Patents by Inventor Harri Hakkarainen
Harri Hakkarainen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250111214Abstract: A machine learning (ML) hardware includes a first data format conversion block configured to receive data generated by an application source in a first data format. The first data format conversion block is configured to convert the received data from the first data format into a second data format. The first data format is different from the second data format. The ML hardware includes a plurality of processing units configured to perform one or more ML operations on the data in the second data format to generate a processed data. The ML hardware includes a second data format conversion block configured to convert the processed data to a third data format. The ML hardware further includes a transmitting component configured to output the processed data in the third data format to a memory component for use by an application destination.Type: ApplicationFiled: October 27, 2023Publication date: April 3, 2025Inventors: Ulf Hanebutte, Senad Durakovic, Harri Hakkarainen, Derek Chickles, Shivah Shankar Narayan Rao
-
Patent number: 12174727Abstract: A new approach is proposed to support correlating high-level code with low-level instructions of an application running on a hardware. A compiler that compiles a high-level function in the high-level code of the application into a set of low-level instructions to be executed on the hardware is configured to utilize one or more reserved fields of the set of low-level instructions to incorporate one or more IDs and an actionable item. The IDs are mapped to the high-level function, wherein such mapping is programmable by the compiler. Based on the mapped IDs and the actionable item incorporated in the set of the low-level instructions, the runtime performance of the application on the hardware can be monitored and profiled and issues related to the high-level code of the application can be identified for debugging purposes.Type: GrantFiled: July 30, 2021Date of Patent: December 24, 2024Assignee: Marvell Asia Pte LtdInventors: Ulf Hanebutte, Harri Hakkarainen, Senad Durakovic, Chien-Chun Chou
-
Patent number: 12121624Abstract: The invention relates to a disinfection method to be used for cleaning.Type: GrantFiled: September 5, 2019Date of Patent: October 22, 2024Assignee: CLEAMIX OYInventors: Harri Hakkarainen, Panu Wilska
-
Patent number: 11995448Abstract: A method includes receiving a first set of data. The method also includes receiving an instruction to determine a largest value within the first set of data. The first set of data is divided into a first plurality of data portions based on a hardware architecture of a first plurality of processing elements. The first plurality of data portions is mapped to the first plurality of processing elements. Each data portion of the first plurality of data portions is mapped exclusively to a processing element of the first plurality of processing elements. Each data portion of the first plurality of data portions is processed by its respective processing element to identify a largest value from each data portion of the first plurality of data portions, wherein the processing forms a first output data comprising the largest value from the each data portion of the first plurality of data portions.Type: GrantFiled: October 26, 2021Date of Patent: May 28, 2024Assignee: Marvell Asia Pte LtdInventors: Avinash Sodani, Ulf Hanebutte, Chien-Chun Chou, Harri Hakkarainen
-
Patent number: 11977475Abstract: A system to support validation and debugging of compiled low-level instructions for a machine learning (ML) network model on an ML-specific hardware. A compiler identifies well-defined boundaries in the ML network model based on primitives used to generate low-level instructions for the hardware. The ML network model is partitioned into units/layers/sub-graphs based on the plurality of well-defined boundaries. The compiler then generates an internal representation for each of the units wherein the internal representation is mapped to components in the hardware. Each of the units is compiled into a first set to be executed on the ML-specific hardware and a second set to be executed on a second computing device. The output results from executing the two sets of low-level instructions are compared to validate the first set of low-level instructions. If the outputs do not match fully, the first set of low-level instructions is debugged and recompiled.Type: GrantFiled: March 2, 2022Date of Patent: May 7, 2024Assignee: Marvell Asia Pte LtdInventors: Chien-Chun Chou, Senad Durakovic, Ulf Hanebutte, Harri Hakkarainen, Yao Chou, Veena Karthikeyan
-
Patent number: 11733983Abstract: A method includes receiving a high-level function in a high-level code of an application; identifying resources in a hardware to execute a set of low-level instructions that is generated from the high-level function in the high-level code; compiling the high-level function in the high-level code of the application into the set of low-level instructions to be executed on the hardware; and generating a plurality of structured metadata associated with allocation of resources in the hardware to execute the set of low-level instructions.Type: GrantFiled: September 8, 2022Date of Patent: August 22, 2023Assignee: Marvell Asia Pte LtdInventors: Senad Durakovic, Chien-Chun Chou, Ulf Hanebutte, Harri Hakkarainen
-
Publication number: 20230015688Abstract: A method includes receiving a high-level function in a high-level code of an application; identifying resources in a hardware to execute a set of low-level instructions that is generated from the high-level function in the high-level code; compiling the high-level function in the high-level code of the application into the set of low-level instructions to be executed on the hardware; and generating a plurality of structured metadata associated with allocation of resources in the hardware to execute the set of low-level instructions.Type: ApplicationFiled: September 8, 2022Publication date: January 19, 2023Inventors: Senad Durakovic, Chien-Chun Chou, Ulf Hanebutte, Harri Hakkarainen
