Patents by Inventor Sandeep Korrapati
Sandeep Korrapati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230394213Abstract: A method, system, and computer program product for parallel regression to bypass regression process interruption are provided. The method identifies an RTL design. The RTL design is converted into a control data flow graph having a plurality of nodes and a plurality of arcs. A mapping table is generated with a machine learning database from a set of test cases based on the control data flow graph. The method selectively calls one or more test cases of the set of test cases to merge a branch to a main repository to bypass a portion of a regression process.Type: ApplicationFiled: August 22, 2023Publication date: December 7, 2023Inventors: Kousik Dan, Sandeep Korrapati, Joji P George, Amarnath Thulabanthula, Nitish Jindal, Madhuri Soma
-
Patent number: 11822675Abstract: Providing a method and a corresponding system for encrypting customer workload data through a trusted entity such as a self-boot engine (SBE). More specifically, there is a method and a corresponding system for securely extracting out customer centric data in a manner that requires the customer payloads and/or workloads to register with the SBE and share the encryption key.Type: GrantFiled: June 24, 2021Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Raja Das, Sachin Gupta, Santosh Balasubramanian, Sandeep Korrapati
-
Patent number: 11790143Abstract: A method, system, and computer program product for parallel regression to bypass regression process interruption are provided. The method identifies an RTL design. The RTL design is converted into a control data flow graph having a plurality of nodes and a plurality of arcs. A mapping table is generated with a machine learning database from a set of test cases based on the control data flow graph. The method selectively calls one or more test cases of the set of test cases to merge a branch to a main repository to bypass a portion of a regression process.Type: GrantFiled: June 15, 2021Date of Patent: October 17, 2023Assignee: International Business Machines CorporationInventors: Kousik Dan, Sandeep Korrapati, Joji P George, Amarnath Thulabanthula, Nitish Jindal, Madhuri Soma
-
Patent number: 11775694Abstract: Validating code that is stored in non-volatile memory. In some instances, code that is written and/or processed by an outside entity that is brought into a local non-volatile memory setting can potentially compromise a given computer system. In order to ensure that this type of code is secure, there are methods to generate interrupt signals that can later be overridden by Otprom code in order to properly validate this outside code.Type: GrantFiled: January 5, 2022Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Raja Das, Sandeep Korrapati
-
Patent number: 11704461Abstract: Embodiments include dynamic control of coverage by a verification testbench. Aspects include obtaining a design under test to be verified by the verification testbench and obtaining one or more testcases for execution by the verification testbench on the design under test. Aspects also include obtaining a plurality of triggers corresponding to the design under test, wherein each of the plurality of triggers includes an activation condition, a deactivation condition and a coverage. Aspects further include simulating, by the verification testbench, execution of the one or more testcases by the design under test. Based on detecting the activation condition of one of the plurality of triggers, aspects also include recording, in a coverage database, data specified in the coverage corresponding the one of the plurality of triggers until the deactivation condition is detected.Type: GrantFiled: January 4, 2022Date of Patent: July 18, 2023Assignee: International Business Machines CorporationInventors: Swathi Priya S, Sandeep Korrapati, Pretty Mariam Jacob, Anusha Reddy Rangareddygari, Puli Srivani, sreekanth reddy Kadapala
-
Publication number: 20230214566Abstract: Embodiments include dynamic control of coverage by a verification testbench. Aspects include obtaining a design under test to be verified by the verification testbench and obtaining one or more testcases for execution by the verification testbench on the design under test. Aspects also include obtaining a plurality of triggers corresponding to the design under test, wherein each of the plurality of triggers includes an activation condition, a deactivation condition and a coverage. Aspects further include simulating, by the verification testbench, execution of the one or more testcases by the design under test. Based on detecting the activation condition of one of the plurality of triggers, aspects also include recording, in a coverage database, data specified in the coverage corresponding the one of the plurality of triggers until the deactivation condition is detected.Type: ApplicationFiled: January 4, 2022Publication date: July 6, 2023Inventors: Swathi Priya S, Sandeep Korrapati, Pretty Mariam Jacob, Anusha Reddy Rangareddygari, Puli Srivani, Sreekanth Reddy Kadapala
-
