Patents by Inventor Vishal Kumar Singh
Vishal Kumar Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250069095Abstract: Various embodiments for authenticating a product associated with a batch production are disclosed. Embodiments disclosed involve scanning a tag affixed on the product and operating a processor to retrieve product identification information which includes an encrypted first chain identifier. The processor then identifies a smart contract for authenticating the product, retrieves from a genesis record stored on the blockchain a batch creation time for the product, and transmits to the smart contract, information to decrypt the smart contract to obtain a second decryption key fragment. The processor then decrypts the first chain identifier using the first decryption key fragment and the second decryption key fragment and determines whether the product is authentic based on a comparison of the batch creation times included in the first chain identifier and the genesis record. Various embodiments for generating tag information for tags affixable to products associated with a batch production are also disclosed.Type: ApplicationFiled: April 26, 2024Publication date: February 27, 2025Inventors: Puneet Pal Singh Randhawa, Vishal Kumar Singh
-
Publication number: 20250013699Abstract: A method according to the present disclosure may include providing an embedded service in an application, in response to receiving an input via the embedded service, determining an applicable module of a plurality of modules based on a characteristic of at least one of the input or of the embedded service, processing the input via the applicable module, and controlling the application based on the processed input. Another method according to the present disclosure may include providing an embedded service in an application, training a monitoring model via federated learning based on data derived locally from the application, monitoring, via the trained monitoring model, a plurality of interactions with the embedded service, determining, by the trained monitoring model, that at least one of the plurality of interactions comprises an anomalous interaction, and in response to the determination, restricting further usage of the application.Type: ApplicationFiled: July 7, 2023Publication date: January 9, 2025Inventors: Padmapriya Mohankumar, Vishal Kumar Singh, Ashraf Kamal
-
Publication number: 20250016064Abstract: A method according to the present disclosure may include providing an embedded service in an application, in response to receiving an input via the embedded service, determining an applicable module of a plurality of modules based on a characteristic of at least one of the input or of the embedded service, processing the input via the applicable module, and controlling the application based on the processed input. Another method according to the present disclosure may include providing an embedded service in an application, training a monitoring model via federated learning based on data derived locally from the application, monitoring, via the trained monitoring model, a plurality of interactions with the embedded service, determining, by the trained monitoring model, that at least one of the plurality of interactions comprises an anomalous interaction, and in response to the determination, restricting further usage of the application.Type: ApplicationFiled: July 7, 2023Publication date: January 9, 2025Inventors: PADMAPRIYA MOHANKUMAR, Vishal Kumar Singh, Ashraf Kamal
-
Publication number: 20240177519Abstract: Techniques are disclosed relating to receiving, by a computer system from a user, a request to authorize the user. The technique may further include receiving, by the computer system, a live video stream of the user, and requesting, by the computer system, the user to submit an identification document from a list of authorized identification documents. While the user submits the identification document, the technique may also include detecting liveliness of the user in the live video stream by using a gesture recognition operation. Additionally, the technique may include determining, using the submitted identification document and the detected liveliness, whether to proceed with the request to authorize the user.Type: ApplicationFiled: November 28, 2022Publication date: May 30, 2024Inventors: Vishal Kumar Singh, Padmapriya Mohankumar, Ashraf Kamal
-
Patent number: 11531478Abstract: Memory usage can be optimized during an imaging process to enable larger-sized deployments and client servicing. A variety of components can be employed on a computing device to present a hybrid virtual volume to the operating system during an imaging process. The hybrid virtual volume will appear to the operating system as having a large size while consuming minimal amounts of memory and disk. As a result, the risk of the imaging process failing for lack of resources will be minimized even when the image is large.Type: GrantFiled: June 7, 2021Date of Patent: December 20, 2022Assignee: Dell Products L.P.Inventors: Gokul Thiruchengode Vajravel, Vishal Kumar Singh
-
Publication number: 20220391111Abstract: Memory usage can be optimized during an imaging process to enable larger-sized deployments and client servicing. A variety of components can be employed on a computing device to present a hybrid virtual volume to the operating system during an imaging process. The hybrid virtual volume will appear to the operating system as having a large size while consuming minimal amounts of memory and disk. As a result, the risk of the imaging process failing for lack of resources will be minimized even when the image is large.Type: ApplicationFiled: June 7, 2021Publication date: December 8, 2022Inventors: Gokul Thiruchengode Vajravel, Vishal Kumar Singh
-
Patent number: 11200091Abstract: A memory optimizer service can be used to provide adaptive memory optimization. The memory optimizer service can be executed on a thin client or other user device to detect when low memory conditions exist. When it detects a low memory condition, the memory optimizer service can obtain process memory information for processes executing on the thin client and use the process memory information to calculate a trim amount to apply to the working set of processes with the highest amount of private bytes in their working sets. These trim amounts can be proportional to the amounts of private bytes and in sum can equal a total desired reduction in memory consumption.Type: GrantFiled: February 3, 2020Date of Patent: December 14, 2021Assignee: DELL PRODUCTS L.P.Inventors: Vishal Kumar Singh, Mohammed Sarfraz
-
