Patents by Inventor Uzair Qureshi
Uzair Qureshi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11943207Abstract: Methods, systems, and use cases for one-touch inline cryptographic data security are discussed, including an edge computing device with a network communications circuitry (NCC), an enhanced DMA engine coupled to a memory device and including a cryptographic engine, and processing circuitry configured to perform a secure exchange with a second edge computing device to negotiate a shared symmetric encryption key, based on a request for data. An inline encryption command for communication to the enhanced DMA engine is generated. The inline encryption command includes a first address associated with a storage location storing the data, a second address associated with a memory location in the memory device, and the shared symmetric encryption key. The data is retrieved from the storage location using the first address, the data is encrypted using the shared symmetric encryption key, and the encrypted data is stored in the memory location using the second address.Type: GrantFiled: September 25, 2020Date of Patent: March 26, 2024Assignee: Intel CorporationInventors: Kshitij Arun Doshi, Uzair Qureshi, Lokpraveen Mosur, Patrick Fleming, Stephen Doyle, Brian Andrew Keating, Ned M. Smith
-
Publication number: 20240012769Abstract: Examples described herein relate to a network interface device. In some examples, the network interface device includes a network interface, a direct memory access (DMA) circuitry, a host interface, memory, one or more processors, and circuitry to: based on a configuration of operation specifying a standalone operation, cause the network interface device to operate in standalone to execute one or more applications and based on a configuration of operation specifying a companion operation, cause the network interface device to operate in companion to provide at least one host system with access to one or more hardware resources accessible by the network interface device.Type: ApplicationFiled: September 20, 2023Publication date: January 11, 2024Inventors: Francesc GUIM BERNAT, Manish DAVE, Vered BAR BRACHA, Bradley A. BURRES, Uzair QURESHI, Joseph GRECCO, Paul KAPPLER, Dirk F. BLEVINS, Mukesh Gangadhar BHAVANI VENKATESAN, Hariharan M, Marek PIOTROWSKI, Dhanya PILLAI, John MANGAN, Mandar CHINCHOLKAR, Eoin WALSH, Sumit MOHAN, Ned SMITH, Tushar Sudhakar GOHAD
-
Patent number: 11831507Abstract: Various approaches for deployment and use of configurable edge computing platforms are described. In an edge computing system, an edge computing device includes hardware resources that can be composed from a configuration of chiplets, as the chiplets are disaggregated for selective use and deployment (for compute, acceleration, memory, storage, or other resources). In an example, configuration operations are performed to: identify a condition for use of the hardware resource, based on an edge computing workload received at the edge computing device; obtain, determine, or identify properties of a configuration for the hardware resource that are available to be implemented with the chiplets, with the configuration enabling the hardware resource to satisfy the condition for use of the hardware resource; and compose the chiplets into the configuration, according to the properties of the configuration, to enable the use of the hardware resource for the edge computing workload.Type: GrantFiled: May 5, 2022Date of Patent: November 28, 2023Assignee: Intel CorporationInventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Timothy Verrall, Uzair Qureshi
-
Patent number: 11809252Abstract: Examples described herein relate to management of battery-use by one or more computing resources in the event of a power outage. Data used by one or more computing resources can be backed-up using battery power. Battery power is allocated to data back-up operations based at least on one or more of: criticality level of data, priority of an application that processes the data, or priority level of resource. The computing resource can back-up data to a persistent storage media. The computing resource can store a log of data that is backed-up or not backed-up. The log can be used by the computing resource to access the backed-up data for continuing to process the data and to determine what data is not available for processing.Type: GrantFiled: July 29, 2019Date of Patent: November 7, 2023Assignee: Intel CorporationInventors: Francesc Guim Bernat, Suraj Prabhakaran, Karthik Kumar, Uzair Qureshi, Timothy Verrall
-
Publication number: 20230217253Abstract: Systems, methods, and apparatus for workload optimized central processing units are disclosed herein. An example apparatus includes a workload analyzer to determine an application ratio associated with the workload, the application ratio based on an operating frequency to execute the workload, a hardware configurator to configure, before execution of the workload, at least one of (i) one or more cores of the processor circuitry based on the application ratio or (ii) uncore logic of the processor circuitry based on the application ratio, and a hardware controller to initiate the execution of the workload with the at least one of the one or more cores or the uncore logic.Type: ApplicationFiled: March 26, 2021Publication date: July 6, 2023Inventors: Stephen Palermo, Srihari Makineni, Shubha Bommalingaiahnapallya, Rany ElSayed, Lokpraveen Mosur, Neelam Chandwani, Pinkesh Shah, Rajesh Gadiyar, Shrikant M. Shah, Uzair Qureshi
