Patents by Inventor Srinivas Krishnan

Srinivas Krishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240154018
    Abstract: Methods for forming a semiconductor structure and semiconductor structures are described. The method comprises patterning a substrate to form a first opening and a second opening, the substrate comprising an n transistor and a p transistor, the first opening over the n transistor and the second opening over the p transistor; pre-cleaning the substrate; depositing a titanium silicide (TiSi) layer on the n transistor and on the p transistor by plasma-enhanced chemical vapor deposition (PECVD); optionally depositing a first barrier layer on the titanium silicide (TiSi) layer and selectively removing the first barrier layer from the p transistor; selectively forming a molybdenum silicide (MoSi) layer on the titanium silicide (TiSi) layer on the n transistor and the p transistor; forming a second barrier layer on the molybdenum silicide (MoSi) layer; and annealing the semiconductor structure. The method may be performed in a processing chamber without breaking vacuum.
    Type: Application
    Filed: January 12, 2024
    Publication date: May 9, 2024
    Applicant: Applied Materials, Inc.
    Inventors: Ria Someshwar, Seshadri Ganguli, Lan Yu, Siddarth Krishnan, Srinivas Gandikota, Jacqueline S. Wrench, Yixiong Yang
  • Publication number: 20240106849
    Abstract: A device receives network segment information identifying network segments associated with a network, and receives endpoint host session information identifying sessions associated with endpoint hosts communicating with the network. The device generates, based on the network segment information and the endpoint host session information, a data structure that includes information associating the network segments with the sessions associated with the endpoint hosts. The device updates the data structure based on changes in the sessions associated with the endpoint hosts and based on changes in locations of the endpoint hosts within the network segments, and identifies, based on the data structure, a particular endpoint host, of the endpoint hosts, that changed locations within the network segments. The device determines a threat policy action to enforce for the particular endpoint host, and causes the threat policy action to be enforced, by the network, for the particular endpoint host.
    Type: Application
    Filed: December 5, 2023
    Publication date: March 28, 2024
    Inventors: Prakash T. SESHADRI, Binh Phu LE, Srinivas NIMMAGADDA, Jeffrey S. MARSHALL, Kartik Krishnan S. IYYER
  • Publication number: 20240089207
    Abstract: A method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.
    Type: Application
    Filed: November 22, 2023
    Publication date: March 14, 2024
    Applicant: Google LLC
    Inventors: David Schultz, Shuang Guan, Srinivas Krishnan, Eran Gal, Doron Shaharabani, Yossi Richter, Md Ahsan Arefin
  • Patent number: 11447089
    Abstract: A vehicle occupant restraint system includes an airbag cushion. A reaction surface is configured to move between a retracted position and a deployed position upon deployment of the airbag cushion, such that the reaction surfaces will direct the airbag cushion toward an occupant area upon deployment of the airbag cushion. Multiple embodiments of reaction surfaces are disclosed, including deployable instrument panel sections, flexible straps, and hoods.
    Type: Grant
    Filed: August 20, 2020
    Date of Patent: September 20, 2022
    Inventors: Roy P. Deutschmann, Alexandra Marie Lazaros, Roland Dominic Furtado, Srinivas Krishnan
  • Patent number: 11351953
    Abstract: An airbag can include active vents to manage the pressure within the airbag when deployed. The active vent can be at least partially controlled by using a tether. A tether separator can be configured to separate the tether. The tether separator can include an explosive. The tether separator can be operatively positioned relative to the tether such that, when the tether separator is activated, the explosive produces shockwaves and/or heat energy. The shockwaves and/or the heat energy can cause the tether to be separated into two pieces. In some instances, a portion of the tether can be held in tension to facilitate the separation of the tether.
    Type: Grant
    Filed: August 6, 2020
    Date of Patent: June 7, 2022
    Assignee: Toyoda Gosei Co., Ltd.
    Inventors: Roy P. Deutschmann, Srinivas Krishnan, Roland Furtado
  • Publication number: 20220041125
    Abstract: An airbag can include active vents to manage the pressure within the airbag when deployed. The active vent can be at least partially controlled by using a tether. A tether separator can be configured to separate the tether. The tether separator can include an explosive. The tether separator can be operatively positioned relative to the tether such that, when the tether separator is activated, the explosive produces shockwaves and/or heat energy. The shockwaves and/or the heat energy can cause the tether to be separated into two pieces. In some instances, a portion of the tether can be held in tension to facilitate the separation of the tether.
