Patents by Inventor Vivek Shankar
Vivek Shankar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12111780Abstract: A system-on-chip (SoC) in which trace data is managed includes a first memory device, a first interface to couple the first memory to a second memory external to the system-on-chip, and a first processing resource coupled to the first interface and the first memory device. The first processing resource includes a data buffer and a first direct access memory (DMA) controller. The first DMA controller transmits data from the data buffer to the first interface over a first channel, and transmits the data from the data buffer with associated trace information for the data to the first memory device over a second channel.Type: GrantFiled: February 22, 2022Date of Patent: October 8, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Mihir Narendra Mody, Ankur Ankur, Vivek Vilas Dhande, Kedar Satish Chitnis, Niraj Nandan, Brijesh Jadav, Shyam Jagannathan, Prithvi Shankar Yeyyadi Anantha, Santhanakrishnan Narayanan Narayanan
-
Publication number: 20240294853Abstract: The present invention relates to mannanase variants. The present invention also relates to polynucleotides encoding the variants; nucleic acid constructs, vectors, and host cells comprising the polynucleotides; and methods of using the variants.Type: ApplicationFiled: May 16, 2024Publication date: September 5, 2024Applicant: Novozymes A/SInventors: Vivek Srivastava, Markus Klinger, Rakhi Saikia, Vijaya Shankar Nataraj, Sohel Dalal, Jens Erik Nielsen
-
Publication number: 20240164663Abstract: A patient handling device includes a frame for supporting a patient, a controller, and two alert lights which are activated when a controller detects an alert situation, such as, but not limited to, a patient exiting from the patient handling device. The controller is in communication with the alert lights and operable to monitor an integrated bed exit system. The alert lights are positioned adjacent the foot end corners of the frame and are viewable by a user positioned anywhere within a 270 degree section of a circle defined at the center of the patient handling device. The alert lights include one or more Light Emitting Diodes (LEDs).Type: ApplicationFiled: January 29, 2024Publication date: May 23, 2024Inventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Richard C. Mayoras, JR., Vivek Shankar
-
Patent number: 11883156Abstract: A patient handling device includes a frame for supporting a patient, a controller, and two alert lights which are activated when a controller detects an alert situation, such as, but not limited to, a patient exiting from the patient handling device. The controller is in communication with the alert lights and operable to monitor an integrated bed exit system. The alert lights are positioned adjacent the foot end corners of the frame and are viewable by a user positioned anywhere within a 270 degree section of a circle defined at the center of the patient handling device. The alert lights include one or more Light Emitting Diodes (LEDs).Type: GrantFiled: July 3, 2019Date of Patent: January 30, 2024Assignee: Stryker CorporationInventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Richard C. Mayoras, Jr., Vivek Shankar
-
Patent number: 11727133Abstract: Embodiments herein describe a pattern or syntax that can be used to convey or express the reason or purpose for a service provider to request user data in an identity federation. A service provider can request user data from the identity provider using an authentication process. If the authentication process is successful, the identity provider provides an authorization token to the service provider which it can use to retrieve the user data. The embodiments herein obtain user consent in the same authentication process used to provide the authorization token. In order to do so, the embodiments herein introduce a pattern or syntax that the service provider uses to convey the purpose for which it wants to use the user data to the identity provider.Type: GrantFiled: April 30, 2021Date of Patent: August 15, 2023Assignee: International Business Machines CorporationInventors: Vivek Shankar, Jose Angel Rodriguez, Weide Victor Soon, Adrian Rinaldi Sasmita
-
Publication number: 20230254353Abstract: A data processing system implements establishing a connection with an online communication platform using a first application to facilitate communication with the computing devices of participants to the online communication session, determining that presentation content includes embedded content comprising at least one embedded content item available from at least one content server, and obtaining embedded content information from a source of the presentation content on the data processing system.Type: ApplicationFiled: February 8, 2022Publication date: August 10, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Vivek SHANKAR, David Pierre CLAUX
-
Publication number: 20220350907Abstract: Embodiments herein describe a pattern or syntax that can be used to convey or express the reason or purpose for a service provider to request user data in an identity federation. A service provider can request user data from the identity provider using an authentication process. If the authentication process is successful, the identity provider provides an authorization token to the service provider which it can use to retrieve the user data. The embodiments herein obtain user consent in the same authentication process used to provide the authorization token. In order to do so, the embodiments herein introduce a pattern or syntax that the service provider uses to convey the purpose for which it wants to use the user data to the identity provider.Type: ApplicationFiled: April 30, 2021Publication date: November 3, 2022Inventors: Vivek SHANKAR, Jose Angel RODRIGUEZ, Weide Victor SOON, Adrian Rinaldi SASMITA
-
Patent number: 10791966Abstract: A patient handling device includes a deck for supporting a patient support surface, a controller, and two light sources, which are operable to output light of different colors. The controller is in communication with the light sources and operable to monitor the plurality of conditions and to generate a first unified indication by illuminating one of the lights when all the conditions remain in their desired state, and to generate a second indication by illuminating the other light when any of the conditions change from their desired state.Type: GrantFiled: September 17, 2014Date of Patent: October 6, 2020Assignee: Stryker CorporationInventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Vivek Shankar, Richard C. Mayoras, Jr.
