Patents by Inventor Swarup Bhunia

Swarup Bhunia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230006674
    Abstract: A method and system are directed to protecting hardware IP, particularly of ASIC designs. Programmability is introduced into an ASIC design to increase the difficulty of formulating ASIC designs as Boolean Satisfiability (SAT) problems. Fine-grain redaction of security-critical information from a design is employed by removing high-entropy logic blocks and subsequently inserting programmable components in place of the redacted portion to hide the actual design intent.
    Type: Application
    Filed: June 22, 2022
    Publication date: January 5, 2023
    Inventors: Swarup BHUNIA, Aritra DASGUPTA, Pravin GAIKWAD, Md Moshiur RAHMAN, Aritra BHATTACHARYAY
  • Publication number: 20220374553
    Abstract: A system for secure testing and provisioning of an integrated circuit (IC) includes, in part, a secure reconfigurable key provisioning architecture (SLEEVE) module disposed in the IC, and a secure asset provisioning hardware entity (SAPHE) module. The IC may include, in part, a modified IEEE 1500 wrapper to control its operation modes. The SLEEVE module may include, in part, an encoding/decoding module and an unlocking module. The encoding/decoding module may include, in part, a decode key stream cipher module, an encode key stream cipher module, Seed Key programmable linear-feedback shift registers (LFSRs), Initialization Vector (IV) LFSRs, and configuration registers. The encoding/decoding module may be configured to generate key bits for decoding and encoding inputs and outputs of the IC. The unlocking module may include, in part, a pattern matching block and a counter. The unlocking module may be configured to enable write access to the configuration registers.
    Type: Application
    Filed: May 6, 2022
    Publication date: November 24, 2022
    Inventors: Swarup Bhunia, Atul Prasad Deb Nath, Kshitij Raj, Sandip Ray, Patanjali Sristi Lakshmiprasanna Sriramakumara
  • Publication number: 20220357394
    Abstract: A reconfigurable JTAG includes, in part, a core logic, a boundary scan chain cell, one or more reconfigurable blocks (RBs), and a reconfigurable block (RB) programming module. The RBs may include, in part, one or more reconfigurable boundary scan chain blocks (RBB) adapted to couple the boundary scan chain cell to the core logic and to input/output (I/O) ports of the reconfigurable JTAG. The RBs may also include, in part, one or more additional reconfigurable logic (ARL) blocks to provide enhanced logic for locking operations. The RB programmable module may communicate with a memory storing data for configuring the RBBs and ARLs. The RB programming module may configure the RBBs and ARLs based at least in part on the data stored in the memory to disable access to the I/O ports of the JTAG. The RB programming module may configure the RBBs to encrypt the I/O ports in accordance with a cipher algorithm.
    Type: Application
    Filed: April 28, 2022
    Publication date: November 10, 2022
    Inventors: Swarup Bhunia, Christopher Vega, Reiner Dizon, Rohan Reddy Kalavakonda, Patanjali Sristi Lakshmiprasanna Sriramakumara
  • Patent number: 11480614
    Abstract: The present disclosure describes exemplary methods and systems that are applicable for hardware authentication, counterfeit detection, and in-field tamper detection in both printed circuit board and/or integrated circuit levels by utilizing random variations in boundary-scan path delay and/or current in the industry-standard JTAG-based design-for-test structure to generate unique device identifiers.
    Type: Grant
    Filed: November 13, 2020
    Date of Patent: October 25, 2022
    Assignee: University of Florida Research Foundation, Inc.
    Inventors: Swarup Bhunia, Shubhra Deb Paul
  • Patent number: 11419533
    Abstract: The present disclosure relates generally to using detected bladder events for the diagnosis of urinary incontinence or the treatment of lower urinary tract dysfunction. A system includes a sensing device comprising a pressure sensor to directly detect a pressure within a bladder. The sensing device is adapted to be located within the bladder. The system also includes a signal processing device to: receive a signal indicating the detected pressure within the bladder; detect a bladder event based the detected pressure within the signal; and characterize the bladder event as a bladder contraction event or a non-contraction event. The characterization of the bladder event can be used in the diagnosis of urinary incontinence or the treatment of lower urinary tract dysfunction.
