Patents by Inventor Kelan Silvester

Kelan Silvester has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11500444
    Abstract: A machine-learning (ML) scheme running a software driver stack to learn user habits of entry into low power states, such as Modern Connect Standby (ModCS), and duration depending on time of day, and/or system telemetry. The ML creates a High Water Mark (HWM) number of dirty cache lines (DL) as a hint to a power agent. A power agent algorithm uses these hints and actual system's number of DL to inform the low power state entry decision (such as S0i4 vs. S0i3 entry decision) for a computing system.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: November 15, 2022
    Assignee: Intel Corporation
    Inventors: Leo Aqrabawi, Chia-hung S. Kuo, James G. Hermerding, II, Premanand Sakarda, Bijan Arbab, Kelan Silvester
  • Publication number: 20210349519
    Abstract: A machine-learning (ML) scheme running a software driver stack to learn user habits of entry into low power states, such as Modern Connect Standby (ModCS), and duration depending on time of day, and/or system telemetry. The ML creates a High Water Mark (HWM) number of dirty cache lines (DL) as a hint to a power agent. A power agent algorithm uses these hints and actual system's number of DL to inform the low power state entry decision (such as S0i4 vs. S0i3 entry decision) for a computing system.
    Type: Application
    Filed: May 8, 2020
    Publication date: November 11, 2021
    Applicant: Intel Corporation
    Inventors: Leo Aqrabawi, Chia-hung S. Kuo, James G. Hermerding II, Premanand Sakarda, Bijan Arbab, Kelan Silvester
  • Publication number: 20090171995
    Abstract: Embodiments of a system for selecting a media file comprising a plurality of media, selecting one or more other media as alternate media, generating metadata specifying the one or more alternate media, and associating the metadata and the one or more alternate media to enable the media file to be alternately presented. Other embodiments are described.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventors: Kelan Silvester, James R. Trethewey, Walter Russell Swindell
  • Publication number: 20080051954
    Abstract: A computer built into an automobile displays the owner's manual for the car. The user requests more information about the automobile through the computer, and the additional information is displayed to the user. Information may include a description of a specific function or device of the car, service history, and/or real time status of a component of the car.
    Type: Application
    Filed: October 8, 2007
    Publication date: February 28, 2008
    Inventor: Kelan SILVESTER
  • Publication number: 20080027603
    Abstract: A computer built into an automobile displays the owner's manual for the car. The user requests more information about the automobile through the computer, and the additional information is displayed to the user. Information may include a description of a specific function or device of the car, service history, and/or real time status of a component of the car.
    Type: Application
    Filed: October 8, 2007
    Publication date: January 31, 2008
    Inventor: Kelan SILVESTER
  • Publication number: 20070152113
    Abstract: A computer system is disclosed herein. The computer system includes a base, a plurality of keys supported by the base, at least one arm having first and second ends, the first end being pivotally secured to the base, and a screen secured to the second end of the arm. In one embodiment, the arm is extensible. In one embodiment, the screen is pivotal relative to the arm. In one embodiment, the arm is extensible and the screen is pivotal relative to the arm.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Inventors: James Okuley, Truong Phan, Ron Egger, Kelan Silvester, Johann Weber
  • Patent number: 7149888
    Abstract: A method and apparatus for booting the operating environment of an autonomous subsystem in a computer based system without involvement of the main operating system are described.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: December 12, 2006
    Assignee: Intel Corporation
    Inventors: Frank P. Hart, Edward J. Pole, Kelan Silvester, Paul Zurcher
  • Publication number: 20060123257
    Abstract: A component in a computer includes multiple functional unit blocks (FUB). Each FUB may be associated with a sensor and may be managed individually. When the sensor detects that a problem associated with a particular FUB may arise, a controller may be used to adjust operation of the FUB instead of operation of the entire component.
    Type: Application
    Filed: January 13, 2006
    Publication date: June 8, 2006
    Inventor: Kelan Silvester
  • Publication number: 20060099991
    Abstract: An approach for determining a type of credential card in a reader and, for some aspects, implementing a protection approach based on the determined type of credential card. For one aspect, an indication that a credential card has been received at a credential reader is received. In response, an instruction to be received by the credential card is provided, the instruction being recognizable by a first type of credential card, but not by a second type of credential card. The card is determined to be the first type of credential card if the response indicates that the instruction was recognized by the credential card. A protection policy may then be implemented for some aspects depending on the type of card detected.
    Type: Application
    Filed: November 10, 2004
    Publication date: May 11, 2006
    Inventors: Sundeep Bajikar, Francis McKeen, Kelan Silvester
  • Publication number: 20060075259
    Abstract: A method and system to exchange a private encryption key via a rusted path between a device and an application executed in a trusted platform of a computer system to generate a session key. In one embodiment, the session key is used to encrypt data to be exchanged via an non-trusted channel within the computer system.
    Type: Application
    Filed: October 29, 2004
    Publication date: April 6, 2006
    Inventors: Sundeep Bajikar, Francis McKeen, Kelan Silvester
  • Publication number: 20050288056
    Abstract: A computing system includes a wireless wide area network (WWAN) module and an identity module reader external to and accessible by the WWAN module to receive an identity card to provide credentials to be accessed by the WWAN module. A platform to test such a system includes a WWAN module, an identity module reader external to the WWAN module to receive an identity card storing credentials to be accessed by the WWAN module and an identity card interface component coupled to the WWAN module and identity module reader, the identity module interface component to substantially emulate an interface between the WWAN module and the identity module reader in a computing platform in which the WWAN module and identity module reader are to be implemented.
