Patents by Inventor Anurag Verma

Anurag Verma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11829700
    Abstract: A method includes clustering cells in a group of cells into a selected number of clusters, and ranking the clusters based on a list of prioritized features to generate a list of ranked clusters. The method also includes ranking cells in each of one or more ranked clusters in the list of ranked clusters, based on the list of prioritized features, to generate a list of ranked critical cells. The method further includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: November 28, 2023
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.
    Inventors: Anurag Verma, Meng-Kai Hsu, Chih-Wei Chang
  • Publication number: 20230259686
    Abstract: A semiconductor device, method, and system of arranging patterns of the same are provided. The method includes generating a plurality of gate patterns and conductive patterns, wherein each of the plurality of gate patterns and conductive patterns is located at a first horizontal level and extends along a first direction. The method also includes selecting one of the gate patterns as an input pin or one of the conductive patterns as an output pin. The method further includes generating, based on a selected gate pattern or a selected conductive pattern, a plurality of metallization patterns. Each of the plurality of metallization patterns is located at a second horizontal level overlying the first horizontal level and extends along a second direction substantially perpendicular to the first direction.
    Type: Application
    Filed: February 17, 2022
    Publication date: August 17, 2023
    Inventors: ANURAG VERMA, MENG-KAI HSU, JOHNNY CHIAHAO LI, SHENG-HSIUNG CHEN, CHENG-YU LIN, HUI-ZHONG ZHUANG, JERRY CHANG JUI KAO
  • Publication number: 20230237235
    Abstract: An integrated circuit includes a first circuit cell having a first width and a second circuit cell having a second width that is wider than the first width by at least one contacted poly pitch. An equivalent circuit of the first circuit cell is the same as an equivalent circuit of the second circuit cell.
    Type: Application
    Filed: June 15, 2022
    Publication date: July 27, 2023
    Inventors: Anurag VERMA, Meng-Kai HSU, ChiWei HU
  • Publication number: 20230222278
    Abstract: The present disclosure provides a method and an apparatus for generating a layout of a semiconductor device. The method includes placing a first cell and a second cell adjacent to the first cell, placing a first conductive pattern in a first track of the first cell extending in a first direction, wherein the first conductive pattern is configured as an input terminal or an output terminal of the first cell, placing a second conductive pattern in a first track of the second cell extending in the first direction, wherein the second conductive pattern is configured as an input terminal or an output terminal of the second cell, and aligning the first conductive pattern with the second conductive pattern.
    Type: Application
    Filed: January 12, 2022
    Publication date: July 13, 2023
    Inventors: ANURAG VERMA, CHI-CHUN LIANG, MENG-KAI HSU, CHENG-YU LIN, POCHUN WANG, HUI-ZHONG ZHUANG
  • Publication number: 20220327277
    Abstract: A layout method and a semiconductor device are disclosed. The layout method includes: generating a design layout by placing a cell, wherein the cell includes: a first conductive segment overlapping a source/drain region and disposed immediately adjacent to a first power rail, wherein the first conductive segment has a length substantially equal to a cell length; a second conductive segment; and a third conductive segment between the first and second conductive segments. The layout method further includes: providing a fourth conductive segment and a fifth conductive segment to the design layout, wherein the fourth and fifth conductive segments are aligned in a first direction.
    Type: Application
    Filed: April 8, 2021
    Publication date: October 13, 2022
    Inventors: ANURAG VERMA, MENG-KAI HSU, CHIH-WEI CHANG, SANG-CHI HUANG, WEI-LING CHANG, HUI-ZHONG ZHUANG
  • Publication number: 20220198121
    Abstract: A method includes clustering cells in a group of cells into a selected number of clusters, and ranking the clusters based on a list of prioritized features to generate a list of ranked clusters. The method also includes ranking cells in each of one or more ranked clusters in the list of ranked clusters, based on the list of prioritized features, to generate a list of ranked critical cells. The method further includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.
    Type: Application
    Filed: March 9, 2022
    Publication date: June 23, 2022
    Inventors: Anurag VERMA, Meng-Kai HSU, Chih-Wei CHANG
  • Patent number: 11288436
    Abstract: A method includes obtaining a feature vector for each cell in a group of cells. The feature vector for a cell includes a score value for each feature in a set of features selected for characterizing the group of cells. The method includes clustering cells in the group into a selected number of clusters, based on distances between end points of feature vectors of the cells. The method includes generating a list of ranked critical cells in the selected number of clusters based on a list of prioritized features associated with the set of features. The method includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: March 29, 2022
    Assignee: TAIWAN SEMICONDUCTOR MANUFACTURING CO., LTD.
    Inventors: Anurag Verma, Meng-Kai Hsu, Chih-Wei Chang
  • Publication number: 20210240904
    Abstract: A method includes obtaining a feature vector for each cell in a group of cells. The feature vector for a cell includes a score value for each feature in a set of features selected for characterizing the group of cells. The method includes clustering cells in the group into a selected number of clusters, based on distances between end points of feature vectors of the cells. The method includes generating a list of ranked critical cells in the selected number of clusters based on a list of prioritized features associated with the set of features. The method includes outputting the list of ranked critical cells for use in adjusting cell layouts based on the ranked critical cells.
