Patents by Inventor Vinodh Kumar
Vinodh Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8564237Abstract: In an embodiment, a system includes: a casing for surrounding at least a portion of a rotor, and enclosing a volume of a cooling gas thereabout, the casing including a plurality of static seals; an end housing at each end of the casing, each end housing including a seal system through which the rotor extends, wherein a portion of cooling gas escapes from the casing to at least one seal area; and a source of cooling gas fluidly coupled to the casing by a cooling gas regulator. The system may further include: a scavenging system coupled to each end housing for removing a gas mixture therefrom including a portion of escaping cooling gas; a sensor for determining a purity of the cooling gas in the casing; and a static seal leak detector that generates an alarm indicative of a leak in at least one of the plurality of static seals.Type: GrantFiled: January 5, 2011Date of Patent: October 22, 2013Assignee: General Electric CompanyInventors: Vinodh Kumar Bandaru, Jeffrey James Andritz, James Daniel Antalek, Krishna Swamy Cherukuri, Daniel James Fitzmorris, Anthony James George, Nicola Piccirillo, Sudhanshu Rai
-
Publication number: 20130117683Abstract: A method of streamlined web site navigation includes providing a command line interface supplemental to a graphic user interface. The command line interface accepts entry of verbs and parameters from a web site-specific vocabulary. The web site-specific vocabulary allows a user to access functions of a graphic user interface page of the web site by entering at least one verb and without navigating page links to reach the graphic user interface page. The method receives data entered at the command line interface, including the at least one verb. The method continues with identifying a particular web page responsive to the verb, and sending the particular web page towards a client system. The method may further include receiving with the data entered at the command line interface at least one parameter that modifies the verb, and identifying the particular web page responsive to the verb combined with the parameter.Type: ApplicationFiled: August 28, 2012Publication date: May 9, 2013Applicant: SALESFORCE.COM, INC.Inventor: Vinodh Kumar Rajagopal
-
Patent number: 8392990Abstract: A technique for mitigating excessive operations attacks in a wireless communication network includes receiving message requests from stations, detecting an excessive operation attack, checking if a received request is a first request or a retry request, and ignoring any first requests. The method can also include saving information about the first request, and wherein if checking reveals that the received request is a retry request, the method further confirms that the retry request and the saved information about the first request meet matching conditions, whereupon the retry request is further processed as normal. Since attacks rarely utilize retry requests, this technique effectively ignores attack messages.Type: GrantFiled: June 28, 2010Date of Patent: March 5, 2013Assignee: Symbol Technologies, Inc.Inventors: Snthilraj Shanmugavadivel, Vinodh Kumar, Srinvasan K. Thirukonda
-
Patent number: 8344676Abstract: Detection of, among other things, seal leakage(s) and/or seal oil contamination for a gas cooled generator are provided. Detectors according to some embodiments of the invention provide mechanisms of early detection of cooling gas, e.g., hydrogen, leakage through leakage sources as well as low purity and high cooling gas consumption problems in a gas cooled generator.Type: GrantFiled: June 17, 2010Date of Patent: January 1, 2013Assignee: General Electric CompanyInventors: Vinodh Kumar Bandaru, Jeffrey James Andritz, James Daniel Antalek, Krishna Swamy Cherukuri, Daniel James Fitzmorris, Anthony James George, Nicola Piccirillo, Sudhanshu Rai
-
Publication number: 20120109569Abstract: A system for evaluating bearing metal temperature (BMT) to diagnose rotor misalignment and/or bearing wipe in an electrical machine. A first system is provided that includes: an input system for obtaining bearing metal temperature (BMT) readings from a first BMT sensor located proximate the turbine and a second BMT sensor located proximate the generator, and for obtaining operational data including lube oil inlet temperature, speed and power; a filter system for filtering bad input data; and a misalignment analysis system that issues a misalignment warning in response to one of the BMT sensor reporting an increasing temperature and the other BMT sensor reporting a decreasing temperature.Type: ApplicationFiled: October 27, 2010Publication date: May 3, 2012Applicant: GENERAL ELECTRIC COMPANYInventors: Dileep Kumar Kana Padinharu, Vinodh Kumar Bandaru, Vasudev Shankar Nilajkar
-
Publication number: 20120070003Abstract: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a recipient at the first and second locations, respectively. A client at the first location generates an encrypted message E, which is the remainder left when a modulus operator divides a first quantity, equal to M multiplied by P to the i power, where i is a selected number, by a second quantity equal to (PQ?1). A tuple comprising E and i is transmitted from the first location to the second location, and a second data processing system at the second location to determines the message M from E, i and Q.Type: ApplicationFiled: September 21, 2010Publication date: March 22, 2012Applicant: International Business Machines CorporationInventors: Subramaniyam Chandrasekaran, Arun C. Ramachandran, Lakshmanan Velusamy, Vinodh Kumar Venkatesan
-
