Patents by Inventor Mansi Jain
Mansi Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12159140Abstract: An electronic device receives a single instruction to apply a neural network operation to a set of M-bit elements stored in one or more input vector registers to initiate a sequence of computational operations related to a neural network. In response to the single instruction, the electronic device implements the neural network operation on the set of M-bit elements to generate a set of P-bit elements by obtaining the set of M-bit elements from the one or more input vector registers, quantizing each of the set of M-bit elements from M bits to P bits, and packing the set of P-bit elements into an output vector register. P is smaller than M. In some embodiments, the neural network operation is a quantization operation including at least a multiplication with a quantization factor and an addition with a zero point.Type: GrantFiled: April 28, 2022Date of Patent: December 3, 2024Assignee: QUALCOMM IncorporatedInventors: Srijesh Sudarsanan, Deepak Mathew, Marc Hoffman, Sundar Rajan Balasubramanian, Mansi Jain, James Lee, Gerald Sweeney
-
Patent number: 11979391Abstract: Systems, methods, and computer-readable media are provided for an efficient roaming management method using a single association identifier token for associating with different access points. In one aspect of the present disclosure, a network controller includes memory having computer-readable instructions stored therein and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive a request from an endpoint to connect to a first access point; generate association identification token (e.g., PMK and PMKID) for the endpoint to connect to the first access point; and distribute the association identification token to a second access point prior to the endpoint attempting to connect to the second access point, the association identification token being used by the second access point to validate a subsequent request by the endpoint to connect to the second access point.Type: GrantFiled: July 22, 2022Date of Patent: May 7, 2024Assignee: Cisco Technology, Inc.Inventors: Abhishek Dhammawat, Mansi Jain, Sudhir Kumar Jain
-
Publication number: 20240104356Abstract: Certain aspects of the present disclosure provide techniques and apparatus for quantized machine learning. A quantized input matrix is accessed at a layer of a neural network, and a first interim value is generated in an accumulator by performing matrix multiplication, using the accumulator, of the quantized input matrix and a quantized weight matrix associated with the layer of the neural network. The first interim value is normalized based at least in part on one or more leading sign bits of the first interim value, and the normalized first interim value is dequantized. A second interim value is generated by applying a rounded right-shift operation to the dequantized normalized first interim value, and activation data is generated by applying an activation function to the second interim value.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Srijesh SUDARSANAN, Deepak MATHEW, Marc HOFFMAN, Sundar Rajan BALASUBRAMANIAN, Gerald SWEENEY, Mansi JAIN, James LEE, Ankita NAYAK
-
Publication number: 20230350678Abstract: This application is directed to using a single instruction to initiate a sequence of computational operations related to a neural network. An electronic device receives a single instruction to apply a neural network operation to a set of M-bit elements stored in one or more input vector registers. In response to the single instruction, the electronic device implements the neural network operation on the set of M-bit elements to generate a set of P-bit elements by obtaining the set of M-bit elements from the one or more input vector registers, quantizing each of the set of M-bit elements from M bits to P bits, and packing the set of P-bit elements into an output vector register. P is smaller than M. In some embodiments, the neural network operation is a quantization operation including at least a multiplication with a quantization factor and an addition with a zero point.Type: ApplicationFiled: April 28, 2022Publication date: November 2, 2023Inventors: Srijesh SUDARSANAN, Deepak MATHEW, Marc HOFFMAN, Sundar Rajan BALASUBRAMANIAN, Mansi JAIN, James LEE, Gerald SWEENEY
-
Publication number: 20230350640Abstract: A device includes a processor that includes a rotation vector register file, a second vector register file, and multiply-accumulate circuitry (MAC). The rotation vector register file includes a rotation vector register. The rotation vector register file is configured to rotate data in the rotation vector register. The second vector register file includes a source vector register. The MAC is configured to receive first input data from the rotation vector register file and second input data from the source vector register.Type: ApplicationFiled: May 2, 2022Publication date: November 2, 2023Inventors: Sundar Rajan BALASUBRAMANIAN, Srijesh SUDARSANAN, Marc HOFFMAN, Deepak MATHEW, Gerald SWEENEY, James LEE, Mansi JAIN
-