-
Publication number: 20190320943Abstract: A patient handling device includes a frame for supporting a patient, a controller, and two alert lights which are activated when a controller detects an alert situation, such as, but not limited to, a patient exiting from the patient handling device. The controller is in communication with the alert lights and operable to monitor an integrated bed exit system. The alert lights are positioned adjacent the foot end corners of the frame and are viewable by a user positioned anywhere within a 270 degree section of a circle defined at the center of the patient handling device. The alert lights include one or more Light Emitting Diodes (LEDs).Type: ApplicationFiled: July 3, 2019Publication date: October 24, 2019Inventors: David Terrance Becker, Christopher John Hopper, Michael Joseph Hayes, Richard C. Mayoras, JR., Vivek Shankar
-
Patent number: 10320776Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.Type: GrantFiled: February 8, 2018Date of Patent: June 11, 2019Assignee: International Business Machines CorporationInventors: Codur S. Pranam, Vivek Shankar
-
Patent number: 10171455Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.Type: GrantFiled: February 8, 2018Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Codur S. Pranam, Vivek Shankar
-
Patent number: 10003959Abstract: Systems and methods for the subscriber identity module (SIM) access profile (SAP) over Bluetooth. In one embodiment, intermediate responses from a SIM card containing procedure bytes are not transmitted to the client, but rather the appropriate response is generated by the server and sent to the SIM card. In another embodiment, the client groups together multiple command APDUs (Application Protocol Data Unit) into one message before sending out to the server, and the message may also contain parameters indicating various actions to be taken by the server in case an error is generated. In another embodiment, the client instructs the server to perform poling of the SIM card in an autonomous manner for any proactive data. Embodiments are not limited to a SIM card, and are applicable to other types of smart cards, such as an UICC (Universal Integrated Circuit Card).Type: GrantFiled: July 30, 2015Date of Patent: June 19, 2018Assignee: QUALCOMM IncorporatedInventors: Michele Berionne, Vivek Shankar, Karthik Sekuru
-
Patent number: 9998455Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.Type: GrantFiled: July 25, 2017Date of Patent: June 12, 2018Assignee: International Business Machines CorporationInventors: Codur S. Pranam, Vivek Shankar
-
Publication number: 20180145965Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.Type: ApplicationFiled: February 8, 2018Publication date: May 24, 2018Inventors: Codur S. Pranam, Vivek Shankar
-
Publication number: 20180145966Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.Type: ApplicationFiled: February 8, 2018Publication date: May 24, 2018Inventors: Codur S. Pranam, Vivek Shankar
-
Patent number: 9917823Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.Type: GrantFiled: October 1, 2015Date of Patent: March 13, 2018Assignee: International Business Machines CorporationInventors: Kelvin K. V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo
-
Patent number: 9887990Abstract: A computer-implemented method, computer program product, and system for tagging and replacing tagged credentials with target credentials unknown to a client. The method includes; receiving an access request from a client to access a protected resource on a target server, injecting credential field tags into a credential form used to access the protected resource, auto-submitting the credential form on the client computer, replace tagged credentials with target credentials, submitting the target credentials to the target server, and updating the target credentials if the target credentials are invalid or expired without intervention by the client.Type: GrantFiled: April 25, 2016Date of Patent: February 6, 2018Assignee: International Business Machines CorporationInventors: Codur S. Pranam, Vivek Shankar
-
Publication number: 20170318009Abstract: Protecting application passwords using a secure proxy. A request is received by a proxy from a client to access a protected resource located on a target server. A secure session is initiated between the proxy and client. The access request is forwarded by the proxy to the target. A response is received from the target that is a credential form. The proxy server injects into each required credential field a credential field tag and is sent to the client computer. Target credentials mapped by the credential field tags are retrieved by the proxy server from a protected datastore. The form is completed and sent to the target. If the credentials are invalid, the target credentials are updated and stored in the protected data store without client computer intervention, and sent by the proxy server to the target. The client computer is then allowed to access the protected resource.Type: ApplicationFiled: July 25, 2017Publication date: November 2, 2017Inventors: Codur S. Pranam, Vivek Shankar
-
Publication number: 20170310659Abstract: A computer-implemented method, computer program product, and system for tagging and replacing tagged credentials with target credentials unknown to a client. The method includes; receiving an access request from a client to access a protected resource on a target server, injecting credential field tags into a credential form used to access the protected resource, auto-submitting the credential form on the client computer, replace tagged credentials with target credentials, submitting the target credentials to the target server, and updating the target credentials if the target credentials are invalid or expired without intervention by the client.Type: ApplicationFiled: April 25, 2016Publication date: October 26, 2017Inventors: Codur S. Pranam, Vivek Shankar
-
Patent number: 9628483Abstract: In an approach for providing auditable retrieval of privileged credentials in a privilege identity management (PIM) system, a processor invokes a checkout of a PIM credential, based on, at least, a determination that a PIM server cannot be accessed. A processor receives a request to access the PIM credential by a user. A processor receives validation of the request to access the PIM credential and an identity of the user. A processor retrieves the PIM credential from a database, wherein the database stores a plurality of PIM credentials owned by a system owner.Type: GrantFiled: October 26, 2016Date of Patent: April 18, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kelvin K. V. Chin, Chee Meng Low, Vivek Shankar, Edwin B. Soenaryo