Patents by Inventor Atul Kabra
Atul Kabra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11863170Abstract: An equalizer circuit includes: a main stage circuit including: a main stage differential pair; and a main stage degeneration resistance; a replica stage circuit including: a replica stage differential pair matching the main stage differential pair; and a replica stage degeneration resistance matching the main stage degeneration resistance and disconnected from the replica stage differential pair; equalizer inputs connected to: gate electrodes of the main stage differential pair; and gate electrodes of the replica stage differential pair; and equalizer outputs connected to: a main stage positive output and a main stage negative output connected to drain electrodes of the main stage differential pair; and a replica stage positive output and a replica stage negative output connected to drain electrodes of the replica stage differential pair, the replica stage positive output connected to the main stage negative output and the replica stage negative output connected to the main stage positive output.Type: GrantFiled: July 21, 2022Date of Patent: January 2, 2024Assignee: SYNOPSYS, INC.Inventors: Jayesh Wadekar, Jairaj Naik K R, Atul Kabra
-
Publication number: 20230042967Abstract: An inductor structure includes a first inductor and a second inductor. A first portion of the first inductor is disposed on a first layer and a second portion of the first inductor is disposed on a second layer. A first portion of the second inductor is disposed on the first layer and a second portion of the second inductor is disposed on the second layer. The first portion of the first inductor and the second portion of the second inductor at least partially overlap. The second portion of the first inductor and the first portion of the second inductor at least partially overlap.Type: ApplicationFiled: July 28, 2022Publication date: February 9, 2023Inventors: Jayesh WADEKAR, Jayashankar MV, Jairaj NAIK K R, Atul KABRA
-
Patent number: 11314859Abstract: According to one embodiment, a method detecting and mitigating a privilege escalation attack on an electronic device is described. The method involves operations by a user agent mode operating within a user space and a kernel driver mode operating within a kernel space. The kernel driver mode, in response to detecting an initial activation of a process being monitored, stores metadata associated with an access token. This metadata includes the initial token state information. Responsive to detecting an event associated with the process being monitored, the kernel mode driver extracts a portion of current state information for the access token for comparison to a portion of the stored token state information. Differences between content within the current state information and the stored token state information are used, at least in part, by the user agent mode to detect a privilege escalation attack.Type: GrantFiled: March 14, 2019Date of Patent: April 26, 2022Assignee: FireEye Security Holdings, Inc.Inventors: Japneet Singh, Ratnesh Pandey, Atul Kabra
-
Patent number: 11270015Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: GrantFiled: July 10, 2019Date of Patent: March 8, 2022Assignee: McAfee, LLCInventors: Atul Kabra, Michael Hughes, John D. Teddy
-
Publication number: 20190332794Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: ApplicationFiled: July 10, 2019Publication date: October 31, 2019Applicant: McAfee, LLCInventors: Atul Kabra, Michael Hughes, John D. Teddy
-
Patent number: 10360398Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: GrantFiled: June 6, 2017Date of Patent: July 23, 2019Assignee: McAfee, LLCInventors: Atul Kabra, Michael Hughes, John Teddy
-
Patent number: 10033759Abstract: A computing device is described that comprises one or more hardware processors and a memory communicatively coupled to the one or more hardware processors. The memory comprises software that, when executed by the processors, operates as (i) a virtual machine and (ii) a hypervisor. The virtual machine includes a guest kernel that facilitates communications between a guest application being processed within the virtual machine and one or more virtual resources. The hypervisor configures a portion of the guest kernel to intercept a system call from the guest application and redirect information associated with the system call to the hypervisor. The hypervisor enables logic within the guest kernel to analyze information associated with the system call to determine whether the system call is associated with a malicious attack in response to the system call being initiated during a memory page execution cycle.Type: GrantFiled: June 29, 2016Date of Patent: July 24, 2018Assignee: FireEye, Inc.Inventors: Atul Kabra, Julian Stecklina, Hirendra Rathor, Udo Steinberg
-
Publication number: 20180089457Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: ApplicationFiled: June 6, 2017Publication date: March 29, 2018Inventors: Atul Kabra, Michael Hughes, John Teddy
-
Patent number: 9787522Abstract: A computer of a data processing system includes a software encryption engine and path circuitry that initially provides one or more paths for conveying data of storage I/O requests to and from a storage device, the paths including an encrypting path having a hardware encrypting component. According to a failover technique, in a first operating state, (a) the data of the storage I/O requests is conveyed via the encrypting path with encryption and decryption of the data being performed by the hardware encrypting component, and (b) monitoring is performed for occurrence of an event indicating that the hardware encrypting component has become unavailable for encrypting and decrypting the data of the storage I/O requests.Type: GrantFiled: June 29, 2011Date of Patent: October 10, 2017Assignee: EMC IP Holding Company LLCInventors: Cesareo Contreras, Atul Kabra, Michael E. Bappe, Edith Epstein, Helen S. Raizen, Alexander Elpaev
-