Publication number: 20120047445Abstract: An approach for pre-fetching pages and records in an on demand services environment is disclosed. This approach for pre-fetching pages and records provides for rendering data directly from a locally saved copy. Particular embodiments can include providing a user interface (UI) for a user of the on-demand services environment. According to requests received via the UI, the server can check for a user's log-in credentials. Depending upon the user's activity history, the server can also predict pages which would likely be visited by the user, store those pages as a local copy, and pre-send those pages in advance to the user.Type: ApplicationFiled: August 20, 2010Publication date: February 23, 2012Applicant: SALESFORCE.COM, INC.Inventor: Vinodh Kumar Rajagopal
-
Publication number: 20110321161Abstract: A technique for mitigating excessive operations attacks in a wireless communication network includes receiving message requests from stations, detecting an excessive operation attack, checking if a received request is a first request or a retry request, and ignoring any first requests. The method can also include saving information about the first request, and wherein if checking reveals that the received request is a retry request, the method further confirms that the retry request and the saved information about the first request meet matching conditions, whereupon the retry request is further processed as normal. Since attacks rarely utilize retry requests, this technique effectively ignores attack messages.Type: ApplicationFiled: June 28, 2010Publication date: December 29, 2011Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: Senthilraj Shanmugavadivel, Vinodh Kumar, Srinvasan K. Thirukonda
-
Publication number: 20110308300Abstract: In an embodiment, a system includes: a casing for surrounding at least a portion of a rotor, and enclosing a volume of a cooling gas thereabout, the casing including a plurality of static seals; an end housing at each end of the casing, each end housing including a seal system through which the rotor extends, wherein a portion of cooling gas escapes from the casing to at least one seal area; and a source of cooling gas fluidly coupled to the casing by a cooling gas regulator. The system may further include: a scavenging system coupled to each end housing for removing a gas mixture therefrom including a portion of escaping cooling gas; a sensor for determining a purity of the cooling gas in the casing; and a static seal leak detector that generates an alarm indicative of a leak in at least one of the plurality of static seals.Type: ApplicationFiled: January 5, 2011Publication date: December 22, 2011Applicant: GENERAL ELECTRIC COMPANYInventors: Vinodh Kumar Bandaru, Jeffrey James Andritz, James Daniel Antalek, Krishna Swamy Cherukuri, Daniel James Fitzmorris, Anthony James George, Nicola Piccirillo, Sudhanshu Rai
-
Publication number: 20110309780Abstract: Detection of, among other things, seal leakage(s) and/or seal oil contamination for a gas cooled generator are provided. Detectors according to some embodiments of the invention provide mechanisms of early detection of cooling gas, e.g., hydrogen, leakage through leakage sources as well as low purity and high cooling gas consumption problems in a gas cooled generator.Type: ApplicationFiled: June 17, 2010Publication date: December 22, 2011Applicant: GENERAL ELECTRIC COMPANYInventors: Vinodh Kumar Bandaru, Jeffrey James Andritz, James Daniel Antalek, Krishna Swamy Cherukuri, Daniel James Fitzmorris, Anthony James George, Nicola Piccirillo, Sudhanshu Rai
-
Publication number: 20110131651Abstract: A method and device enables detecting a spoofing attack in a wireless communication network (100). The method includes receiving at the primary access point (105) a beacon signal transmitted from an alternative access point (115), where the beacon signal includes an alternative access point identification. The primary access point (105) then compares the alternative access point identification with an actual identification of the primary access point (105). It is then determined at the primary access point that the alternative access point (115) is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point (105).Type: ApplicationFiled: December 1, 2009Publication date: June 2, 2011Inventors: Senthilraj Shanmugavadivel, Pranav Choudhary, Vinodh Kumar
-
Patent number: 7899166Abstract: A service selection gateway (SSG) which permits multiple access quotas associated with a pre-paid service accessed by a user. For example, the user's access may be terminated if the usage exceeds a specified time or volume of data transferred (examples of access quotas). According to another aspect, access of a service is permitted based on different tariffs. Thus, a user may be charged differently depending on the applicable tariff. In an embodiment implemented in the context of pre-paid tariffs, multiple access quotas may be received associated with the same resource, and each quota may be computed according to a corresponding tariff.Type: GrantFiled: April 18, 2003Date of Patent: March 1, 2011Assignee: Cisco Technology, Inc.Inventors: Vinodh Kumar Ravindranath, Kotha Subba Rama Chandra Murty, Navneet Agarwal, Marco Cesare Centemeri, Amit S. Phadnis
-
Publication number: 20100228860Abstract: A service policy manager may be used to enable a first subscriber in a community to administer rules on another subscriber in the same community. A service selection gateway (SSG) may then be configured according to the rules to provides services according to the rules. As a result, the services provided to a subscriber depend not just on the individual profile of the subscriber, but also potentially on the rules administered by other members of the communities the subscriber is a part of.Type: ApplicationFiled: May 17, 2010Publication date: September 9, 2010Applicant: Cisco Technology, Inc., a California CorporationInventor: Vinodh Kumar Ravindranath
-