    Type: Application
    Filed: June 29, 2004
    Publication date: December 29, 2005
    Inventors: Sundeep Bajikar, Francis McKeen, Ramgopal K. Reddy, Kelan Silvester
  • Publication number: 20050286746
    Abstract: Embodiments of the present invention can combine biometric identification data with additional information, or knowledge, to form a new type of security measure. One embodiment of the present invention obtains biometric identification data for accessing a particular context, identifies context identification data related to the particular context, and combines the biometric identification data and the context identification data into an identification template.
    Type: Application
    Filed: June 25, 2004
    Publication date: December 29, 2005
    Inventor: Kelan Silvester
  • Publication number: 20050250472
    Abstract: A method for providing security to a computer system is described. Specifically, the computer periodically polls for a Bluetooth electronic device or other similar wireless electronic device. If the computer locates such a Bluetooth electronic device, the computer requests authentication from the Bluetooth electronic device. The user of the electronic device is given access to the computer system only if the computer recognizes the identification of the Bluetooth electronic device and is able to validate the authentication information provided by the Bluetooth electronic device through an encrypted channel.
    Type: Application
    Filed: May 4, 2004
    Publication date: November 10, 2005
    Inventors: Kelan Silvester, Francis McKeen, Sundeep Bajikar, Luke Girard
  • Publication number: 20050249381
    Abstract: An image capture device for providing security, power management, and video capture to a computer system is described. Specifically, the image capture device is capable of capturing fingerprint and facial images. If the captured images matches previously enrolled images, a user is granted access to a computer system. After a user is granted access to the computer system, the image capture device monitors the ambient lighting of the computing environment and adjusts the display settings accordingly.
    Type: Application
    Filed: May 7, 2004
    Publication date: November 10, 2005
    Inventors: Kelan Silvester, Aaron Tsirkel
  • Publication number: 20050228993
    Abstract: A user-authentication sub-system and approach for user authentication. The user authentication sub-system of one aspect includes at least a first input mechanism to receive first multi-factor authentication data associated with Z authentication factors, a cryptographic engine to encrypt the first multi-factor authentication data, and a separated user authentication, non-volatile data store to store the encrypted first multi-factor authentication data. The sub-system further includes a processing unit to determine whether second authentication data received via the at least first input mechanism matches a subset of the first multi-factor authentication data, the second authentication data associated with N authentication factors where N is less than or equal to Z.
    Type: Application
    Filed: April 12, 2004
    Publication date: October 13, 2005
    Inventors: Kelan Silvester, Francis McKeen, Sundeep Bajikar, Luke Girard
  • Publication number: 20050221853
    Abstract: A method for providing security to a computer system is described. Specifically, the computer periodically polls for an electronic device having a SIM card. If the computer locates such an electronic device, the computer requests authentication from the electronic device. The user of the electronic device is given access to the computer system only if the computer is able to validate the authentication information provided by the electronic device.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Inventor: Kelan Silvester
  • Publication number: 20050108171
    Abstract: An approach for providing Subscriber Identity Module (SIM) capabilities in an open platform without the need for a discrete, physical SIM device. For one aspect, a computing system provides for secure provisioning of SIM data and algorithms, for example, protected storage of SIM secret data objects, and protected execution of SIM algorithms that provide for Authentication, Authorization and Accounting (AAA) capabilities currently associated with discrete hardware SIM devices.
    Type: Application
    Filed: November 19, 2003
    Publication date: May 19, 2005
    Inventors: Sundeep Bajikar, Luke Girard, Ramgopal Reddy, Francis McKeen, Kelan Silvester
  • Publication number: 20050108534
    Abstract: An approach for providing services to an open platform implementing Subscriber Identity Module (SIM) capabilities without the need for a discrete, physical SIM device. For one aspect, a protected communications channel is established with a computing system, the computing system providing SIM Authentication, Authorization and Accounting (AAA) capabilities without the use of a discrete hardware SIM device. SIM secret data is provisioned to the computing system over the protected communications channel.
    Type: Application
    Filed: November 19, 2003
    Publication date: May 19, 2005
    Inventors: Sundeep Bajikar, Luke Girard, Ramgopal Reddy, Francis McKeen, Kelan Silvester
  • Publication number: 20050064893
    Abstract: A cellular telephone may be equipped with a compartment that slidingly receives upgrade modules, such as PC or memory cards. The modules may provide added functionality, such as wireless Ethernet connection, additional memory, pre-programmed memory, additional processing, better displays, and the like. By simply unplugging an existing card from its compartment and inserting in its place a new card, upgraded features may be pluggingly provided to cellular telephones.
    Type: Application
    Filed: October 12, 2004
    Publication date: March 24, 2005
    Inventor: Kelan Silvester
  • Publication number: 20050039013
    Abstract: In one embodiment, the invention provides a method comprising storing user authentication information in a hardware structure of a computer system, the hardware structure including a security mechanism to protect the stored authentication information from unauthorized access, and authenticating a user of the computer system by comparing user input authentication information with the stored authentication information.
    Type: Application
    Filed: August 11, 2003
    Publication date: February 17, 2005
    Inventors: Sundeep Bajikar, Luke Girard, Kelan Silvester, Francis McKeen