    Type: Grant
    Filed: March 21, 2019
    Date of Patent: August 23, 2022
    Assignees: THE CLEVELAND CLINIC FOUNDATION, The United States Government as represented by the Department of Veterans Affairs, Case Western Reserve University
    Inventors: Margot S. Damaser, Swarup Bhunia, Robert Karam, Steve Majerus, Dennis Bourbeau, Hui Zhu
  • Publication number: 20220253563
    Abstract: In general, embodiments of the present disclosure provide methods, apparatus, systems, computer program products, computing devices, and computing entities for modifying a design of a hardware IP. According to one embodiment, a method is provided, the method including generating a control and data flow graph (CDFG) representation for portions of the design. The method further includes partitioning the CDFG representation into a set of partitioned sub-graphs. The method further includes, for each partitioned sub-graph, generating a merged sub-graph to form a set of merged sub-graphs. Generating the merged sub-graph for each partitioned sub-graph involves generating a container sub-graph and merging the container sub-graph with the partitioned sub-graph to form the merged sub-graph. The container sub-graph may be a modification of the partitioned sub-graph with respect to an identified feature, in some examples.
    Type: Application
    Filed: January 31, 2022
    Publication date: August 11, 2022
    Inventors: Swarup Bhunia, Abdulrahman Alaql
  • Publication number: 20220222386
    Abstract: The present disclosure describes various embodiments of systems, apparatuses, and methods of protecting an integrated circuit. One such method comprises operating the integrated circuit under a normal mode of operation; detecting, by a decommission controller, a triggering condition for a decommission operation to be initiated for the integrated circuit; initiating, by the decommission controller, a decommission mode for the integrated circuit after detection of the triggering condition; and causing, by the decommission controller, functionality of the integrated circuit to be irreversibly disabled after initiating the decommission mode. Other methods, systems, and apparatus are also presented.
    Type: Application
    Filed: January 11, 2022
    Publication date: July 14, 2022
    Inventors: Swarup BHUNIA, Md Moshiur RAHMAN, Aritra DASGUPTA, Abdulrahman ALAQL
  • Patent number: 11376979
    Abstract: Apparatus, systems, and methods described herein relate generally to on-the-go entity-to-entity charging in transportation systems. A method can include determining charge levels, current positions, and transport speeds for an electric vehicle (EV), identifying one or more EVs in need of charging, and mobilizing a nearby EV for on-the-go peer-to-peer charging. A processor, with a memory including computer program code, can be configured to receive current charge level data for mobile battery-powered entities, identify one or more EVs to be charged and one or more other EVs that have excess charge to transfer, and send charging instructions to the EVs. A routing and charge transaction scheduling algorithm can be used to optimize the route of one or more battery-powered entities and to schedule charge transactions between EVs and/or a charging entity.
    Type: Grant
    Filed: February 5, 2020
    Date of Patent: July 5, 2022
    Assignee: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCORPORATED
    Inventors: Prabuddha Chakraborty, Swarup Bhunia
  • Publication number: 20220198108
    Abstract: In general, embodiments of the present disclosure provide methods, apparatus, systems, computer program products, computing devices, computing entities, and/or the like for altering a design of a hardware intellectual property (IP). In accordance with various embodiments, a representation of the design of the hardware IP is converted to generate a control and data flow graph (CDFG) for the design. An entropy analysis of the CDFG is conducted to identify one or more control paths and/or data paths for removal. Responsive to identifying control path(s) for removal, control logic for the control path(s) is removed from the design and replaced with first reconfigurable logic. Responsive to identifying data path(s) for removal, datapath logic for the data path(s) is removed from the design and replaced with second reconfigurable logic. Logic synthesis is then performed on the design, along with verification to check functional correctness of the design of the hardware.
    Type: Application
    Filed: December 15, 2021
    Publication date: June 23, 2022
    Inventors: Swarup BHUNIA, Abdulrahman ALAQL
  • Publication number: 20220188387
    Abstract: The present disclosure provides systems and methods for timed unlocking and locking of hardware intellectual properties obfuscation. One such method includes determining whether received key inputs match a functional key sequence of an integrated circuit or a test key sequence of the integrated circuit; permanently enabling operation of the integrated circuit responsive to the received key inputs being determined to be a functional key sequence for permanently enabling operation of the integrated circuit; temporarily enabling operation of the integrated circuit responsive to the received key inputs being determined to be the test key sequence for temporarily enabling operation of the integrated circuit to perform testing of the functionality and disable thereafter; and locking sequential logic and combinational logic of the integrated circuit if the received key inputs are determined to not be either the functional key sequence or the test key sequence. Other systems and methods are also provided.
