Patents by Inventor Mojtaba Mirashrafi

Mojtaba Mirashrafi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9990473
    Abstract: Securely sharing content between a first system and a second system is provided. A hardware-based root of trust is established between the first system and a server. Content requested by a user and an encrypted license blob associated with the content is received by the first system from the server. A first agent on the first system connects with a second agent on the second system. The encrypted license blob and a sub-license request are sent from the first agent to a security processor on the first system. The first security processor decrypts the encrypted license blob, validates the sub-license request, and if allowed, creates a sub-license to allow the second system to play the content. The first security processor sends the sub-license to a security processor on the second system. The first system provides access to the content to the second system for future playback according to the sub-license.
    Type: Grant
    Filed: December 8, 2011
    Date of Patent: June 5, 2018
    Assignee: Intel Corporation
    Inventors: Mojtaba Mirashrafi, Mousumi M. Hazra, Ramesh Pendakur, Daniel Nemiroff
  • Publication number: 20170046682
    Abstract: A method, system, and device are disclosed. In one embodiment the method includes receiving a recipient phone number into an electronic gift phone module (EGPM). The EGPM also receives a set of gift data that includes a gift identification. The EGPM sends the recipient phone number and at least some gift data to an electronic gift processing server module (EGPSM). The EGPSM purchases a recipient gift by utilizing the gift identification. The EGPSM also sends notification of the recipient gift purchase to the recipient phone number.
    Type: Application
    Filed: May 17, 2016
    Publication date: February 16, 2017
    Inventors: Gyan Prakash, Selim Aissi, Saurabh Dadu, Ramesh Pendakur, Mojtaba Mirashrafi
  • Patent number: 9337999
    Abstract: A system for application usage continuum across client devices and platforms includes a first client device configured to execute a first instance of an application and a second client device configured to execute a second instance of the application. The first client device is configured to receive an indication to transfer operation of the first instance of the application running on the first client device to the second instance of the application on the second client device. The first client device is further configured to generate state information and data associated with execution of the first instance of the application on the first client device and cause the state information to be sent to the second client device to enable the second instance of the application on the second client device to continue operation of the application on the second client device using the state information from the first client device.
    Type: Grant
    Filed: April 1, 2011
    Date of Patent: May 10, 2016
    Assignee: Intel Corporation
    Inventors: Naveed Iqbal, Mousumi M. Hazra, Jiphun C. Satapathy, Mojtaba Mirashrafi, Walter Gintz
  • Patent number: 8892904
    Abstract: The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: November 18, 2014
    Assignee: Intel Corporation
    Inventors: Mojtaba Mirashrafi, Gyan Prakash, Jiphun C. Satapathy, Saurabh Dadu
  • Publication number: 20140280840
    Abstract: Methods, systems, and computer program products that relate to managing persistence information of client devices for services registered with a persistence cloud service. A method from the perspective of a computing device associated with a registered service may include receiving, from a client device, a device identifier that identifies the client device to the registered service. The method further may include requesting, from a persistence cloud server associated with the persistence cloud service, persistence information associated with the device identifier. The method may also include receiving the persistence information, determining a level of service to provide to the client device based on the persistence information, and providing the level of service to the client device. The computing device may, for example, be a server associated with the registered service, or may, for example, be a router.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Jiphun C. Satapathy, Mojtaba Mirashrafi, Gyan Prakash, Mousumi M. Hazra
  • Patent number: 8682750
    Abstract: A client computing system renders digital content (such as, for example, a movie or TV program) for a user. Based on the user's interest, the user may select an object image in a video frame of a sequence of video frames of the digital content being rendered. The user input data indicating the object image selection may be sent to a service provider server coupled to the client computing system over a network via a secure communications channel. The server obtains information about an object corresponding to the user-selected object image. The server sends the object information to the client computing system for display to the user. The object may be an object in the physical world, such as a consumer good. The object information may include information enabling the user to purchase the object.
    Type: Grant
    Filed: March 11, 2011
    Date of Patent: March 25, 2014
    Assignee: Intel corporation
    Inventors: Mojtaba Mirashrafi, Mousumi M. Hazra, Ramesh Pendakur
  • Publication number: 20140075550
    Abstract: The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Inventors: MOJTABA MIRASHRAFI, GYAN PRAKASH, JIPHUN C. SATAPATHY, SAURABH DADU
  • Publication number: 20130283392
    Abstract: Securely sharing content between a first system and a second system is provided. A hardware-based root of trust is established between the first system and a server. Content requested by a user and an encrypted license blob associated with the content is received by the first system from the server. A first agent on the first system connects with a second agent on the second system. The encrypted license blob and a sub-license request are sent from the first agent to a security processor on the first system. The first security processor decrypts the encrypted license blob, validates the sub-license request, and if allowed, creates a sub-license to allow the second system to play the content. The first security processor sends the sub-license to a security processor on the second system. The first system provides access to the content to the second system for future playback according to the sub-license.
    Type: Application
    Filed: December 8, 2011
    Publication date: October 24, 2013
    Inventors: Mojtaba Mirashrafi, Mousumi M. Hazra, Ramesh Pendakur, Daniel Nemiroff
  • Patent number: 8566610
    Abstract: Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed.