Publication number: 20230214537Abstract: Validating code that is stored in non-volatile memory. In some instances, code that is written and/or processed by an outside entity that is brought into a local non-volatile memory setting can potentially compromise a given computer system. In order to ensure that this type of code is secure, there are methods to generate interrupt signals that can later be overridden by Otprom code in order to properly validate this outside code.Type: ApplicationFiled: January 5, 2022Publication date: July 6, 2023Inventors: Raja Das, Sandeep Korrapati
-
Publication number: 20220414233Abstract: Providing a method and a corresponding system for encrypting customer workload data through a trusted entity such as a self-boot engine (SBE). More specifically, there is a method and a corresponding system for securely extracting out customer centric data in a manner that requires the customer payloads and/or workloads to register with the SBE and share the encryption key.Type: ApplicationFiled: June 24, 2021Publication date: December 29, 2022Inventors: Raja Das, Sachin Gupta, Santosh Balasubramanian, Sandeep Korrapati
-
Publication number: 20220398368Abstract: A method, system, and computer program product for parallel regression to bypass regression process interruption are provided. The method identifies an RTL design. The RTL design is converted into a control data flow graph having a plurality of nodes and a plurality of arcs. A mapping table is generated with a machine learning database from a set of test cases based on the control data flow graph. The method selectively calls one or more test cases of the set of test cases to merge a branch to a main repository to bypass a portion of a regression process.Type: ApplicationFiled: June 15, 2021Publication date: December 15, 2022Inventors: Kousik Dan, Sandeep Korrapati, Joji P. George, Amarnath Thulabanthula, Nitish Jindal, Madhuri Soma
-
Patent number: 11194913Abstract: Embodiments provide a mutable CRTM schema for ensuring the integrity of a client workload on a single system as updates are made to the firmware used to initialize and run that system by booting a computing system in a secure mode; when successfully validating a boot image for the computing system via a secure verification code that is blocked from write access when the system is booted in a unsecure mode, allowing write access to the secure verification code; and continuing to boot the computing system in the secure mode according to the boot image. When booting the system and unseccessfully validating the boot image at the third time, the system boot is failed.Type: GrantFiled: March 12, 2019Date of Patent: December 7, 2021Assignee: International Business Machines CorporationInventors: Sachin Gupta, Sandeep Korrapati, Santosh Balasubramanian, Raja Das, Shakeeb Pasha B.K.
-
Patent number: 10902169Abstract: A method, system, and computer program product are described for use with graph-based verification of a circuit design. The method comprises performing, using a graph referencing the circuit design, a predefined set of one or more test sequences. The method further comprises determining that a first coverage point of the graph is not fully hit by the predefined set, and back-traversing the graph from a second coverage point of the graph that is partially hit or fully hit by the predefined set. The method further comprises generating, based on back-traversing the graph, a prospective test sequence to fully hit the first coverage point.Type: GrantFiled: November 8, 2019Date of Patent: January 26, 2021Assignee: International Business Machines CorporationInventors: Joji P. George, Kousik Dan, Nitish Jindal, Sandeep Korrapati, Amarnath Thulabanthula
-
Patent number: 10839132Abstract: Cover points are automatically generated based on analysis of the hardware design represented in register transfer level (RTL) of a hardware description language. A cover point generator uses uncertainty of event occurrence, critical point analysis and redundancy elimination to determine consequential cover points for function verification. A user may provide input parameters to the cover point generator to define depth and width of cover events for generating cover points.Type: GrantFiled: February 19, 2019Date of Patent: November 17, 2020Assignee: International Business Machines CorporationInventors: Kousik Dan, Sandeep Korrapati
-
Publication number: 20200293662Abstract: Embodiments provide a mutable CRTM schema for ensuring the integrity of a client workload on a single system as updates are made to the firmware used to initialize and run that system by booting a computing system in a secure mode; when successfully validating a boot image for the computing system via a secure verification code that is blocked from write access when the system is booted in a unsecure mode, allowing write access to the secure verification code; and continuing to boot the computing system in the secure mode according to the boot image. When booting the system and unseccessfully validating the boot image at the third time, the system boot is failed.Type: ApplicationFiled: March 12, 2019Publication date: September 17, 2020Inventors: Sachin GUPTA, Sandeep KORRAPATI, Santosh BALASUBRAMANIAN, Raja DAS, Shakeeb PASHA B.K.
