Patents by Inventor Hemal Shah

Hemal Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080172482
    Abstract: Certain aspects of a method and system for light-weight simple object access protocol (SOAP) transport for web services based management are disclosed. Aspects of a method may include managing a system using a simple object access protocol (SOAP) message that is mapped over one or both of: a remote management and control protocol (RMCP) and a RMCP security extensions protocol (RSP) to enable remote management of systems using Web services in out-of-band (OOB) management devices.
    Type: Application
    Filed: January 12, 2007
    Publication date: July 17, 2008
    Inventor: Hemal Shah
  • Publication number: 20080109545
    Abstract: A management device may determine the presence of WS-Management services in a network device, and may discover capabilities of discovered WS-Management services in the network device. The management device may determine the presence of the WS-Management services utilizing a unicast ping mechanism in instances where the MAC and/or IP address of the network device may be known or a broadcast ping mechanism may be utilized in instances when the MAC and/or IP address is unknown. The discovery of capabilities of the WS-Management services may be performed via direct communication between the devices, and may utilize WS-Management based messaging. The direct communication may utilize specific HTTP ports when utilizing WS-Management based messaging. Where WS-Management and ASF services may coexist in the network device, the management device may additionally perform discovery of capabilities of ASF services, and may utilize ASF based messaging to perform discovery of capabilities of discovered ASF services.
    Type: Application
    Filed: November 1, 2007
    Publication date: May 8, 2008
    Inventor: Hemal Shah
  • Publication number: 20070130624
    Abstract: Certain aspects of a method and system for securing an operating system are disclosed. Aspects of one method may include receiving quarantine information of an operating system prior to booting the operating system. A quarantine mechanism may be enforced based on the received quarantine information prior to booting the operating system. At the time of boot up, the pre-OS quarantine agent may provide quarantine information to the quarantine server. The quarantine server may provide quarantine related information such as OS image to boot and network resources that may be accessed by the pre-OS quarantine agent. The pre-OS quarantine agent may perform the loading of the OS image based on the health and response from the quarantine server.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 7, 2007
    Inventors: Hemal Shah, Uri El Zur
  • Publication number: 20060235999
    Abstract: Provided are techniques for writing doorbell information. In accordance with certain techniques, one or more protection domains are created. One or more data structures are created, wherein each of the data structures is associated with at least one protection domain. One of the data structures is updated. A doorbell structure address for a doorbell structure associated with the updated data structure is computed. Doorbell information is written at the computed doorbell structure address. In accordance with certain other techniques, doorbell information is received. A doorbell structure address is decoded from the doorbell information. A first protection domain identifier is determined from the doorbell structure address. A resource context of a data structure is determined from the doorbell information. The resource context at the doorbell address is read to determine a second protection domain identifier.
    Type: Application
    Filed: April 15, 2005
    Publication date: October 19, 2006
    Inventors: Hemal Shah, Gary Tsao, Arturo Arizpe, Ali Oztaskin
  • Publication number: 20060235977
    Abstract: Input/Output (I/O) protocol operations such as iSCSI protocol operations may be selectively offloaded to an I/O protocol offload device, or retained by a host driver software. In one embodiment, iSCSI data transfer functions are offloaded to an offload device while session and connection establishing and maintenance operations are retained by host driver software. Other features are described and claimed.
    Type: Application
    Filed: April 15, 2005
    Publication date: October 19, 2006
    Inventors: Mark Wunderlich, Hemal Shah, Anshuman Thakur, Daniel Manseau
  • Publication number: 20060146814
    Abstract: A network controller generates a remote direct memory access segment. In one embodiment, the controller generates an RDMA segment including an RDMA header, markers, and message segment data obtained in a direct memory access operation. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2004
    Publication date: July 6, 2006
    Inventors: Hemal Shah, Ashish Choubal
  • Publication number: 20060133396
    Abstract: In one embodiment, a method is provided. The method of this embodiment provides determining if a management queue can be created, and if a management queue can be created, allocating virtually contiguous memory to a management queue associated with a device, registering the management queue, and creating a management queue context.
    Type: Application
    Filed: December 20, 2004
    Publication date: June 22, 2006
    Inventors: Hemal Shah, Gary Tsao, Arturo Arizpe, Scott Hahn, Ali Oztaskin, Greg Cummings, Ellen Deleganes
  • Publication number: 20060136697
    Abstract: Provided are a method, system, and program for updating a cache in which, in one aspect of the description provided herein, changes to data structure entries in the cache are selectively written back to the source data structure table maintained in the host memory. In one embodiment, translation and protection table (TPT) contents of an identified cache entry are written to a source TPT in host memory as a function of an identified state transition of the cache entry in connection with a memory operation and the memory operation. Other embodiments are described and claimed.
    Type: Application
    Filed: December 16, 2004
    Publication date: June 22, 2006
    Inventors: Gary Tsao, Hemal Shah, Arturo Arizpe
  • Publication number: 20060123130
    Abstract: Proxy nodes perform TCP/IP processing on behalf of application nodes, utilize lightweight protocols to communicate with application nodes, and communicate with network nodes and network clients using Transmission Control Protocol/Internet Protocol (TCP/IP).
    Type: Application
    Filed: January 24, 2006
    Publication date: June 8, 2006
    Inventors: Hemal Shah, Greg Regnier, Annie Foong
  • Publication number: 20060072564
    Abstract: In one embodiment, a method is provided. The method of this embodiment provides storing a packet header at a set of at least one page of memory allocated to storing packet headers, and storing the packet header and a packet payload at a location not in the set of at least one page of memory allocated to storing packet headers.
