Patents by Inventor Vishal Soni
Vishal Soni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240137203Abstract: The techniques disclosed herein are directed to devices, circuits, systems, and techniques to mitigate the impact of side-channel attacks on a cryptography function in a target system. The Razor flip-flops are inserted into critical paths of the cryptography function of the target system, including at rest blocks such as key vaults and data vaults, and also including registers and/or pipelines used for calculations within the cryptography functions. Errors detected by the Razor flip-flops are processed by error detection logic in the cryptographic function, which continues the calculations until completion. The generated key and data value pairs resulting from detected errors are discarded, silently ignored without disrupting the calculation process. The schemes disclosed herein mitigate the impact of side-channel attacks with a digital logic based implementation, with reduced complexity and reduced cost.Type: ApplicationFiled: October 24, 2022Publication date: April 25, 2024Inventors: Bharat S. PILLILLI, Bryan David KELLY, Vishal SONI
-
Patent number: 11853798Abstract: Examples are disclosed that relate to a disaggregated memory pool. One example provides a memory system comprising a memory controller and memory attached to the memory controller and forming at least a portion of a disaggregated memory pool, the disaggregated memory pool including a plurality of slices that are each dynamically assigned to a respective compute node. The memory system is configured to receive a request to adjust an assignment of the memory pool to a requesting compute node, where the portion of the memory pool includes an unassigned slice that can satisfy the request, assign at least part of the unassigned portion to the requesting compute node, and where the portion of the memory pool does not include an unassigned slice that can satisfy the request, cause a request to be directed to another compute node to free at least one slice to the such compute node.Type: GrantFiled: September 3, 2020Date of Patent: December 26, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Siamak Tavallaei, Vishal Soni, Ishwar Agarwal
-
Publication number: 20230385410Abstract: Systems and methods related to flush plus reload cache side-channel attack mitigation are described. An example method for mitigating a side-channel timing attack in a system including a processor having at least one cache is described. The method includes receiving a first instruction, where the first instruction, when executed by the processor, is configured to flush at least one cache line from the at least one cache associated with the processor. The method further includes, prior to execution of the first instruction by the processor, automatically mapping the first instruction to a second instruction such that the at least one cache line is not flushed from the at least one cache even in response to receiving the first instruction.Type: ApplicationFiled: June 13, 2022Publication date: November 30, 2023Inventors: Ishwar AGARWAL, Bharat PILLILLI, Vishal SONI
-
Publication number: 20230325225Abstract: Systems and methods for a confidential compute architecture integrated with direct swap caching are described. An example method for managing a near memory and a far memory includes, in response to determining that the far memory contains an encrypted version of a first block of data, retrieving from the far memory the encrypted version of the first block of data, decrypting the first block of data using a first key for exclusive use by a first virtual machine associated with the system, and providing a decrypted version of the first block of data to the requestor. The method further includes swapping out a second block of data having an address conflict with the first block of data from the near memory to the far memory, where the second block of data is encrypted using a second key for exclusive use by a second virtual machine associated with the system.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Inventors: Ishwar AGARWAL, Bryan David KELLY, Vishal SONI
-
Publication number: 20230315626Abstract: A method for memory address mapping in a disaggregated memory system includes receiving an indication of one or more ranges of host physical addresses (HPAs) from a compute node of a plurality of compute nodes, the one or more ranges of HPAs including a plurality of memory addresses corresponding to different allocation slices of the disaggregated memory pool that are allocated to the compute node. The one or more ranges of HPAs are converted into a contiguous range of device physical addresses (DPAs). For each DPA, a target address decoder (TAD) is identified based on a slice identifier and a slice-to-TAD index. Each DPA is mapped to a media-specific physical element of a physical memory unit of the disaggregated memory pool based on the TAD.Type: ApplicationFiled: May 31, 2021Publication date: October 5, 2023Inventors: Siamak TAVALLAEI, Ishwar AGARWAL, Vishal SONI
