Patents by Inventor Anurag Verma
Anurag Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11829700Abstract: A method includes clustering cells in a group of cells into a selected number of clusters, and ranking the clusters based on a list of prioritized features to generate a list of ranked clusters. The method also includes ranking cells in each of one or more ranked clusters in the list of ranked clusters, based on the list of prioritized features, to generate a list of ranked critical cells. The method further includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.Type: GrantFiled: March 9, 2022Date of Patent: November 28, 2023Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.Inventors: Anurag Verma, Meng-Kai Hsu, Chih-Wei Chang
-
Publication number: 20230259686Abstract: A semiconductor device, method, and system of arranging patterns of the same are provided. The method includes generating a plurality of gate patterns and conductive patterns, wherein each of the plurality of gate patterns and conductive patterns is located at a first horizontal level and extends along a first direction. The method also includes selecting one of the gate patterns as an input pin or one of the conductive patterns as an output pin. The method further includes generating, based on a selected gate pattern or a selected conductive pattern, a plurality of metallization patterns. Each of the plurality of metallization patterns is located at a second horizontal level overlying the first horizontal level and extends along a second direction substantially perpendicular to the first direction.Type: ApplicationFiled: February 17, 2022Publication date: August 17, 2023Inventors: ANURAG VERMA, MENG-KAI HSU, JOHNNY CHIAHAO LI, SHENG-HSIUNG CHEN, CHENG-YU LIN, HUI-ZHONG ZHUANG, JERRY CHANG JUI KAO
-
Publication number: 20230237235Abstract: An integrated circuit includes a first circuit cell having a first width and a second circuit cell having a second width that is wider than the first width by at least one contacted poly pitch. An equivalent circuit of the first circuit cell is the same as an equivalent circuit of the second circuit cell.Type: ApplicationFiled: June 15, 2022Publication date: July 27, 2023Inventors: Anurag VERMA, Meng-Kai HSU, ChiWei HU
-
Publication number: 20230222278Abstract: The present disclosure provides a method and an apparatus for generating a layout of a semiconductor device. The method includes placing a first cell and a second cell adjacent to the first cell, placing a first conductive pattern in a first track of the first cell extending in a first direction, wherein the first conductive pattern is configured as an input terminal or an output terminal of the first cell, placing a second conductive pattern in a first track of the second cell extending in the first direction, wherein the second conductive pattern is configured as an input terminal or an output terminal of the second cell, and aligning the first conductive pattern with the second conductive pattern.Type: ApplicationFiled: January 12, 2022Publication date: July 13, 2023Inventors: ANURAG VERMA, CHI-CHUN LIANG, MENG-KAI HSU, CHENG-YU LIN, POCHUN WANG, HUI-ZHONG ZHUANG
-
Publication number: 20220327277Abstract: A layout method and a semiconductor device are disclosed. The layout method includes: generating a design layout by placing a cell, wherein the cell includes: a first conductive segment overlapping a source/drain region and disposed immediately adjacent to a first power rail, wherein the first conductive segment has a length substantially equal to a cell length; a second conductive segment; and a third conductive segment between the first and second conductive segments. The layout method further includes: providing a fourth conductive segment and a fifth conductive segment to the design layout, wherein the fourth and fifth conductive segments are aligned in a first direction.Type: ApplicationFiled: April 8, 2021Publication date: October 13, 2022Inventors: ANURAG VERMA, MENG-KAI HSU, CHIH-WEI CHANG, SANG-CHI HUANG, WEI-LING CHANG, HUI-ZHONG ZHUANG
-
Publication number: 20220198121Abstract: A method includes clustering cells in a group of cells into a selected number of clusters, and ranking the clusters based on a list of prioritized features to generate a list of ranked clusters. The method also includes ranking cells in each of one or more ranked clusters in the list of ranked clusters, based on the list of prioritized features, to generate a list of ranked critical cells. The method further includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.Type: ApplicationFiled: March 9, 2022Publication date: June 23, 2022Inventors: Anurag VERMA, Meng-Kai HSU, Chih-Wei CHANG
-
Patent number: 11288436Abstract: A method includes obtaining a feature vector for each cell in a group of cells. The feature vector for a cell includes a score value for each feature in a set of features selected for characterizing the group of cells. The method includes clustering cells in the group into a selected number of clusters, based on distances between end points of feature vectors of the cells. The method includes generating a list of ranked critical cells in the selected number of clusters based on a list of prioritized features associated with the set of features. The method includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.Type: GrantFiled: September 18, 2020Date of Patent: March 29, 2022Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.Inventors: Anurag Verma, Meng-Kai Hsu, Chih-Wei Chang
-
Publication number: 20210240904Abstract: A method includes obtaining a feature vector for each cell in a group of cells. The feature vector for a cell includes a score value for each feature in a set of features selected for characterizing the group of cells. The method includes clustering cells in the group into a selected number of clusters, based on distances between end points of feature vectors of the cells. The method includes generating a list of ranked critical cells in the selected number of clusters based on a list of prioritized features associated with the set of features. The method includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.Type: ApplicationFiled: September 18, 2020Publication date: August 5, 2021Inventors: Anurag VERMA, Meng-Kai HSU, Chih-Wei CHANG