Publication number: 20230351144Abstract: This application is directed to using a single instruction to initiate a sequence of computational operations related to a neural network activation function. An electronic device receives a single instruction to apply a linear activation operation to a set of first elements stored in one or more input vector registers. In response to the single instruction, the linear activation operation is implemented on the set of first elements to generate a set of output elements. For each first element, the electronic device detects a sign value of the respective first element, selects a respective scalar from one or more scalars based on the sign value, and applies the linear activation operation on the respective first element based on the selected respective scalar and a bias value to generate a respective element of the set of output elements. The electronic device quantizes the set of output elements.Type: ApplicationFiled: April 28, 2022Publication date: November 2, 2023Inventors: Srijesh SUDARSANAN, Deepak MATHEW, Marc HOFFMAN, Sundar Rajan BALASUBRAMANIAN, Mansi JAIN, James LEE, Gerald SWEENEY
-
Patent number: 11611875Abstract: Authentication with security in wireless networks may be provided. A first confirm message comprising a first send-confirm element and a first confirm element may be received. Next, an Authenticator Number Used Once (ANonce) may be generated and a second confirm message may be sent comprising the ANonce, a second send-confirm element, and a second confirm element. Then an association request may be received comprising a Supplicant Number Used Once (SNonce) and a Message Integrity Code (MIC). An association response may be sent comprising an encrypted Group Temporal Key (GTK), an encrypted Integrity Group Temporal Key (IGTK), the ANonce, and the MIC. An acknowledgment may be received comprising the MIC in an Extensible Authentication Protocol (EAP) over LAN (EAPoL) key frame and a controller port may be unblocked in response to receiving the acknowledgment.Type: GrantFiled: March 17, 2021Date of Patent: March 21, 2023Assignee: Cisco Technology, Inc.Inventors: Abhishek Dhammawat, Mansi Jain
-
Publication number: 20220360578Abstract: Systems, methods, and computer-readable media are provided for an efficient roaming management method using a single association identifier token for associating with different access points. In one aspect of the present disclosure, a network controller includes memory having computer-readable instructions stored therein and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive a request from an endpoint to connect to a first access point; generate association identification token (e.g., PMK and PMKID) for the endpoint to connect to the first access point; and distribute the association identification token to a second access point prior to the endpoint attempting to connect to the second access point, the association identification token being used by the second access point to validate a subsequent request by the endpoint to connect to the second access point.Type: ApplicationFiled: July 22, 2022Publication date: November 10, 2022Inventors: Abhishek Dhammawat, Mansi Jain, Sudhir Kumar Jain
-
Patent number: 11411942Abstract: Systems, methods, and computer-readable media are provided for an efficient roaming management method using a single association identifier token for associating with different access points. In one aspect of the present disclosure, a network controller includes memory having computer-readable instructions stored therein and one or more processors. The one or more processors are configured to execute the computer-readable instructions to receive a request from an endpoint to connect to a first access point; generate association identification token (e.g., PMK and PMKID) for the endpoint to connect to the first access point; and distribute the association identification token to a second access point prior to the endpoint attempting to connect to the second access point, the association identification token being used by the second access point to validate a subsequent request by the endpoint to connect to the second access point.Type: GrantFiled: July 22, 2019Date of Patent: August 9, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Abhishek Dhammawat, Mansi Jain, Sudhir Kumar Jain
-
Patent number: 11240661Abstract: A secure Simultaneous Authentication of Equals (SAE) anti-clogging mechanism may be provided. A public key of an access point may be provided from the access point to a client attempting to connect with a network via the access point. The access point may receive from the client a first anti-clogging token and a public key of the client. The first anti-clogging token may be generated by the first client using a shared secret based on a private key of the client and the public key of the access point and a multiplier. The access point may generate a second anti-clogging token using a shared secret based on a private key of the access point and the public key of the client and the multiplier. The access point may then verify the first anti-clogging token and the second anti-clogging token match to authenticate the client.Type: GrantFiled: September 3, 2019Date of Patent: February 1, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Abhishek Dhammawat, Mansi Jain
-
Patent number: 11129022Abstract: A wireless network environment includes a plurality of access points, a wireless local area network (WLAN) controller, and a plurality of client devices. The client devices attempt to authenticate with the WLAN controller to gain access to wireless services provided by the WLAN controller and/or the access points. To authenticate with the WLAN controller, the WLAN controller obtains a request to establish a wireless network connection from one or more of the client devices. The WLAN controller then provides a response to the request. The response indicates whether the WLAN controller supports performing password-mapped simultaneous authentication of equals (SAE). The WLAN controller then obtains a message including a password-mapped identifier from the client device. The WLAN controller then establishes a connection with the client device based on the password obtained with password-mapped identifier mapping at WLC.Type: GrantFiled: November 19, 2018Date of Patent: September 21, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Abhishek Dhammawat, Sudhir Kumar Jain, Mansi Jain