Patent number: 9672374Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: GrantFiled: June 28, 2013Date of Patent: June 6, 2017Assignee: McAfee, Inc.Inventors: Atul Kabra, Michael Hughes, John Teddy
-
Patent number: 9160526Abstract: A method performed in a device is provided. The method includes (a) receiving key identification information from a key controller module on an external host, (b) obtaining a key identified by the key identification information from an external key server, (c) decrypting encrypted data from an encrypted storage system using the key, and (d) processing the decrypted data. A corresponding computer program product is also provided.Type: GrantFiled: May 22, 2013Date of Patent: October 13, 2015Assignee: EMC CorporationInventors: Helen Raizen, Michael Emerald Bappe, Edith Epstein, Atul Kabra, Cesareo Contreras, Assaf Natanzon, Harold Martin Sandstrom
-
Publication number: 20140310800Abstract: A request is received from a security tool, the request relating to an event involving data records in a storage device. An application programming interface (API) is used to interface with secure storage functionality of the storage device, the secure storage functionality enabling a set of secure storage operations. A security operation is caused to be performed at the storage device involving the data records based at least in part on the request. In one aspect, the set of secure storage operations can include a direct read operation, a direct write operation, a copy-on-write operation, and a save-attempted-write operation.Type: ApplicationFiled: June 28, 2013Publication date: October 16, 2014Inventors: Atul Kabra, Michael Hughes, John Teddy
-
Patent number: 8826041Abstract: A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and cooperate with a particular protocol. Along these lines, functional components engage in an in-band communications protocol, such as a data encryption key (DEK) management protocol. The in-band communications protocol employs protocol commands and responses carried along the data path as contents of in-band transport messages and responses, such as special SCSI read commands and their responses. The protocol commands and responses include a handshake command and a handshake response used during an initial handshake operation. Each protocol command and response has a protocol signature field carrying one of distinct first and second signature values which are used to identify the presence of the protocol command or response in the transport messages and responses at different locations along the data path.Type: GrantFiled: March 30, 2011Date of Patent: September 2, 2014Assignee: EMC CorporationInventors: Cesareo Contreras, Atul Kabra, Michael E. Bappe, Edith Epstein, Helen S. Raizen
-
Patent number: 8798262Abstract: An encryption endpoint (EE) receives, via a storage I/O stack (having a key controller module (KCM)), encryption metadata identifying an encryption key and a set of region entries. Each region entry includes an identification of a region within a storage device subject to encryption with the encryption key and an identification of a correlation between the region and a corresponding region on a logical volume (LV) managed by the KCM. The EE receives, via the stack, a storage command to process a block having a first address on the storage device. It corresponds to a second address located within the corresponding region of the LV. The EE determines the second address within the LV and then cryptographically processes the block using an address-dependent cryptographic algorithm and (a) data of the block, (b) the determined second address, and (c) the encryption key.Type: GrantFiled: December 23, 2010Date of Patent: August 5, 2014Assignee: EMC CorporationInventors: Helen Raizen, Atul Kabra
-
Patent number: 8751828Abstract: A host in an encrypted data storage system sends encryption metadata associated with an encrypted logical volume (LV) from a key controller module to an encryption endpoint via a storage I/O stack. The encryption metadata identifies an encryption key and encrypted regions of the LV, and the sending results in establishment of one or more shared associations between the key controller module and the encryption endpoint which associates the encrypted LV with the encryption metadata for the encrypted LV. A data storage operation is performed on the encrypted LV by sending a data storage command from the key controller module to an encrypted region of the encryption endpoint via the storage I/O stack. The encryption endpoint uses the encryption metadata associated with the encrypted LV to cryptographically process data of the data storage operation.Type: GrantFiled: December 23, 2010Date of Patent: June 10, 2014Assignee: EMC CorporationInventors: Helen Raizen, Michael Emerald Bappe, Edith Epstein, Atul Kabra, Cesareo Contreras, Assaf Natanzon, Harold Martin Sandstrom
-
Patent number: 8190784Abstract: An in-band protocol transport carries command-response protocol communications between first and second functional components of a storage input/output (I/O) interface stack, for example to control encryption-related processing of storage I/O commands. A storage read command used as a protocol transport message has protocol data in a read data buffer, and predetermined read address information, such as a prime-numbered starting block address and a small, odd-valued length value, unlikely to occur in normal (non-transport) storage read commands. The second functional component determines that the storage read command contains the predetermined read address information, indicating that the storage read command is a protocol transport message rather than a normal read. For greater confidence, it also determines that the protocol data in the read data buffer includes protocol identification data such as a protocol signature.Type: GrantFiled: March 30, 2011Date of Patent: May 29, 2012Assignee: EMC CorporationInventors: Helen S. Raizen, Michael E. Bappe, Edith Epstein, Atul Kabra, Cesareo Contreras, Xunce Zhou