Patents by Inventor Yogesh K
Yogesh K has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240211591Abstract: Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.Type: ApplicationFiled: February 4, 2024Publication date: June 27, 2024Inventors: Anisha MAZUMDER, Haijun ZHAI, Daniel Lee MACE, Yogesh K. ROY, Seetharaman HARIKRISHNAN
-
Patent number: 11996254Abstract: A method comprises: forming a first metallization layer on a semiconductor die, the first metallization layer including a metal fuse; and forming a second metallization layer on the first metallization layer, in which the second metallization layer includes a thermal conductor spaced from the metal fuse, and the first metallization layer is between the second metallization layer and the semiconductor die.Type: GrantFiled: July 3, 2023Date of Patent: May 28, 2024Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Yogesh K. Ramadass, Ujwal Radhakrishna, Vinod Kuniganahalli Rai
-
Patent number: 11928207Abstract: Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.Type: GrantFiled: November 5, 2021Date of Patent: March 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Anisha Mazumder, Haijun Zhai, Daniel Lee Mace, Yogesh K. Roy, Seetharaman Harikrishnan
-
Publication number: 20240070270Abstract: A computer-implemented method of generating a security language query from a user input query includes receiving, at a computer system, an input security hunting user query indicating a user intention; selecting, using a trained machine learning model and based on the input security hunting query, an example user security hunting query and corresponding example security language query; generating, using the trained machine learning model, query metadata from the input security hunting query; generating a prompt, the prompt comprising: the input security hunting user query; the selected example user security hunting query and the corresponding example security language query; and the generated query metadata; inputting the prompt to a large language model; receiving a security language query from the large language model corresponding to the input security hunting query reflective of the user intention.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Daniel Lee MACE, William BLUM, Jeremias EICHELBAUM, Amir RUBIN, Edir V. GARCIA LAZO, Nihal Irmak PAKIS, Yogesh K. ROY, Jugal PARIKH, Peter A. BRYAN, Benjamin Elliott NICK, Ram Shankar Siva KUMAR
-
Publication number: 20230343539Abstract: A method comprises: forming a first metallization layer on a semiconductor die, the first metallization layer including a metal fuse; and forming a second metallization layer on the first metallization layer, in which the second metallization layer includes a thermal conductor spaced from the metal fuse, and the first metallization layer is between the second metallization layer and the semiconductor die.Type: ApplicationFiled: July 3, 2023Publication date: October 26, 2023Applicant: Texas Instruments IncorporatedInventors: Yogesh K. Ramadass, Ujwal Radhakrishna, Vinod Kuniganahalli Rai
-
Patent number: 11721510Abstract: An electronic device includes an input, an output, a metal fuse, a resistor, a heat control transistor, and a heat controller. The metal fuse is coupled between the input and the output. The resistor is coupled between the metal fuse and the heat control transistor. The heat control transistor is coupled between the resistor and a reference terminal of the electronic device, and the heat controller is configured to control a heater current of the heat control transistor.Type: GrantFiled: September 30, 2021Date of Patent: August 8, 2023Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Yogesh K. Ramadass, Ujwal Radhakrishna, Vinod Kuniganahalli Rai
-
Publication number: 20230134348Abstract: Various embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for performing predictive data analysis operations. For example, certain embodiments of the present invention utilize systems, methods, and computer program products that perform predictive data analysis operations by machine learning models that are trained using one or more filtered training entries that are selected from a plurality of candidate training entries in accordance with one or more optimal imbalance adjustment conditions, where the one or more optimal imbalance adjustment conditions that are selected from a plurality of candidate imbalance adjustment conditions in a manner that is configured to maximize a cumulative target score for the one or more optimal imbalance adjustment conditions while a cumulative non-target score for the one or more optimal imbalance adjustment conditions satisfies an upper cumulative non-target score threshold.Type: ApplicationFiled: November 2, 2021Publication date: May 4, 2023Inventors: Kartik Chaudhary, Ankit Varshney, Rajat Gupta, Snigdha Sree Borra, Yogesh K. Dagar