-
Publication number: 20220337481Abstract: Various approaches for deployment and use of configurable edge computing platforms are described. In an edge computing system, an edge computing device includes hardware resources that can be composed from a configuration of chiplets, as the chiplets are disaggregated for selective use and deployment (for compute, acceleration, memory, storage, or other resources). In an example, configuration operations are performed to: identify a condition for use of the hardware resource, based on an edge computing workload received at the edge computing device; obtain, determine, or identify properties of a configuration for the hardware resource that are available to be implemented with the chiplets, with the configuration enabling the hardware resource to satisfy the condition for use of the hardware resource; and compose the chiplets into the configuration, according to the properties of the configuration, to enable the use of the hardware resource for the edge computing workload.Type: ApplicationFiled: May 5, 2022Publication date: October 20, 2022Inventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Timothy Verrall, Uzair Qureshi
-
Patent number: 11388054Abstract: Various approaches for deployment and use of configurable edge computing platforms are described. In an edge computing system, an edge computing device includes hardware resources that can be composed from a configuration of chiplets, as the chiplets are disaggregated for selective use and deployment (for compute, acceleration, memory, storage, or other resources). In an example, configuration operations are performed to: identify a condition for use of the hardware resource, based on an edge computing workload received at the edge computing device; obtain, determine, or identify properties of a configuration for the hardware resource that are available to be implemented with the chiplets, with the configuration enabling the hardware resource to satisfy the condition for use of the hardware resource; and compose the chiplets into the configuration, according to the properties of the configuration, to enable the use of the hardware resource for the edge computing workload.Type: GrantFiled: December 20, 2019Date of Patent: July 12, 2022Assignee: Intel CorporationInventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Timothy Verrall, Uzair Qureshi
-
Publication number: 20210042849Abstract: A computer implemented method of providing supply chain intelligence (156) is disclosed. The method comprises receiving, at a server of a payment processing network (150), a plurality of payment records (152), wherein each payment record (152) results from an account holder (120) tendering payment to a merchant (130) for a product/service to authorize a transfer of funds (172) from an issuer account to an acquirer account using an account identifier, wherein the payment record (152) comprises RDF data, and the payment record (152) comprises product/service information identifying the product/service. A payment graph database (154) is generated from the payment records (152). Payment data (211, 212 . . . 21n) is extracted from the payment graph database (154), and the payment data (211, 212 . . . 21n) is processed to determine the supply chain intelligence (156).Type: ApplicationFiled: August 6, 2020Publication date: February 11, 2021Inventor: Uzair Qureshi
-
Publication number: 20210034130Abstract: Examples described herein relate to management of battery-use by one or more computing resources in the event of a power outage. Data used by one or more computing resources can be backed-up using battery power. Battery power is allocated to data back-up operations based at least on one or more of: criticality level of data, priority of an application that processes the data, or priority level of resource. The computing resource can back-up data to a persistent storage media. The computing resource can store a log of data that is backed-up or not backed-up. The log can be used by the computing resource to access the backed-up data for continuing to process the data and to determine what data is not available for processing.Type: ApplicationFiled: July 29, 2019Publication date: February 4, 2021Inventors: Francesc GUIM BERNAT, Suraj PRABHAKARAN, Karthik KUMAR, Uzair QURESHI, Timothy VERRALL
-
