Patents by Inventor Alexander Gantman
Alexander Gantman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11126586Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of calibrating a component. The method includes receiving previous calibration parameters for an external component at a secondary SoC from a primary SoC, wherein the secondary SoC is coupled to the external component and configured to calibrate the external component. The method further includes determining validity of the previous calibration parameters by the secondary SoC. The method further includes operating the external component by the secondary SoC based on the determined validity of the previous calibration parameters.Type: GrantFiled: April 1, 2020Date of Patent: September 21, 2021Assignee: QUALCOMM INCORPORATEDInventors: Dhamim Packer Ali, Sreenivasulu Reddy Chalamcharla, Ruchi Parekh, Daison Davis Koola, Dhaval Patel, Eric Taseski, Yanru Li, Alexander Gantman
-
Patent number: 11055402Abstract: A method is provided for safely executing dynamically generated code to avoid the possibility of an attack in unprotected memory space. Upon ascertaining that dynamically generated code is to be executed, a processing circuit and/or operating system kernel restrict the dynamically generated code to use a first memory region within an unprotected memory space, where the first memory region is distinct (e.g., reserved) from other memory regions used by other processes executed by the processing circuit. A first processing stack is maintained for the dynamically generated code within the first memory region. This first processing stack is separate from a general processing stack used by other processes executed by the processing circuit. A stack pointer is switched/pointed to the first processing stack when the dynamically generated code is executed and the stack pointer is switched/pointed to the general processing stack when the dynamically generated code ends.Type: GrantFiled: September 26, 2018Date of Patent: July 6, 2021Assignee: QUALCOMM IncorporatedInventors: Can Acar, Robert Turner, Alexander Gantman
-
Publication number: 20200257650Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of calibrating a component. The method includes receiving previous calibration parameters for an external component at a secondary SoC from a primary SoC, wherein the secondary SoC is coupled to the external component and configured to calibrate the external component. The method further includes determining validity of the previous calibration parameters by the secondary SoC. The method further includes operating the external component by the secondary SoC based on the determined validity of the previous calibration parameters.Type: ApplicationFiled: April 1, 2020Publication date: August 13, 2020Inventors: Dhamim PACKER ALI, Sreenivasulu Reddy CHALAMCHARLA, Ruchi PAREKH, Daison DAVIS KOOLA, Dhaval PATEL, Eric TASESKI, Yanru LI, Alexander GANTMAN
-
Patent number: 10642781Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of calibrating a component. The method includes receiving previous calibration parameters for an external component at a secondary SoC from a primary SoC, wherein the secondary SoC is coupled to the external component and configured to calibrate the external component. The method further includes determining validity of the previous calibration parameters by the secondary SoC. The method further includes operating the external component by the secondary SoC based on the determined validity of the previous calibration parameters.Type: GrantFiled: August 21, 2017Date of Patent: May 5, 2020Assignee: QUALCOMM IncorporatedInventors: Dhamim Packer Ali, Sreenivasulu Reddy Chalamcharla, Ruchi Parekh, Daison Davis Koola, Dhaval Patel, Eric Taseski, Yanru Li, Alexander Gantman
-
Publication number: 20190102540Abstract: A method is provided for safely executing dynamically generated code to avoid the possibility of an attack in unprotected memory space. Upon ascertaining that dynamically generated code is to be executed, a processing circuit and/or operating system kernel restrict the dynamically generated code to use a first memory region within an unprotected memory space, where the first memory region is distinct (e.g., reserved) from other memory regions used by other processes executed by the processing circuit. A first processing stack is maintained for the dynamically generated code within the first memory region. This first processing stack is separate from a general processing stack used by other processes executed by the processing circuit. A stack pointer is switched/pointed to the first processing stack when the dynamically generated code is executed and the stack pointer is switched/pointed to the general processing stack when the dynamically generated code ends.Type: ApplicationFiled: September 26, 2018Publication date: April 4, 2019Inventors: Can ACAR, Robert TURNER, Alexander GANTMAN
-
Publication number: 20180293204Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of calibrating a component. The method includes receiving previous calibration parameters for an external component at a secondary SoC from a primary SoC, wherein the secondary SoC is coupled to the external component and configured to calibrate the external component. The method further includes determining validity of the previous calibration parameters by the secondary SoC. The method further includes operating the external component by the secondary SoC based on the determined validity of the previous calibration parameters.Type: ApplicationFiled: August 21, 2017Publication date: October 11, 2018Inventors: Dhamim PACKER ALI, Sreenivasulu Reddy CHALAMCHARLA, Ruchi PAREKH, Daison DAVIS KOOLA, Dhaval PATEL, Eric TASESKI, Yanru LI, Alexander GANTMAN
-
Patent number: 9882722Abstract: A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes.Type: GrantFiled: August 12, 2014Date of Patent: January 30, 2018Assignee: QUALCOMM IncorporatedInventors: John Jozwiak, Gregory Gordon Rose, Alexander Gantman
-