-
Publication number: 20230099861Abstract: An electronic device includes an input, an output, a metal fuse, a resistor, a heat control transistor, and a heat controller. The metal fuse is coupled between the input and the output. The resistor is coupled between the metal fuse and the heat control transistor. The heat control transistor is coupled between the resistor and a reference terminal of the electronic device, and the heat controller is configured to control a heater current of the heat control transistor.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Inventors: Yogesh K. Ramadass, Ujwal Radhakrishna, Vinod Kuniganahalli Rai
-
Publication number: 20230102103Abstract: Techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. A Bayesian network is initialized using an association graph to establish connections among network nodes in the Bayesian network. The network nodes are grouped among clusters that correspond to respective intents. Patterns in the Bayesian network are identified. At least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. Scores are assigned to the respective patterns in the Bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. An output graph is automatically generated. The output graph includes each pattern that has a score that is greater than or equal to a score threshold. Each pattern in the output graph represents a potential security threat.Type: ApplicationFiled: November 5, 2021Publication date: March 30, 2023Inventors: Anisha MAZUMDER, Haijun ZHAI, Daniel Lee MACE, Yogesh K. ROY, Seetharaman HARIKRISHNAN
-
Publication number: 20220415768Abstract: A semiconductor package includes a leadframe, a semiconductor die attached to the leadframe, and a passive component electrically connected to the semiconductor die through the leadframe. The leadframe includes a cavity in a side of the leadframe opposite the semiconductor die, and at least a portion of the passive component resides within the cavity in a stacked arrangement.Type: ApplicationFiled: August 30, 2022Publication date: December 29, 2022Inventors: Jeffrey MORRONI, Rajeev Dinkar JOSHI, Sreenivasan K. KODURI, Sujan Kundapur MANOHAR, Yogesh K. RAMADASS, Anindya PODDAR
-
Patent number: 11430722Abstract: A semiconductor package includes a leadframe, a semiconductor die attached to the leadframe, and a passive component electrically connected to the semiconductor die through the leadframe. The leadframe includes a cavity in a side of the leadframe opposite the semiconductor die, and at least a portion of the passive component resides within the cavity in a stacked arrangement.Type: GrantFiled: April 11, 2018Date of Patent: August 30, 2022Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Jeffrey Morroni, Rajeev Dinkar Joshi, Sreenivasan K. Koduri, Sujan Kundapur Manohar, Yogesh K. Ramadass, Anindya Poddar
-
Patent number: 11194910Abstract: Provided herein are methods, systems, and computer program products for intelligent detection of multistage attacks which may arise in computer environments. Embodiments herein leverage adaptive graph-based machine-learning solutions that can incorporate rules as well as supervised learning for detecting multistage attacks. Multistage attacks and attack chains may be detected or identified by collecting data representing events, detections, and behaviors, determining relationships among various data, and analyzing the data and associated relationships. A graph of events, detections, and behaviors which are connected by edges representing relationships between nodes of the graph may be constructed and then subgraphs of the possibly enormous initial graph may be identified which represent likely attacks.Type: GrantFiled: November 2, 2018Date of Patent: December 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Anisha Mazumder, Craig Henry Wittenberg, Daniel L. Mace, Haijun Zhai, Seetharaman Harikrishnan, Ram Shankar Siva Kumar, Yogesh K. Roy
-