    Type: Application
    Filed: August 6, 2020
    Publication date: February 10, 2022
    Inventors: Roy P. Deutschmann, Srinivas Krishnan, Roland Furtado
  • Publication number: 20210328927
    Abstract: A method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.
    Type: Application
    Filed: June 28, 2021
    Publication date: October 21, 2021
    Applicant: Google LLC
    Inventors: David Schultz, Shuang Guan, Srinivas Krishnan, Eran Gal, Doron Shaharabani, Yossi Richter, Ahsan Arefin
  • Patent number: 11070475
    Abstract: A method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: July 20, 2021
    Assignee: Google LLC
    Inventors: David Schultz, Shuang Guan, Srinivas Krishnan, Eran Gal, Doron Shaharabani, Yossi Richter, Md Ahsan Arefin
  • Publication number: 20210053525
    Abstract: A vehicle occupant restraint system includes an airbag cushion. A reaction surface is configured to move between a retracted position and a deployed position upon deployment of the airbag cushion, such that the reaction surfaces will direct the airbag cushion toward an occupant area upon deployment of the airbag cushion. Multiple embodiments of reaction surfaces are disclosed, including deployable instrument panel sections, flexible straps, and hoods.
    Type: Application
    Filed: August 20, 2020
    Publication date: February 25, 2021
    Inventors: Roy P. Deutschmann, Alexandra Marie Lazaros, Roland Dominic Furtado, Srinivas Krishnan
  • Publication number: 20200195558
    Abstract: A method for transparent migration of virtual network functions is provided. The method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.
    Type: Application
    Filed: December 13, 2018
    Publication date: June 18, 2020
    Applicant: Google LLC
    Inventors: David Schultz, Shuang Guan, Srinivas Krishnan, Eran Gal, Doron Shaharabani, Yossi Richter, Md Ahsan Arefin
  • Patent number: 10027550
    Abstract: Described herein is a system and method for providing and administering a partitionable environment for operating application software. The environment is provided together with a plurality of deployable resources usable within the environment and one or more resource group templates. Each resource group template defines a grouping of the deployable resources within a domain. An administration console is usable to create and configure one or more partitions within the domain, with each partition providing an administrative and runtime subdivision of the domain. The administration console can be set to display the one or more partitions and enable creation and configuration of specific artifacts within the one or more partitions.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: July 17, 2018
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Anissa Lam, Loren Konkus, Suma Sri Uppala, Srinivas Krishnan
  • Patent number: 9973473
    Abstract: Methods, systems, and computer readable media for rapid filtering of opaque data traffic are disclosed. According to one method, the method includes receiving a packet containing a payload. The method also includes analyzing a portion of the payload for determining whether the packet contains compressed or encrypted data. The method further includes performing, if the packet contains compressed or encrypted data, at least one of sending the packet to an opaque traffic analysis engine for analysis, discarding the packet, logging the packet, or marking the packet.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: May 15, 2018
    Assignee: THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL
    Inventors: Andrew Maxwell White, Fabian Monrose, Srinivas Krishnan, Phillip Andrew Porras, Michael Donald Bailey
  • Patent number: 9934379
    Abstract: Methods, systems, and computer readable media for detecting a compromised computing host are disclosed. According to one method, the method includes receiving one or more domain name system (DNS) non-existent domain (NX) messages associated with a computing host. The method also includes determining, using a host score associated with one or more unique DNS zones or domain names included in the one or more DNS NX messages, whether the computing host is compromised. The method further includes performing, in response to determining that the computing host is compromised, a mitigation action.
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: April 3, 2018
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Fabian Monrose, Teryl Taylor, Srinivas Krishnan, John McHugh
  • Patent number: 9721089
    Abstract: According to one aspect, the subject matter described herein includes a method for efficient computer forensic analysis and data access control. The method includes steps occurring from within a virtualization layer separate from a guest operating system. The steps include monitoring disk accesses by the guest operating system to a region of interest on a disk from which data is copied into memory. The steps also include tracking subsequent accesses to the memory resident data where the memory resident data is copied from its initial location to other memory locations or over a network. The steps further include linking operations made by the guest operating system associated with the disk accesses with operations made by the guest operating system associated with the memory accessed.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: August 1, 2017
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Srinivas Krishnan, Fabian Monrose, Kevin Snow
  • Patent number: 9305165
    Abstract: According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The method includes extracting data content from a buffer. The method also includes providing an operating system kernel configured to detect injected machine code. The method further includes executing, using the operating system kernel, the data content on a physical processor. The method further includes monitoring, using the operating system kernel, the execution of the data content to determine whether the data content contains injected machine code indicative of a code injection attack.