    Type: Application
    Filed: December 13, 2021
    Publication date: June 16, 2022
    Inventors: Swarup Bhunia, Abdulrahman Alaql, Aritra Dasgupta, Md Moshiur Rahman
  • Patent number: 11341283
    Abstract: Embodiments of the present disclosure provide methods, apparatus, systems, computer program products, computing devices, and/or computing entities for obfuscating a hardware intellectual property (IP) design by locking the design based at least in part on a plurality of key-bits. In one embodiment, a method is provided comprising: generating a key vulnerability matrix for a locked version of the design and a plurality of attacks that comprises for each attack, a vector comprising a value for each key-bit identifying whether the attack successfully extracted a correct key value for the key-bit; and for each key-bit: determining whether the key-bit is vulnerable to an attack based on the values in the matrix; and responsive to being vulnerable: identifying a set of solutions to mitigate the attack; selecting a solution from the set; and inserting a key-gate type for the key-bit at a location identified by the selected solution into the design.
    Type: Grant
    Filed: November 23, 2020
    Date of Patent: May 24, 2022
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Abdulrahman Alaql, Saranyu Chattopadhyay, Swarup Bhunia, Prabuddha Chakraborty
  • Patent number: 11321510
    Abstract: Embodiments of the present disclosure provide methods, apparatus, and computer program products for generating an insertion netlist for a target circuit configured for inserting a malicious design alteration into the circuit based on a design identifying reference trigger nets. Features are extracted for each net identified in a netlist for the circuit. A set of reference trigger features is generated for each of the reference trigger nets. A net is selected from the netlist for each set of reference trigger features based on a similarity between the features of the net and the set of reference trigger features. The insertion netlist is generated that includes the circuit with the malicious design alteration inserted at each of the selected nets.
    Type: Grant
    Filed: September 29, 2020
    Date of Patent: May 3, 2022
    Assignee: University of Florida Research Foundation, Incorporated
    Inventors: Swarup Bhunia, Prabuddha Chakraborty, Abhishek A. Nair, Tamzidul Hoque, Jonathan W. Cruz, Naren Masna, Pravin Gaikwad
  • Patent number: 11314953
    Abstract: This disclosure relates to tagging of materials and objects and analysis for authentication thereof. An example method includes analyzing separately a number of locations distributed across a given surface of a solid object according to one or more analysis technologies to determine feature data for each of the locations. The feature data are indicative of a respective chemical property and/or mechanical property of the solid object at each of the locations, corresponding to a feature tag, and the feature data depend on the one or more analysis technologies. The method also includes determining a tag signature for the solid object based on the feature data determined for each of the locations.
    Type: Grant
    Filed: March 12, 2020
    Date of Patent: April 26, 2022
    Assignees: CASE WESTERN RESERVE UNIVERSITY, UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INC.
    Inventors: Swarup Bhunia, Naren Vikram Masna, Soumyajit Mandal
  • Publication number: 20220083987
    Abstract: The present disclosure describes various embodiments of systems, apparatuses, and methods for drone-based administration of remotely located devices. One such method comprises deploying an unmanned aerial vehicle from a base station, wherein the base station assigns a maintenance order to the unmanned aerial vehicle for servicing of a remote device, traveling, by the unmanned aerial vehicle, to the location of the remote device, authenticating, by the unmanned aerial vehicle, a valid identification of the remote device; upon the remote device being authenticated by the unmanned aerial vehicle, servicing the remote device by at least charging a power supply of the remote device and transferring contents of a device log to the unmanned aerial vehicle; and after completing the servicing of the remote device; returning to the base station and transferring contents of the device log to the base station.
    Type: Application
    Filed: September 7, 2021
    Publication date: March 17, 2022
    Inventors: SWARUP BHUNIA, PRABUDDHA CHAKRABORTY, REINER DIZON, PARKER DIFUNTORUM, CHRISTOPHER VEGA, PATANJALI SRISTI LAKSHMIPRASANNA SRIRAMAKUMARA
  • Publication number: 20220077858
    Abstract: Methods and systems are directed to creating a physical unclonable function (PUF) on a Field Programmable Gate Array (FPGA) and generating a unique signature for a device. The method includes, in part, designing a PUF by taking advantages of programmable logic elements on the FPGA, and extracting uninitialized values associated with one or more storage elements comprised in the PUF when the FPGA is powered up. The extracted uninitialized values can be combined to generate the unique signature for the device. The one or more storage elements can be bi-stable memory cells that are mapped to look up tables (LUTs) on the FPGA. The coordinates of these LUTs can be determined based on hamming distance analysis. Alternatively, the one or more storage elements can be memory cells associated with boundary scan cells of a boundary scan chain.
