Patents by Inventor Men Long

Men Long has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9307409
    Abstract: Some demonstrative embodiments include apparatuses, systems and/or methods of protecting domains of a multimode wireless radio transceiver. For example, an apparatus may include a protection domain controller (PDC) to restrict access of a configuration software to a protection domain of a plurality of protection domains of a multimode wireless radio transceiver based on a security level of the configuration software, wherein the protection domain includes one or more radio configuration parameters of the multimode wireless radio transceiver.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: April 5, 2016
    Assignee: INTEL CORPORATION
    Inventors: Farhana Asrar Sheikh, Patrick Koeberl, Jesse Walker, Hossein Alavi, Men Long, Ram Kumar Krishnamurthy, Alpa T. Narendra Trivedi
  • Publication number: 20160070910
    Abstract: A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions.
    Type: Application
    Filed: June 15, 2015
    Publication date: March 10, 2016
    Applicant: INTEL CORPORATION
    Inventors: Hormuzd M. Khosravi, Venkat R. Gokulrangan, Yasser Rasheed, Men Long
  • Patent number: 9276745
    Abstract: An apparatus and method for preserving image privacy when manipulated by cloud services includes middleware for receiving an original image, splitting the original image into two sub-images, where the RGB pixel values of the sub-images have a bit value that is less than RGB pixel values of the original image. The sub-images are encrypted by adding a keystream to the RGB pixel values of the sub-images. The sub-image data is transmitted to a cloud service such as a social network or photo-sharing site, which manipulate the images by resizing, cropping, filtering, or the like. The sub-image data is received by the middleware and is successfully decrypted irrespective of the manipulations performed by the cloud services. In an alternative embodiment, the blocks of the original image are permutated when encrypted, and then reverse-permutated when decrypted.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: March 1, 2016
    Assignee: Intel Corporation
    Inventors: David M. Durham, Men Long, Karanvir S. Grewal, Prashant Dewan, Xiaozhu Kang
  • Patent number: 9245141
    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    Type: Grant
    Filed: December 1, 2014
    Date of Patent: January 26, 2016
    Assignee: Intel Corporation
    Inventors: David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
  • Patent number: 9213653
    Abstract: Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits. An integrity action may be implemented, for example, when the unencrypted data includes a random distribution of the plurality of bits.
    Type: Grant
    Filed: December 5, 2013
    Date of Patent: December 15, 2015
    Assignee: Intel Corporation
    Inventors: David M. Durham, Men Long
  • Publication number: 20150304286
    Abstract: A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server is also capable of sending a session key to the client when the measured health information is validated. When the client receives the session key, the client is capable of initiating an encrypted and authenticated connection with an application server in the domain using the session key.
    Type: Application
    Filed: April 20, 2015
    Publication date: October 22, 2015
    Inventors: Divya Naidu Kolar Sundar, Prashant Dewan, Men Long
  • Patent number: 9094733
    Abstract: Cryptographic access control of multimedia video is presented. A method includes generating as metadata an access control policy (ACP) associated with video, the ACP including authorization rules and cryptographic information associated with an encryption policy; encrypting the video according to the encryption policy; and encoding the encrypted video with the authorization rules and the cryptographic information, which may be used to decrypt and render the encoded video. As an example, an authorized receiver device having credentials and/or capabilities matched to the authorization rules may extract the ACP information from the encrypted video and use it to decrypt and properly render the video.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: July 28, 2015
    Assignee: Intel Corporation
    Inventors: Karanvir S. Grewal, David Durham, Xiaozhu Kang, Men Long, Prashant Dewan
  • Patent number: 9092644
    Abstract: A method and system to provide an effective, scalable and yet low-cost solution for Confidentiality, Integrity and Replay protection for sensitive information stored in a memory and prevent an attacker from observing and/or modifying the state of the system. In one embodiment of the invention, the system has strong hardware protection for its memory contents via XTS-tweak mode of encryption where the tweak is derived based on “Global and Local Counters”. This scheme offers to enable die-area efficient Replay protection for any sized memory by allowing multiple counter levels and facilitates using small counter-sizes to derive the “tweak” used in the XTS encryption without sacrificing cryptographic strength.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: July 28, 2015
    Assignee: Intel Corporation
    Inventors: Alpa T. Narendra Trivedi, David M. Durham, Men Long, Siddhartha Chhabra, Uday R. Savagaonkar, Carlos V. Rozas
  • Publication number: 20150205732
    Abstract: Systems, apparatuses, and methods, and for seamlessly protecting memory regions to protect against hardware-based attacks are disclosed. In one embodiment, an apparatus includes a decoder, control logic, and cryptographic logic. The decoder is to decode a transaction between a processor and memory-mapped input/output space. The control logic is to redirect the transaction from the memory-mapped input/output space to a system memory. The cryptographic logic is to operate on data for the transaction.
    Type: Application
    Filed: August 1, 2014
    Publication date: July 23, 2015
    Inventors: Uday SAVAGAONKAR, Ravi Sahita, David Durham, Men Long
  • Publication number: 20150189509
    Abstract: Some demonstrative embodiments include apparatuses, systems and/or methods of protecting domains of a multimode wireless radio transceiver. For example, an apparatus may include a protection domain controller (PDC) to restrict access of a configuration software to a protection domain of a plurality of protection domains of a multimode wireless radio transceiver based on a security level of the configuration software, wherein the protection domain includes one or more radio configuration parameters of the multimode wireless radio transceiver.