Patent number: 9787695Abstract: A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is benign or non-benign. This may be accomplished via the server performing static and/or dynamic analysis operations, generating a behavior information structure that describes or characterizes the range of correct or expected behaviors of the software application, and sending the behavior information structure to a computing device. The computing device may compare the received behavior information structure to a locally generated behavior information structure to determining whether the observed behavior of the software application differs or deviates from the expected behavior of the software application or whether the observed behavior is within the range of expected behaviors. The computing device may increase its level of security/scrutiny when the behavior information structure does not match the local behavior information structure.Type: GrantFiled: March 24, 2015Date of Patent: October 10, 2017Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Rajarshi Gupta, Vinay Sridhara
-
Patent number: 9779798Abstract: Systems, methods, and computer programs for providing row tamper protection in a multi-bank memory cell array. One method comprises monitoring row activation activity for each of a plurality of banks in a multi-bank memory cell array. In response to monitoring the row activation activity, a row activation counter table is stored in a memory. The row activation counter table comprises a plurality of row address entries, each row address entry having a corresponding row activation counter. In response to detecting one of the plurality of row activation counters has exceeded a threshold indicating suspicious row tampering, the corresponding row address entry associated with the row activation counter exceeding the threshold is determined. A refresh operation is performed on one or more rows adjacent to the row address having the row activation counter exceeding the threshold.Type: GrantFiled: January 6, 2017Date of Patent: October 3, 2017Assignee: QUALCOMM IncorporatedInventors: Yanru Li, Dexter Chun, Jungwon Suh, Alexander Gantman
-
Patent number: 9697359Abstract: A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve a cryptographic operation over the software and a digital signature of the software. A verification tag may be generated for the software if authentication of the software is successful, the verification tag based on the software and at least a device-specific secret data. The verification tag may be stored within the device. Each subsequent time the software is loaded for execution it may be verified (not authenticated) by using the verification tag to confirm that the software being loaded is the same as the one used to generate the verification tag while avoiding authentication of the software.Type: GrantFiled: April 15, 2015Date of Patent: July 4, 2017Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, David Merrill Jacobson
-
Patent number: 9652362Abstract: Methods, and mobile devices implementing the methods, use application-specific and/or application-type specific classifier to improve the efficiency and performance of a comprehensive behavioral monitoring and analysis system predicting whether a software application is causing undesirable or performance depredating behavior. The application-specific and application-type specific classifier models may include a reduced and more focused subset of the decision nodes that are included in a full or more complete classifier model that may be received or generated in the mobile device. The locally generated application-specific and/or application-type specific classifier models may be used to perform real-time behavior monitoring and analysis operations by applying the application-based classifier models to a behavior/feature vector generated by monitoring mobile device behavior.Type: GrantFiled: April 23, 2014Date of Patent: May 16, 2017Assignee: QUALCOMM IncorporatedInventors: Rajarshi Gupta, Alexander Gantman, Vinay Sridhara
-
Publication number: 20170109090Abstract: Systems and methods are disclosed for providing memory channel interleaving with selective power or performance optimization. One such method comprises configuring a memory address map for two or more memory devices accessed via two or more respective memory channels. The memory address map comprises one or more interleaved blocks and a plurality of linear blocks. Each interleaved block comprises an interleaved address space for relatively higher performance tasks, and each linear block comprises a linear address space for relatively lower power tasks. A request is received from a process for a virtual memory page. The request comprises a preference for power savings or performance. If the preference is for power savings, the virtual memory page is mapped to a physical page in a concatenated linear block.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventors: DEXTER TAMIO CHUN, YANRU LI, ALEXANDER GANTMAN
-
Publication number: 20160313938Abstract: A way is provided to protect memory blocks from unauthorized access from executable instructions by defining various sets of instructions that are specifically bound to operate on defined memory blocks and inhibited from operating in other memory blocks. For instance, executable code may include a plurality of distinct read and write instructions where each read and/or write instruction is specific to one memory access tag from a plurality of different memory access tags. Memory blocks are also established and each memory block is associated with one of the plurality of different memory access tags. Consequently, if a first read and/or write instruction, associated with a first memory access tag, attempts to access a memory block associated with a different memory access tag, then execution of the first read and/or write instruction is inhibited or aborted.Type: ApplicationFiled: April 24, 2015Publication date: October 27, 2016Inventors: Alexander Gantman, Can Acar, Billy Brumley, Brian Rosenberg
-
