Patents by Inventor Eswaramoorthi Nallusamy

Eswaramoorthi Nallusamy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180095832
    Abstract: A system for granular reset management without reboot is disclosed. The system may include a subsystem, a processor including a reset management circuit coupled to the subsystem. The reset management circuit may include circuitry to receive a command to reset the subsystem, determine whether the subsystem can be reset without performing a system wide reboot, and based on a determination that the subsystem can be reset without performing a system wide reboot, block the use of the subsystem, drain the subsystem, and reset the subsystem. Circuity and method are also disclosed.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Inventors: Bharat S. Pillilli, Eswaramoorthi Nallusamy
  • Publication number: 20180098136
    Abstract: The present disclosure is directed to push telemetry data accumulation. A system may comprise at least telemetry circuitry configured to push telemetry data (e.g., provide telemetry data without first receiving a request). An example system may comprise one or more devices that include at least one set of telemetry circuitry. The at least one set of telemetry circuitry may be configured to push data based at least on a frequency configuration and a skew configuration. The frequency configuration may control how often the at least one set of telemetry circuitry generates data. The skew configuration may control when the telemetry data is transmitted. For example, sets of telemetry circuitry may be configured with different skew configurations to minimize transmission overlap. This may prevent telemetry data accumulation (TDA) circuitry in the system, which receives the transmission of telemetry data from the at least one set of telemetry circuitry, from becoming overwhelmed.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Applicant: Intel Corporation
    Inventors: RAMAMURTHY KRITHIVAS, DONGLAI DAI, RUSSELL WUNDERLICH, ESWARAMOORTHI NALLUSAMY
  • Patent number: 9798641
    Abstract: Methods and apparatus to increase cloud availability and silicon isolation using secure enclaves. A compute platform is configured to host a compute domain in which a plurality of secure enclaves are implemented. In conjunction with creating and deploying secure enclaves, mapping information is generated that maps the secure enclaves to platform/CPU resources, such as Intellectual Property blocks (IP) belong to the secure enclaves. In response to platform error events caused by errant platform/CPU resources, the secure enclave(s) belonging to the errant platform/CPU are identified via the mapping information, and an interrupt is directed to that/those secure enclave(s). In response to the interrupt, a secure enclave may be configured to one or more of handle the error, pass information to another secure enclave, and teardown the enclave. The secure enclave may execute an interrupt service routine that causes the errant platform/CPU resource to reset without resetting the entire platform or CPU, as applicable.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: October 24, 2017
    Assignee: Intel Corporation
    Inventors: Robert C. Swanson, Theodros Yigzaw, Eswaramoorthi Nallusamy, Raghunandan Makaram, Vincent J. Zimmer
  • Publication number: 20170177457
    Abstract: Methods and apparatus to increase cloud availability and silicon isolation using secure enclaves. A compute platform is configured to host a compute domain in which a plurality of secure enclaves are implemented. In conjunction with creating and deploying secure enclaves, mapping information is generated that maps the secure enclaves to platform/CPU resources, such as Intellectual Property blocks (IP) belong to the secure enclaves. In response to platform error events caused by errant platform/CPU resources, the secure enclave(s) belonging to the errant platform/CPU are identified via the mapping information, and an interrupt is directed to that/those secure enclave(s). In response to the interrupt, a secure enclave may be configured to one or more of handle the error, pass information to another secure enclave, and teardown the enclave. The secure enclave may execute an interrupt service routine that causes the errant platform/CPU resource to reset without resetting the entire platform or CPU, as applicable.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Inventors: ROBERT C. SWANSON, THEODROS YIGZAW, ESWARAMOORTHI NALLUSAMY, RAGHUNANDAN MAKARAM, VINCENT J. ZIMMER
  • Patent number: 9535606
    Abstract: Apparatus, systems, and methods to implement a virtual serial presence detect operation for pooled memory are described. In one embodiment, a controller comprises logic to receive a request to establish a composed computing device, define a plurality of virtual memory devices to be associated with a composed computing device, allocate memory from a shared pool of physical memory to the plurality of virtual memory devices, create a plurality of virtual serial detects (vSPDs) for the plurality of virtual memory devices, and store the plurality of vSPDs in a linked list in an operational memory device. Other embodiments are also disclosed and claimed.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: January 3, 2017
    Assignee: Intel Corporation
    Inventors: Ramamurthy Krithivas, Eswaramoorthi Nallusamy, Mark A. Schmisseur
  • Publication number: 20160179383
    Abstract: Apparatus, systems, and methods to implement a virtual serial presence detect operation for pooled memory are described. In one embodiment, a controller comprises logic to receive a request to establish a composed computing device, define a plurality of virtual memory devices to be associated with a composed computing device, allocate memory from a shared pool of physical memory to the plurality of virtual memory devices, create a plurality of virtual serial detects (vSPDs) for the plurality of virtual memory devices, and store the plurality of vSPDs in a linked list in an operational memory device. Other embodiments are also disclosed and claimed.
