Patents by Inventor Venugopal RAO
Venugopal RAO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240121317Abstract: A request to activate a service may be received from a user device and a determination may be made as to whether the request is authorized or fraudulent. In particular, a geographical location of the user device may be determined. Whether to activate the service may be determined based on the geographical location of the user device.Type: ApplicationFiled: November 1, 2023Publication date: April 11, 2024Inventors: James C. Taylor, Anil K. Khanna, Jasbir Rajpal, Venugopal Rao Mudigonda, Nirav Dave, Padmini Bettadapura, Benjamin Lieberman
-
Patent number: 11848999Abstract: A request to activate a service may be received from a user device and a determination may be made as to whether the request is authorized or fraudulent. In particular, a geographical location of the user device may be determined. Whether to activate the service may be determined based on the geographical location of the user device.Type: GrantFiled: January 24, 2022Date of Patent: December 19, 2023Assignee: Comcast Cable Communications, LLCInventors: James C. Taylor, Anil K. Khanna, Jasbir Rajpal, Venugopal Rao Mudigonda, Nirav Dave, Padmini Bettadapura, Benjamin Lieberman
-
Publication number: 20230139720Abstract: An apparatus for performing product matching may include: a processor configured to receive a search as product item for searching for a catalog product that matches a target product; classify the target product in a product taxonomy tree including a plurality of taxonomy nodes, by identifying a taxonomy node to which the target product belongs, among the taxonomy nodes; obtain product data associated with the target product from an internal source and an external source and measure data quality; extract attributes from the product data based on a machine learning model; validate the attribute in response to the attribute corresponding to defined mandatory attribute of the taxonomy node to which the target product belongs, and provide a search result based on the validated attributes; re-rank searched results governed by relevancy score and display matched set of products to the customer above defined re-rank confidence score.Type: ApplicationFiled: October 28, 2021Publication date: May 4, 2023Applicant: Rakuten Asia Pte. Ltd.Inventors: Muralidhar SORTUR, Venugopal RAO, Pawan RAJPOOT, Subhanandh TAMILARASU, Manjunath SRINIVAS, Ganji KRISHNA, Sreevidhya RAJAKRISHNAN
-
Publication number: 20220150259Abstract: A request to activate a service may be received from a user device and a determination may be made as to whether the request is authorized or fraudulent. In particular, a geographical location of the user device may be determined. Whether to activate the service may be determined based on the geographical location of the user device.Type: ApplicationFiled: January 24, 2022Publication date: May 12, 2022Inventors: James C. Taylor, Anil K. Khanna, Jasbir Rajpal, Venugopal Rao Mudigonda, Nirav Dave, Padmini Bettadapura, Benjamin Lieberman
-
Patent number: 11270031Abstract: The transition to a horizontal integrated circuit (IC) design flow has raised concerns regarding the security and protection of IC intellectual property (IP). Obfuscation of an IC has been explored as a potential methodology to protect IP in both the digital and analog domains in isolation. However, novel methods are required for analog mixed-signal circuits that both enhance the current disjoint implementations of analog and digital security measures and prevent an independent adversarial attack of each domain. A methodology generates functional and behavioral dependencies between the analog and digital domains that results in an increase in the adversarial key search space. The dependencies between the analog and digital keys result in a 3× increase in the number of iterations required to complete the SAT attack.Type: GrantFiled: April 29, 2020Date of Patent: March 8, 2022Assignee: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Joseph Juretus
-
Patent number: 11265386Abstract: Methods, computing devices, and systems that dynamically determine whether a service request is authorized or fraudulent are described herein. A computing device may receive a request from a user device, and a geographical location of the user device may be determined based on a signal received from the user device. A determination as to whether to activate the service or not may be made based on the determined geographical location of the user device.Type: GrantFiled: November 5, 2019Date of Patent: March 1, 2022Assignee: Comcast Cable Communications, LLCInventors: James C. Taylor, Anil K. Khanna, Jasbir Rajpal, Venugopal Rao Mudigonda, Nirav Dave, Padmini Bettadapura, Benjamin Lieberman
-
Patent number: 11157674Abstract: An approach is described for enhancing the security of analog circuits using Satisfiability Modulo Theory (SMT) based design space exploration. The technique takes as inputs generic circuit equations and performance constraints and, by exhaustively exploring the design space, outputs transistor sizes that satisfy the given constraints. The analog satisfiability (aSAT) methodology is applied to parameter biasing obfuscation, where the width of a transistor is obfuscated to mask circuit properties, while also limiting the number of keys that produce the target performance requirements.Type: GrantFiled: January 31, 2020Date of Patent: October 26, 2021Assignee: Drexel UniversityInventors: Vaibhav Venugopal Rao, Ioannis Savidis
-
