Patents by Inventor Vijay Kumar

Vijay Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250024836
    Abstract: The present disclosure relates to a composition comprising three active ingredients emamectin benzoate, fipronil, lambda-cyhalothrin and one or more inactive excipient(s) selected from the group comprising of a pH stabilizer, an emulsifier, a dispersing agent, stabilizing agent, wetting agent, spreading agent, anti-foaming agent, rheology modifier, solvent, capsule forming agent, quenching agent, super spreader, an anti-freezing agent, a biocide, an anti-caking agent, an inert carrier or combination thereof. Particularly, the present disclosure provides an oil dispersion (OD) formulation, ZC formulation (ZC) and water dispersible granule (WDG) formulation comprising three active ingredients emamectin benzoate, fipronil and lambda-cyhalothrin combination with one or more excipients and process for preparation thereof.
    Type: Application
    Filed: November 29, 2022
    Publication date: January 23, 2025
    Applicant: Rallis India Limited
    Inventors: Mallikarjunappa SIDDAPPA, Kendappa GOWDRA NANJAPPA, Sai YADDANAPUDI, Rupak PAUL, Vijay Kumar REDDY, Sandesh HEGDE
  • Publication number: 20250029085
    Abstract: Computer-implemented methods, apparatuses, and computer program products are provided for multi-user transaction authentication and allocation. An example computer-implemented method includes receiving a transaction payment request data object from a first user device that includes image data and a transaction payment request value. The method further includes determining a first user and a second user from amongst the plurality of users based at least in part upon the image data, determining a first sub-transaction value for the first user, and determining a second sub-transaction value for the second user. The method further includes generating a responsive transaction payment data object that includes instructions for executing a transaction responsive to the transaction payment request data object.
    Type: Application
    Filed: March 16, 2022
    Publication date: January 23, 2025
    Inventors: Biswajit Mishra, Bhawana Chauhan, Durga Vijay Kumar Sunkavalli
  • Publication number: 20250022085
    Abstract: A method includes receiving a learning requirement for a user. A preliminary learning recommendation is generated based on the learning requirement of the user and learning histories of a plurality of users. The preliminary learning recommendation is filtered to generate a filtered learning recommendation. A problem of finding an improved learning recommendation from the filtered learning recommendation is mapped to a quantum Ising model. A quantum annealing process is performed one or more times to determine one or more final quantum states from an initial quantum state. One or more energies of the quantum Ising model are determined for the one or more final quantum states. A minimum energy is determined among the determined energies. A target quantum state that corresponds to the minimum energy is determined among the determined final quantum states. The improved learning recommendation is determined from the target quantum state and is sent to the user.
    Type: Application
    Filed: July 10, 2023
    Publication date: January 16, 2025
    Inventors: Lingaraj Gopalakrishnan, Anmol Puri, Avinash Basavant Nigudkar, Vijay Kumar Battiprolu
  • Publication number: 20250021545
    Abstract: Systems and methods are disclosed herein for providing a recommendation to modify deficient a deficient content item. A plurality of content items associated with a topic is retrieved. Each of the content items includes a plurality of portions each associated with a respective sub-topic. A rating for each sub-topic of the content items is calculated, and a minimum viable subset of the sub-topics is identified based on the calculated ratings. A new content item associated with the topic is accessed. A plurality of portions of the new content item is identified and a sub-topic for each identified portion is determined. An omitted sub-topic of the minimum viable subset of the sub-topics that is not included in the sub-topics of the new content item is identified, and the system interrupts upload of the new content and recommends modifying the new content item to include a portion with the omitted sub-topic.
    Type: Application
    Filed: July 15, 2024
    Publication date: January 16, 2025
    Inventors: Vijay Kumar, Rajendran Pichaimurthy, Madhusudhan Srinivasan, Prakash Viswanathan
  • Publication number: 20250023842
    Abstract: Technology related to resolution of hostname for webtop resource access is disclosed. In one example, a method includes receiving request for accessing one or more resources from the webtop associated with the user. A usage pattern data of the user for the webtop is determined. For the requested resource, hostname pre-resolution data is determined based on the usage pattern data and an access policy before a given resource is requested for access. A response for the resource access request is generated based on the determined hostname pre-resolution data and the access policy. The response for the resource access request comprises an address of at least one corresponding backend server for redirecting the user to access the requested resource.