    Type: Grant
    Filed: December 18, 2009
    Date of Patent: October 22, 2013
    Assignee: Intel Corporation
    Inventors: Mousumi Hazra, Gyan Prakash, Saurabh Dadu, Mojtaba Mirashrafi, Duncan Glendinning
  • Patent number: 8356340
    Abstract: A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: January 15, 2013
    Assignee: Intel Corporation
    Inventors: Saurabh Dadu, Gyan Prakash, Mojtaba Mirashrafi
  • Patent number: 8346305
    Abstract: Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: January 1, 2013
    Assignee: Intel Corporation
    Inventors: Duncan Glendinning, Mojtaba Mirashrafi, Saurabh Dadu, Mousumi M. Hazra, Gyan Prakash, Carol A. Bell
  • Patent number: 8296554
    Abstract: Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. In one instance, the method includes determining on pre-boot whether a removable storage device is attached to a computer system, determining whether the computer system is in a locked state and, if the removable storage device is detected, transferring control to a pre-boot authentication module (PBA) stored on the removable storage device to interact with a manageability engine to restore the computer system from the locked state to an unlocked state. If the removable storage device is not detected, the computer system shuts down if the system is determined to be in the locked state and no other PBA is detected. The computer system comprises a host operating environment and a manageability engine that operates independent of the host operating environment. Other embodiments may also be described and claimed.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: October 23, 2012
    Assignee: Intel Corporation
    Inventors: Mojtaba Mirashrafi, Mousumi Hazra, Gyan Prakash, Saurabh Dadu
  • Publication number: 20120250858
    Abstract: A system for application usage continuum across client devices and platforms includes a first client device configured to execute a first instance of an application and a second client device configured to execute a second instance of the application. The first client device is configured to receive an indication to transfer operation of the first instance of the application running on the first client device to the second instance of the application on the second client device. The first client device is further configured to generate state information and data associated with execution of the first instance of the application on the first client device and cause the state information to be sent to the second client device to enable the second instance of the application on the second client device to continue operation of the application on the second client device using the state information from the first client device.
    Type: Application
    Filed: April 1, 2011
    Publication date: October 4, 2012
    Inventors: Naveed Iqbal, Mousumi M. Hazra, Jiphun C. Satapathy, Mojtaba Mirashrafi, Walter Gintz
  • Publication number: 20120233036
    Abstract: A client computing system renders digital content (such as, for example, a movie or TV program) for a user. Based on the user's interest, the user may select an object image in a video frame of a sequence of video frames of the digital content being rendered. The user input data indicating the object image selection may be sent to a service provider server coupled to the client computing system over a network via a secure communications channel. The server obtains information about an object corresponding to the user-selected object image. The server sends the object information to the client computing system for display to the user. The object may be an object in the physical world, such as a consumer good. The object information may include information enabling the user to purchase the object.
    Type: Application
    Filed: March 11, 2011
    Publication date: September 13, 2012
    Inventors: Mojtaba Mirashrafi, Mousumi M. Hazra, Ramesh Pendakur
  • Publication number: 20120166304
    Abstract: A method, system, and device are disclosed. In one embodiment the method includes receiving a recipient phone number into an electronic gift phone module (EGPM). The EGPM also receives a set of gift data that includes a gift identification. The EGPM sends the recipient phone number and at least some gift data to an electronic gift processing server module (EGPSM). The EGPSM purchases a recipient gift by utilizing the gift identification. The EGPSM also sends notification of the recipient gift purchase to the recipient phone number.
    Type: Application
    Filed: December 23, 2010
    Publication date: June 28, 2012
    Inventors: Gyan Prakash, Selim Aissi, Saurabh Dadu, Ramesh Pendakur, Mojtaba Mirashrafi
  • Publication number: 20120115442
    Abstract: A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature.
    Type: Application
    Filed: December 21, 2011
    Publication date: May 10, 2012
    Inventors: Saurabh Dadu, Gyan Prakash, Mojtaba Mirashrafi
  • Patent number: 8171529
    Abstract: A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature.
    Type: Grant
    Filed: December 17, 2009
    Date of Patent: May 1, 2012
    Assignee: Intel Corporation
    Inventors: Saurabh Dadu, Gyan Prakash, Mojtaba Mirashrafi
  • Publication number: 20110151836
    Abstract: A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature.
    Type: Application
    Filed: December 17, 2009
    Publication date: June 23, 2011
    Inventors: Saurabh Dadu, Gyan Prakash, Mojtaba Mirashrafi
  • Publication number: 20110154030
    Abstract: Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed.
    Type: Application
    Filed: December 18, 2009
    Publication date: June 23, 2011
    Inventors: Mousumi Hazra, Gyan Prakash, Saurabh Dadu, Mojtaba Mirashrafi, Duncan Glendinning
  • Publication number: 20110076986
    Abstract: Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Inventors: Duncan Glendinning, Mojtaba Mirashrafi, Saurabh Dadu, Mousumi M. Hazra, Gyan Prakash, Carol A. Bell