Patents by Inventor David Durham

David Durham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140044258
    Abstract: Methods and systems for cryptographic access control of multimedia video, include embedding as metadata access control policy (ACP) information, including authorization rules and cryptographic information tied to an encryption policy, into encrypted video. An authorized receiver device having credentials and/or capabilities matched to the authorization rules is able to extract the ACP information from the encrypted video and use it to decrypt and properly render the video.
    Type: Application
    Filed: March 31, 2012
    Publication date: February 13, 2014
    Inventors: Karanvir S. Grewal, David Durham, Xiaozhu Kang, Men Long, Prashant Dewan
  • Publication number: 20140040397
    Abstract: A network appliance is configured to communicate with a representative system and a customer system. The network appliance permits control and access to the customer system by the representative system or to the representative system by the customer system for providing remote support service. The network appliance manages, logs, and routes screen updates of the customer system to the representative system. In addition, the network appliance logs and provides reports for all actions taken during the support service.
    Type: Application
    Filed: October 4, 2013
    Publication date: February 6, 2014
    Applicant: BOMGAR
    Inventors: Joel Bomgaars, Nathan McNeill, David Durham, Jeremy Cross, Ryan Sleevi, Huey Jiun Ngo
  • Patent number: 8645704
    Abstract: Disclosed is a method for restricting access of a first code of a plurality of codes of a first function from a second function. The method comprises calling the second function by the first function, addresses of the plurality of codes are stored in a stack page and colored in a first color (102). The method comprises performing access control check in a transition page for verifying whether the first function has permission to call the second function (104). Further the method comprises protecting the first code from the second function by coloring the addresses in a second color (106). Furthermore, the method comprises executing the second function by pushing addresses of the second function on the stack page, the addresses of the second function colored in a third color (108) and unprotecting the first code by coloring the addresses of the first code in the first color (110).
    Type: Grant
    Filed: May 7, 2007
    Date of Patent: February 4, 2014
    Assignee: Intel Corporation
    Inventors: Uday Savagaonkar, David Durham, Ravi Sahita, Subhash Gutti
  • Publication number: 20130332548
    Abstract: A network appliance is configured to communicate with a representative system and a customer system. The network appliance permits control and access to the customer system by the representative system or to the representative system by the customer system for providing remote support service. The network appliance manages, logs, and routes screen updates of the customer system to the representative system. In addition, the network appliance logs and provides reports for all actions taken during the support service.
    Type: Application
    Filed: August 13, 2013
    Publication date: December 12, 2013
    Applicant: BOMGAR
    Inventors: Joel Bomgaars, Nathan McNeill, David Durham, Jeremy Cross, Ryan Sleevi, Huey Jiun Ngo
  • Patent number: 8601273
    Abstract: A measurement engine performs active platform observation. A program includes an integrity manifest to indicate an integrity check value for a section of the program's source code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action can be triggered. The integrity manifest can include a secure signature to verify the validity of the integrity manifest.
    Type: Grant
    Filed: May 27, 2011
    Date of Patent: December 3, 2013
    Assignee: Intel Corporation
    Inventors: Travis Schluessler, David Durham, George Cox, Karanvir Ken Grewal
  • Patent number: 8584204
    Abstract: Architectures and techniques that allow a firmware agent to operate as a tamper-resistant agent on a host platform that may be used as a trusted policy enforcement point (PEP) on the host platform to enforce policies even when the host operating system is compromised. The PEP may be used to open access control and/or remediation channels on the host platform. The firmware agent may also act as a local policy decision point (PDP) on the host platform in accordance with an authorized enterprise PDP entity by providing policies if a host trust agent is non-responsive and may function as a passive agent when the host trust agent is functional.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: November 12, 2013
    Assignee: Intel Corporation
    Inventors: David Durham, Ravi Sahita, Karanvir Grewal, Ned Smith, Kapil Sood
  • Publication number: 20130298120
    Abstract: Embodiments of copy equivalent protection using secure page flipping for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor (VMM), Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. In an embodiment, an embedded VM is allowed to directly manipulate page table mappings so that, even without running the VMM or obtaining VMXRoot privilege, the embedded VM can directly flip pages of memory into its direct/exclusive control and back. Other embodiments may be described and claimed.
