Patents by Inventor Chintan H. Shah

Chintan H. Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140293682
    Abstract: Embodiments disclosed include memory bitcell clusters employing localized generation of complementary bitlines to reduce memory area. The memory bitcell clusters disclosed may be static random access memory (SRAM) used as central processing unit (CPU) register files. The memory bitcell clusters disclosed include a plurality of memory bitcells that share a common bitline. To reduce area required to provide complementary bitlines for the memory bitcells, the memory bitcell clusters include a localized inverter circuit. The localized inverter circuit is configured to invert a common bitline localized to the memory bitcells to provide a complementary bitline for the memory bitcells in the memory bitcell cluster. Because the inverter circuit is localized to the memory bitcells, a track in a semiconductor die for the complementary bitline does not extend beyond the memory bitcell cluster, minimizing the complexity of the memory bitcell cluster by reducing a number of bitline tracks used by half.
    Type: Application
    Filed: June 5, 2013
    Publication date: October 2, 2014
    Inventors: Chintan H. Shah, Yeshwant Nagaraj Kolla
  • Patent number: 8677487
    Abstract: A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware.
    Type: Grant
    Filed: October 18, 2011
    Date of Patent: March 18, 2014
    Assignee: McAfee, Inc.
    Inventors: Ravindra Balupari, Vinay Mahadik, Bharath Madhusudan, Chintan H. Shah
  • Publication number: 20130097699
    Abstract: A method is provided in one example embodiment that includes detecting repetitive connections from a source node to a destination node, calculating a score for the source node based on the connections, and taking a policy action if the score exceeds a threshold score. In more particular embodiments, the repetitive connections use a hypertext transfer protocol and may include connections to a small number of unique domains, connections to small number of unique resources associated with the destination node, and/or a large number of connections to a resource in a domain. Moreover, heuristics may be used to score the source node and identify behavior indicative of a threat, such as a bot or other malware.
    Type: Application
    Filed: October 18, 2011
    Publication date: April 18, 2013
    Inventors: Ravindra Balupari, Vinay Mahadik, Bharath Madhusudan, Chintan H. Shah