    Type: Grant
    Filed: May 7, 2012
    Date of Patent: April 5, 2016
    Assignee: The University of North Carolina at Chapel Hill
    Inventors: Kevin Snow, Fabian Monrose, Srinivas Krishnan
  • Publication number: 20160026796
    Abstract: Methods, systems, and computer readable media for detecting a compromised computing host are disclosed. According to one method, the method includes receiving one or more domain name system (DNS) non-existent domain (NX) messages associated with a computing host. The method also includes determining, using a host score associated with one or more unique DNS zones or domain names included in the one or more DNS NX messages, whether the computing host is compromised. The method further includes performing, in response to determining that the computing host is compromised, a mitigation action.
    Type: Application
    Filed: March 5, 2014
    Publication date: January 28, 2016
    Inventors: Fabian Monrose, Teryl Taylor, Srinivas Krishnan, John McHugh
  • Publication number: 20150372883
    Abstract: Described herein is a system and method for providing and administering a partitionable environment for operating application software. The environment is provided together with a plurality of deployable resources usable within the environment and one or more resource group templates. Each resource group template defines a grouping of the deployable resources within a domain. An administration console is usable to create and configure one or more partitions within the domain, with each partition providing an administrative and runtime subdivision of the domain. The administration console can be set to display the one or more partitions and enable creation and configuration of specific artifacts within the one or more partitions.
    Type: Application
    Filed: June 23, 2015
    Publication date: December 24, 2015
    Inventors: ANISSA LAM, LOREN KONKUS, SUMA SRI UPPALA, SRINIVAS KRISHNAN
  • Patent number: 9049140
    Abstract: A source device obtains a data packet that includes both a destination address and a payload. The source device selects an exit point address of multiple exit point addresses corresponding to the destination address based on one or more policies. The source device encapsulates the data packet with a header that includes the selected exit point address, and the encapsulated data packet is provided to the backbone network. The encapsulated data packet is routed through the backbone network based on the exit point address, and an edge router of the backbone network identifies an interface of the edge router that corresponds to the exit point address. The header is removed from the encapsulated data packet, and the data packet is added to a buffer of the interface for routing to one or more other devices outside of the backbone network.
    Type: Grant
    Filed: November 18, 2010
    Date of Patent: June 2, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Abhishek Singh, Ming Zhang, Albert G. Greenberg, Parantap Lahiri, David A. Maltz, Srinivas Krishnan
  • Publication number: 20150052601
    Abstract: Methods, systems, and computer readable media for rapid filtering of opaque data traffic are disclosed. According to one method, the method includes receiving a packet containing a payload. The method also includes analyzing a portion of the payload for determining whether the packet contains compressed or encrypted data. The method further includes performing, if the packet contains compressed or encrypted data, at least one of sending the packet to an opaque traffic analysis engine for analysis, discarding the packet, logging the packet, or marking the packet.
    Type: Application
    Filed: March 13, 2013
    Publication date: February 19, 2015
    Inventors: Andrew Maxwell White, Fabian Monrose, Srinivas Krishnan, Phillip Andrew Porras, Michael Donald Bailey
  • Publication number: 20140181976
    Abstract: According to one aspect, the subject matter described herein includes a method for detecting injected machine code. The method includes extracting data content from a buffer. The method also includes providing an operating system kernel configured to detect injected machine code. The method further includes executing, using the operating system kernel, the data content on a physical processor. The method further includes monitoring, using the operating system kernel, the execution of the data content to determine whether the data content contains injected machine code indicative of a code injection attack.
    Type: Application
    Filed: May 7, 2012
    Publication date: June 26, 2014
    Applicant: THE UNIVERSITY OF NORTH CAROLINA AT CHAPEL HILL
    Inventors: Kevin Snow, Fabian Monrose, Srinivas Krishnan