Patents by Inventor Sanjeev Joshi

Sanjeev Joshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140148431
    Abstract: Compounds of Formula (I), their preparation and use in preventing or treating bacterial infection is disclosed.
    Type: Application
    Filed: August 24, 2012
    Publication date: May 29, 2014
    Inventors: Mahesh Vithalbhai Patel, Prasad Keshav Deshpande, Satish Bhawsar, Sachin Bhagwat, Mohammed Alam Jafri, Amit Mishra, Laxmikant Pavase, Sunil Gupta, Rajesh Kale, Sanjeev Joshi
  • Publication number: 20140104960
    Abstract: Static random access memory (SRAM) circuits are used in most digital integrated circuits to store digital data bits. SRAM memory circuits are generally read by decoding an address, reading from an addressed memory cell using a set of bit lines, outputting data from the read memory cell, and precharging the bit lines for a subsequent memory cycle. To handle memory operations faster, a bit line multiplexing system is proposed. Two sets of bit lines are coupled to each memory cell and each set of bit lines are used for memory operations in alternating memory cycles. During a first memory cycle, a first set of bit lines accesses the memory array while precharging a second set of bit lines. Then during a second memory cycle following the first memory cycle, the first set of bit lines are precharged while the second set of bit lines accesses the memory array to read data.
    Type: Application
    Filed: October 15, 2012
    Publication date: April 17, 2014
    Inventors: Sundar Iyer, Shang-Tse Chuang, Thu Nguyen, Sanjeev Joshi, Adam Kablanian
  • Patent number: 8589851
    Abstract: Designing memory subsystems for integrated circuits can be time-consuming and costly task. To reduce development time and costs, an automated system and method for designing and constructing high-speed memory operations is disclosed. The automated system accepts a set of desired memory characteristics and then methodically selects different potential memory system design types and different implementations of each memory system design type. The potential memory system design types may include traditional memory systems, optimized traditional memory systems, intelligent memory systems, and hierarchical memory systems. A selected set of proposed memory systems that meet the specified set of desired memory characteristics is output to a circuit designer. When a circuit designer selects a proposed memory system, the automated system generates a complete memory system design, a model for the memory system, and a test suite for the memory system.
    Type: Grant
    Filed: August 23, 2010
    Date of Patent: November 19, 2013
    Assignee: Memoir Systems, Inc.
    Inventors: Sundar Iyer, Sanjeev Joshi, Shang-Tse Chuang
  • Publication number: 20130258757
    Abstract: Multi-port memory circuits are often required within modern digital integrated circuits to store data. Multi-port memory circuits allow multiple memory users to access the same memory cell simultaneously. Multi-port memory circuits are generally custom-designed in order to obtain the best performance or synthesized with logic synthesis tools for quick design. However, these two options for creating multi-port memory give integrated circuit designers a stark choice: invest a large amount of time and money to custom design an efficient multi-port memory system or allow logic synthesis tools to inefficiently create multi-port memory. An intermediate solution is disclosed that allows an efficient multi-port memory array to be created largely using standard circuit cell components and register transfer level hardware design language code.
    Type: Application
    Filed: March 29, 2012
    Publication date: October 3, 2013
    Applicant: MEMOIR SYSTEMS, INC.
    Inventors: Sundar Iyer, Shang-Tse Chuang, Thu Nguyen, Sanjeev Joshi, Adam Kablanian
  • Publication number: 20110289349
    Abstract: Monitoring and repairing memory includes selecting a first memory bank comprising a plurality of memory cells to analyze. The plurality of memory cells are copied from the first memory bank to a second memory bank, wherein a request to access the first memory bank is redirected to the second memory bank. A determination is made whether the first memory bank comprises an error of the memory cell.
    Type: Application
    Filed: May 24, 2010
    Publication date: November 24, 2011
    Applicant: Cisco Technology, Inc.
    Inventors: Matthias J. Loeser, Daniel V. Singletary, Sanjeev A. Joshi, Shadab Nazar
  • Publication number: 20110145777
    Abstract: Designing memory subsystems for integrated circuits can be time-consuming and costly task. To reduce development time and costs, an automated system and method for designing and constructing high-speed memory operations is disclosed. The automated system accepts a set of desired memory characteristics and then methodically selects different potential memory system design types and different implementations of each memory system design type. The potential memory system design types may include traditional memory systems, optimized traditional memory systems, intelligent memory systems, and hierarchical memory systems. A selected set of proposed memory systems that meet the specified set of desired memory characteristics is output to a circuit designer. When a circuit designer selects a proposed memory system, the automated system generates a complete memory system design, a model for the memory system, and a test suite for the memory system.
    Type: Application
    Filed: August 23, 2010
    Publication date: June 16, 2011
    Inventors: Sundar Iyer, Sanjeev Joshi, Shang-Tse Chuang
  • Publication number: 20080295145
    Abstract: A method for identifying non-orthogonal roles (112, 114, 116, 118) in an access control system (100). The method can include, for at least one policy (Pn,i) defined for a first role (112) in the access control system, automatically determining whether there is at least one policy (Pm,j) defined in a second role that conflicts with the policy defined in the first role. The method also can include, responsive to determining that the policy defined in the second role conflicts with the policy defined in the first role, providing a conflict indicator.
    Type: Application
    Filed: May 23, 2007
    Publication date: November 27, 2008
    Applicant: MOTOROLA, INC.
    Inventors: Bashir A. Haswarey, Sanjeev A. Joshi
  • Publication number: 20070240231
    Abstract: A method and system for managing objects in a O&M RBAC system includes a first step of dynamically discovering an object and associated command actions by the RBAC system. A next step includes defining roles and tasks to users assigning authorization privileges for the object. A next step includes updating a graphical user interface with information about the objects, roles, tasks, and command actions. A next step includes adding information about the objects, roles, tasks, and command actions to a database for the network. A next step includes entering a command with an action from a user. A next step includes determining a role of a requesting user. A next step includes comparing the role against the database to find authorization to execute the task and action against the object.
    Type: Application
    Filed: March 29, 2006
    Publication date: October 11, 2007
    Inventors: Bashir Haswarey, Sanjeev Joshi
  • Publication number: 20060235971
    Abstract: A method is disclosed for Simple Network Management Protocol (SNMP) bulk information processing. A request for a plurality of object instances stored in a storage space is received. The request specifies a condition and a maximum number of repetitions. The values of one or more object instances of the plurality of object instances are retrieved. The retrieval of object instance values is terminated when the condition is satisfied even though the maximum number of repetitions is not reached. For example, the condition may be specified by one or more pairs of Object Identifier (OID) values, wherein each pair is represented by a starting OID value and an ending OID value. In this example, the condition is satisfied when an OID value of an object instance that is retrieved is not lexicographically between the starting OID value and the ending OID value of any pair of the one or more pairs.
    Type: Application
    Filed: April 18, 2005
    Publication date: October 19, 2006
    Inventors: Keith McCloghrie, H. K. Vivek, Vinay Gaonkar, Sanjeev Joshi