Patents by Inventor Steven L. Grobman

Steven L. Grobman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230269076
    Abstract: System, method, and apparatus embodiments for creating, using, and managing protected cryptography keys are described. In an embodiment, an apparatus includes a decoder, an execution unit, and a cache. The decoder is to decode a single instruction into a decoded single instruction, the single instruction having a first source operand to specify encrypted data and a second source operand to specify a handle including a first including ciphertext of an encryption key, an integrity tag, and additional authentication data.
    Type: Application
    Filed: August 27, 2021
    Publication date: August 24, 2023
    Applicant: Intel Corporation
    Inventors: Jason W. BRANDT, Steven L. GROBMAN, Vedvyas SHANBHOGUE
  • Patent number: 11366906
    Abstract: A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: June 21, 2022
    Assignee: INTEL CORPORATION
    Inventors: Ned M. Smith, Steven L. Grobman, Craig T. Owen
  • Patent number: 11363058
    Abstract: A first storage device or first storage disk including first executable instructions that, when executed, cause a processor to at least: in response to determining a variable associated with a memory page that (1) has been loaded into local memory from a second storage device and (2) has been accessed from the local memory, has a first state, identify the memory page as a modified memory page, the memory page including second executable instructions. The first instructions also cause the processor to, in response to determining the second executable instructions of the modified memory page have been changed since a previous analysis of the modified memory page, perform anti-malware analysis of at least a portion of the modified memory page.
    Type: Grant
    Filed: March 23, 2020
    Date of Patent: June 14, 2022
    Assignee: MCAFEE, LLC
    Inventors: Venkata Ramanan Sambandam, Carl D. Woodward, Dmitri Rubakha, Steven L. Grobman
  • Publication number: 20200228545
    Abstract: A first storage device or first storage disk including first executable instructions that, when executed, cause a processor to at least: in response to determining a variable associated with a memory page that (1) has been loaded into local memory from a second storage device and (2) has been accessed from the local memory, has a first state, identify the memory page as a modified memory page, the memory page including second executable instructions. The first instructions also cause the processor to, in response to determining the second executable instructions of the modified memory page have been changed since a previous analysis of the modified memory page, perform anti-malware analysis of at least a portion of the modified memory page.
    Type: Application
    Filed: March 23, 2020
    Publication date: July 16, 2020
    Inventors: Venkata Ramanan Sambandam, Carl D. Woodward, Dmitri Rubakha, Steven L. Grobman
  • Patent number: 10623438
    Abstract: A technique for detecting malware uses hardware capabilities of the processing element of a programmable device to detect modification of executable code during execution. By monitoring a dirty bit in page tables, pages that have been modified can be detected, allowing analysis of those pages during execution. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: April 14, 2020
    Assignee: McAfee, LLC
    Inventors: Venkata Ramanan Sambandam, Carl D. Woodward, Dmitri Rubakha, Steven L. Grobman
  • Publication number: 20200065496
    Abstract: A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers.
    Type: Application
    Filed: October 28, 2019
    Publication date: February 27, 2020
    Inventors: Ned M. Smith, Steven L. Grobman, Craig T. Owen
  • Patent number: 10482254
    Abstract: A method, apparatus, system, and computer program product for domain-authenticated control of platform resources. Resources under the control of the platform are managed in accordance with access control rules that are centrally managed by a directory service. Security policies are uniformly applied by requiring authorization of the user's access to platform resources including hard drives, flash memory, sensors, network controllers and power state controllers.
    Type: Grant
    Filed: July 14, 2010
    Date of Patent: November 19, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Steven L. Grobman, Craig T. Owen
  • Patent number: 10097349
    Abstract: Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key.
    Type: Grant
    Filed: August 14, 2015
    Date of Patent: October 9, 2018
    Assignee: Intel Corporation
    Inventors: Steven L. Grobman, Jason W. Brandt
  • Publication number: 20180183814
    Abstract: A technique for detecting malware uses hardware capabilities of the processing element of a programmable device to detect modification of executable code during execution. By monitoring a dirty bit in page tables, pages that have been modified can be detected, allowing analysis of those pages during execution. An indication may then be passed to an anti-malware software to analyze the executable further.
