Patents by Inventor Hemaprabhu Jayanna

Hemaprabhu Jayanna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240113875
    Abstract: A method and apparatus for storing keys in a key storage block includes processing a key request. A first key is allocated based upon the key request. The first key is stored in the key storage block, wherein the first key is of a first size and includes a first rule.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Applicants: Advanced Micro Devices, Inc., ATI Technologies ULC
    Inventors: Norman Vernon Douglas Stewart, Mihir Shaileshbhai Doctor, Omar Fakhri Ahmed, Hemaprabhu Jayanna, John Traver
  • Publication number: 20240106813
    Abstract: A method and system for distributing keys in a key distribution system includes receiving a connection for communication from a first component. A determination is made whether the first component requires a key be generated and distributed. Based upon a security mode for the communication, the key generated and distributed to the first component.
    Type: Application
    Filed: September 28, 2022
    Publication date: March 28, 2024
    Applicants: Advanced Micro Devices, Inc., ATI Technologies ULC
    Inventors: Norman Vernon Douglas Stewart, Mihir Shaileshbhai Doctor, Omar Fakhri Ahmed, Hemaprabhu Jayanna, John Traver
  • Patent number: 10523444
    Abstract: Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C2) packet from a remote computer associated with a device vendor. The C2 packet includes a request for the controller to perform a restricted command, and a vendor signature. The memory component stores instructions executable by the processor to determine if the vendor signature is valid and to direct the controller to perform the restricted command if the vendor signature is determined to be valid.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: December 31, 2019
    Assignee: Micron Technology, Inc.
    Inventors: Robert W. Strong, Hemaprabhu Jayanna
  • Publication number: 20190058598
    Abstract: Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C2) packet from a remote computer associated with a device vendor. The C2 packet includes a request for the controller to perform a restricted command, and a vendor signature. The memory component stores instructions executable by the processor to determine if the vendor signature is valid and to direct the controller to perform the restricted command if the vendor signature is determined to be valid.
    Type: Application
    Filed: October 19, 2018
    Publication date: February 21, 2019
    Inventors: Robert W. Strong, Hemaprabhu Jayanna
  • Patent number: 10142112
    Abstract: Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C2) packet from a remote computer associated with a device vendor. The C2 packet includes a request for the controller to perform a restricted command, and a vendor signature. The memory component stores instructions executable by the processor to determine if the vendor signature is valid and to direct the controller to perform the restricted command if the vendor signature is determined to be valid.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: November 27, 2018
    Assignee: Micron Technology, Inc.
    Inventors: Robert W. Strong, Hemaprabhu Jayanna
  • Publication number: 20180159692
    Abstract: Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C2) packet from a remote computer associated with a device vendor. The C2 packet includes a request for the controller to perform a restricted command, and a vendor signature. The memory component stores instructions executable by the processor to determine if the vendor signature is valid and to direct the controller to perform the restricted command if the vendor signature is determined to be valid.
    Type: Application
    Filed: January 22, 2018
    Publication date: June 7, 2018
    Inventors: Robert W. Strong, Hemaprabhu Jayanna
  • Patent number: 9900159
    Abstract: Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C2) packet from a remote computer associated with a device vendor. The C2 packet includes a request for the controller to perform a restricted command, and a vendor signature. The memory component stores instructions executable by the processor to determine if the vendor signature is valid and to direct the controller to perform the restricted command if the vendor signature is determined to be valid.
    Type: Grant
    Filed: July 21, 2015
    Date of Patent: February 20, 2018
    Assignee: Micron Technology, Inc.
    Inventors: Robert W. Strong, Hemaprabhu Jayanna
  • Patent number: 9825952
    Abstract: An embodiment of the invention allows a network access server to control network access for individual applications that run on a device. The device may be included in a machine-to-machine environment. The embodiment may provide a secure channel between the network access server and the device access layer and another secure channel between the device access layer and the device application layer. Thus, before applications are allowed to access the network those applications may be required to authenticate themselves via a secure channel. Other embodiments are described herein.
    Type: Grant
    Filed: December 30, 2011
    Date of Patent: November 21, 2017
    Assignee: Intel Corporation
    Inventors: Ashok Sunder Rajan, Rakesh Dodeja, David A. De Vries, Hemaprabhu Jayanna, William J. Tiso, Kevin W. Bross, Robert J. Hunter
  • Publication number: 20170026183
    Abstract: Several embodiments of memory devices and systems with command and control access are described herein. In one embodiment, a memory device includes a controller having a processor and a memory component operably coupled to the processor. The controller is configured to receive at least one command and control (C2) packet from a remote computer associated with a device vendor. The C2 packet includes a request for the controller to perform a restricted command, and a vendor signature. The memory component stores instructions executable by the processor to determine if the vendor signature is valid and to direct the controller to perform the restricted command if the vendor signature is determined to be valid.
    Type: Application
    Filed: July 21, 2015
    Publication date: January 26, 2017
    Inventors: Robert W. Strong, Hemaprabhu Jayanna
  • Publication number: 20140122897
    Abstract: Integrity management architecture is extended with trusted hash provisioning. The trusted hash provisioning ensures the integrity of a computing device. Thus, a multipurpose device can be as secure as a dedicated single-purpose device. The trusted hash provisioning includes determining a hash mask, and computing a trusted hash computation based on signatures of components identified as included within the scope of the hash. The computed trusted hash computation is used to determine integrity of the computing device.
    Type: Application
    Filed: December 31, 2011
    Publication date: May 1, 2014
    Inventors: Rakesh Dodeja, Alex De Vries, Ashok Sunder Rajan, Hemaprabhu Jayanna, William J. Tiso, Kevin W. Bross, Robert Hunter