JAYARAMAN, Divya RAVICHANDRAN, Rohit KAPOOR
  • Patent number: 9407563
    Abstract: Various apparatuses and methods for transmitting uplink data of an application at a user equipment are provided. In one aspect of the disclosure, uplink data of an application at a user equipment (UE) is transmitted to a network. A first amount of the uplink data expected to be buffered at a radio link control (RLC) layer is determined based on a latency of the application. A second amount of the uplink data available for transmission at the RLC layer is determined based on information provided by a modem of the UE. A data rate of the application is dynamically adjusted based on a difference between the first amount and second amount of the uplink data. In another aspect of the disclosure, an amount of the application data buffered at the RLC layer is maintained to be greater than a predetermined threshold that sets a Happy bit at an unhappy setting.
    Type: Grant
    Filed: February 11, 2014
    Date of Patent: August 2, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Sitaramanjaneyulu Kanamarlapudi, Venkata Ramanan Venkatachalam Jayaraman, Rohit Kapoor, Rashid Ahmed Akbar Attar, Christopher Gerard Lott
  • Publication number: 20160182563
    Abstract: A technique allows a client computer with a web browser to receive a web page having active content in response to transmitting a request for content. The active content includes a signature and a set of attributes associated with a web domain. The web browser can interpret the signature and the set of attributes as formatted in the active content. Validation of the signature and the set of attributes can be in a secure mode through a secure enclave module.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Venkata Ramanan Sambandam, Simon Hunt
  • Publication number: 20160182518
    Abstract: Organizing a trusted network includes receive, by a local device, a message from a first remote trusted device identifying a first service hosted by the first remote trusted device, wherein the local device and the first remote trusted device are in a trusted network. Organizing a trusted network also includes indexing, by the local device, the first service in a registry comprising services available to the local device and a location of each service available, wherein the registry is local to the local device.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Ned M. Smith, Venkata Ramanan Sambandam