Publication number: 20210240534Abstract: A memory optimizer service can be used to provide adaptive memory optimization. The memory optimizer service can be executed on a thin client or other user device to detect when low memory conditions exist. When it detects a low memory condition, the memory optimizer service can obtain process memory information for processes executing on the thin client and use the process memory information to calculate a trim amount to apply to the working set of processes with the highest amount of private bytes in their working sets. These trim amounts can be proportional to the amounts of private bytes and in sum can equal a total desired reduction in memory consumption.Type: ApplicationFiled: February 3, 2020Publication date: August 5, 2021Inventors: Vishal Kumar Singh, Mohammed Sarfraz
-
Patent number: 10230820Abstract: Analytics driven update notifications can be provided. An agent on a managed device can monitor which applications are being used on the managed device and can provide a report of these application usage details along with other details of components on the managed device to a management server. The management server can evaluate reports received from a number of agents to generate rankings of applications and components that are based at least partially on usage. The management server can then identify available updates and present recommendations for deploying the updates based on the rankings.Type: GrantFiled: April 12, 2017Date of Patent: March 12, 2019Assignee: Wyse Technology L.L.C.Inventors: Shailesh Jain, Vishal Kumar Singh
-
Publication number: 20180302494Abstract: Analytics driven update notifications can be provided. An agent on a managed device can monitor which applications are being used on the managed device and can provide a report of these application usage details along with other details of components on the managed device to a management server. The management server can evaluate reports received from a number of agents to generate rankings of applications and components that are based at least partially on usage. The management server can then identify available updates and present recommendations for deploying the updates based on the rankings.Type: ApplicationFiled: April 12, 2017Publication date: October 18, 2018Inventors: Shailesh Jain, Vishal Kumar Singh
-
Patent number: 9253042Abstract: A method implemented in a network apparatus used in a network is disclosed. The method includes sensing network topology and network utilization, receiving a request from an application, deciding path setup requirement using network state information obtained from the network topology and the network utilization, and translating the path setup requirement into a rule to be installed. Other methods, apparatuses, and systems also are disclosed.Type: GrantFiled: September 30, 2013Date of Patent: February 2, 2016Assignee: NEC Laboratories America, Inc.Inventors: Cristian Lumezanu, Curtis Yu, Vishal Kumar Singh, Yueping Zhang, Guofei Jiang
-
Patent number: 9143452Abstract: A method implemented in a network apparatus used in a network is disclosed. The method comprises collecting information about network topology from a network controller, collecting information about data movement, deciding routing in the network according to the information about network topology and the information about data movement, and providing information about the routing to the network controller, wherein the network controller enforces the routing in the network. Other methods, apparatuses, and systems also are disclosed.Type: GrantFiled: August 22, 2013Date of Patent: September 22, 2015Assignee: NEC Laboratories America, Inc.Inventors: Cristian Lumezanu, Anupam Das, Yueping Zhang, Vishal Kumar Singh, Curtis Yu, Guofei Jiang
-
Publication number: 20140098678Abstract: A method implemented in a network apparatus used in a network is disclosed. The method includes sensing network topology and network utilization, receiving a request from an application, deciding path setup requirement using network state information obtained from the network topology and the network utilization, and translating the path setup requirement into a rule to be installed. Other methods, apparatuses, and systems also are disclosed.Type: ApplicationFiled: September 30, 2013Publication date: April 10, 2014Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Cristian Lumezanu, Curtis Yu, Vishal Kumar Singh, Yueping Zhang, Guofei Jiang
-
Publication number: 20140064066Abstract: A method implemented in a network apparatus used in a network is disclosed. The method comprises collecting information about network topology from a network controller, collecting information about data movement, deciding routing in the network according to the information about network topology and the information about data movement, and providing information about the routing to the network controller, wherein the network controller enforces the routing in the network. Other methods, apparatuses, and systems also are disclosed.Type: ApplicationFiled: August 22, 2013Publication date: March 6, 2014Applicant: NEC LABORATORIES AMERICA, INC.Inventors: Cristian Lumezanu, Anupam Das, Yueping Zhang, Vishal Kumar Singh, Curtis Yu, Guofei Jiang
-
Patent number: 7733769Abstract: Nodes in an Internet Protocol (IP) network receive probe packets configured to travel over particular IP media paths. The probe packets cause the network nodes to send media path reports to a logging system. The media path reports contain information identifying the different nodes in the media path. The logging system can reconstruct the network topology of a particular media path from the media path reports which can then be used for debugging purposes. In one embodiment the probe packets are Resource Reservation Setup Protocol (RSVP) packets configured for media path probing.Type: GrantFiled: June 8, 2004Date of Patent: June 8, 2010Assignee: Cisco Technology, Inc.Inventors: Cullen Jennings, David R. Oran, Shiva J. Shankar, Vishal Kumar Singh
-
Patent number: 7525952Abstract: Techniques for finding the source of perceptual audio degradation in an IP telephony environment provide a hop-by-hop analysis of a network over which IP telephony is laid, and may be performed by network switching devices, such as routers, gateways and switches. Rather than monitoring packet loss, these techniques employ perceptual measures to determine the source of audio quality degradation in the network, as perceived by a user or caller. Generally, a reference waveform is systematically sent to intermediate network switching devices along the path between two endpoints. Each intermediate device sends back a return waveform that is based on the respective reference waveform received at each device. From comparing the reference waveform with the return waveform, for each round-trip along the path, the degradation of the audio quality is computed for each round-trip path, from which audio degradation is computed for each hop, from which the source of degradation is determined.Type: GrantFiled: January 7, 2004Date of Patent: April 28, 2009Assignee: Cisco Technology, Inc.Inventors: Jagannathan Shiva Shankar, Vishal Kumar Singh, Muktevi Srinivas, Rahul Mukherjee