Patents by Inventor Sourin Sarkar

Sourin Sarkar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250103707
    Abstract: In some implementations, a memory device may include one or more components. The one or more components may be configured to identify an operation to access content stored in a memory of the memory device, wherein the operation is associated with a user profile. The one or more components may be configured to flag a user, associated with the user profile, as being potentially malicious based on the operation conflicting with a past content access pattern associated with the user profile. The one or more components may be configured to lock the memory based on the user being flagged.
    Type: Application
    Filed: July 23, 2024
    Publication date: March 27, 2025
    Inventors: Sourin SARKAR, Kiran K. GUNNAM, Chittoor Ranganathan PARTHASARATHY
  • Publication number: 20250106014
    Abstract: In some implementations, a memory device may generate a physical unclonable function (PUF) value. The memory device may access a PUF protection key stored in a non-host-addressable memory region. The memory device may encrypt the PUF value, using the PUF protection key, to generate an encrypted PUF value. The memory device may store the encrypted PUF value in scattered memory locations in the non-host-addressable memory region.
    Type: Application
    Filed: December 9, 2024
    Publication date: March 27, 2025
    Inventors: Sourin SARKAR, Vamshikrishna KOMURAVELLI
  • Publication number: 20250068739
    Abstract: Implementations described herein relate to establishing a chain of ownership of a device. In some implementations, the device may determine first ownership metadata based on first ownership data associated with the device. The device may split the first ownership metadata into a first portion of first ownership metadata and a second portion of first ownership metadata. The device may store, in the memory of the device, the first portion of first ownership metadata. The device may transmit, to a server, the second portion of first ownership metadata for storage in a blockchain ledger of a blockchain node. A chain of ownership associated with the device may be established based on a combination of the first portion of first ownership metadata stored in the memory of the device and the second portion of first ownership metadata stored in the blockchain ledger.
    Type: Application
    Filed: November 8, 2024
    Publication date: February 27, 2025
    Inventor: Sourin SARKAR
  • Patent number: 12229327
    Abstract: A system for providing forensic tracing of memory device content erasure and tampering is disclosed. The system uses a special command that enables forensic tracing in a secure memory device. Once the forensic tracing is enabled, firmware of the memory device tracks the data stored on the memory device. The command specifies whether the tracking and tracing is for the entire memory device or for a region of the memory device. The firmware confirms that the forensic tracing is enabled, and a target protection region is defined. Once an authenticated command for an operation to access, modify, or erase data of the memory device is received from a host, the system enables the operation to proceed. The system creates a trace of the operation and the metadata of the target region that is modified within a secure memory region of the memory device that is not addressable by the host device.
    Type: Grant
    Filed: September 7, 2022
    Date of Patent: February 18, 2025
    Assignee: Micron Technology, Inc.
    Inventor: Sourin Sarkar
  • Patent number: 12166870
    Abstract: In some implementations, a memory device may generate a physical unclonable function (PUF) value. The memory device may access a PUF protection key stored in a non-host-addressable memory region. The memory device may encrypt the PUF value, using the PUF protection key, to generate an encrypted PUF value. The memory device may store the encrypted PUF value in scattered memory locations in the non-host-addressable memory region.
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: December 10, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Sourin Sarkar, Vamshikrishna Komuravelli
  • Patent number: 12141286
    Abstract: Implementations described herein relate to establishing a chain of ownership of a device. In some implementations, the device may determine first ownership metadata based on first ownership data associated with the device. The device may split the first ownership metadata into a first portion of first ownership metadata and a second portion of first ownership metadata. The device may store, in the memory of the device, the first portion of first ownership metadata. The device may transmit, to a server, the second portion of first ownership metadata for storage in a blockchain ledger of a blockchain node. A chain of ownership associated with the device may be established based on a combination of the first portion of first ownership metadata stored in the memory of the device and the second portion of first ownership metadata stored in the blockchain ledger.
    Type: Grant
    Filed: July 6, 2022
    Date of Patent: November 12, 2024
    Assignee: Micron Technology, Inc.
    Inventor: Sourin Sarkar
  • Publication number: 20240330009
    Abstract: Implementations described herein relate to boot processes for memory devices. In some implementations, a controller of a storage system receives a command for enabling a fast bootup process for the storage system. The fast bootup process may exclude a measurement of information retrieved from a memory device of the storage system during the fast bootup process. The controller may enable the fast bootup process based on the command. The controller may disable a normal bootup process for the storage system based on the fast bootup process being enabled. The normal bootup process may include a measurement of information retrieved from the memory device during the normal bootup process.
