Patents by Inventor Victoria C. Moore

Victoria C. Moore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8892858
    Abstract: A data processing system may include a high integrity storage (HIS) device with a partition or cache that is protected from updates. The data processing system may perform a boot process in response to being reactivated. The boot process may include the operation of executing a boot object. During the boot process, before executing the boot object, the data processing system may retrieve a digest for the boot object from the protected cache of the HIS device. The digest may be a cryptographic hash value for the boot object. During the boot process, the retrieved digest may be extended into a platform configuration register in a trusted platform module of the data processing system. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: November 18, 2014
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Vincent J. Zimmer, Victoria C. Moore
  • Publication number: 20140259125
    Abstract: An embodiment may include circuitry to be included, at least in part, in a host. The host may include at least one host central processing unit (CPU) to execute, at least in part, at least one host operating system (OS). The circuitry may perform, at least in part, at least one operation in isolation both from interference from and control by the at least one host CPU and the at least one host OS. The at least one operation may include user authorization determination and user presence determination. The authorization determination may be in response, at least in part, to indication of physical presence of at least one user in proximity to the host. The user presence determination may determine, at least in part, whether, after the indication has been provided, the physical presence of the at least one user in the proximity to the host has ceased.
    Type: Application
    Filed: March 5, 2013
    Publication date: September 11, 2014
    Inventors: Ned M. Smith, Victoria C. Moore
  • Publication number: 20140181535
    Abstract: Described herein are techniques related to a tap-to-wake and tap-to-login system. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope and meaning of the claims. A tap-to-wake and tap-to-login system allows a user of a near field device to wake up a computing platform from a deep sleep state using a bump/tap without having to move a mouse or enter a keyboard stroke.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: Ned M. Smith, Victoria C. Moore, Avi Kanon
  • Publication number: 20140181925
    Abstract: In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: Ned M. Smith, Conor P. Cahill, Victoria C. Moore, Jason Martin, Micah J. Sheller
  • Publication number: 20140025939
    Abstract: A data processing system may include a high integrity storage (HIS) device with a partition or cache that is protected from updates. The data processing system may perform a boot process in response to being reactivated. The boot process may include the operation of executing a boot object. During the boot process, before executing the boot object, the data processing system may retrieve a digest for the boot object from the protected cache of the HIS device. The digest may be a cryptographic hash value for the boot object. During the boot process, the retrieved digest may be extended into a platform configuration register in a trusted platform module of the data processing system. Other embodiments are described and claimed.
    Type: Application
    Filed: December 29, 2011
    Publication date: January 23, 2014
    Inventors: Ned M. Smith, Vincent J. Zimmer, Victoria C. Moore
  • Publication number: 20130248717
    Abstract: According to some embodiments, a method and apparatus are provided to receive a first signal from a sensor, determine that a user is present based on the received first signal, receive a second signal from the sensor, and determine if the user is still present based on the received second signal.
    Type: Application
    Filed: December 28, 2011
    Publication date: September 26, 2013
    Inventors: Victoria C. Moore, Ned M. Smith
  • Publication number: 20120167187
    Abstract: A manageability engine, and/or operations thereof, for controlling access to one or more resources of a computer device. In an embodiment, the manageability engine executes an authentication agent to perform authentication of a local user of a computer platform which includes the manageability engine. In another embodiment, the manageability engine includes a device driver to control an input/output device for the local user to exchange an authentication factor via a trusted path between the input/output device and the manageability engine.
    Type: Application
    Filed: December 22, 2010
    Publication date: June 28, 2012
    Inventors: Ned M. Smith, Victoria C. Moore, Moshe Valenci, Craig T. Owen
  • Publication number: 20110154023
    Abstract: A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments.
    Type: Application
    Filed: December 21, 2009
    Publication date: June 23, 2011
    Inventors: Ned M. Smith, Victoria C. Moore, Steven L. Grobman
  • Publication number: 20110138166
    Abstract: In one embodiment, the present invention includes a method for obtaining a pre-boot authentication (PBA) image from a non-volatile storage that is configured with full disk encryption (FDE), and storing the PBA image in a memory. Then a callback protocol can be performed between a loader executing on an engine of a chipset and an integrity checker of a third party that provided the PBA image to confirm integrity of the PBA image, the PBA image is executed if the integrity is confirmed, and otherwise it is deleted. Other embodiments are described and claimed.
    Type: Application
    Filed: December 21, 2010
    Publication date: June 9, 2011
    Inventors: Jacek Peszek, Ned M. Smith, Vincent J. Zimmer, Victoria C. Moore, Alberto J. Martinez