    Type: Application
    Filed: January 31, 2023
    Publication date: January 16, 2025
    Inventors: Vijay Kumar BURUGU, Rakesh ADHI
  • Publication number: 20250021741
    Abstract: Aspects of the disclosed technology provide solutions for generating summaries of a source text based on user specified content parameters. In some aspects, a process of the disclosed technology can include steps for receiving a first source text, the source text having a first textual attribute, receiving a content parameter, providing the source text and the content parameter to a machine-learning (ML) model, and receiving, from the ML model, a proto text based on the source text and the content parameter, wherein the proto text has second textual attribute, and wherein the second textual attribute is different than the first textual attribute. Systems and machine-readable media are also provided.
    Type: Application
    Filed: July 11, 2024
    Publication date: January 16, 2025
    Inventors: Vijay Kumar, Rajay Kumar
  • Publication number: 20250016243
    Abstract: Systems and associated methods are described for determining popularity of new content and generating a recommendation to modify content to increase popularity. The system analyzes a content item to determine an anticipated level of user activity over a future time period on a sharing platform. Based on the anticipated level of user activity, the system further recommends applying a modification to at least one attribute of a content item will increase popularity. The system further identifies a plurality of platforms based on the popularity of the content item, and the system also generates a recommendation for uploading the content item onto a platform wherein the platform makes the content item accessible to a plurality of devices.
    Type: Application
    Filed: September 24, 2024
    Publication date: January 9, 2025
    Inventors: Vijay Kumar, Gyanveer Singh, Urvashi Verma
  • Patent number: 12190299
    Abstract: In an aspect, a method performed at a server includes: receiving a message representing a request for a transfer; performing a series of automated processing operations on the message; providing, to a client device associated with an authenticated entity, a transfer interface, the transfer interface including an interface element for selecting the transfer; receiving an indication of a selection of the transfer; in response to receiving the indication of the selection, retrieving stage state data, the stage state data indicating a current one of the automated processing operations in the series; and sending, to the client device, an indication of the stage state data, wherein the client device is configured to update the transfer interface in response to receiving the indication to display a representation of the series of automated processing operations which identifies one of the processing operations in the series as a current processing operation.
    Type: Grant
    Filed: May 24, 2022
    Date of Patent: January 7, 2025
    Assignee: The Toronto-Dominion Bank
    Inventors: Carlos Alejandro Kade, Anne Marie Morissette, Vijay Kumar, Caroline Bandiera, Adriann Teresa Coe
  • Patent number: 12189757
    Abstract: Various methods, apparatuses/systems, and media for programmatically generating and rotating secrets for applications to read them to connect to various services are disclosed. A processor determines, in a preconfigured time interval, whether secrets/credentials corresponding to a service provider has been changed; calls a first API to retrieve the changed secrets/credentials from the corresponding service provider; stores the changed secrets/credentials to a corresponding predefined location; causes an application to call a second API to retrieve the changed secret or the credential from the corresponding predefined location; and automatically establishes a connection between the application and the corresponding service provider based on a determination that the changed secrets/credentials retrieved from the predefined location matches with the changed secrets/credentials retrieved from the corresponding service provider during the preconfigured time interval.
    Type: Grant
    Filed: November 9, 2022
    Date of Patent: January 7, 2025
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Kumar Rao Krishnagi, Vijay Kumar Perla
  • Publication number: 20250005150
    Abstract: In some implementations, a phishing test engine may receive a set of email messages that are associated with a set of users and with an indication of legitimacy. The phishing test engine may perform clustering on the set of email messages to identify a subset of similar email messages and a subset of users. The phishing test engine may generate an email template based on the subset of similar email messages and including an indicator of phishing. The phishing test engine may generate, from the email template, a test email message addressed to a user in the subset of users and may transmit the test email message to the user. The phishing test engine may receive an indication of an interaction with the test email message and may update a policy associated with the set of users based on the indication of the one or more interactions.