    Type: Application
    Filed: December 28, 2016
    Publication date: June 28, 2018
    Inventors: Venkata Ramanan Sambandam, Carl D. Woodward, Dmitri Rubakha, Steven L. Grobman
  • Patent number: 9635557
    Abstract: A system for determining reliability for location resources. A device may be configured to determine device location based on location information received from a location information source, the device including secure systems configured to provide a reliability rating of the location information source. The secure systems may be configured to compare a device location based on the location information to a secondary device location based on secondary information to determine the reliability rating. For example, location information based on location signals received by the device may be compared to sensor information in the device to determine whether the movement described by location information and sensor information agrees. In the same or a different embodiment, a refined reliability rating may be requested from a secure resource in the device or accessible via a network. The secure resource may refine the reliability rating using tertiary information available to the secure resource.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: April 25, 2017
    Assignee: INTEL CORPORATION
    Inventor: Steven L. Grobman
  • Publication number: 20170111388
    Abstract: A system for securing electronic devices includes a processor, a storage medium communicatively coupled to the processor, and a secured storage communicatively coupled to the client. The system further includes a client application including computer-executable instructions on the medium. The instructions are readable by the processor. The application is configured to manage a trusted image of software of a client in a secured storage and, upon a signal indicating malware on the client, restore the trusted image to the client independent of an operating system and user processes of the client.
    Type: Application
    Filed: April 1, 2016
    Publication date: April 20, 2017
    Inventors: Kunal Mehta, Dmitri Rubakha, Carl D. Woodward, Steven L. Grobman, Adrian R. Pearson, Faraz A. Siddiqi
  • Patent number: 9602275
    Abstract: The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol.
    Type: Grant
    Filed: October 28, 2003
    Date of Patent: March 21, 2017
    Assignee: Intel Corporation
    Inventor: Steven L. Grobman
  • Publication number: 20160342798
    Abstract: A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.
    Type: Application
    Filed: July 25, 2016
    Publication date: November 24, 2016
    Applicant: Intel Corporation
    Inventors: NED M. Smith, VICTORIA C. MOORE, STEVEN L. GROBMAN
  • Patent number: 9426147
    Abstract: A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.
    Type: Grant
    Filed: August 22, 2014
    Date of Patent: August 23, 2016
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Victoria C. Moore, Steven L. Grobman
  • Publication number: 20150381358
    Abstract: Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key.
    Type: Application
    Filed: August 14, 2015
    Publication date: December 31, 2015
    Inventors: Steven L. Grobman, Jason W. Brandt
  • Patent number: 9177129
    Abstract: Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing a trust level of the computing device, and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.
    Type: Grant
    Filed: June 27, 2012
    Date of Patent: November 3, 2015
    Assignee: Intel Corporation
    Inventors: Steven L. Grobman, Uttam K. Sengupta
  • Patent number: 9135450
    Abstract: Systems and methods for protecting symmetric encryption keys when performing encryption are described. In one embodiment, a computer-implemented method includes retrieving at least one real key from a secure area and executing, with a processor, a key transform instruction to generate at least one transformed key based on receiving the at least one real key. The at least one transformed key is an encrypted version of at least one round key that is encrypted by the processor using the at least one real key. The processor is able to decrypt the at least one transformed key and encrypt the at least one round key.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: September 15, 2015
    Assignee: Intel Corporation
    Inventors: Steven L. Grobman, Jason W. Brandt
  • Patent number: 8996883
    Abstract: A series of touch panel key entries may be secured by shuffling touch entry coordinates. In one embodiment, the entries may be secured by applying a shuffling algorithm that replaces the true coordinates with other incorrect coordinates. Then the correct data may be reassembled in a secure environment.
    Type: Grant
    Filed: November 30, 2011
    Date of Patent: March 31, 2015
    Assignee: Intel Corporation
    Inventors: Steven L. Grobman, Ioannis T. Schoinas
  • Patent number: 8984613
    Abstract: The present disclosure relates to the authenticating a client against a pool of servers utilizing a secure authentication protocol, and, more specifically, to the authenticating a client against a pool of servers providing a common service, utilizing the Kerberos secure authentication protocol.
    Type: Grant
    Filed: January 5, 2007
    Date of Patent: March 17, 2015
    Assignee: Intel Corporation
    Inventor: Steven L. Grobman
  • Publication number: 20150067343
    Abstract: By processing aggregated data in a trusted environment, a system can reduce opportunities for tampering with aggregated data that is processed in a peer-to-peer chain. Each device may pass the predecessor aggregated data to a trusted environment in that device, which obtains local data for that device and aggregates it with the predecessor aggregated data, producing an output aggregated data. Optionally, the system can identify when a device has previously processed the aggregated data, reducing the possibility that the device can be used to aggregate data repeatedly. The aggregated data may be digitally signed or encrypted to enhance the tamper resistance of the data payload.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 5, 2015
    Inventor: Steven L. Grobman