    Type: Application
    Filed: December 27, 2013
    Publication date: July 2, 2015
    Inventors: Farhana Asrar Sheikh, Patrick Koeberl, Jesse Walker, Hossein Alavi, Men Long, Ram Kumar Krishnamurthy, Alpa T. Narendra Trivedi
  • Publication number: 20150186295
    Abstract: A processor is described that includes one or more processing cores. The processor includes a memory controller to interface with a system memory having a protected region and a non protected region. The processor includes a protection engine to protect against active and passive attacks. The processor includes an encryption/decryption engine to protect against passive attacks. The protection engine includes bridge circuitry coupled between the memory controller and the one or more processing cores. The bridge circuitry is also coupled to the protection engine and the encryption/decryption engine. The bridge circuitry is to route first requests directed to the protected region to the protection engine and to route second requests directed to the non protected region to the encryption/decryption engine.
    Type: Application
    Filed: December 27, 2013
    Publication date: July 2, 2015
    Inventors: Uday R. Savagaonkar, Siddhartha Chhabra, Men Long, Alpa T. Narendra Trivedi, Carlos Cornelas Omelas, Edgar Borrayo, Ramadass Nagarajan, Stanley Steve Kulick
  • Patent number: 9069961
    Abstract: A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions.
    Type: Grant
    Filed: June 17, 2013
    Date of Patent: June 30, 2015
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, Venkat R. Gokulrangan, Yasser Rasheed, Men Long
  • Patent number: 9064116
    Abstract: Techniques for a data storage device to locally implement security management functionality. In an embodiment, a security management process of the data storage device is to determine whether an access to non-volatile media of the data storage device is authorized. In certain embodiments, the data storage device is to restrict access to a secure region of the non-volatile storage media, the secure region to store information used and/or generated by a security management process of the data storage device.
    Type: Grant
    Filed: November 8, 2010
    Date of Patent: June 23, 2015
    Assignee: Intel Corporation
    Inventors: Nicholas D. Triantafillou, Paritosh Saxena, Robert W. Strong, Richard J. Heiler, Eliezer Tamir, Simoni Ben-Michael, Brad W. Stewart, Akshay R. Kadam, Men Long, James T. Doyle, Hormuzd M. Khosravi, Lokpraveen B. Mosur, Edward J. Pullin, Paul S. Schmitz, Carol L. Barrett, Paul J. Thadikaran
  • Publication number: 20150161059
    Abstract: Systems and methods may provide for identifying unencrypted data including a plurality of bits, wherein the unencrypted data may be encrypted and stored in memory. In addition, a determination may be made as to whether the unencrypted data includes a random distribution of the plurality of bits. An integrity action may be implemented, for example, when the unencrypted data includes a random distribution of the plurality of bits.
    Type: Application
    Filed: December 5, 2013
    Publication date: June 11, 2015
    Inventors: David M. Durham, Men Long
  • Patent number: 9053346
    Abstract: A method and system to provide a low-overhead cryptographic scheme that affords memory confidentiality, integrity and replay-protection by removing the critical read-after-write dependency between the various levels of the cryptographic tree. In one embodiment of the invention, the cryptographic processing of a child node can be pipelined with that of the parent nodes. This parallelization provided by the invention results in an efficient utilization of the cryptographic pipeline, enabling significantly lower performance overheads.
    Type: Grant
    Filed: December 28, 2011
    Date of Patent: June 9, 2015
    Assignee: Intel Corporation
    Inventors: Siddhartha Chhabra, Uday R. Savagaonkar, Carlos V. Rozas, Alpa T. Narendra Trivedi, Men Long, David M. Durham
  • Publication number: 20150134952
    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    Type: Application
    Filed: December 1, 2014
    Publication date: May 14, 2015
    Applicant: INTEL CORPORATION
    Inventors: David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
  • Patent number: 9015484
    Abstract: A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server is also capable of sending a session key to the client when the measured health information is validated. When the client receives the session key, the client is capable of initiating an encrypted and authenticated connection with an application server in the domain using the session key.
    Type: Grant
    Filed: July 29, 2013
    Date of Patent: April 21, 2015
    Assignee: Intel Corporation
    Inventors: Divya Naidu Kolar Sundar, Prashant Dewan, Men Long
  • Publication number: 20150074419
    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    Type: Application
    Filed: July 3, 2014
    Publication date: March 12, 2015
    Applicant: Intel Corporation
    Inventors: David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
  • Patent number: 8903084
    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES128(base_key_1,client_ID),??(1) client_key_LSB=AES128(base_key_2,client_ID+pad),and??(2) client_key=client_key_MSB?client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.
    Type: Grant
    Filed: June 12, 2013
    Date of Patent: December 2, 2014
    Assignee: Intel Corporation
    Inventors: Men Long, Jesse Walker, Karanvir S. Grewal
  • Patent number: 8873746
    Abstract: An embodiment may include circuitry to establish, at least in part, a secure communication channel between, at least in part, a client in a first domain and a server in a second domain. The channel may include a first and second domain sessions in the first and second domains. The circuitry may generate first and second domain session keys that may encrypt, at least in part, respectively, the first and second domain sessions. The first domain session key may be generated based upon a first domain key assigned to the first domain and a first data set associated with the first domain session. The second domain session key may be generated based upon a second domain key assigned to the second domain and a second data set associated with the second domain session.
    Type: Grant
    Filed: January 28, 2010
    Date of Patent: October 28, 2014
    Assignee: Intel Corporation
    Inventors: Men Long, Karanvir S. Grewal