Patents by Inventor Kshitij A. Doshi

Kshitij A. Doshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190042417
    Abstract: The present disclosure is directed to systems and methods that include cache operation storage circuitry that selectively enables/disables the Cache Line Flush (CLFLUSH) operation. The cache operation storage circuitry may also selectively replace the CLFLUSH operation with one or more replacement operations that provide similar functionality but beneficially and advantageously prevent an attacker from placing processor cache circuitry in a known state during a timing-based, side channel attack such as Spectre or Meltdown. The cache operation storage circuitry includes model specific registers (MSRs) that contain information used to determine whether to enable/disable CLFLUSH functionality. The cache operation storage circuitry may include model specific registers (MSRs) that contain information used to select appropriate replacement operations such as Cache Line Demote (CLDEMOTE) and/or Cache Line Write Back (CLWB) to selectively replace CLFLUSH operations.
    Type: Application
    Filed: June 29, 2018
    Publication date: February 7, 2019
    Applicant: Intel Corporation
    Inventors: Vadim Sukhomlinov, Kshitij Doshi
  • Publication number: 20190042778
    Abstract: A data processing system includes technology for protecting digital content using computer-mediated reality (CMR). The system comprises a processor, first and second video ports, a non-transitory machine-readable medium, and a display protection module stored in the machine-readable medium. The display protection module enables the data processing system to (a) automatically determine whether at least part of an output screen from a presentation application should receive display protection; (b) in response to a determination that the output screen should not receive display protection, cause at least some content from the output screen to be sent to a primary display via the first video port; and (c) in response to a determination that at least part of the output screen should receive display protection, automatically cause at least some content from the output screen to be sent to a CMR headset via the second video port. Other embodiments are described and claimed.
    Type: Application
    Filed: December 14, 2017
    Publication date: February 7, 2019
    Inventors: Vadim A. Sukhomlinov, Tamir Damian Munafo, Kshitij A. Doshi
  • Publication number: 20190042515
    Abstract: There is disclosed an example of an artificial intelligence (AI) system, including: a first hardware platform; a fabric interface configured to communicatively couple the first hardware platform to a second hardware platform; a processor hosted on the first hardware platform and programmed to operate on an AI problem; and a first training accelerator, including: an accelerator hardware; a platform inter-chip link (ICL) configured to communicatively couple the first training accelerator to a second training accelerator on the first hardware platform without aid of the processor; a fabric ICL to communicatively couple the first training accelerator to a third training accelerator on a second hardware platform without aid of the processor; and a system decoder configured to operate the fabric ICL and platform ICL to share data of the accelerator hardware between the first training accelerator and second and third training accelerators without aid of the processor.
    Type: Application
    Filed: December 20, 2017
    Publication date: February 7, 2019
    Applicant: Intel Corporation
    Inventors: Francesc Guim Bernat, Da-Ming Chiang, Kshitij A. Doshi, Suraj Prabhakaran, Mark A. Schmisseur
  • Publication number: 20190042124
    Abstract: Methods, apparatus, systems and articles of manufacture to optimize dynamic memory assignments in multi-tiered memory systems are disclosed. An example computer readable storage medium comprises instructions to, during an offline profiling run of a computer application: responsive to a first malloc function call, perform a first backtrace to identify a first path preceding the first malloc function call and identify a size of a buffer in memory allocated to the first path; and determine an indicator corresponding to a temperature of the buffer allocated to the first path; and during runtime: responsive to a second malloc function call, perform a second backtrace to identify a second path preceding the second malloc function call; and responsive to the second path corresponding to the first path, allocate memory from a tier of memory based on the indicator.
    Type: Application
    Filed: June 28, 2018
    Publication date: February 7, 2019
    Inventors: Kshitij Doshi, Andreas Kleen, Harshad Sane
  • Publication number: 20190042219
    Abstract: Various embodiments are generally directed to techniques for compiler sheltered nonvolatile memory (NVM) stores, such as based on demarcated atomic persistence regions in source code, for instance. Some embodiments are particularly related to a compiler that effectively shelters updates to NVM-based variables in a compiler implemented register, or register file, until the compiler has recorded undo values into a temporary but nonvolatile log range.