-
Patent number: 11467811Abstract: A method includes receiving a high-level function in a high-level code of an application is received. The method also include identifying resources in a hardware to execute a set of low-level instructions that is generated from the high-level function in the high-level code. One or more processing operations are determined to be performed that is associated with the high-level function in the high-level code. The determining of the one or more processing operations occurs based on architecture of the hardware. The high-level function in the high-level code of the application is compiled into the set of low-level instructions to be executed on the hardware. A plurality of structured metadata is generated and includes information associated with the determining resources in the hardware and further includes information associated with the determining one or more processing operations.Type: GrantFiled: July 30, 2021Date of Patent: October 11, 2022Assignee: Marvell Asia Pte LtdInventors: Senad Durakovic, Chien-Chun Chou, Ulf Hanebutte, Harri Hakkarainen
-
Publication number: 20210386890Abstract: The invention relates to a disinfection method to be used for cleaning.Type: ApplicationFiled: September 5, 2019Publication date: December 16, 2021Inventors: Harri HAKKARAINEN, Panu WILSKA
-
Publication number: 20210330843Abstract: The present invention relates to a disinfection method to be used for cleaning.Type: ApplicationFiled: September 5, 2019Publication date: October 28, 2021Inventor: Harri HAKKARAINEN
-
Patent number: 8661266Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.Type: GrantFiled: April 20, 2011Date of Patent: February 25, 2014Assignee: Cavium, Inc.Inventors: Harri Hakkarainen, Amer Haider, Muhammad Hussain, Trent Parker
-
Publication number: 20120195999Abstract: The present invention provides a drink composition for maintaining and/or restoring the fluid balance, for example during a sports event or an exercise containing proteins, carbohydrates and salts. The present invention also provides the use of said drink composition for maintaining and/or restoring the fluid balance during a sports event or an exercise. The present invention also provides a method for treating or preventing dehydration.Type: ApplicationFiled: February 3, 2012Publication date: August 2, 2012Applicant: NORTHFORCE OYInventors: Harri Hakkarainen, Tea Skinnari
-
Publication number: 20120011373Abstract: Disclosed are systems and methods for protecting secret device keys, such as High-bandwidth Digital Content Protection (HDCP) device keys. Instead of storing secret device keys in the plain, a security algorithm and one or more protection keys are stored on the device. The security algorithm is applied to the secret device keys and the one or more protection keys to produce encrypted secret device keys. The encrypted secret device keys are then stored either on chip or off-chip.Type: ApplicationFiled: April 20, 2011Publication date: January 12, 2012Applicant: CAVIUM NETWORKSInventors: Harri Hakkarainen, Amer Haider, Muhammad Hussain, Trent Parker
-
Publication number: 20100191590Abstract: Method for creating a controlled data transfer connection between a remote device and a subscriber terminal by a transmission system. The first party of the interconnection, (remote device), creates a connection to the transmission system, which verifies information used for the authentication informed by the remote device and allocates an unique identifier ID for the remote device, by which the remote device can be addressed in the transmission system. The other part of the interconnection, (subscriber terminal), requests the transmission system to transmit the request to the remote device, identified by the identifier. The transmission system transmits this request to the remote device, which processes the request and sends the response via the transmission system to the subscriber terminal. This response can be converted in the transmission system to a form suitable for the subscriber terminal, and subscriber-targeted advertisements, or other data, may be added in the response.Type: ApplicationFiled: May 26, 2008Publication date: July 29, 2010Applicant: HUUKED LABS OYInventors: Harri Hakkarainen, Juha Utriainen
-
Patent number: 7602919Abstract: A method of integrating quantum key distribution (QKD) with Internet protocol security (IPSec) to improve the security of IPSec. Standard IPSec protocols impose limits on the frequency at which keys can be changed. This makes efforts to improve the security of IPSec by employing quantum keys problematic. The method includes employing multiple security associations (SA) in in-bound and outbound SA Tables in a manner that enables a high key flipping rate and that enables combining quantum keys with classical keys generated by Internet Key Exchange (IKE), thereby enabling QKD-based IPSec.Type: GrantFiled: March 16, 2005Date of Patent: October 13, 2009Assignee: MagiQ Technologies, IncInventors: Audrius Berzanskis, Harri Hakkarainen, Keun Lee, Muhammad Raghib Hussain
-
Publication number: 20060212936Abstract: A method of integrating quantum key distribution (QKD) with Internet protocol security (IPSec) to improve the security of IPSec. Standard IPSec protocols impose limits on the frequency at which keys can be changed. This makes efforts to improve the security of IPSec by employing quantum keys problematic. The method includes increasing the size of the Security Association (SA) Table in a manner that enables a high key change rate so that the quantum keys can be combined with the classical keys generated by Internet Key Exchange (IKE). The invention includes a method of creating the SA Table by combining quantum keys generated by the QKD process with classical keys generated by the IKE process, thereby enabling QKD-based IPSec.Type: ApplicationFiled: March 16, 2005Publication date: September 21, 2006Inventors: Audrius Berzanskis, Harri Hakkarainen, Keun Lee, Muhammad Hussain