    Type: Application
    Filed: June 29, 2023
    Publication date: January 2, 2025
    Inventors: Lokesh Vijay KUMAR, Poornima Bagare RAJU
  • Publication number: 20250004893
    Abstract: Techniques are provided for metadata management for enabling automated switchover in accordance with a configuration of storage solution that expresses a preference for either maintaining availability (e.g., a non-zero RPO mode) of the storage solution or avoiding data loss (e.g., a zero RPO mode). In one example, responsive to detecting a switchover trigger event, a node of a local cluster of a cross-site storage solution determines whether performance of an automated switchover from a failed cluster to a surviving cluster of the cross-site storage solution is enabled. Responsive to an affirmative determination, the node selectively proceeds with the automated switchover based on the configuration.
    Type: Application
    Filed: July 8, 2024
    Publication date: January 2, 2025
    Applicant: NetApp, Inc.
    Inventors: Sasidharan Krishnan, Kalaivani Arumugham, Preksha Bansal, Vijay Kumar Chakravarthy Ekkaladevi, Ryan Edward Bartlett
  • Publication number: 20250005429
    Abstract: Systems, computer program products, and methods are described herein for determining cumulative optimal global minima error for a system using composite artificial intelligence modeling. The present disclosure comprises a composite artificial intelligence model, wherein the composite artificial intelligence model comprises one or more component artificial intelligence models. The present disclosure is configured to receive one or more component level optimal error points, wherein the one or more component level optimal error points are associated with the one or more component artificial intelligence models. The present disclosure aggregates the one or more component level optimal error points and determines an optimal error point, wherein the optimal error point is associated with the composite artificial intelligence model.
    Type: Application
    Filed: June 29, 2023
    Publication date: January 2, 2025
    Applicant: BANK OF AMERICA CORPORATION
    Inventors: Jorge Kara, Vijay Kumar Yarabolu
  • Publication number: 20250007695
    Abstract: A system for implementing secure interaction sessions through dynamic routing paths comprises a processor associated with a server. The processor communicates a traversal key to a communication equipment in response to verifying an authentication token from a communication equipment to implement an interaction session. The traversal key is associated with a routing path that comprises a particular set of entry points for a set of resources. The processor allows the communication equipment to traverse the routing path and generates a traversal path associated with the interaction session. The traversal path identifies the entry points of the set of the resources that are accessed by the communication equipment during the interaction session. The processor generates a second hash value based on a set of ciphers associated with the entry points. The processor completes the interaction session with the communication equipment if the second hash value matches the first hash value.
    Type: Application
    Filed: June 29, 2023
    Publication date: January 2, 2025
    Inventor: Vijay Kumar Yarabolu
  • Publication number: 20250005441
    Abstract: A system for training an artificial intelligence system based on entity rules, regulation rules, and core values comprises a processor associated with a server. The processor analyzes a first set of data objects associated with a first set of data groups to derive a set of logic relationships between the first set of the data objects. The processor trains a machine learning model with the first set of the data objects and the logic relationships based on a set of training rules to meet one or more entity rules with a desired accuracy. The processor tests the machine learning model with the first set of the data objects and the set of the logic relationships. The processor retrains the tested machine learning model with a second set of data objects to meet the one or more regulation rules and the one or more core values.
    Type: Application
    Filed: June 29, 2023
    Publication date: January 2, 2025
    Inventor: Vijay Kumar Yarabolu
  • Patent number: 12182081
    Abstract: In various example embodiments, a system and method for consistent schema-less and scalable database storage are described herein. A data object is generated. The data object corresponds to a column of a table from a database. The data object includes information regarding an order that is placed over a network publication system. The data object is stored in the column of the table in the database. A request to access the data object is received from a device of a first user. The data object is transmitted to the device of the first user. The data is kept coherent during concurrent updates by using optimistic locks. The data is kept backward and forward compatible utilizing intermediate data structures common to both versions of the software. The data is kept searchable by using lookup indexes. The storage system is kept scalable by sharing data across many databases.