    Type: Application
    Filed: May 26, 2005
    Publication date: April 6, 2006
    Inventors: Linden Cornett, David Minturn, Sujoy Sen, Hemal Shah, Anshuman Thakur, Gary Tsao, Anil Vasudevan
  • Publication number: 20060004983
    Abstract: Provided are a method, system, and program for managing memory options for a device such as an I/O device. Private addresses provided by logic blocks within the device may be transparently routed to either an optional external memory or to system memory, depending upon which of the optional memories the private address has been mapped.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Gary Tsao, Quang Le, Ashish Choubal, Hemal Shah
  • Publication number: 20060004795
    Abstract: Provided are a method, system, and program for utilizing a virtualized data structure table such as an address translation and protection table (TPT), for example, in an I/O device. The virtualized data structure table has virtually contiguous data structures but not necessarily physically contiguous data structures in system memory. The data structure table may be accessed in a virtually contiguous manner. In the illustrated embodiment, the table is subdivided at a first hierarchal level into a plurality of virtually contiguous units or segments. Each unit or segment is in turn subdivided at a second hierarchal level into a plurality of virtually contiguous subunits, subsegments, pages or blocks. Each page or block is in turn subdivided at a third hierarchal level into a plurality of physically contiguous table entries.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Hemal Shah, Ali Oztaskin
  • Publication number: 20060004941
    Abstract: Provided are a method, system, and program for caching a virtualized data structure table. In one embodiment, an input/output (I/O) device has a cache subsystem for a data structure table which has been virtualized. As a consequence, the data structure table cache may be addressed using a virtual address or index. For example, a network adapter may maintain an address translation and protection table (TPT) which has virtually contiguous data structures but not necessarily physically contiguous data structures in system memory. TPT entries may be stored in a cache and addressed using a virtual address or index. Mapping tables may be stored in the cache as well and addressed using a virtual address or index.
    Type: Application
    Filed: June 30, 2004
    Publication date: January 5, 2006
    Inventors: Hemal Shah, Ashish Choubal, Gary Tsao, Arturo Arizpe, Sarita Saraswat
  • Publication number: 20050251676
    Abstract: A card receives data encoded in a protocol. The data may be divided into packets, or still in a protocol data unit. If still in a protocol data unit, the card divides the data into packets of appropriate size. Digests appropriate to the protocol are computed and inserted into the packets. Checksums are generated for the packets that need them, such as the packet now including the digest. The packets may then be transmitted to a recipient.
    Type: Application
    Filed: May 5, 2004
    Publication date: November 10, 2005
    Applicant: Intel Corporation
    Inventors: Hemal Shah, David Matheny, Jeff Zachem
  • Publication number: 20050232298
    Abstract: A network offload engine having a first buffer to store packet payloads that are received at the network offload engine until being copied to a location in a receive buffer of a host memory. An engine is programmed to copy contents of the first buffer to the location in the receive buffer of the host memory in response to meeting a first precondition. Host notification of the copy is postponed until a second precondition is met. Other embodiments are also described.
    Type: Application
    Filed: April 19, 2004
    Publication date: October 20, 2005
    Inventors: Harlan Beverly, Hemal Shah
  • Publication number: 20050228920
    Abstract: Provided are techniques for interrupt processing. An Input/Output device determines that an event has occurred. The Input/Output device determines a state of an event data structure. The Input/Output device writes an event entry into the event data structure in response to determining that the event has occurred. After writing the event entry, the Input/Output device determines whether to generate an interrupt or not based on the state of the event data structure. Additionally provided are techniques for interrupt processing in which an I/O device driver determines that an interrupt has occurred. The I/O device driver reads an event entry in an event data structure in response to determining that the interrupt has occurred. The I/O device driver updates a state of a structure state indicator to enable/disable interrupts.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 13, 2005
    Inventors: Hemal Shah, Gary Tsao, Ali Oztaskin
  • Publication number: 20050228922
    Abstract: Provided are techniques for interrupt processing. An Input/Output device determines that an event has occurred. The Input/Output device determines a processor identifier and determines an event data structure identifier for an event data structure into which data for the event is stored using the processor identifier. The Input/Output device also determines a vector identifier for an interrupt message vector into which an interrupt message for the event is written. Then, interrupt message data is written to the interrupt message vector to generate an interrupt.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 13, 2005
    Inventors: Gary Tsao, Hemal Shah, Gregory Cummings
  • Publication number: 20050216597
    Abstract: A method and system for transmitting packets. Packets may be transmitted when a protocol control block is copied from a host processing system to a network protocol offload engine. Message information that contains packet payload addresses may be provided to the network protocol offload engine to generate a plurality of message contexts in the offload engine. With the message contexts, protocol processing may be performed at the offload engine while leaving the packet payload in the host memory. Thus, packet payloads may be transmitted directly from the host memory to a network communication link during transmission of the packets by the offload engine. Other embodiments are also described.
    Type: Application
    Filed: March 24, 2004
    Publication date: September 29, 2005
    Inventors: Hemal Shah, Gary Tsao, Ashish Choubal, Harlan Beverly, Christopher Foulds
  • Publication number: 20030212624
    Abstract: This invention applies the concept of time-sharing to help fill the needs of industry for a pool of highly skilled individuals at a more affordable rate then if they were required to maintain a sufficient skilled workforce for projects that evolve out of a highly dynamic environment. Simply stated individuals with the skill sets needed by business and industry would contract with the provider and be placed in the Time Share Skills (TSS) database system. Business and Industry would buy or place an order from the Time Share Skills (TSS) provider the projected needed skills for a time in the future at a rate that would be significantly less then if they had to hire and develop the projected work force for projects.
    Type: Application
    Filed: May 8, 2002
    Publication date: November 13, 2003
    Inventors: Sundeep Sanghavi, Hemal Shah