    Type: Application
    Filed: April 11, 2013
    Publication date: November 7, 2013
    Inventors: David Durham, Prashant Dewan
  • Patent number: 8572692
    Abstract: A method and system for a platform-based trust verifying service for multi-party verification. In one embodiment, the method includes a client platform accessing an service provider over a network. Upon accessing the service provider, the client platform receives a request from the service provider for platform measurement and verification. The client platform collects platform information and performs measurement and verification, including performing an integrity manifest comparison. If the integrity manifest comparison indicates a good client platform posture, then the client platform signs the client platform posture and sends an approval notification to the service provider indicating that the client platform has not been compromised. The client platform may then receive the service of the service provider.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: October 29, 2013
    Assignee: Intel Corporation
    Inventors: Divya Naidu Kolar Sunder, Hormuzd Khosravi, David Durham, Dan Dahle, Prashant Dewan
  • Patent number: 8555348
    Abstract: A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point.
    Type: Grant
    Filed: March 1, 2010
    Date of Patent: October 8, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd Khosravi, David Durham, Karanvir Grewal
  • Publication number: 20130198853
    Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
    Type: Application
    Filed: March 13, 2013
    Publication date: August 1, 2013
    Inventors: Francis X. McKEEN, Carlos V. ROZAS, Uday R. SAVAGAONKAR, Simon P. JOHNSON, Vincent SCARLATA, Michael A. GOLDSMITH, Ernie BRICKELL, Jiang Tao LI, Howard C. HERBERT, Prashant DEWAN, Stephen J. TOLOPKA, Gilbert NEIGER, David DURHAM, Gary GRAUNKE, Bernard LINT, Don A. VAN DYKE, Joseph CIHULA, Stalinselvaraj JEYASINGH, Stephen R. VAN DOREN, Dion RODGERS, John GARNEY, Asher ALTMAN
  • Patent number: 8499151
    Abstract: Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by authenticated, authorized and verified software components. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy to receive verification for any component. The verification or voucher helps assure to the remote entity that no malware running in the platform or on the network will have access to provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the software component.
    Type: Grant
    Filed: March 5, 2012
    Date of Patent: July 30, 2013
    Assignee: Intel Corporation
    Inventors: David Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
  • Patent number: 8490550
    Abstract: A roller coaster with seats articulated between vertical and reclined positions. The roller coaster includes a track with a load/unload portion and a ride portion. The coaster includes a vehicle with a body supported on the track and a passenger seat positioned in the body mounted for articulation between a first position and a second position. The roller coaster includes a seat positioning mechanism coupled to the passenger seat operating while the vehicle is in the load/unload portion to articulate the seat into the first position and operating, prior to the vehicle traveling into the ride portion of the ride path, to articulate the seat into the second position. The passenger seat includes a seat back that is substantially vertical in the first position and is at an obtuse angle in the second position or horizontal position, such that a passenger has an upward point of view during the ride.
    Type: Grant
    Filed: July 26, 2011
    Date of Patent: July 23, 2013
    Assignee: Disney Enterprises, Inc.