    Type: Application
    Filed: June 12, 2018
    Publication date: February 7, 2019
    Inventors: BHANU SHANKAR, KSHITIJ DOSHI
  • Publication number: 20190044971
    Abstract: Embodiments are directed toward techniques to detect a first function associated with an address space initiating a call instruction to a second function in the address space, the first function to call the second function in a deprivileged mode of operation, and define accessible address ranges for segments of the address space for the second function, each segment to a have a different address range in the address space where the second function is permitted to access in the deprivileged mode of operation, Embodiments include switching to the stack associated with the second address space and the second function, and initiating execution of the second function in the deprivileged mode of operation
    Type: Application
    Filed: June 29, 2018
    Publication date: February 7, 2019
    Inventors: VADIM SUKHOMLINOV, KSHITIJ DOSHI, MICHAEL LEMAY, DMITRY BABOKIN, AREG MELIK-ADAMYAN
  • Publication number: 20190045037
    Abstract: Technologies for network packet processing between cloud and telecommunications networks includes a network computing device which includes two application layer packet translators (ALPTs). The first ALPT is configured to receive a network packet from a computing device in a telecommunications network, identify a virtual network function (VNF) instance, and perform an application layer encapsulation of at least a portion of data of the received network packet as a parameter of a remote procedure call (RPC) associated with the identified VNF instance. The first ALPT is additionally configured to invoke the identified VNF instance using an API call corresponding to the RPC that includes the RPC parameter and the VNF instance is configured to transmit an RPC call response to the second ALPT. The second ALPT is configured to generate a new network packet as a function of the RPC call response and transmit the new network packet to another computing device in a cloud network.
    Type: Application
    Filed: March 30, 2018
    Publication date: February 7, 2019
    Inventors: Vadim Sukhomlinov, Kshitij Doshi, Areg Melik-Adamyan
  • Publication number: 20190042416
    Abstract: In embodiments, an apparatus may include a CC, and a LLC coupled to the CC, the CC to reserve a defined portion of the LLC where data objects whose home location is in a NVM are given placement priority. In embodiments, the apparatus may be further coupled to at least one lower level cache and a second LLC, wherein the CC may further identify modified data objects in the at least one lower level cache whose home location is in a second NVM, and in response to the identification, cause the modified data objects to be written from the lower level cache to the second LLC, the second LLC located in a same socket as the second NVM.
    Type: Application
    Filed: June 22, 2018
    Publication date: February 7, 2019
    Inventors: Kshitij Doshi, Bhanu Shankar
  • Publication number: 20190042747
    Abstract: The present disclosure is directed to systems and methods for mitigating or eliminating the effectiveness of a side channel attack, such as a Meltdown or Spectre type attack by selectively introducing a variable, but controlled, quantity of uncertainty into the externally accessible system parameters visible and useful to the attacker. The systems and methods described herein provide perturbation circuitry that includes perturbation selector circuitry and perturbation block circuitry. The perturbation selector circuitry detects a potential attack by monitoring the performance/timing data generated by the processor. Upon detecting an attack, the perturbation selector circuitry determines a variable quantity of uncertainty to introduce to the externally accessible system data. The perturbation block circuitry adds the determined uncertainty into the externally accessible system data. The added uncertainty may be based on the frequency or interval of the event occurrences indicative of an attack.
    Type: Application
    Filed: June 29, 2018
    Publication date: February 7, 2019
    Applicant: Intel Corporation
    Inventors: Vadim Sukhomlinov, Kshitij Doshi, Francesc Guim, Alex Nayshtut
  • Publication number: 20190042769
    Abstract: Techniques and apparatus for preventing unauthorized use of an image capture device are described. In one embodiment, for example, an apparatus may include an image capture unit operative to capture images from incident light incident on at least a portion of the image capture unit, a privacy assembly operative to prevent the image capture unit from generating a clear image responsive to a privacy active signal, and logic coupled to the privacy assembly, the logic to generate the privacy active signal responsive to the image capture unit being inactive. Other embodiments are described and claimed.
    Type: Application
    Filed: December 27, 2017
    Publication date: February 7, 2019
    Applicant: INTEL CORPORATION
    Inventors: Vadim Sukhomlinov, Tamir Damian Munafo, Kshitij Doshi
  • Publication number: 20190042263
    Abstract: The present disclosure is directed to systems and methods for mitigating or eliminating the effectiveness of a side channel attack, such as a Spectre type attack, by limiting the ability of a user-level branch prediction inquiry to access system-level branch prediction data. The branch prediction data stored in the BTB may be apportioned into a plurality of BTB data portions. BTB control circuitry identifies the initiator of a received branch prediction inquiry. Based on the identity of the branch prediction inquiry initiator, the BTB control circuitry causes BTB look-up circuitry to selectively search one or more of the plurality of BTB data portions.
    Type: Application
    Filed: June 29, 2018
    Publication date: February 7, 2019
    Applicant: Intel Corporation
    Inventors: Vadim Sukhomlinov, Kshitij Doshi
  • Publication number: 20190042783
    Abstract: An embodiment of a semiconductor apparatus may include technology to receive data with a unique identifier, and bypass encryption logic of a media controller based on the unique identifier. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: September 27, 2018
    Publication date: February 7, 2019
    Inventors: Francesc Guim Bernat, Mark Schmisseur, Kshitij Doshi, Kapil Sood, Tarun Viswanathan
  • Publication number: 20190042234
    Abstract: Technologies for providing streamlined provisioning of accelerated functions in a disaggregated architecture include a compute sled. The compute sled includes a network interface controller and circuitry to determine whether to accelerate a function of a workload executed by the compute sled, and send, to a memory sled and in response to a determination to accelerate the function, a data set on which the function is to operate. The circuitry is also to receive, from the memory sled, a service identifier indicative of a memory location independent handle for data associated with the function, send, to a compute device, a request to schedule acceleration of the function on the data set, receive a notification of completion of the acceleration of the function, and obtain, in response to receipt of the notification and using the service identifier, a resultant data set from the memory sled. The resultant data set was produced by an accelerator device during acceleration of the function on the data set.