-
Publication number: 20210204125Abstract: Authentication with security in wireless networks may be provided. A first confirm message comprising a first send-confirm element and a first confirm element may be received. Next, an Authenticator Number Used Once (ANonce) may be generated and a second confirm message may be sent comprising the ANonce, a second send-confirm element, and a second confirm element. Then an association request may be received comprising a Supplicant Number Used Once (SNonce) and a Message Integrity Code (MIC). An association response may be sent comprising an encrypted Group Temporal Key (GTK), an encrypted Integrity Group Temporal Key (IGTK), the ANonce, and the MIC. An acknowledgment may be received comprising the MIC in an Extensible Authentication Protocol (EAP) over LAN (EAPoL) key frame and a controller port may be unblocked in response to receiving the acknowledgment.Type: ApplicationFiled: March 17, 2021Publication date: July 1, 2021Applicant: Cisco Technology, Inc.Inventors: Abhishek Dhammawat, Mansi Jain
-
Patent number: 10966087Abstract: Authentication with security in wireless networks may be provided. A first confirm message comprising a first send-confirm element and a first confirm element may be received. Next, an Authenticator Number Used Once (ANonce) may be generated and a second confirm message may be sent comprising the ANonce, a second send-confirm element, and a second confirm element. Then an association request may be received comprising a Supplicant Number Used Once (SNonce) and a Message Integrity Code (MIC). An association response may be sent comprising an encrypted Group Temporal Key (GTK), an encrypted Integrity Group Temporal Key (IGTK), the ANonce, and the MIC. An acknowledgment may be received comprising the MIC in an Extensible Authentication Protocol (EAP) over LAN (EAPoL) key frame and a controller port may be unblocked in response to receiving the acknowledgment.Type: GrantFiled: November 15, 2018Date of Patent: March 30, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Abhishek Dhammawat, Mansi Jain
-
Publication number: 20210067961Abstract: A secure Simultaneous Authentication of Equals (SAE) anti-clogging mechanism may be provided. A public key of an access point may be provided from the access point to a client attempting to connect with a network via the access point. The access point may receive from the client a first anti-clogging token and a public key of the client. The first anti-clogging token may be generated by the first client using a shared secret based on a private key of the client and the public key of the access point and a multiplier. The access point may generate a second anti-clogging token using a shared secret based on a private key of the access point and the public key of the client and the multiplier. The access point may then verify the first anti-clogging token and the second anti-clogging token match to authenticate the client.Type: ApplicationFiled: September 3, 2019Publication date: March 4, 2021Applicant: Cisco Technology, Inc.Inventors: Abhishek Dhammawat, Mansi Jain
-
Publication number: 20200162907Abstract: Authentication with security in wireless networks may be provided. A first confirm message comprising a first send-confirm element and a first confirm element may be received. Next, an Authenticator Number Used Once (ANonce) may be generated and a second confirm message may be sent comprising the ANonce, a second send-confirm element, and a second confirm element. Then an association request may be received comprising a Supplicant Number Used Once (SNonce) and a Message Integrity Code (MIC). An association response may be sent comprising an encrypted Group Temporal Key (GTK), an encrypted Integrity Group Temporal Key (IGTK), the ANonce, and the MIC. An acknowledgment may be received comprising the MIC in an Extensible Authentication Protocol (EAP) over LAN (EAPoL) key frame and a controller port may be unblocked in response to receiving the acknowledgment.Type: ApplicationFiled: November 15, 2018Publication date: May 21, 2020Applicant: Cisco Technology, Inc.Inventors: Abhishek Dhammawat, Mansi Jain
-
Publication number: 20200162915Abstract: A wireless network environment includes a plurality of access points, a wireless local area network (WLAN) controller, and a plurality of client devices. The client devices attempt to authenticate with the WLAN controller to gain access to wireless services provided by the WLAN controller and/or the access points. To authenticate with the WLAN controller, the WLAN controller obtains a request to establish a wireless network connection from one or more of the client devices. The WLAN controller then provides a response to the request. The response indicates whether the WLAN controller supports performing password-mapped simultaneous authentication of equals (SAE). The WLAN controller then obtains a message including a password-mapped identifier from the client device. The WLAN controller then establishes a connection with the client device based on the password obtained with password-mapped identifier mapping at WLC.Type: ApplicationFiled: November 19, 2018Publication date: May 21, 2020Inventors: Abhishek Dhammawat, Sudhir Kumar Jain, Mansi Jain