    Type: Application
    Filed: June 10, 2024
    Publication date: October 3, 2024
    Inventors: Sourin SARKAR, Vamshikrishna KOMURAVELLI, Kanika MITTAL
  • Patent number: 12014187
    Abstract: Implementations described herein relate to boot processes for memory devices. In some implementations, a controller of a storage system receives a command for enabling a fast bootup process for the storage system. The fast bootup process may exclude a measurement of information retrieved from a memory device of the storage system during the fast bootup process. The controller may enable the fast bootup process based on the command. The controller may disable a normal bootup process for the storage system based on the fast bootup process being enabled. The normal bootup process may include a measurement of information retrieved from the memory device during the normal bootup process.
    Type: Grant
    Filed: May 4, 2022
    Date of Patent: June 18, 2024
    Assignee: Micron Technology, Inc.
    Inventors: Sourin Sarkar, Vamshikrishna Komuravelli, Kanika Mittal
  • Publication number: 20240078348
    Abstract: A system for providing forensic tracing of memory device content erasure and tampering is disclosed. The system uses a special command that enables forensic tracing in a secure memory device. Once the forensic tracing is enabled, firmware of the memory device tracks the data stored on the memory device. The command specifies whether the tracking and tracing is for the entire memory device or for a region of the memory device. The firmware confirms that the forensic tracing is enabled, and a target protection region is defined. Once an authenticated command for an operation to access, modify, or erase data of the memory device is received from a host, the system enables the operation to proceed. The system creates a trace of the operation and the metadata of the target region that is modified within a secure memory region of the memory device that is not addressable by the host device.
    Type: Application
    Filed: September 7, 2022
    Publication date: March 7, 2024
    Inventor: Sourin Sarkar
  • Publication number: 20240078314
    Abstract: A system for providing usage model context aware power management in secure systems with embedded hardware security modules is disclosed. The system determines a context associated with a transaction with a memory device that is initiated by a host device. Based on the context, the system sets conditions within its internal data structures and state machines. The context may indicate that the transaction is a secure transaction requiring cryptographic services of the memory device. Flags are set in firmware of the memory device indicating a need for context aware power management and for cryptographic services. If a power management function to reduce power to the memory device is to be executed, the firmware rejects the transaction until the memory device reenters a functional mode. If the function is not to be executed, the firmware provides the host with a notification of an impending power state change for the memory device.
    Type: Application
    Filed: September 7, 2022
    Publication date: March 7, 2024
    Inventors: Sourin Sarkar, Vamshikrishna Komuravelli
  • Publication number: 20230394901
    Abstract: In some aspects, the techniques described herein relate to a method including: receiving, by an electronic voting machine (EVM), user data from a user device, the user data including a unique code; presenting, by the EVM, an interface, the interface capable of receiving a vote; generating, by the EVM, a command based on the user data and the vote; determining, by the EVM, that the command is valid; encrypting, by the EVM, the vote and the user data; and writing, by the EVM, the vote to a secure memory.
    Type: Application
    Filed: July 7, 2022
    Publication date: December 7, 2023
    Inventors: Sourin Sarkar, Vamshikrishna Komuravelli, Spandana Patchigolla
  • Publication number: 20230393763
    Abstract: Implementations described herein relate to protection against invalid memory commands. In some implementations, a memory device may include one or more components that may receive, from a host device, a pilot command that includes an indication of a sequence of upcoming memory commands to be transmitted from the host device to the memory device, receive a memory command from the host device after receiving the pilot command, determine that the memory command is invalid based on the indication of the sequence of upcoming memory commands, and transmit, to the host device and based on determining that the memory command is invalid, a message indicating that the memory command is invalid. Numerous other implementations are described.
    Type: Application
    Filed: June 7, 2022
    Publication date: December 7, 2023
    Inventor: Sourin SARKAR
  • Publication number: 20230396611
    Abstract: In some aspects, the techniques described herein relate to a method including: receiving a radio signal by a wireless transceiver installed in a vehicle; determining that the radio signal was generated by and received from a legitimate user based on a biometric data of the legitimate user and a unique device identifier (UDI) included in the radio signal; enabling access to the vehicle; and enabling ignition of the vehicle based on the biometric data and the UDI.