    Type: Application
    Filed: March 6, 2018
    Publication date: February 7, 2019
    Inventors: Francesc Guim Bernat, Suraj Prabhakaran, Kshitij Doshi, Timothy Verrall
  • Publication number: 20190042339
    Abstract: Examples include techniques for invocation of a function or service. Examples include receiving a call instruction from an application hosted by a platform to invoke a virtual function provided by a different application. Information included in the call instruction are used to determine how to prepare for and enter an invocation of the call for the virtual function.
    Type: Application
    Filed: June 29, 2018
    Publication date: February 7, 2019
    Inventors: Kshitij A. DOSHI, Vadim SUKHOMLINOV
  • Publication number: 20190042108
    Abstract: An embodiment of a semiconductor apparatus may include technology to determine if a memory operation on a memory is avoidable, and suppress the memory operation if the memory operation is determined to be avoidable. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: June 22, 2018
    Publication date: February 7, 2019
    Applicant: Intel Corporation
    Inventors: Kshitij Doshi, Bhanu Shankar
  • Publication number: 20190042884
    Abstract: An apparatus for training artificial intelligence (AI) models is presented. In embodiments, the apparatus may include an input interface to receive in real time model training data from one or more sources to train one or more artificial neural networks (ANNs) associated with the one or more sources, each of the one or more sources associated with at least one of the ANNs; a load distributor coupled to the input interface to distribute in real time the model training data for the one or more ANNs to one or more AI appliances; and a resource manager coupled to the load distributor to dynamically assign one or more computing resources on ones of the AI appliances to each of the ANNs in view of amounts of the training data received in real time from the one or more sources for their associated ANNs.
    Type: Application
    Filed: December 28, 2017
    Publication date: February 7, 2019
    Inventors: Francesc GUIM BERNAT, Suraj PRABHAKARAN, Alexander BACHMUTSKY, Raghu KONDAPALLI, Kshitij A. DOSHI
  • Publication number: 20190044967
    Abstract: Particular embodiments described herein provide for an electronic device that can be configured to identify a string of data to be displayed on a display, render the string to create an image that represents how the string of data will be displayed on the display, perform object character recognition (OCR) on the image to create a string of OCR data, compare the string of OCR data to the string of data to determine if there is a difference between the string of OCR data and the string of data, and communicate an alert to a user when there is a difference between the string of OCR data and the string of data. In an example, the string of data is a malicious string link to a malicious website.
    Type: Application
    Filed: September 12, 2018
    Publication date: February 7, 2019
    Applicant: Intel Corporation
    Inventors: Vadim Sukhomlinov, Kshitij A. Doshi, Tamir Damian Munafo
  • Publication number: 20190042437
    Abstract: Embodiments of the present disclosure relate to a controller that includes a monitor to determine an access pattern for a range of memory of a first computer memory device, and a pre-loader to pre-load a second computer memory device with a copy of a subset of the range of memory based at least in part on the access pattern, wherein the subset includes a plurality of cache lines. In some embodiments, the controller includes a specifier and the monitor determines the access pattern based at least in part on one or more configuration elements in the specifier. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: September 6, 2018
    Publication date: February 7, 2019
    Inventors: Francesc Guim Bernat, Kshitij Doshi
  • Publication number: 20190034340
    Abstract: An embodiment of a semiconductor package apparatus may include technology to create a tracking structure for a memory controller to track a range of memory addresses of a persistent memory, identify a write request at the memory controller for a memory location within the range of tracked memory addresses, and set a flag in the tracking structure to indicate that the memory location had the identified write request. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: December 27, 2017
    Publication date: January 31, 2019
    Inventors: Kshitij A. Doshi, Francesc Guim Bernat, Daniel Rivas Barragan, Suraj Prabhakaran
  • Publication number: 20190034206
    Abstract: Embodiments may be directed to techniques to execute a binary based on source code comprising basic blocks of instructions, identify a path of execution of a plurality of the basic blocks of instructions having a higher execution frequency than an execution frequency threshold, and collect last branch records for the plurality of the basic blocks of instructions, the last branch records to indicate times of execution for the plurality of the basic blocks of instructions. Further, embodiments include determining latency values for each of the plurality of the basic blocks of instructions based on the times of execution, and performing a mitigation operation for each of the plurality of the basic blocks of instruction having latency values above a latency threshold.
    Type: Application
    Filed: November 29, 2017
    Publication date: January 31, 2019
    Inventors: Harshad Sane, Kshitij Doshi