    Inventors: David W. Crawford, Thomas Fitzgerald, Derek Howard, David A. Durham, James H. Shull
  • Patent number: 8489686
    Abstract: A method and device allowing a scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an out-of-band (OOB) configured to compute a first hash value for data stored in one or more sectors of a data storage device at a first time; receive, using communication circuitry, a request to transmit a portion of the data stored in the one or more sectors of the data storage device at a second time, the second time being subsequent to the first time; compute a second hash value for the data stored in the one or more sectors of the data storage device at the second time; and transmit, using the communication circuitry, the requested portion of the data, only if the second hash value does not match the first hash value.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: July 16, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd Khosravi, David Durham, David A. Edwards, Venkat R. Gokulrangan, Men Long, Yasser Rasheed
  • Publication number: 20130159726
    Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
    Type: Application
    Filed: June 19, 2012
    Publication date: June 20, 2013
    Inventors: Francis X. MCKEEN, Carlos V. Rozas, Uday R. Savagaonkar, Simon P. Johnson, Vincent Scarlata, Michael A. Goldsmith, Ernie Brickell, Jiang Tao Li, Howard C. Herbert, Prashant Dewan, Stephen J. Tolopka, Gilbert Neiger, David Durham, Gary Graunke, Bernard Lint, Don A. Van Dyke, Joseph Cihula, Stalinselvaraj Jeyasingh, Stephen R. Van Doren, Dion Rodgers, John Garney, Asher Altman
  • Patent number: 8423747
    Abstract: Embodiments of copy equivalent protection using secure page flipping for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor (VMM), Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. In an embodiment, an embedded VM is allowed to directly manipulate page table mappings so that, even without running the VMM or obtaining VMXRoot privilege, the embedded VM can directly flip pages of memory into its direct/exclusive control and back. Other embodiments may be described and claimed.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: April 16, 2013
    Assignee: Intel Corporation
    Inventors: David Durham, Prashant Dewan
  • Patent number: 8417945
    Abstract: Methods and systems to detect virtualization of computer system resources, such as by malware, include methods and systems to evaluate information corresponding to a computer processor operating environment, outside of or secure from the operating environment, which may include one or more of a system management mode of operation and a management controller system. Information may include processor register values. Information may be obtained from within the operating environment, such as with a host application running within the operating environment. Information may be obtained outside of the operating environment, such as from a system state map. Information obtained from within the operating environment may be compared to corresponding information obtained outside of the operating environment. Direct memory address (DMA) translation information may be used to determine whether an operating environment is remapping DMA accesses.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: April 9, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, David Durham
  • Patent number: 8411868
    Abstract: Various embodiments are directed to systems and techniques for shared security associations. In one or more embodiments, a key distribution server provides shared security associations for clients and servers by assigning a group key to a particular client according to a time-based group key assignment schedule. The key distribution server may comprise a recursive codebook including multiple entries corresponding to group key assignments to be selected by the key distribution server with respect to time intervals. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 30, 2007
    Date of Patent: April 2, 2013
    Assignee: Intel Corporation
    Inventors: Men Long, David Durham
  • Publication number: 20130036291
    Abstract: Embodiments of an invention for generating multiple address space identifiers per virtual machine to switch between protected micro-contexts are disclosed. In one embodiment, a method includes receiving an instruction requiring an address translation; initiating, in response to receiving the instruction, a page walk from a page table pointed to by the contents of a page table pointer storage location; finding, during the page walk, a transition entry; storing the address translation and one of a plurality of address source identifiers in a translation lookaside buffer, the one of the plurality of address source identifiers based on one of a plurality of a virtual partition identifiers, at least two of the plurality of virtual partition identifiers associated with one of a plurality of virtual machines; and re-initiating the page walk.
    Type: Application
    Filed: October 12, 2012
    Publication date: February 7, 2013
    Inventors: Uday Savagaonkar, Madhavan Parthasarathy, Ravi Sahita, David Durham
  • Publication number: 20130025492
    Abstract: A roller coaster with seats articulated between vertical and reclined positions. The roller coaster includes a track with a load/unload portion and a ride portion. The coaster includes a vehicle with a body supported on the track and a passenger seat positioned in the body mounted for articulation between a first position and a second position. The roller coaster includes a seat positioning mechanism coupled to the passenger seat operating while the vehicle is in the load/unload portion to articulate the seat into the first position and operating, prior to the vehicle traveling into the ride portion of the ride path, to articulate the seat into the second position. The passenger seat includes a seat back that is substantially vertical in the first position and is at an obtuse angle in the second position or horizontal position, such that a passenger has an upward point of view during the ride.
    Type: Application
    Filed: July 26, 2011
    Publication date: January 31, 2013
    Applicant: DISNEY ENTERPRISES, INC.
    Inventors: DAVID W. CRAWFORD, THOMAS FITZGERALD, DEREK HOWARD, DAVID A. DURHAM, JAMES H. SHULL
  • Patent number: 8364973
    Abstract: A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: January 29, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd Khosravi, David Durham, Prashant Dewan, Ravi Sahita, Uday R. Savagaonkar, Men Long