    Type: Application
    Filed: September 3, 2021
    Publication date: March 10, 2022
    Inventors: Swarup Bhunia, Christopher Vega, Shubhra Deb Paul
  • Publication number: 20220041187
    Abstract: Disclosed are various embodiments related to coordinated monitoring and responding to an emergency situation at a building structure as a supplement to a traditional emergency response. In some embodiments, a system comprises a computing device that is configured to receive sensor data from a sensor network. The sensor network includes monitoring units that monitor various locations of an infrastructure. The computing device determines an occurrence of an emergency event at a location in the infrastructure using an anomaly detector model based at least in part on the sensor data. A hybrid mobile unit is instructed by the computing device to navigate to the location of the emergency event. The hybrid mobile unit is configured to provide mobile sensor data associated with the location to confirm the emergency event.
    Type: Application
    Filed: August 3, 2021
    Publication date: February 10, 2022
    Inventors: Prabuddha CHAKRABORTY, Reiner DIZON, Christopher VEGA, Joel B. HARLEY, Sandip RAY, Swarup BHUNIA, Patanjali Sristi Lakshmiprasanna Sriramakumara
  • Publication number: 20220042938
    Abstract: An exemplary integrated nuclear quadrupole resonance-based detection system comprises a front-end device having a hand-held form factor, wherein the front-end device is configured to scan a sample in or near a sample coil using inbuild electronics and acquire a nuclear quadrupole resonance measurement. The system further includes a swappable sample coil that is attached to an opening at a face of the front-end device and is tuned to a resonant frequency of the sample; and a swappable impedance matching network that is attached to the opening at the face of the front-end device and is configured to tune the resonant frequency of the sample coil. The inbuild electronics comprises a wireless transfer module that is configured to communicate the acquired nuclear quadrupole resonance measurement with a back-end device of the integrated nuclear quadrupole resonance-based detection system. Other systems and methods are also provided.
    Type: Application
    Filed: July 30, 2021
    Publication date: February 10, 2022
    Inventors: Swarup Bhunia, Naren Vikram Raj Masna, Soumyajit Mandal, David Joseph Ariando
  • Publication number: 20220035977
    Abstract: A method of obfuscating a circuit design includes, in part, receiving a netlist of the circuit design, splitting the circuit design into a multitude of partitions, transforming each partitions so as to obfuscate each partition, and stitching the multitude of transformed partitions to form the obfuscated circuit. The netlist may be a register transfer level netlist. The number and the size of partitions may vary. The partitions may be distributed throughout the entirety of the design. The method may further include generating a randomized circuit associated with at least a subset of the partitions, and merging each partition with the partition's associated randomized circuit. The method may further include quantifying the amount of transformation associated with each partition. The method may further include adding a first key to at least one of the obfuscated partitions, and adding a second key to the partition's associated randomized circuit.
    Type: Application
    Filed: July 27, 2021
    Publication date: February 3, 2022
    Inventors: Swarup Bhunia, Abdulrahman Alaql
  • Publication number: 20220019720
    Abstract: Systems and methods generate the design of a tiled multi-core system-on-chip (SoC). Design specification defining a multitude of cores to be used in the tiled multi-core SoC is analyzed and a multitude of subsystems based on the plurality of cores is built. The subsystems are augmented with one or more network adapters to generate the design of the tiled multi-core SoC. To achieve this, a multitude of IP blocks defined by the specification are retrieved from a design library. Design metadata associated with the IP blocks are extracted. Next, a standardized interface is generated for each of the IP blocks using the design metadata. Thereafter, a bus interface is generated for the IP blocks. Next, a tiled synthesizable register-transfer level code for the SoC design is generated in accordance with received configuration information.
    Type: Application
    Filed: July 14, 2021
    Publication date: January 20, 2022
    Inventors: Swarup Bhunia, Sandip Ray, Atul Prasad Deb Nath
  • Publication number: 20220007763
    Abstract: A mask apparatus that is configured to prevent airborne pathogens from reaching an individual by actively mitigating airborne droplets that have a pathogen. In one example, the mask apparatus comprises a sensor device, a mitigator device, and a controller. The sensor device comprises an aerosol detector that is configured to perform a light measurement of an airborne aerosol droplet in an area proximate to the wearable apparatus. The mitigator device is configured to initiate a mitigation action directed at the airborne aerosol droplet. The controller is data communication with the sensor device and the mitigator device. The controller is configured to determine that the airborne aerosol droplet has a pathogen based at least in part on the light measurement captured by the sensor device and cause the mitigator device to initiate the mitigation action based on the airborne aerosol droplet having the pathogen.
    Type: Application
    Filed: July 7, 2021
    Publication date: January 13, 2022
    Inventors: Naren Vikram Raj MASNA, Swarup BHUNIA, Soumyajit MANDAL, Anamika BHUNIAROY, Rohan Reddy Kalavakonda