Patents by Inventor Gary L. Graunke

Gary L. Graunke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20030002675
    Abstract: The present invention provides secure communication from one encryption domain to another using a trusted module. In one embodiment, the invention includes generating a cipher stream based on a first key for encrypted streamed content, and generating a second cipher stream based on a second key to re-encrypt the streamed content. The invention further includes receiving the encrypted streamed content, simultaneously decrypting and re-encrypting the encrypted content using a combination of the first and the second cipher streams and conveying the re-encrypted content to a sink.
    Type: Application
    Filed: June 29, 2001
    Publication date: January 2, 2003
    Inventor: Gary L. Graunke
  • Publication number: 20030005285
    Abstract: The present invention provides secure communication from one encryption domain to another using a trusted module. In one embodiment, the invention includes receiving a first key for decryption of encrypted content over a secure authenticated channel, receiving a second key for re-encrypting the encrypted content over a secure authenticated channel. The invention further includes receiving the encrypted content, decrypting and re-encrypting the encrypted content using the first key and the second key, and conveying the re-encrypted content to a sink.
    Type: Application
    Filed: June 29, 2001
    Publication date: January 2, 2003
    Inventor: Gary L. Graunke
  • Patent number: 6477252
    Abstract: A video source device provides a basis value to a symmetric ciphering/deciphering process to a video sink device, to which the video source device is to provide a video content. The video source device ciphers the video content for transmission to the video sink device, including generation of a first cipher key through functional transformation of the basis value. The video source device further verifies periodically that the transmitted video content is indeed being symmetrically deciphered by the video sink device. The video sink device practices symmetric deciphering, including generation of a first decipher key through functional transformation of the basis value. The video sink device also provides verification values to the video source device to facilitate confirmation of symmetric deciphering. In one embodiment, the video source and sink devices further authenticate each other, including generation of an authentication key, which is used in the generation of the first cipher/decipher key.
    Type: Grant
    Filed: August 29, 1999
    Date of Patent: November 5, 2002
    Assignee: Intel Corporation
    Inventors: Robert W. Faber, David A. Lee, Brendan S. Traw, Gary L. Graunke
  • Publication number: 20020002680
    Abstract: A method for generating a signed manifest includes referencing an object. A metadata name is recorded. A digest algorithm is recorded. An integrity value that belongs to the object that corresponds to the metadata subject name is digested with the digest algorithm.
    Type: Application
    Filed: March 25, 1998
    Publication date: January 3, 2002
    Inventors: JOHN M. CARBAJAL, GARY L. GRAUNKE, CARLOS ROZAS
  • Patent number: 6256577
    Abstract: A system may receive requests for traffic routing information from a plurality of vehicles and may provide a suggested route, not only based on actual current conditions and historical information, but based on the application of a predictive model. The predictive model may use information about current traffic conditions and historical information to predict the actual conditions that will occur in the course of traversing a desired route to an intended destination. In this way, the system may adapt for the dynamic nature of traffic conditions.
    Type: Grant
    Filed: September 17, 1999
    Date of Patent: July 3, 2001
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 6205550
    Abstract: In one apparatus, a number of obfuscated programming instructions are equipped to self-verify whether execution of the obfuscated programming instructions is being observed. In another apparatus, a number of obfuscated programming instruction are equipped to determine whether the apparatus is being operated in a mode that supports single step execution of the obfuscated programming instructions. In yet another apparatus, a number of obfuscated programming instruction are equipped to verify whether an amount of elapsed execution time has exceeded a threshold. In yet another apparatus, a first and a second group of obfuscated programming instruction are provided to implement a first and a second tamper resistant technique respectively, with the first and the second group of programming instructions sharing a storage location for a first and a second key value corresponding to the first and the second tamper resistant technique.
    Type: Grant
    Filed: September 5, 1997
    Date of Patent: March 20, 2001
    Assignee: Intel Corporation
    Inventors: Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
  • Patent number: 6178509
    Abstract: In one apparatus, a number of obfuscated programming instructions is provided to perform integrity verification on a number of other plain text programming instructions. In another apparatus, a number of obfuscated programming instructions is provided to self-verify an invocation of the obfuscated programming instructions is not originated from an intruder.
    Type: Grant
    Filed: September 5, 1997
    Date of Patent: January 23, 2001
    Assignee: Intel Corporation
    Inventors: Joseph M. Nardone, Richard T. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
  • Patent number: 6175925
    Abstract: In one apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a descrambler that descrambles scrambled content to generate descrambled content. In another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an authenticator that provides appropriate authentication challenges to a scrambled content provider, and generates appropriate authentication responses to authentication challenges from the scrambled content provider. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an integrity verifier that performs integrity verification on a decoder. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a secrets holder that holds a number of secrets associated with playing scrambled contents.
    Type: Grant
    Filed: September 5, 1997
    Date of Patent: January 16, 2001
    Assignee: Intel Corporation
    Inventors: Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
  • Patent number: 6105137
    Abstract: A method and apparatus of authenticating and verifying the integrity of software modules is disclosed. In one embodiment, said software modules initially establish their corresponding credentials. Then said local software module ensures its integrity by validating its own digital signature. Said local software module authenticates the integrity of said partner software module after having derived and validated certain information from said partner module's credential. In addition, secure linkage between said local software module and said partner software module is maintained.
    Type: Grant
    Filed: July 2, 1998
    Date of Patent: August 15, 2000
    Assignee: Intel Corporation
    Inventors: Gary L. Graunke, Carlos V. Rozas
  • Patent number: 6041122
    Abstract: A method and apparatus for hiding cryptographic keys based on autocorrelation timing attacks is provided. The method and apparatus of the present invention utilize a autocorrelation timing attack to allow independent software entities to authenticate themselves without storing a private cryptographic key. This is accomplished by storing timing statistics related to the evaluation of an equation in the software entity rather than the cryptographic key itself. When the software entity authenticates itself, the cryptographic key is derived based on information provided by the timing statistics contained in the software entity.
    Type: Grant
    Filed: February 27, 1998
    Date of Patent: March 21, 2000
    Assignee: Intel Corporation
    Inventors: Gary L. Graunke, David W. Aucsmith
  • Patent number: 5991399
    Abstract: Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided. Once validated, the trusted player uses the private key to decrypt encrypted digital content. The private key is dynamically generated, associated with specific digital content, and communicated in real-time from a server to the trusted player in a secure manner, thereby controlling access to encrypted digital content. The key is wrapped into an executable tamper resistant key module in which the key can only be used by the right trusted player as determined by the server based on user requests and payment. The key module plugs in to the trusted player and executes to validate the player and decrypt the content.
    Type: Grant
    Filed: December 18, 1997
    Date of Patent: November 23, 1999
    Assignee: Intel Corporation
    Inventors: Gary L. Graunke, John Carbajal, Richard L. Maliszewski, Carlos V. Rozas