Patent number: 7774483Abstract: A service policy manager may be used to enable a first subscriber in a community to administer rules on another subscriber in the same community. A service selection gateway (SSG) may then be configured according to the rules to provides services according to the rules. As a result, the services provided to a subscriber depend not just on the individual profile of the subscriber, but also potentially on the rules administered by other members of the communities the subscriber is a part of.Type: GrantFiled: July 8, 2002Date of Patent: August 10, 2010Assignee: Cisco Technology, Inc.Inventor: Vinodh Kumar Ravindranath
-
Patent number: 7720960Abstract: A method is disclosed for authorizing a prepaid network service in a data network. A network end station issues a request for a prepaid network service. At a network node, such as a router serving as a gateway for selecting services, a determination is made about whether a user associated with the end station is authorized to access the prepaid network service. Network traffic from the end station is forwarded to a service provider only when the user is authorized to use the prepaid network service. Specific embodiments provide message flows among a mobile station, gateway support node, router, and authentication server that support providing prepaid services in a packet-switched network for mobile communication. In certain embodiments, a connection is held open for an end station while a prepaid quota value is refreshed at a portal, thereby reducing overhead and precluding the need to repeat user logon steps.Type: GrantFiled: March 4, 2003Date of Patent: May 18, 2010Assignee: Cisco Technology, Inc.Inventors: Richard Manfred Pruss, Matthew Lawrence King, John Fitzgerald, Tanja Hess, Mark Grayson, David Hovey, Marco Cesare Centemeri, Amit Phadnis, Navneet Agarwal, Vinodh Kumar Ravindranath, Kotha Subba Rama Chandra Murty, Tirumali Seetharam Ajai
-
Patent number: 7646771Abstract: An improvement in the compilation of classification tables from across control lists increases the efficiency of memory utilization by fragments in the lower level tables and using the classification ID's from a pair of higher-level tables as pointers to the fragments and as indicators of the depth of the entries in the fragments. A further improvement makes use of aggregate bit vectors, thereby simplifying construction of the lower-level tables. The bit-vector sections preferably coincide with the cache lines of the processing, thereby maximizing the speed with which the relevant bits in the bit vector can be identified from the aggregate bit vectors.Type: GrantFiled: September 28, 2005Date of Patent: January 12, 2010Assignee: Cisco Technology, Inc.Inventors: Parthibhan Parama Guru, Vinodh Kumar, Andrew McRae
-
Publication number: 20080155425Abstract: A method of creating a browser renderable toolbar or helper application, and a network architecture therefore. The browser renderable toolbar obviates the need for separately-installed software while still permitting a user to take advantage of the functionality provided by a traditional toolbar.Type: ApplicationFiled: December 20, 2006Publication date: June 26, 2008Applicant: Yahoo! Inc.Inventors: Vinodh Kumar Chandra Murthy, Chris Kalaboukis
-
Publication number: 20070276826Abstract: A method is provided to aggregate a plurality of affinity lists to generate a single aggregated affinity list representing predicted affinities of a particular item, to other items, under a plurality of conditions. Each of the plurality of affinity lists represents an affinity of the particular item, to other items, under a subset of the plurality of conditions that is less than all of the plurality of conditions. For each of the affinity lists, a sub-list is determined corresponding to that affinity list by determining a subset of the entries of that affinity list based on the indicated affinity, and the indicated lifts of the entries of that affinity list. For each entry of the sub-list, a normalization indication is determined for that entry. Based on the determined normalization indications, the single aggregated affinity list is generated. Each entry of the single aggregated affinity list indicates a unique one of the other items as indicated by entries in one or more of the sub-lists.Type: ApplicationFiled: May 26, 2006Publication date: November 29, 2007Applicant: YAHOO! INC.Inventors: Jagdish Chand, Vinodh Kumar Chandra Murthy
-
Publication number: 20070209058Abstract: A technique that simplifies managing and configuring firewalls by provisioning a vendor-neutral firewall in an MPLS-VPN service network. In one example embodiment, this is accomplished by creating a vendor-neutral firewall policy using a service activation tool residing in a host server. One of the one or more VPNs requiring the provisioning of the vendor-neutral firewall in the MPLS-VPN service network is then selected. The created vendor-neutral firewall policy is then transformed to form a vendor-specific firewall policy associated with the selected one of the one or more VPNs.Type: ApplicationFiled: March 3, 2006Publication date: September 6, 2007Inventors: Prasanna Anantharamiah, Raghavan Venkata, Jimmi Skaria, Vinodh Kumar
-
Patent number: 7194541Abstract: A service selection gateway (SSG) which enables a service provider to conveniently provide access of the same services to a group of hosts. The service provider may specify the specific services each group of hosts is permitted to access, and the SSG forwards packets from the hosts only to the corresponding specified services. In an embodiment implemented substantially in the form of software, the access information (specifying the server addresses which can be accessed from each group of hosts) is stored in the form of data structures in which the same copy of access information is shared by many (all) hosts in the corresponding group.Type: GrantFiled: March 22, 2002Date of Patent: March 20, 2007Assignee: Cisco Technology, IncInventors: Vinodh Kumar Ravindranath, Amit S. Phadnis