    Type: Application
    Filed: December 22, 2014
    Publication date: June 23, 2016
    Applicant: Intel Corporation
    Inventors: RAMAMURTHY KRITHIVAS, ESWARAMOORTHI NALLUSAMY, MARK A. SCHMISSEUR
  • Patent number: 9075751
    Abstract: Generally, this disclosure provides methods and systems for secure data protection with improved read-only memory locking during system pre-boot including protection of Advanced Configuration and Power Interface (ACPI) tables. The methods may include selecting a region of system memory to be protected, the selection occurring in response to a system reset state and performed by a trusted control block (TCB) comprising a trusted basic input/output system (BIOS); programming an address decoder circuit to configure the selected region as read-write; moving data to be secured to the selected region; programming the address decoder circuit to configure the selected region as read-only; and locking the read-only configuration in the address decoder circuit.
    Type: Grant
    Filed: August 9, 2012
    Date of Patent: July 7, 2015
    Assignee: Intel Corporation
    Inventors: Palsamy Sakthikumar, Vincent J. Zimmer, Robert C. Swanson, Eswaramoorthi Nallusamy
  • Publication number: 20150161037
    Abstract: Apparatus, systems, and methods to manage memory operations are described. In one example, a controller comprises logic to receive a first transaction to operate on a first data element in a volatile memory, determine whether the first data element is to be stored in a nonvolatile memory, and in response to a determination that the first data element is to be stored in a nonvolatile memory, to forward the first transaction to the memory controller coupled to the nonvolatile memory. Other examples are also disclosed and claimed.
    Type: Application
    Filed: December 9, 2013
    Publication date: June 11, 2015
    Inventors: Sarathy Jayakumar, Mohan J. Kumar, Eswaramoorthi Nallusamy
  • Publication number: 20140089573
    Abstract: Embodiments of the invention describe apparatuses, systems and methods for enabling memory device access prior to bus training, thereby enabling firmware image storage in non-flash nonvolatile memory, such as DDR DRAM. The increasing size of firmware images, such as BIOS, MRC, and ME firmware, makes current non-volatile storage solutions, such as SPI flash memory, impractical; executing BIOS code in flash is slow, and having a separate non-volatile memory device increases device costs. Furthermore, solutions such as Cache-as-RAM, which are utilized for running the pre-memory BIOS code, are limited by the cache size that is not scalable to the increasing complexity of BIOS code. Embodiments of the invention enable the use of persistent memory, such as DRAM, for BIOS code execution and data transfer by allowing DRAM access before memory channel training; said firmware images may then executed to “train” memory channels for subsequent system use.
    Type: Application
    Filed: September 24, 2012
    Publication date: March 27, 2014
    Inventors: Palsamy Sakthikumar, Eswaramoorthi Nallusamy, Rahul Khanna, Kuljit S. Bains
  • Publication number: 20140047174
    Abstract: Generally, this disclosure provides methods and systems for secure data protection with improved read-only memory locking during system pre-boot including protection of Advanced Configuration and Power Interface (ACPI) tables. The methods may include selecting a region of system memory to be protected, the selection occurring in response to a system reset state and performed by a trusted control block (TCB) comprising a trusted basic input/output system (BIOS); programming an address decoder circuit to configure the selected region as read-write; moving data to be secured to the selected region; programming the address decoder circuit to configure the selected region as read-only; and locking the read-only configuration in the address decoder circuit.
    Type: Application
    Filed: August 9, 2012
    Publication date: February 13, 2014
    Inventors: Palsamy Sakthikumar, Vincent J. Zimmer, Robert C. Swanson, Eswaramoorthi Nallusamy
  • Publication number: 20050251652
    Abstract: Methods and apparatus to process a virtual machine instruction in a loop are described herein. In an example method, at least one of a loop-start instruction and a loop-end instruction associated with a loop having the virtual machine instruction is monitored. In response to detecting the loop-start instruction, the virtual machine instruction is validated. Further, the virtual machine instruction is converted into one or more native instructions in response to a failure to detect the loop-end instruction. Other embodiments may be described and claimed.
    Type: Application
    Filed: April 27, 2004
    Publication date: November 10, 2005
    Inventor: Eswaramoorthi Nallusamy