    Type: Application
    Filed: September 18, 2020
    Publication date: August 5, 2021
    Inventors: Anurag VERMA, Meng-Kai HSU, Chih-Wei CHANG
  • Patent number: 9477424
    Abstract: Methods and systems for synchronous replication of data are provided. A master intelligent storage adapter operating within a cluster having a slave intelligent storage adapter receives a plurality of write requests; generates a first input/output (I/O) request for storing the data for the plurality of write requests at a first storage device; and generates a second I/O request for a replication module executed by a computing device for synchronously storing the data at a second storage device. The computing device initiates a synchronous replication operation to replicate the data for the plurality of write requests at the second storage device.
    Type: Grant
    Filed: July 23, 2014
    Date of Patent: October 25, 2016
    Assignee: QLOGIC, Corporation
    Inventor: Anurag Verma
  • Patent number: 9454305
    Abstract: Methods and systems for managing logical storage object reservation requests are provided. A controller of a storage array having a storage device for storing information on behalf of the logical storage object communicates with a first adapter via a network connection. The controller grants ownership of the logical storage object to the first adapter by the controller. A second adapter that interfaces with the first adapter is notified by the first adapter regarding the granted ownership. The second adapter is configured to send a request for reserving the logical storage object to the first adapter, where the second adapter sends the request on behalf of an application for reading, writing or both reading and writing at the storage space using the logical storage object. The first adapter receives and processes the request.
    Type: Grant
    Filed: January 27, 2014
    Date of Patent: September 27, 2016
    Assignee: QLOGIC, Corporation
    Inventors: Normin A. Emralino, Anurag Verma, Ajmer Singh
  • Patent number: 9436654
    Abstract: Methods and systems for processing task management requests are provided. A cache client adapter receives a task management request other than an abort for a logical storage object owned by a cache owner adapter and determines if there are any pending input/output (I/O) requests associated with the storage object. The cache client adapter sends an abort request to the cache owner adapter when there are pending I/O requests and sends the task management request directly to a controller that manages a storage device whose space is presented as the logical storage object; and sends only the task management request to the controller when there are no pending I/O requests for the logical storage object.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: September 6, 2016
    Assignee: QLOGIC, Corporation
    Inventor: Anurag Verma
  • Patent number: 8826413
    Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.
    Type: Grant
    Filed: December 30, 2009
    Date of Patent: September 2, 2014
    Assignee: Motorla Solutions, Inc.
    Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
  • Publication number: 20120155426
    Abstract: A method is disclosed for seamlessly handing over a mobile device from one access point to another access point in a wireless network. The method includes predicting future movement of a mobile device from an associated coverage area to another coverage area within a predefined time period. The method also includes identifying candidate access points to whom the mobile device can connect after the mobile device leaves the associated coverage area and sending a predefined number of communications sessions for the mobile device to the candidate access points. The method further includes transmitting a neighbor report to the mobile device in response to indication of movement by the mobile device to the other coverage area and, when the mobile device roams, transmitting any remaining communications sessions for the mobile device to a second access.
    Type: Application
    Filed: December 15, 2010
    Publication date: June 21, 2012
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Anurag Verma, Jeelan Poola, Hari Sharma
  • Patent number: 8134987
    Abstract: A wireless local area network system allows policy enforcement execution to be split between an access port and a centralized wireless controller. The policy may be of various types, including, but not limited to, a firewall policy, a QoS policy, a traffic shaping policy, and a bandwidth-management policy. On the AP, for all the traffic that is to be bridged or forwarded to specified ports, the policy table on the AP is checked. If it matches the policy table entry, then the specified action is taken. For all the traffic that gets forwarded to the controller by the AP, the match is checked with the policy table at the controller. If a match is detected, then the appropriate action specified by the policy is taken.
    Type: Grant
    Filed: November 7, 2008
    Date of Patent: March 13, 2012
    Assignee: Symbol Technologies, Inc.
    Inventors: Anurag Verma, Laxminarayan Bhat
  • Publication number: 20110162060
    Abstract: Methods and systems are provided for improving a firewall implemented at a WLAN infrastructure device (WID). The WID includes a stateful firewall that implements firewall rules based on an ESSID of the WID to specify whether traffic is allowed to or from the ESSID. For example, in one implementation of such a firewall rule, packets that are required to be sent out on all wired ports can be blocked from being flooded out on WLANs (e.g., the packet is allowed to pass only to the wired ports). A method and system are provided for preventing a malicious wireless client device (WCD) that is transmitting undesirable traffic from using RF resources by deauthenticating the malicious WCD to remove it from the WLAN and blacklisting it to prevent it from rejoining the WLAN for a time period. Method and systems are also provided for either “on-demand” and/or predicatively communicating state information regarding an existing firewall session.
    Type: Application
    Filed: December 30, 2009
    Publication date: June 30, 2011
    Applicant: Motorola, Inc.
    Inventors: Rajesh Vijayakumar, Nicolas S. Dade, Jacob Thomas, Anurag Verma
  • Publication number: 20090129352
    Abstract: A wireless local area network system allows policy enforcement execution to be split between an access port and a centralized wireless controller. The policy may be of various types, including, but not limited to, a firewall policy, a QoS policy, a traffic shaping policy, and a bandwidth-management policy. On the AP, for all the traffic that is to be bridged or forwarded to specified ports, the policy table on the AP is checked. If it matches the policy table entry, then the specified action is taken. For all the traffic that gets forwarded to the controller by the AP, the match is checked with the policy table at the controller. If a match is detected, then the appropriate action specified by the policy is taken.
    Type: Application
    Filed: November 7, 2008
    Publication date: May 21, 2009
    Applicant: SYMBOL TECHNOLOGIES, INC.
    Inventors: Anurag Verma, Laxminarayan Bhat