Publication number: 20210014203Abstract: Methods, systems, and use cases for one-touch inline cryptographic data security are discussed, including an edge computing device with a network communications circuitry (NCC), an enhanced DMA engine coupled to a memory device and including a cryptographic engine, and processing circuitry configured to perform a secure exchange with a second edge computing device to negotiate a shared symmetric encryption key, based on a request for data. An inline encryption command for communication to the enhanced DMA engine is generated. The inline encryption command includes a first address associated with a storage location storing the data, a second address associated with a memory location in the memory device, and the shared symmetric encryption key. The data is retrieved from the storage location using the first address, the data is encrypted using the shared symmetric encryption key, and the encrypted data is stored in the memory location using the second address.Type: ApplicationFiled: September 25, 2020Publication date: January 14, 2021Inventors: Kshitij Arun Doshi, Uzair Qureshi, Lokpraveen Mosur, Patrick Fleming, Stephen Doyle, Brian Andrew Keating, Ned M. Smith
-
Publication number: 20210014301Abstract: Methods, apparatus, systems and articles of manufacture to select a location of execution of a computation are disclosed. An example apparatus includes a cache digest interface to identify a node capable of performing a computation. A compute plan solver is to obtain a cost estimate of performing the computation from the node. Privacy weighting circuitry is to apply a privacy weighting value to the cost estimate to determine a weighted cost estimate. The compute plan solver is to select the node for performance of the computation based on the weighted cost estimate. A plan executor is to transmit a request for the selected node to perform the computation.Type: ApplicationFiled: September 25, 2020Publication date: January 14, 2021Inventors: Kshitij Doshi, Francesc Guim Bernat, Ned Smith, Timothy Verrall, Uzair Qureshi
-
Publication number: 20210014047Abstract: An apparatus to manage a data lake is disclosed. A disclosed example apparatus includes a location selector to select an edge device to store the data lake, a key generator to, in response to an indication that a service is authorized to access the data lake, generate an encryption key corresponding to the data lake and generate a key wrapping key corresponding to the edge device, and a key distributor to wrap the encryption key using the key wrapping key, and distribute the encryption key and the key wrapping key to the edge device, the encryption key to enable the service on the edge device to access the data lake.Type: ApplicationFiled: September 25, 2020Publication date: January 14, 2021Inventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Uzair Qureshi, Timothy Verrall
-
Publication number: 20210004265Abstract: Various aspects of methods, systems,and use cases include coordinating actions at an edge device based on power production in a distributed edge computing environment. Systems and methods may be used to an edge device based on power production. A method may include predicting power harvesting of an edge device over a period of time. The method may determine an optimized timeframe among various timeframes for performing a task based on the predicted power harvesting. The method may include outputting or an indication for use by an implementing edge device.Type: ApplicationFiled: September 18, 2020Publication date: January 7, 2021Inventors: Francesc Guim Bernat, Uzair Qureshi, Lokpraveen Mosur, Kshitij Arun Doshi, Ned M. Smith
-
Publication number: 20200136906Abstract: Various approaches for deployment and use of configurable edge computing platforms are described. In an edge computing system, an edge computing device includes hardware resources that can be composed from a configuration of chiplets, as the chiplets are disaggregated for selective use and deployment (for compute, acceleration, memory, storage, or other resources). In an example, configuration operations are performed to: identify a condition for use of the hardware resource, based on an edge computing workload received at the edge computing device; obtain, determine, or identify properties of a configuration for the hardware resource that are available to be implemented with the chiplets, with the configuration enabling the hardware resource to satisfy the condition for use of the hardware resource; and compose the chiplets into the configuration, according to the properties of the configuration, to enable the use of the hardware resource for the edge computing workload.Type: ApplicationFiled: December 20, 2019Publication date: April 30, 2020Inventors: Francesc Guim Bernat, Kshitij Arun Doshi, Ned M. Smith, Timothy Verrall, Uzair Qureshi
-
Publication number: 20180352679Abstract: A memory device carrier is described that is particular suitable for a high density rack drive chassis in which the drives are front serviceable. In one example, a memory system includes an enclosure configured to mount in a rack, the enclosure having a front configured to receive airflow and a rear configured for cabling, a drawer configured to slide longitudinally in and out of the enclosure, the drawer having a bottom surface and a front face, and a longitudinal connector board mounted to the drawer having a plurality of memory device sockets, the sockets facing outward laterally from the longitudinal board and configured to receive memory devices inserted laterally into a respective socket.Type: ApplicationFiled: June 2, 2017Publication date: December 6, 2018Applicant: Intel CorporationInventors: Blaine R. Monson, Pankaj Kumar, Anthony K. Wong, Uzair A. Qureshi