-
Patent number: 9477424Abstract: Methods and systems for synchronous replication of data are provided. A master intelligent storage adapter operating within a cluster having a slave intelligent storage adapter receives a plurality of write requests; generates a first input/output (I/O) request for storing the data for the plurality of write requests at a first storage device; and generates a second I/O request for a replication module executed by a computing device for synchronously storing the data at a second storage device. The computing device initiates a synchronous replication operation to replicate the data for the plurality of write requests at the second storage device.Type: GrantFiled: July 23, 2014Date of Patent: October 25, 2016Assignee: QLOGIC, CorporationInventor: Anurag Verma
-
Patent number: 9454305Abstract: Methods and systems for managing logical storage object reservation requests are provided. A controller of a storage array having a storage device for storing information on behalf of the logical storage object communicates with a first adapter via a network connection. The controller grants ownership of the logical storage object to the first adapter by the controller. A second adapter that interfaces with the first adapter is notified by the first adapter regarding the granted ownership. The second adapter is configured to send a request for reserving the logical storage object to the first adapter, where the second adapter sends the request on behalf of an application for reading, writing or both reading and writing at the storage space using the logical storage object. The first adapter receives and processes the request.Type: GrantFiled: January 27, 2014Date of Patent: September 27, 2016Assignee: QLOGIC, CorporationInventors: Normin A. Emralino, Anurag Verma, Ajmer Singh
-
Patent number: 9436654Abstract: Methods and systems for processing task management requests are provided. A cache client adapter receives a task management request other than an abort for a logical storage object owned by a cache owner adapter and determines if there are any pending input/output (I/O) requests associated with the storage object. The cache client adapter sends an abort request to the cache owner adapter when there are pending I/O requests and sends the task management request directly to a controller that manages a storage device whose space is presented as the logical storage object; and sends only the task management request to the controller when there are no pending I/O requests for the logical storage object.Type: GrantFiled: June 23, 2014Date of Patent: September 6, 2016Assignee: QLOGIC, CorporationInventor: Anurag Verma
-
Patent number: 8826413Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.Type: GrantFiled: December 30, 2009Date of Patent: September 2, 2014Assignee: Motorla Solutions, Inc.Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
-
Publication number: 20120155426Abstract: A method is disclosed for seamlessly handing over a mobile device from one access point to another access point in a wireless network. The method includes predicting future movement of a mobile device from an associated coverage area to another coverage area within a predefined time period. The method also includes identifying candidate access points to whom the mobile device can connect after the mobile device leaves the associated coverage area and sending a predefined number of communications sessions for the mobile device to the candidate access points. The method further includes transmitting a neighbor report to the mobile device in response to indication of movement by the mobile device to the other coverage area and, when the mobile device roams, transmitting any remaining communications sessions for the mobile device to a second access.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: Anurag Verma, Jeelan Poola, Hari Sharma
-
Patent number: 8134987Abstract: A wireless local area network system allows policy enforcement execution to be split between an access port and a centralized wireless controller. The policy may be of various types, including, but not limited to, a firewall policy, a QoS policy, a traffic shaping policy, and a bandwidth-management policy. On the AP, for all the traffic that is to be bridged or forwarded to specified ports, the policy table on the AP is checked. If it matches the policy table entry, then the specified action is taken. For all the traffic that gets forwarded to the controller by the AP, the match is checked with the policy table at the controller. If a match is detected, then the appropriate action specified by the policy is taken.Type: GrantFiled: November 7, 2008Date of Patent: March 13, 2012Assignee: Symbol Technologies, Inc.Inventors: Anurag Verma, Laxminarayan Bhat
-
Publication number: 20110162060Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.Type: ApplicationFiled: December 30, 2009Publication date: June 30, 2011Applicant: Motorola, Inc.Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
-
Publication number: 20090129352Abstract: A wireless local area network system allows policy enforcement execution to be split between an access port and a centralized wireless controller. The policy may be of various types, including, but not limited to, a firewall policy, a QoS policy, a traffic shaping policy, and a bandwidth-management policy. On the AP, for all the traffic that is to be bridged or forwarded to specified ports, the policy table on the AP is checked. If it matches the policy table entry, then the specified action is taken. For all the traffic that gets forwarded to the controller by the AP, the match is checked with the policy table at the controller. If a match is detected, then the appropriate action specified by the policy is taken.Type: ApplicationFiled: November 7, 2008Publication date: May 21, 2009Applicant: SYMBOL TECHNOLOGIES, INC.Inventors: Anurag Verma, Laxminarayan Bhat