Patent number: 11159551Abstract: The described technologies leverage a trained evaluation function to analyze an email message to determine if a password is included in the text of the email message. The text of the email message may be vectorized using a character lookup table including vector values for each ASCII character. The trained evaluation function analyzes the vectorized text to determine if a password is included in the text of the mail message. An email message found to include a password may be placed in a quarantine storage to at least temporality prevent the email message from being disseminated to a recipient.Type: GrantFiled: April 19, 2019Date of Patent: October 26, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Richard P. Lewis, Arvindnarayanan Ravi, Daniel L. Mace, Jordan Wesley Rogers, Manas George, Wing Kwong Wan, Yogesh K. Roy
-
Patent number: 10881445Abstract: Adapters for use with surgical systems including a surgical forceps, and a surgical clip; and methods for providing clip-applying functionality are disclosed. The adapter is releasably engagable with the end effector assembly of the surgical forceps. The surgical clip is releasably engagable with the adapter. With the surgical clip engaged with the adapter and the adapter engaged with the end effector assembly, the jaw members of the end effector assembly are configured to move from the spaced-apart position towards the approximated position to move the jaw bodies of the adapter towards one another to, in turn, urge the legs of the surgical clip towards one another to form the surgical clip.Type: GrantFiled: February 9, 2017Date of Patent: January 5, 2021Assignee: Covidien LPInventors: Amarsinh D. Jadhav, Yogesh K. Vikharankar
-
Publication number: 20200336501Abstract: The described technologies leverage a trained evaluation function to analyze an email message to determine if a password is included in the text of the email message. The text of the email message may be vectorized using a character lookup table including vector values for each ASCII character. The trained evaluation function analyzes the vectorized text to determine if a password is included in the text of the mail message. An email message found to include a password may be placed in a quarantine storage to at least temporality prevent the email message from being disseminated to a recipient.Type: ApplicationFiled: April 19, 2019Publication date: October 22, 2020Inventors: Richard P. LEWIS, Arvindnarayanan RAVI, Daniel L. MACE, Jordan Wesley ROGERS, Manas GEORGE, Wing Kwong WAN, Yogesh K. ROY
-
Patent number: 10734313Abstract: A semiconductor package includes a leadframe and a semiconductor die attached to the leadframe by way of solder posts. In a stacked arrangement, the package also includes a passive component disposed between the leadframe and the semiconductor die and electrically connected to the semiconductor die through the leadframe.Type: GrantFiled: April 11, 2018Date of Patent: August 4, 2020Assignee: TEXAS INSTRUMENTS INCORPORATEDInventors: Jeffrey Morroni, Rajeev Dinkar Joshi, Sreenivasan K. Koduri, Sujan Kundapur Manohar, Yogesh K. Ramadass, Anindya Poddar
-
Patent number: 10660665Abstract: A surgical instrument for cutting tissue includes a sleeve, a shaft slidably disposed within the sleeve and defining a longitudinal axis, and a plurality of legs coupled to the shaft and disposed about the longitudinal axis. Each leg has a blade attached to an end portion thereof and each blade defines a cutting edge. The shaft is slidable relative to the sleeve between a collapsed configuration, wherein the legs are disposed within the sleeve, and an expanded configuration, wherein the legs extend distally and radially outwardly from the sleeve. In the expanded configuration, the cutting edge of each blade is disposed in a proximally-facing orientation. Alternatively, the shaft is rotatable relative to the sleeve to rotate the legs about the longitudinal axis, thereby rotating each blade through a circular cutting path defining a different diameter. Methods of cutting tissue are also provided.Type: GrantFiled: July 10, 2017Date of Patent: May 26, 2020Assignee: Covidien LPInventors: Yogesh K. Vikharankar, Jeevan Maddur Shankarsetty
-
Patent number: D901547Type: GrantFiled: May 30, 2019Date of Patent: November 10, 2020Assignee: DEERE & COMPANYInventors: Abhijit Gade, Piyush Choudhary, Arlyn Wilcox, Yogesh K, Saurabh Gaur
-
Patent number: D912102Type: GrantFiled: May 30, 2019Date of Patent: March 2, 2021Assignee: DEERE & COMPANYInventors: Abhijit Gade, Piyush Choudhary, Arlyn Wilcox, Yogesh K
-
Patent number: D1069848Type: GrantFiled: June 13, 2023Date of Patent: April 8, 2025Assignee: DEERE & COMPANYInventors: Brian L. Andersen, Yogesh K, Lee Bot, Charles N. Warren, Ryan G. Brown, Samair M. Mahadik