-
Patent number: 11655174Abstract: A method and system for treating contaminated water are described. The method comprises receiving, in a first chamber, contaminated water with injection of a modifier; in a first chamber, treating the contaminated water with at least one of air or oxygen and simultaneously treating the contaminated water with ultraviolet radiation; in a second chamber, receiving fluid from the first chamber and treating the received fluid with at least one of oxygen or ozone; in a third chamber, receiving fluid from the second chamber and treating the received fluid with ultraviolet radiation; and discharging water from the third chamber using a discharge pump.Type: GrantFiled: July 29, 2021Date of Patent: May 23, 2023Assignee: Kewest Equipment Corp.Inventors: Anil Kumar Chhibber, Peter Stewart Forbes, Vishal Soni, Harjot Brar, Kurt Wilhelm Klingbeil
-
Publication number: 20230055840Abstract: This application describes a system associated with a network-based delivery service that receives item delivery requests from various individuals. The system determines whether the item(s) in the item delivery requests can be delivered. If not, the system generates and provides a selectable notification the various individuals. The selectable notification prompts the various individuals to pick up the item(s) in the item delivery request instead of waiting for delivery of the item(s).Type: ApplicationFiled: August 19, 2022Publication date: February 23, 2023Inventors: Boting Li, Vishal Soni, Jason Wien
-
Publication number: 20220405004Abstract: The present disclosure relates to systems, methods, and computer-readable media for tracking memory usage data on a memory controller system and providing a mechanism whereby one or multiple accessing agents (e.g., computing nodes, applications, virtual machines) can access memory usage data for a memory resource managed by a memory controller. Indeed, the systems described herein facilitate generation of and access to heatmaps having memory usage data thereon. The systems described herein describe features and functionality related to generating and maintaining the heatmaps as well as providing access to the heatmaps to a variety of accessing agents. This memory tracking and accessing is performed using low processing overhead while providing useful information to accessing agents in connection with memory resources managed by a memory controller.Type: ApplicationFiled: August 24, 2022Publication date: December 22, 2022Inventors: Lisa Ru-Feng HSU, Aninda MANOCHA, Ishwar AGARWAL, Daniel Sebastian BERGER, Stanko NOVAKOVIC, Janaina Barreiro GAMBARO BUENO, Vishal SONI
-
Publication number: 20220382873Abstract: A system includes a stored counter value and a stored boot manifest including a manifest type flag. A manifest type of the boot manifest is determined based on the manifest type flag, a tenancy mode is determined based on a parity of the counter value, a first boot is executed if the manifest type is a first manifest type and the tenancy mode is a first tenancy mode, a second boot flow is executed if the manifest type is the first manifest type and the tenancy mode is a second tenancy mode, a third boot flow is executed if the manifest type is a second manifest type and the tenancy mode is the first tenancy mode, and a fourth boot flow is executed if the manifest type is the second manifest type and the tenancy mode is the second tenancy mode.Type: ApplicationFiled: June 1, 2021Publication date: December 1, 2022Inventors: Vishal SONI, Bryan David KELLY
-
Patent number: 11442654Abstract: The present disclosure relates to systems, methods, and computer-readable media for tracking memory usage data on a memory controller system and providing a mechanism whereby one or multiple accessing agents (e.g., computing nodes, applications, virtual machines) can access memory usage data for a memory resource managed by a memory controller. Indeed, the systems described herein facilitate generation of and access to heatmaps having memory usage data thereon. The systems described herein describe features and functionality related to generating and maintaining the heatmaps as well as providing access to the heatmaps to a variety of accessing agents. This memory tracking and accessing is performed using low processing overhead while providing useful information to accessing agents in connection with memory resources managed by a memory controller.Type: GrantFiled: October 15, 2020Date of Patent: September 13, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Lisa Ru-Feng Hsu, Aninda Manocha, Ishwar Agarwal, Daniel Sebastian Berger, Stanko Novakovic, Janaina Barreiro Gambaro Bueno, Vishal Soni
-
Publication number: 20220164118Abstract: The present disclosure relates to systems, methods, and computer-readable media for managing tracked memory usage data and performing various actions based on memory usage data tracked by a memory controller on a memory device. For example, systems described herein involve collecting and compiling data across one or more memory controllers to evaluate characteristics of the memory usage data to determine hotness metric(s) for segments of a memory resource. The systems described herein may perform a variety of segment actions based on the hotness metric(s). In addition, the systems described herein can compile the memory usage data according to one or more access granularities. This compiled data may further be shared with multiple accessing agents in accordance with access resolutions of the respective accessing agents.Type: ApplicationFiled: November 23, 2020Publication date: May 26, 2022Inventors: Lisa Ru-Feng HSU, Aninda MANOCHA, Ishwar AGARWAL, Daniel Sebastian BERGER, Stanko NOVAKOVIC, Janaina Barreiro GAMBARO BUENO, Vishal SONI
-
Publication number: 20220121386Abstract: The present disclosure relates to systems, methods, and computer-readable media for tracking memory usage data on a memory controller system and providing a mechanism whereby one or multiple accessing agents (e.g., computing nodes, applications, virtual machines) can access memory usage data for a memory resource managed by a memory controller. Indeed, the systems described herein facilitate generation of and access to heatmaps having memory usage data thereon. The systems described herein describe features and functionality related to generating and maintaining the heatmaps as well as providing access to the heatmaps to a variety of accessing agents. This memory tracking and accessing is performed using low processing overhead while providing useful information to accessing agents in connection with memory resources managed by a memory controller.Type: ApplicationFiled: October 15, 2020Publication date: April 21, 2022Inventors: Lisa Ru-Feng HSU, Aninda MANOCHA, Ishwar AGARWAL, Daniel Sebastian BERGER, Stanko NOVAKOVIC, Janaina Barreiro GAMBARO BUENO, Vishal SONI
-
Publication number: 20220119294Abstract: A method and system for treating contaminated water are described. The method comprises receiving, in a first chamber, contaminated water with injection of a modifier; in a first chamber, treating the contaminated water with at least one of air or oxygen and simultaneously treating the contaminated water with ultraviolet radiation; in a second chamber, receiving fluid from the first chamber and treating the received fluid with at least one of oxygen or ozone; in a third chamber, receiving fluid from the second chamber and treating the received fluid with ultraviolet radiation; and discharging water from the third chamber using a discharge pump.Type: ApplicationFiled: July 29, 2021Publication date: April 21, 2022Applicant: Kewest Equipment Corp.Inventors: Anil Kumar CHHIBBER, Peter Stewart FORBES, Vishal SONI, Harjot BRAR, Kurt Wilhelm KLINGBEIL
-
Publication number: 20220066935Abstract: A memory control system comprises a memory cache and a disaggregated memory pool including a plurality of physical memory media configured to provide volatile data storage for any of a plurality of compute nodes communicatively coupled with the disaggregated memory pool. Processing componentry of the memory control system is configured to populate the memory cache with data items stored by the plurality of compute nodes within the disaggregated memory pool according to a cache fill policy. Upon receiving a memory read request for a data item stored in the disaggregated memory pool from a compute node, the memory cache and disaggregated memory pool are searched in parallel for the data item. Upon retrieving the data item from either the memory cache or disaggregated memory pool, the data item is provided to the compute node.Type: ApplicationFiled: September 3, 2020Publication date: March 3, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Siamak TAVALLAEI, Ishwar AGARWAL, Vishal SONI
-
Publication number: 20220066827Abstract: Examples are disclosed that relate to a disaggregated memory pool. One example provides a memory system comprising a memory controller and memory attached to the memory controller and forming at least a portion of a disaggregated memory pool, the disaggregated memory pool including a plurality of slices that are each dynamically assigned to a respective compute node. The memory system is configured to receive a request to adjust an assignment of the memory pool to a requesting compute node, where the portion of the memory pool includes an unassigned slice that can satisfy the request, assign at least part of the unassigned portion to the requesting compute node, and where the portion of the memory pool does not include an unassigned slice that can satisfy the request, cause a request to be directed to another compute node to free at least one slice to the such compute node.Type: ApplicationFiled: September 3, 2020Publication date: March 3, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Siamak TAVALLAEI, Vishal SONI, Ishwar AGARWAL
-
Patent number: 11210218Abstract: A method for memory address mapping in a disaggregated memory system includes receiving an indication of one or more ranges of host physical addresses (HPAs) from a compute node of a plurality of compute nodes, the one or more ranges of HPAs including a plurality of memory addresses corresponding to different allocation slices of the disaggregated memory pool that are allocated to the compute node. The one or more ranges of HPAs are converted into a contiguous range of device physical addresses (DPAs). For each DPA, a target address decoder (TAD) is identified based on a slice identifier and a slice-to-TAD index. Each DPA is mapped to a media-specific physical element of a physical memory unit of the disaggregated memory pool based on the TAD.Type: GrantFiled: September 3, 2020Date of Patent: December 28, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Siamak Tavallaei, Ishwar Agarwal, Vishal Soni
-
Patent number: 9877250Abstract: A continual learning process is applied to a class of risk estimate-based algorithms and associated risk thresholds used for deciding when to initiate a handoff between different types of network connections that are available to a mobile device having telephony functionality. The process is implemented as a virtuous loop providing ongoing tuning and adjustment to improve call handoff algorithms and risk thresholds so that handoffs can be performed with the goals of minimizing dropped calls and unacceptable degradation in call quality as well as avoiding premature handoffs. Device characteristics, environmental context, connection measurements, and outcomes of call handoff decisions are crowd-sourced from a population of mobile devices into a cloud-based handoff decision enabling service.Type: GrantFiled: October 17, 2016Date of Patent: January 23, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Gursharan S. Sidhu, Thomas Kuehnel, Rao Salapaka, Vishal Soni, Ranveer Chandra, Mansoor Jafry, Anish Desai, Ruchir Astavans, Humayun Khan, John Mark Miller
-
Publication number: 20170034754Abstract: A continual learning process is applied to a class of risk estimate-based algorithms and associated risk thresholds used for deciding when to initiate a handoff between different types of network connections that are available to a mobile device having telephony functionality. The process is implemented as a virtuous loop providing ongoing tuning and adjustment to improve call handoff algorithms and risk thresholds so that handoffs can be performed with the goals of minimizing dropped calls and unacceptable degradation in call quality as well as avoiding premature handoffs. Device characteristics, environmental context, connection measurements, and outcomes of call handoff decisions are crowd-sourced from a population of mobile devices into a cloud-based handoff decision enabling service.Type: ApplicationFiled: October 17, 2016Publication date: February 2, 2017Inventors: Gursharan S. Sidhu, Thomas Kuehnel, Rao Salapaka, Vishal Soni, Ranveer Chandra, Mansoor Jafry, Anish Desai, Ruchir Astavans, Humayun Khan, John Mark Miller
-
Patent number: 9510251Abstract: A continual learning process is applied to a class of risk estimate-based algorithms and associated risk thresholds used for deciding when to initiate a handoff between different types of network connections that are available to a mobile device having telephony functionality. The process is implemented as a virtuous loop providing ongoing tuning and adjustment to improve call handoff algorithms and risk thresholds so that handoffs can be performed with the goals of minimizing dropped calls and unacceptable degradation in call quality as well as avoiding premature handoffs. Device characteristics, environmental context, connection measurements, and outcomes of call handoff decisions are crowd-sourced from a population of mobile devices into a cloud-based handoff decision enabling service.Type: GrantFiled: December 31, 2013Date of Patent: November 29, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Gursharan S Sidhu, Thomas Kuehnel, Rao Salapaka, Vishal Soni, Ranveer Chandra, Mansoor Jafry, Anish Desai, Ruchir Astavans, Humayun Khan, John Mark Miller
-
Patent number: 9445305Abstract: Techniques and tools are described for transmitting beacon messages using a wireless communication protocol, such as the Bluetooth Low Energy protocol. In some examples, beacon messages can be generated in a compact format and included in an AdvData portion of a payload of a protocol data unit of a Bluetooth Low Energy advertising channel packet. A beacon message can be transmitted from a stationary beacon generation device and broadcast to an area within a transmission range of the beacon generation device, and mobile computing devices, such as mobile phones, can receive the beacon message and perform one or more actions in response to information contained in the beacon message, all while conserving energy used by the beacon generation device and the mobile computing device.Type: GrantFiled: September 12, 2011Date of Patent: September 13, 2016Assignee: Microsoft CorporationInventors: James M. Lyon, Hugh A. Teegan, Thomas Kuehnel, Vishal Soni