Gaurav Mathur - Mountain View CA, US Tom Moss - Los Altos CA, US Michael Chan - San Francisco CA, US
Assignee:
THREE LAWS MOBILITY, INC. - Mountain View CA
International Classification:
G06F 15/16
US Classification:
709206, 709229
Abstract:
Systems and methods are provided for regulating access to resources at application run-time. A permissions application is invoked. The permissions application accesses an information store comprising a plurality of permissions. Each such permission is associated with a corresponding resource in a plurality of device resources. The information store specifies which applications have permission to access which device resources. An application is executed on the device and makes a request for a resource while the application is executing. Responsive to the request, the permissions application determines whether the application has run-time access permission to use the resource. When the application has run-time access permission to use the resource, it is granted run-time access to the resource. When the application does not have run-time access permission to use the resource, it is not granted run-time access to the resource but is permitted to continue executing on the device without the requested resource.
- Alameda CA, US Seppo Helava - Oakland CA, US Gaurav Mathur - Alameda CA, US David Hill - Alameda CA, US Albert Hing-Yin Chen - Alameda CA, US Joseph White - Alameda CA, US
International Classification:
A63B 71/06 G06F 3/01 A63B 24/00 G16H 20/30
Abstract:
A system and method for facilitating physical therapy that may include a wearable display, wearable sensors disposed at varying positions on a user, a processor comprising executable instructions configured to provide a virtual reality environment, virtual characters, and therapeutic activities on the wearable display, wherein the virtual characters interact with the user to provide at least form feedback and positive reinforcement. A new instance of the virtual reality environment, with identifiable differences, may be generated in response to a measured completion or partial completion of a therapeutic activity. Changes in the virtual reality environment may offer users continued indications of progression throughout the duration of a physical therapy program. The system may include a connectable device comprising a display that duplicates a portion of the wearable displays image, enables interaction within the virtual reality environment, and allows for the selection and modification of therapeutic activities.
Identifying Unverified Application Behavior In A Computing Environment
- Mountain View CA, US Gaurav Mathur - Palo Alto CA, US Richard Spillane - Mountain View CA, US Gordon Chaffee - Hillsborough CA, US
International Classification:
H04L 29/06
Abstract:
Systems, methods, and software provided herein identify unverified behavior in an application component environment. In one example, a method of operating a collection service includes receiving communication data for a plurality of application components and generating a baseline set of communication interactions for the application component environment based on the communication data. The method further includes receiving additional communication data for the application components and generating a second set of communication interactions for the application component environment based on the communication data. The method also provides identifying a differential set of communication interactions by comparing the baseline set and the second set of communication interactions.
Behavior Data Management In An Application Component Environment
- Mountain View CA, US Gaurav Mathur - Palo Alto CA, US Richard Spillane - Mountain View CA, US Gordon Chaffee - Hillsborough CA, US
International Classification:
H04L 29/06 H04L 12/26 G06F 17/30
Abstract:
Systems, methods, and software provided herein manage behavioral data for application components in a computing environment. In one example, a method of operating collection service includes receiving behavior reports for application containers in a computing environment. Once received, behavioral data in the behavior reports is stored in a tree data structure, wherein the tree data structure includes nodes for various time periods. Once the behavioral data is stored, a request may be generated for a portion of the behavioral data over a defined time period. In response to the request, a response summary may be generated based on the tree data structure and the defined time period.
- Mountain View CA, US Gaurav Mathur - Palo Alto CA, US
International Classification:
G06F 21/62 G06F 21/60
Abstract:
Systems, methods, and software described herein provide security preferences to application containers executing independently on a host computing system. In one example, a method of operating a management service to manage security preferences for containerized applications includes receiving an initiation request from a security module in an application container. The method further provides, responsive to the request, identifying configuration parameters for the application container, the configuration parameters corresponding to unique security preferences based on one or more applications in the application container, and transferring the configuration parameters to the application container.