-
Publication number: 20200265123Abstract: Cover points are automatically generated based on analysis of the hardware design represented in register transfer level (RTL) of a hardware description language. A cover point generator uses uncertainty of event occurrence, critical point analysis and redundancy elimination to determine consequential cover points for function verification. A user may provide input parameters to the cover point generator to define depth and width of cover events for generating cover points.Type: ApplicationFiled: February 19, 2019Publication date: August 20, 2020Inventors: Kousik Dan, Sandeep Korrapati
-
Patent number: 10223226Abstract: Disclosed aspects relate to controlling an electronic circuit having multiple units with at least one signal input each. A set of signal resources is determined by tracing back a dependency tree for each unit signal input until an endpoint representing a signal resource is reached. For each signal resource in the set a resource manager may be provided in dependence of its signal type. That resource manager may be assigned a set of signal inputs comprising each signal input in the circuit which was traced back to its respective signal resource. The resource manager is configured for controlling the signal resource. A control device may be provided to receive technical implementation requirements for one or more of the resource managers, detect conflicting requirements received for the one or more resource managers, and enable or disable one or more of the resource managers in response to the detected conflicting requirements.Type: GrantFiled: November 14, 2016Date of Patent: March 5, 2019Assignee: International Business Machines CorporationInventors: Joerg Behrend, Holger Horbach, Alexander Jung, Klaus Keuerleber, Sandeep Korrapati, Juergen Wakunda
-
Patent number: 10146654Abstract: Disclosed aspects relate to controlling an electronic circuit having multiple units with at least one signal input each. A set of signal resources is determined by tracing back a dependency tree for each unit signal input until an endpoint representing a signal resource is reached. For each signal resource in the set a resource manager may be provided in dependence of its signal type. That resource manager may be assigned a set of signal inputs comprising each signal input in the circuit which was traced back to its respective signal resource. The resource manager is configured for controlling the signal resource. A control device may be provided to receive technical implementation requirements for one or more of the resource managers, detect conflicting requirements received for the one or more resource managers, and enable or disable one or more of the resource managers in response to the detected conflicting requirements.Type: GrantFiled: February 15, 2018Date of Patent: December 4, 2018Assignee: International Business Machines CorporationInventors: Joerg Behrend, Holger Horbach, Alexander Jung, Klaus Keuerleber, Sandeep Korrapati, Juergen Wakunda
-
Publication number: 20180217907Abstract: Disclosed aspects relate to controlling an electronic circuit having multiple units with at least one signal input each. A set of signal resources is determined by tracing back a dependency tree for each unit signal input until an endpoint representing a signal resource is reached. For each signal resource in the set a resource manager may be provided in dependence of its signal type. That resource manager may be assigned a set of signal inputs comprising each signal input in the circuit which was traced back to its respective signal resource. The resource manager is configured for controlling the signal resource. A control device may be provided to receive technical implementation requirements for one or more of the resource managers, detect conflicting requirements received for the one or more resource managers, and enable or disable one or more of the resource managers in response to the detected conflicting requirements.Type: ApplicationFiled: February 15, 2018Publication date: August 2, 2018Inventors: Joerg Behrend, Holger Horbach, Alexander Jung, Klaus Keuerleber, Sandeep Korrapati, Juergen Wakunda
-
Publication number: 20180137023Abstract: Disclosed aspects relate to controlling an electronic circuit having multiple units with at least one signal input each. A set of signal resources is determined by tracing back a dependency tree for each unit signal input until an endpoint representing a signal resource is reached. For each signal resource in the set a resource manager may be provided in dependence of its signal type. That resource manager may be assigned a set of signal inputs comprising each signal input in the circuit which was traced back to its respective signal resource. The resource manager is configured for controlling the signal resource. A control device may be provided to receive technical implementation requirements for one or more of the resource managers, detect conflicting requirements received for the one or more resource managers, and enable or disable one or more of the resource managers in response to the detected conflicting requirements.Type: ApplicationFiled: November 14, 2016Publication date: May 17, 2018Inventors: Joerg Behrend, Holger Horbach, Alexander Jung, Klaus Keuerleber, Sandeep Korrapati, Juergen Wakunda