Patents by Inventor Adi Shaliv

Adi Shaliv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11374930
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Grant
    Filed: January 2, 2019
    Date of Patent: June 28, 2022
    Assignee: INTEL CORPORATION
    Inventors: Adi Shaliv, Jesse Walker
  • Patent number: 11019084
    Abstract: A controller may include one or more processors configured to control an automotive operating function representing an operation of an actuator of an automobile; receive a first message in accordance with an automotive fieldbus communication protocol via a fieldbus communication network, wherein the first message comprises contextual information associated with the automobile; determine whether a relation between the contextual information and a status of the automotive operating function fulfills a predefined criterion; generate a second message in accordance with the automotive fieldbus communication protocol, wherein the second message comprises information representing a result of the determination.
    Type: Grant
    Filed: December 14, 2018
    Date of Patent: May 25, 2021
    Assignee: Intel Corporation
    Inventors: Oleg Pogorelik, Glen J Anderson, Adi Shaliv, Michael Kara-Ivanov
  • Patent number: 10764635
    Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: September 1, 2020
    Assignee: Intel Corporation
    Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
  • Patent number: 10621977
    Abstract: Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. Sampling logic can receive the signal of the audible speech and record a portion of the of the audible speech as a digital audio recording of the audible speech. Packaging logic can create a trusted speech transcription data record that includes the text and the digital audio recording and to digitally sign the transcription file to securely associate the text with the digital audio recording.
    Type: Grant
    Filed: October 30, 2015
    Date of Patent: April 14, 2020
    Assignee: McAfee, LLC
    Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Adi Shaliv
  • Publication number: 20190230411
    Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
    Type: Application
    Filed: December 17, 2018
    Publication date: July 25, 2019
    Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
  • Publication number: 20190141035
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Application
    Filed: January 2, 2019
    Publication date: May 9, 2019
    Applicant: INTEL CORPORATION
    Inventors: Adi Shaliv, Jesse Walker
  • Publication number: 20190141069
    Abstract: A controller may include one or more processors configured to control an automotive operating function representing an operation of an actuator of an automobile; receive a first message in accordance with an automotive fieldbus communication protocol via a fieldbus communication network, wherein the first message comprises contextual information associated with the automobile; determine whether a relation between the contextual information and a status of the automotive operating function fulfills a predefined criterion; generate a second message in accordance with the automotive fieldbus communication protocol, wherein the second message comprises information representing a result of the determination.
    Type: Application
    Filed: December 14, 2018
    Publication date: May 9, 2019
    Inventors: Oleg Pogorelik, Glen J. Anderson, Adi Shaliv, Michael Kara-Ivanov
  • Patent number: 10187385
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: January 22, 2019
    Assignee: INTEL CORPORATION
    Inventors: Adi Shaliv, Jesse Walker
  • Patent number: 10158914
    Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: December 18, 2018
    Assignee: Intel Corporation
    Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
  • Publication number: 20180288478
    Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
    Type: Application
    Filed: March 30, 2017
    Publication date: October 4, 2018
    Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
  • Patent number: 9798895
    Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: October 24, 2017
    Assignee: McAfee, Inc.
    Inventors: Alex Nayshtur, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik
  • Publication number: 20170125014
    Abstract: Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. Sampling logic can receive the signal of the audible speech and record a portion of the of the audible speech as a digital audio recording of the audible speech. Packaging logic can create a trusted speech transcription data record that includes the text and the digital audio recording and to digitally sign the transcription file to securely associate the text with the digital audio recording.
    Type: Application
    Filed: October 30, 2015
    Publication date: May 4, 2017
    Applicant: McAfee, Inc.
    Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Adi Shaliv
  • Patent number: 9564773
    Abstract: Methods and systems for optimizing wireless charging are provided. The method may include identifying, by a charging controller, charging apparatus location information associated with a wireless charging apparatus configured to direct charging beams, and identifying, by the charging controller, an optimal charging zone of the wireless charging apparatus based at least in part on the charging apparatus location information. The method may include receiving, by the charging controller, a first location information associated with a mobile device, and determining, by the charging controller, a first proximity of the mobile device to the optimal charging zone of the wireless charging apparatus based at least in part on the first location information. The method may include transmitting, by the charging controller, first optimal charging indicator information to the mobile device, the first optimal charging indicator information based at least in part on the first proximity.
    Type: Grant
    Filed: September 24, 2014
    Date of Patent: February 7, 2017
    Assignee: Intel IP Corportation
    Inventors: Oleg Pogorelik, Adi Shaliv, Justin Lipman, Shahar Porat
  • Patent number: 9479998
    Abstract: Systems and methods are described herein for authenticating a user device that uses a wireless local area network, determining the location of the device, and complying with wireless guidelines based at least in part on the location. The user device may communicate with a location server to determine the user device's location. The user device will determine which wireless guidelines are applicable to that location and configure the wireless system or any device feature to comply with the guidelines. For example, some locations prohibit the operation of wireless devices with a frequency of greater than 5 GHz. If the location of the user device dictates compliance with that guideline, the user device will not transmit wireless signals with a frequency of greater than 5 GHz.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: October 25, 2016
    Assignee: Intel Corporation
    Inventors: David Birnbaum, Guy Halperin, Adi Shaliv, Eran Friedlander
  • Patent number: 9467430
    Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: October 11, 2016
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
  • Patent number: 9319835
    Abstract: Systems and techniques for securely managed location-and-tracking service (LTS) access are described herein. A trusted execution environment (TEE) may establish a connection to an LTS. The TEE may provide verification to the LTS that the connection origination from the TEE. The TEE may request an LTS location for the mobile device from the LTS using the connection. The TEE may provide the LTS location to applications of the mobile device.
    Type: Grant
    Filed: September 19, 2013
    Date of Patent: April 19, 2016
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Adi Shaliv
  • Publication number: 20160092697
    Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Alex Nayshtut, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik
  • Publication number: 20160087486
    Abstract: Methods and systems for optimizing wireless charging are provided. The method may include identifying, by a charging controller, charging apparatus location information associated with a wireless charging apparatus configured to direct charging beams, and identifying, by the charging controller, an optimal charging zone of the wireless charging apparatus based at least in part on the charging apparatus location information. The method may include receiving, by the charging controller, a first location information associated with a mobile device, and determining, by the charging controller, a first proximity of the mobile device to the optimal charging zone of the wireless charging apparatus based at least in part on the first location information. The method may include transmitting, by the charging controller, first optimal charging indicator information to the mobile device, the first optimal charging indicator information based at least in part on the first proximity.
    Type: Application
    Filed: September 24, 2014
    Publication date: March 24, 2016
    Inventors: OLEG POGORELIK, ADI SHALIV, JUSTIN LIPMAN, SHAHAR PORAT
  • Publication number: 20150358320
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Application
    Filed: November 26, 2013
    Publication date: December 10, 2015
    Inventors: Adi Shaliv, Jesse Walker
  • Publication number: 20150319150
    Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.
    Type: Application
    Filed: February 10, 2015
    Publication date: November 5, 2015
    Inventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv