Inteum Company
Links
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - kanad+ghose
8
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
Enhanced Central processing unit (CPU) architecture with hardware tags blocks security attacks with no overhead
This invention introduces a secure CPU architecture that embeds fine-grained hardware tags directly into instructions and data, enabling real-time enforcement of control-flow and pointer integrity. By validating operations at execution time, it blocks hijacks and memory errors with minimal performance overhead, delivering practical, built-in protection...
Published: 10/24/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
Technologies
Category(s):
Campus > Binghamton University
Direct-to-chip diamond-backed cooling for AI and HPC chiplets
This invention integrates a crystalline diamond- or sapphire-backed heat spreader directly onto silicon wafers prior to chip fabrication, paired with a sealed fluid chamber that delivers direct-to-chip liquid cooling without thermal interface materials. The result is a low-resistance, high-efficiency cooling path that improves reliability, reduces energy...
Published: 10/24/2025
|
Inventor(s):
Kanad Ghose
,
Bahgat Sammakia
,
Srikanth Rangarajan
Keywords(s):
Technologies
Category(s):
Campus > Binghamton University
Control Systems and Prediction Methods for IT Cooling Performance in Containment
Control systems and prediction methods for it cooling performance in containment systems by effectively controlling airflow Background: Containment is becoming a standard modality in data centers today due to its inherent energy efficiency advantages. Cold aisle containment, hot aisle containment, chimney, enclosed racks and rear door heat exchangers...
Published: 8/21/2025
|
Inventor(s):
Husam Alissa
,
Kourosh Nemati
,
Bahgat Sammakia
,
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Energy-Aware Load Direction in Server Installations
Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their peak efficiency levels. Technology Overview: Energy-aware load direction technique uses front-end switches in a server installation to activate, deactivate and to operate active servers at their...
Published: 8/29/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Server Power Management Through Dynamic Job Classification
This tool schedules new jobs and repetitive jobs with the server characteristics using the most energy-efficient configuration for realizing the performance goal Technology Overview: With the growing concern about energy expenditures in server installations, mechanisms are needed for improving the energy-efficiency of server installations....
Published: 8/29/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
CleanTech
,
Technologies
Category(s):
Technology Classifications > Clean Energy
,
Campus > Binghamton University
Hardware Mechanism for Authenticating Program Execution at Run-Time in a Microprocessor
A mechanism for validating the legal execution path and instructions that works in parallel with normal program execution and imposes a small performance penalty Background: The construction of trustworthy systems demands that the execution of every piece of code is validated as genuine – that the executed codes do exactly what they are supposed...
Published: 8/21/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time Using Control Flow Signatures
A simple hardware mechanism to validate the execution of a program continuously for fast validation of the program as it executes. Background: A central requirement for implementing trusted computing platforms is to validate whether a program executing on a potentially untrusted host is really the program the user thinks it is. If the host...
Published: 8/21/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University
System and Method for Validating Program Execution at Run-Time
A technology that enables the detection of tampering of a program as the program executes for security applications. Background: Current computer systems are highly vulnerable to cyber-attack. The number of attacks and the financial losses due to those attacks has risen exponentially. Despite significant investments, the situation continues...
Published: 8/21/2025
|
Inventor(s):
Kanad Ghose
Keywords(s):
#SUNYresearch
,
Technologies
Category(s):
Technology Classifications > Wireless Technologies
,
Technology Classifications > Computers
,
Campus > Binghamton University