Publication number: 20160306976Abstract: A first time software is loaded for execution by a device, the software stored in non-secure storage is authenticated. Authenticating the software may involve a cryptographic operation over the software and a digital signature of the software. A verification tag may be generated for the software if authentication of the software is successful, the verification tag based on the software and at least a device-specific secret data. The verification tag may be stored within the device. Each subsequent time the software is loaded for execution it may be verified (not authenticated) by using the verification tag to confirm that the software being loaded is the same as the one used to generate the verification tag while avoiding authentication of the software.Type: ApplicationFiled: April 15, 2015Publication date: October 20, 2016Inventors: Alexander Gantman, David Merrill Jacobson
-
Publication number: 20160285897Abstract: A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is benign or non-benign. This may be accomplished via the server performing static and/or dynamic analysis operations, generating a behavior information structure that describes or characterizes the range of correct or expected behaviors of the software application, and sending the behavior information structure to a computing device. The computing device may compare the received behavior information structure to a locally generated behavior information structure to determining whether the observed behavior of the software application differs or deviates from the expected behavior of the software application or whether the observed behavior is within the range of expected behaviors. The computing device may increase its level of security/scrutiny when the behavior information structure does not match the local behavior information structure.Type: ApplicationFiled: March 24, 2015Publication date: September 29, 2016Inventors: Alexander GANTMAN, Rajarshi GUPTA, Vinay SRIDHARA
-
Publication number: 20160267529Abstract: The embodiments include methods and systems for detecting advertising fraud in a computing device by monitoring information received in a receiver component of the computing device, monitoring information received in a render component of the computing device, comparing the information received in the receiver component to the information received in the render component to generate comparison results, using the comparison results to determine whether there are discrepancies between the received information and the rendered information, and performing fraud prevention operations in response to determine that there are discrepancies between the received information and the rendered information. The fraud prevention operations may include dropping a connection to cease receiving the information in the receiver component, sending negative or position feedback to the service provider or a security server, and performing other similar operations.Type: ApplicationFiled: March 9, 2015Publication date: September 15, 2016Inventors: Bjorn Marcus Jakobsson, Rajarshi Gupta, Alexander Gantman, Seyedhossein Siadati
-
Patent number: 9443255Abstract: A method, apparatus, and system are provided for implementing resource and/or location-based matching services between a wireless terminal (e.g., mobile phone) user and one or more resources. A novel infrastructure supports resource and/or location based matching services over a wireless network. A back-end system includes a database, server, and match engine that are configured match a user with one or more resources based on the user's characteristics, preferences, and/or location. Such resources include (1) other users, (2) targeted advertising, (3) businesses/networking opportunities, and/or (4) locate a nearby service or store. A flexible database architecture supports application-specific resources which facilitate the deployment of various matching services. Application developers are thus able to implement different resource-matching applications for wireless devices through a common back-end infrastructure.Type: GrantFiled: January 31, 2014Date of Patent: September 13, 2016Assignee: QUALCOMM IncorporatedInventors: Jack Steenstra, Alexander Gantman, Kirk S. Taylor, Liren Chen
-
Patent number: 9411765Abstract: Methods of using a peripheral component interconnect express (PCIe) device in a virtual environment are disclosed. Two operating systems operate on a primary device. One operating system acts as a guest in a virtual environment within the primary device. A peripheral device is coupled to the primary device through a wireless connection. In an exemplary embodiment, the wireless connection is a PCIe bridge. The host operating system interfaces directly with the memory elements and hardware of the primary device. The guest operating system interoperates with the memory elements and hardware of the peripheral device. The use of the PCIe wireless link allows the guest operating system to interface with the elements of the peripheral device with relatively little latency.Type: GrantFiled: December 20, 2013Date of Patent: August 9, 2016Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Yossef Tsfaty, Vladimir Kondratiev
-
Patent number: 9402156Abstract: A system and method for providing a location based service to create a social network, comprising activating a feature from a wireless terminal, registering from the wireless terminal with a location based service associated with the feature, creating a profile of a user of the feature, and displaying candidates based on the profile and based on the geographic location of the candidates. A Global Positioning System (GPS) may be used to geographically locate active users of a feature. An activity map may be associated with a feature, the activity map displaying active users of the feature.Type: GrantFiled: March 31, 2014Date of Patent: July 26, 2016Assignee: QUALCOMM IncorporatedInventors: Jack Steenstra, Kirk Steven Taylor, Liren Chen, Alexander Gantman
-
Publication number: 20160210160Abstract: A portable self-contained node computer is provided. The portable self-contained node computer connects to a host computer. The host computer allows the portable node computer to access its peripheral input/output devices.Type: ApplicationFiled: February 25, 2016Publication date: July 21, 2016Inventors: Alexander GANTMAN, Gregory ROSE, Jack STEENSTRA, Liren CHEN, Adam J. DREW