    Type: Grant
    Filed: December 8, 2022
    Date of Patent: December 31, 2024
    Assignee: EBAY INC.
    Inventors: Anand Sekar Rengasamy Rajasekar, Srilatha Koneru, Mansi Narula, Senthilnathan Subramanian, Vijayshree Singh, Scott Sharp, Vijay Kumar Sivakumar
  • Publication number: 20240427395
    Abstract: Methods, systems, and apparatus for handling applications in an ambient computing system. One of the apparatus includes multiple devices arranged in multiple power blocks, wherein each device of the multiple devices belongs to one of the multiple power blocks; and multiple local power managers, each local power manager being programmable to execute respective sets of instruction sequences for a respective power block in order to effectuate power state transitions for one or more devices in the respective power block.
    Type: Application
    Filed: July 16, 2021
    Publication date: December 26, 2024
    Inventors: Ronak Subhas Patel, William James Tuohy, Vinu Vijay Kumar, Alex Robert Carlson
  • Patent number: 12177229
    Abstract: Aspects of the disclosure relate to detecting and preventing botnet attacks using client-specific event payloads. A computing platform may receive a request to access data within an enterprise organization. The computing platform may monitor the movement of peripheral devices that are used to populate the data access request and may detect an event associated with each movement. The computing platform may generate an alpha-numeric event code and an alpha-numeric user interface code for each event, determine the location of each event, and categorize each event. The computing platform may generate a client-specific event payload using the unique alpha-numeric codes and the location and categorization of the event. The computing platform may generate a simulated client event payload using the unique alpha-numeric codes. The computing platform may determine whether to approve or deny the data access request based on whether the client-specific event payload matches the simulated client event payload.
    Type: Grant
    Filed: February 25, 2022
    Date of Patent: December 24, 2024
    Assignee: Bank of America Corporation
    Inventor: Vijay Kumar Yarabolu
  • Patent number: 12164540
    Abstract: A server can receive a request to subscribe to a data tenancy in an extended region. The server can determine a size of stored data records associated with the data tenancy in a home region to be replicated in the extended region. Based in part on the size of the stored data records, the server can open a new communication channel dedicated to replicating the stored data records from the first server in the home region to the second server in the extended region. The server can pull the stored data records from the first server in the home region, store the pulled data records on the second sever in the extended region. The server can receive updated data records over an established communication channel between the first server in the home region and the second server in the extended region and store the updated data records on the second server.
    Type: Grant
    Filed: November 3, 2020
    Date of Patent: December 10, 2024
    Assignee: Oracle International Corporation
    Inventors: Arsalan Ahmad, Ashwin Kumar Vajantri, Vijay Kumar Agrawal, Pradyumna Reddy Vajja
  • Publication number: 20240403422
    Abstract: Computer-implemented cyber-security processes and machines provide proactive anti-forensics activity detection and prevention to safeguard the integrity of transactions and their associated log details or other data using artificial intelligence and/or machine learning, thereby ensuring that all transactions and logs within the system are complaint for cyber forensics, and helping to make reactive forensic tasks more robust by adding proactive monitoring and compliance activity.
    Type: Application
    Filed: June 28, 2024
    Publication date: December 5, 2024
    Inventor: Vijay Kumar Yarabolu
  • Publication number: 20240403423
    Abstract: Computer-implemented cyber-security processes and machines provide proactive anti-forensics activity detection and prevention to safeguard the integrity of transactions and their associated log details or other data using artificial intelligence and/or machine learning, thereby ensuring that all transactions and logs within the system are complaint for cyber forensics, and helping to make reactive forensic tasks more robust by adding proactive monitoring and compliance activity.
    Type: Application
    Filed: June 28, 2024
    Publication date: December 5, 2024
    Inventor: Vijay Kumar Yarabolu