Patent number: 10923442Abstract: A key based technique that targets obfuscation of critical circuit parameters of an analog circuit block by masking physical characteristics of a transistor (width and length) and the circuit parameters reliant upon these physical characteristics (i.e. circuit biasing conditions, phase noise profile, bandwidth, gain, noise figure, operating frequency, etc.). The proposed key based obfuscation technique targets the physical dimensions of the transistors used to set the optimal biasing conditions. The widths and/or lengths of a transistor are obfuscated and, based on an applied key sequence, provides a range of potential biasing points. Only when the correct key sequence is applied and certain transistor(s) are active, are the correct biasing conditions at the target node set.Type: GrantFiled: March 12, 2018Date of Patent: February 16, 2021Assignee: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Juretus
-
Publication number: 20200342142Abstract: The transition to a horizontal integrated circuit (IC) design flow has raised concerns regarding the security and protection of IC intellectual property (IP). Obfuscation of an IC has been explored as a potential methodology to protect IP in both the digital and analog domains in isolation. However, novel methods are required for analog mixed-signal circuits that both enhance the current disjoint implementations of analog and digital security measures and prevent an independent adversarial attack of each domain. A methodology generates functional and behavioral dependencies between the analog and digital domains that results in an increase in the adversarial key search space. The dependencies between the analog and digital keys result in a 3× increase in the number of iterations required to complete the SAT attack.Type: ApplicationFiled: April 29, 2020Publication date: October 29, 2020Applicant: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Joseph Juretus
-
Publication number: 20200267226Abstract: Methods, computing devices, and systems that dynamically determine whether a request is authorized or fraudulent are described herein. A computing device may receive a request from a communication device, and a geographical location of the communication device may be determined. User information may be requested, and based on the information and the geographical location of the communication device, a risk value can be calculated. A determination of whether to honor the request may be based on the subscriber risk value.Type: ApplicationFiled: November 5, 2019Publication date: August 20, 2020Inventors: James C. Taylor, Anil K. Khanna, Jasbir Rajpal, Venugopal Rao Mudigonda, Nirav Dave, Padmini Bettadapura, Benjamin Lieberman
-
Publication number: 20200250365Abstract: An approach is described for enhancing the security of analog circuits using Satisfiability Modulo Theory (SMT) based design space exploration. The technique takes as inputs generic circuit equations and performance constraints and, by exhaustively exploring the design space, outputs transistor sizes that satisfy the given constraints. The analog satisfiability (aSAT) methodology is applied to parameter biasing obfuscation, where the width of a transistor is obfuscated to mask circuit properties, while also limiting the number of keys that produce the target performance requirements.Type: ApplicationFiled: January 31, 2020Publication date: August 6, 2020Applicant: Drexel UniversityInventors: Vaibhav Venugopal Rao, Ioannis Savidis
-
Publication number: 20180301426Abstract: A key based technique that targets obfuscation of critical circuit parameters of an analog circuit block by masking physical characteristics of a transistor (width and length) and the circuit parameters reliant upon these physical characteristics (i.e. circuit biasing conditions, phase noise profile, bandwidth, gain, noise figure, operating frequency, etc.). The proposed key based obfuscation technique targets the physical dimensions of the transistors used to set the optimal biasing conditions. The widths and/or lengths of a transistor are obfuscated and, based on an applied key sequence, provides a range of potential biasing points. Only when the correct key sequence is applied and certain transistor(s) are active, are the correct biasing conditions at the target node set.Type: ApplicationFiled: March 12, 2018Publication date: October 18, 2018Applicant: Drexel UniversityInventors: Ioannis Savidis, Vaibhav Venugopal Rao, Kyle Juretus
-
Patent number: 9963452Abstract: The present invention relates to a method using some novel compounds and compositions for the inhibition of ROS tyrosine kinase. In particular, the present invention covers a method to treat abnormal cell growth, such as cancer, with ROS 10 inhibitors and compositions having ROS inhibitors. An illustrative compound of the invention is shown below Formula (I).Type: GrantFiled: March 13, 2014Date of Patent: May 8, 2018Assignee: AUGUSTA PHARMACEUTICALS INC.Inventors: Dorre A. Grueneberg, Ori Kalid, Jun Xian, Sharanappa B. Rajur, Hwa-Ok Kim, Venugopal Rao Neelagiri, Paresh Salgaonkar, Divakaramenon Sethumadhavan, Chaeho Moon, Madhavi Neelagiri
-
Patent number: 9323584Abstract: A load adaptive pipeline system includes a data recovery pipeline configured to transfer data between a memory and a host. The pipeline includes a plurality of resources, one or more of the plurality of resources in the pipeline have multiple resource components available for allocation. The system includes a pipeline controller configured to assess at least one parameter affecting data transfer through the pipeline. The pipeline controller is configure to allocate resource components to the one or more resources in the pipeline in response to assessment of the at least one data transfer parameter.Type: GrantFiled: September 6, 2013Date of Patent: April 26, 2016Assignee: SEAGATE TECHNOLOGY LLCInventors: Jeffrey John Pream, Bijoy Purushothaman, Venugopal Rao Garuda, Ara Patapoutian