Real-Time Tracking And Visibility Into Application Communications And Component Interactions
- Mountain View CA, US Gaurav Mathur - Palo Alto CA, US Richard Spillane - Mountain View CA, US Gordon Chaffee - Hillsborough CA, US
International Classification:
H04L 12/26 H04L 29/06
Abstract:
Systems, methods, and software provided herein generate a visual representation of communication between application components. In one example, a method of operating a method of operating a collection service system includes receiving a plurality of communication reports representing communications for application components, and storing the communication data from the plurality of communication reports in one or more data structures. The method further provides identifying administrator defined display parameters for the communication data, and generating a visual representation of the application components based on the display parameters and the one or more data structures.
Management Of Encryption Keys In An Application Container Environment
- Mountain View CA, US Gaurav Mathur - Palo Alto CA, US Richard Spillane - Mountain View CA, US Gordon Chaffee - Hillsborough CA, US
International Classification:
G06F 21/60 H04L 9/14
Abstract:
Systems, methods, and software to manage encryption keys in an application container environment are provided. In one example, a method of managing encryption keys comprises identifying a plurality of data objects to encrypt and encrypting the plurality of data objects via a plurality of encryption keys. The method further provides generating supplemental data for each data object, wherein the supplemental data for each data object comprises a key identifier that corresponds to an encryption key used to encrypt each data object. The method further includes associating the supplemental data for each data object with the encrypted version of each data object, and organizing the key identifiers from the plurality of data objects into a data structure with the plurality of encryption keys.
Medicine Doctors
Dr. Gaurav Mathur, Oakland CA - MD (Doctor of Medicine)
Vitas Healthcare Corporation Home Health Care Services
39899 Balentine Dr, Newark, CA 94560 670 N Mccarthy Blcvd 220, Milpitas, CA 95035 (510)4389602
Gaurav Mathur Chief Technology Officer
THREE LAWS MOBILITY, INC Custom Computer Programing
222 W Merchandise Mart Plz, Chicago, IL 60654 2035 Landings Dr, Mountain View, CA 94043 1755 Embarcadero Rd, Palo Alto, CA 94303 600 N Us Hwy 45, Green Oaks, IL 60048
University of Texas System, Austin Degree - BS - Bachelor of Science - Chemical Engineering Northwestern University School of Law Degree - JD - Juris Doctor - Law
Chicago Parsippany, New Jersey Atlanta, Georgia Pune Kolkata Kota Jalandhar Chennai Mumbai Manipal
Work:
Sears Holdings Management Corporation - Sr. Business Analyst (2013) Cognizant Business Consulting - Social Media Analyst, Lead Consultant (2011-2013)
Education:
T.A Pai Management Institute, Manipal - MBA, National Institute of Technology Jalandhar - Bachelors - Engineering
Gaurav Mathur
Work:
Orange Business Services - Team Lead (2006) Affiliated Computer Services (Xerox) - Infrastructure Management Specialist (2005-2005) Patni Computer Systems - Lead Network Analyst (2003-2005)
Education:
Bachelors in Information Technology - IT
Gaurav Mathur
Work:
Accenture - Team Lead (2005)
Education:
Saint Anselm School - Computer
Tagline:
Hi
Gaurav Mathur
Work:
Accenture (2010)
Education:
Jaypee Institute of Information Technology
Gaurav Mathur
Work:
Ajegroup - SALES OFFICER
Education:
INDIRA INSTITUTE OF MANAGEMENT - MARKETING
Tagline:
M COOL PERSON .....
Gaurav Mathur
Education:
AIT - Ece
Tagline:
Dream like you will live forever, live like you will die today
She also said that 3LM's ownership was "absolutely" a factor in Google's decision to acquire Motorola Mobility. Motorola Mobility bought 3LM in February. 3LM was founded by Tom Moss and Gaurav Mathur, who had been part of Google's Android development team.