    Type: Application
    Filed: June 2, 2022
    Publication date: December 7, 2023
    Inventors: Sourin Sarkar, Gowrishankar Gajendiran, Kanika Mittal
  • Publication number: 20230391345
    Abstract: In some implementations, a host processor associated with a vehicle may select, from a plurality of devices that are configured to communicate with the host processor for performing security functions, a first device to serve as a primary device and a second device to serve as a secondary device. The first device may include a first memory with an embedded hardware security module and may be associated with a first set of nodes of the vehicle. The second device may include a second memory with an embedded hardware security module and may be associated with a second set of nodes of the vehicle. The host processor may determine, based on a signal, a failure associated with the first device or the second device. The host processor may initiate a remediation process based on the failure associated with the first device or the second device. Numerous other implementations are described.
    Type: Application
    Filed: July 6, 2022
    Publication date: December 7, 2023
    Inventor: Sourin SARKAR
  • Publication number: 20230394152
    Abstract: Implementations described herein relate to establishing a chain of ownership of a device. In some implementations, the device may determine first ownership metadata based on first ownership data associated with the device. The device may split the first ownership metadata into a first portion of first ownership metadata and a second portion of first ownership metadata. The device may store, in the memory of the device, the first portion of first ownership metadata. The device may transmit, to a server, the second portion of first ownership metadata for storage in a blockchain ledger of a blockchain node. A chain of ownership associated with the device may be established based on a combination of the first portion of first ownership metadata stored in the memory of the device and the second portion of first ownership metadata stored in the blockchain ledger.
    Type: Application
    Filed: July 6, 2022
    Publication date: December 7, 2023
    Inventor: Sourin SARKAR
  • Publication number: 20230359466
    Abstract: Implementations described herein relate to boot processes for memory devices. In some implementations, a controller of a storage system receives a command for enabling a fast bootup process for the storage system. The fast bootup process may exclude a measurement of information retrieved from a memory device of the storage system during the fast bootup process. The controller may enable the fast bootup process based on the command. The controller may disable a normal bootup process for the storage system based on the fast bootup process being enabled. The normal bootup process may include a measurement of information retrieved from the memory device during the normal bootup process.
    Type: Application
    Filed: May 4, 2022
    Publication date: November 9, 2023
    Inventors: Sourin SARKAR, Vamshikrishna KOMURAVELLI, Kanika MITTAL
  • Publication number: 20230344624
    Abstract: In some implementations, a memory device may generate a physical unclonable function (PUF) value. The memory device may access a PUF protection key stored in a non-host-addressable memory region. The memory device may encrypt the PUF value, using the PUF protection key, to generate an encrypted PUF value. The memory device may store the encrypted PUF value in scattered memory locations in the non-host-addressable memory region.
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Inventors: Sourin SARKAR, Vamshikrishna KOMURAVELLI
  • Publication number: 20230300139
    Abstract: In some implementations, a device of an Internet of Things (IoT) network may receive, from a host associated with the IoT network, information associated with the IoT network. The device may store, via a memory controller of the device, the information in a memory with an embedded hardware security module of the device, wherein the device serves as a root of trust for the host using the information stored in the memory. The device may receive, from the host, a request to perform a security function. The device may perform, based on the request, the security function using the information stored in the memory. The device may generate an alert based on an outcome of the security function. Numerous other implementations are described.
    Type: Application
    Filed: March 17, 2022
    Publication date: September 21, 2023
    Inventors: Sourin SARKAR, Kanika MITTAL, Gowrishankar GAJENDIRAN
  • Patent number: 9626318
    Abstract: Methods and devices are provided for determining compliance with standards for at least one of Serial Attached SCSI and Serial Advanced Technology Attachment (SAS/SATA). The device comprises PHY layer logic operable to couple the device with another device, and a control unit. The control unit is operable to direct operations of the PHY layer logic, and to determine that the other device is a SAS/SATA device. The control unit is further operable to perform SAS/SATA protocol compliance testing on the other device to determine a degree of compliance of the other device with SAS/SATA protocol standards, and to alter subsequent communications with the other device responsive to determining that the other device is not fully compliant with SAS/SATA protocol standards.
    Type: Grant
    Filed: January 26, 2012
    Date of Patent: April 18, 2017
    Assignee: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD.
    Inventor: Sourin Sarkar
  • Publication number: 20160306555
    Abstract: A set of storage capacity data points may be obtained. A regression may be determined from the set. A set of coefficients of determination for a subset of the set may be obtained. A breakpoint for a subsequent regression may be determined from a point of the subset having a maximal coefficient of determination.
    Type: Application
    Filed: December 20, 2013
    Publication date: October 20, 2016
    Inventors: Sinchan Banerjee, Sourin Sarkar