-
Publication number: 20160031890Abstract: The present invention relates to a method using some novel compounds and compositions for the inhibition of ROS tyrosine kinase. In particular, the present invention covers a method to treat abnormal cell growth, such as cancer, with ROS 10 inhibitors and compositions having ROS inhibitors. An illustrative compound of the invention is shown below Formula (I).Type: ApplicationFiled: March 14, 2013Publication date: February 4, 2016Inventors: Dorre A. GRUENEBERG, Ori KALID, Jun XIAN, Sharanappa B. RAJUR, Hwa-ok KIM, Venugopal Rao NEELAGIRI, Paresh GAONKAR, Divakaramenon MADHAVAN, Chaeho MOON, Madhavi NEELAGIRI
-
Publication number: 20150074677Abstract: A load adaptive pipeline system includes a data recovery pipeline configured to transfer data between a memory and a host. The pipeline includes a plurality of resources, one or more of the plurality of resources in the pipeline have multiple resource components available for allocation. The system includes a pipeline controller configured to assess at least one parameter affecting data transfer through the pipeline. The pipeline controller is configure to allocate resource components to the one or more resources in the pipeline in response to assessment of the at least one data transfer parameter.Type: ApplicationFiled: September 6, 2013Publication date: March 12, 2015Applicant: Seagate Technology LLCInventors: Jeffrey John Pream, Purushothaman Bijoy, Venugopal Rao Garuda, Ara Patapoutian
-
Patent number: 8521875Abstract: Various embodiments of a networked computer system in which an application server associates an identity with each data source included in the system are disclosed. The networked computer system may include several backend systems, each including one or more data resources, and the identity of a data source may be unique to a data resource. When an application requests a connection to a data resource, the application server may ascertain the identity of the associated data source and compare this identity to identities of data sources with existing connections. If a match is found, the application server may provide an existing connection to the application, whereas if no match is found the application server may provide a new connection. The identity of a data source may include one or more data source configuration properties. In some embodiments, the identity may include database name, URL, and user name.Type: GrantFiled: September 4, 2003Date of Patent: August 27, 2013Assignee: Oracle America, Inc.Inventors: Bala Dutt, Ajay Kumar, Venugopal Rao K, Sankara R. Bhogi, Srinivasan Kannan
-
Patent number: 8145759Abstract: A dynamically configurable resource pool may provide a pool of computing resource for use in a computing system or application, such as a connection pool or a thread pool for server systems such as application and web server systems. In one embodiment, a server may include a resource pool configured to provide a plurality of computing resources. Other components in the server may be configured to request use of one of the computing resources from the connection pool. The resource pool may include a resource pool manager configured to service requests for the computing resources. The resource pool manager may manage configuration of the resource pool. The resource pool manager may also be configured to receive a configuration change request to change the configuration of the resource pool while the resource pool is available for use.Type: GrantFiled: November 4, 2002Date of Patent: March 27, 2012Assignee: Oracle America, Inc.Inventors: Sankara R. Bhogi, Ajay Kumar, Bala Dutt, Venugopal Rao K, Srinivasan Kannan
-
Publication number: 20110117522Abstract: The invention provides a screw type dental implant system (1), comprising three components namely-Dental implant fixture (2), Multifunctional component (3) and the Abutment screw (4). The invention includes screw shape dental implant fixture with external surface having Buttress threads on the body and micro threads at the collar of particular dimensions. This combination provides advantages of improved biomechanics at the implant abutment interface, self-tapping nature to the implant and minimizes the stresses at the crest of the bone leading to decrease resorption of crestal bone during the implant functioning thus ensuring long-term implant stability. The multifunctional component of the system serves the purpose of implant mount, impression analog and final abutment. In addition the multifunctional component has a single prosthetic platform so one component is compatible with different implant dimensions.Type: ApplicationFiled: October 23, 2008Publication date: May 19, 2011Applicant: COUNCIL OF SCIENTIFIC & INDUSTRIAL RESEARCHInventors: Mahesh Verma, Naresh Bhatnagar, Abhinav Sood, Farukh Faraz, Kshitij Sharma, Gedela Venugopal Rao, Palani Selva Kumar, Shankar Iyer
-
Patent number: 7885965Abstract: A markup language parser processes markup language data and provides processed data to an application. A reader is configured to tokenize the markup language data and store resulting tokens in a buffer associated with the reader. A scanner is configured to create string objects based on the tokens and to provide the created string objects to an application. The scanner is further configured to determine a need by the application for the string objects. For each at least some of the string objects created by the scanner, the scanner is configured to selectively create those string objects based on a determination of the need by the application for the string objects.Type: GrantFiled: November 17, 2005Date of Patent: February 8, 2011Assignee: Oracle America, Inc.Inventors: Neeraj Bajaj, K. Venugopal Rao