Patents by Inventor Adi Shaliv
Adi Shaliv has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11374930Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.Type: GrantFiled: January 2, 2019Date of Patent: June 28, 2022Assignee: INTEL CORPORATIONInventors: Adi Shaliv, Jesse Walker
-
Patent number: 11019084Abstract: A controller may include one or more processors configured to control an automotive operating function representing an operation of an actuator of an automobile; receive a first message in accordance with an automotive fieldbus communication protocol via a fieldbus communication network, wherein the first message comprises contextual information associated with the automobile; determine whether a relation between the contextual information and a status of the automotive operating function fulfills a predefined criterion; generate a second message in accordance with the automotive fieldbus communication protocol, wherein the second message comprises information representing a result of the determination.Type: GrantFiled: December 14, 2018Date of Patent: May 25, 2021Assignee: Intel CorporationInventors: Oleg Pogorelik, Glen J Anderson, Adi Shaliv, Michael Kara-Ivanov
-
Patent number: 10764635Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.Type: GrantFiled: December 17, 2018Date of Patent: September 1, 2020Assignee: Intel CorporationInventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
-
Patent number: 10621977Abstract: Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. Sampling logic can receive the signal of the audible speech and record a portion of the of the audible speech as a digital audio recording of the audible speech. Packaging logic can create a trusted speech transcription data record that includes the text and the digital audio recording and to digitally sign the transcription file to securely associate the text with the digital audio recording.Type: GrantFiled: October 30, 2015Date of Patent: April 14, 2020Assignee: McAfee, LLCInventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Adi Shaliv
-
Publication number: 20190230411Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.Type: ApplicationFiled: December 17, 2018Publication date: July 25, 2019Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
-
Publication number: 20190141035Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.Type: ApplicationFiled: January 2, 2019Publication date: May 9, 2019Applicant: INTEL CORPORATIONInventors: Adi Shaliv, Jesse Walker
-
Publication number: 20190141069Abstract: A controller may include one or more processors configured to control an automotive operating function representing an operation of an actuator of an automobile; receive a first message in accordance with an automotive fieldbus communication protocol via a fieldbus communication network, wherein the first message comprises contextual information associated with the automobile; determine whether a relation between the contextual information and a status of the automotive operating function fulfills a predefined criterion; generate a second message in accordance with the automotive fieldbus communication protocol, wherein the second message comprises information representing a result of the determination.Type: ApplicationFiled: December 14, 2018Publication date: May 9, 2019Inventors: Oleg Pogorelik, Glen J. Anderson, Adi Shaliv, Michael Kara-Ivanov
-
Patent number: 10187385Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.Type: GrantFiled: November 26, 2013Date of Patent: January 22, 2019Assignee: INTEL CORPORATIONInventors: Adi Shaliv, Jesse Walker
-
Patent number: 10158914Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.Type: GrantFiled: March 30, 2017Date of Patent: December 18, 2018Assignee: Intel CorporationInventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
-
Publication number: 20180288478Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.Type: ApplicationFiled: March 30, 2017Publication date: October 4, 2018Inventors: Lenitra M. Durham, Tamir Damian Munafo, Rita H. Wouhaybi, Adi Shaliv, Giuseppe Raffa, Oleg Pogorelik, Sangita Ravi Sharma, Alex Nayshtut
-
Patent number: 9798895Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.Type: GrantFiled: September 25, 2014Date of Patent: October 24, 2017Assignee: McAfee, Inc.Inventors: Alex Nayshtur, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik
-
Publication number: 20170125014Abstract: Embodiments include a system, method, and apparatus for creating a trusted speech transcription. Transcription logic can receive a signal of audible speech from an audio source and convert the audible speech signal into text. Sampling logic can receive the signal of the audible speech and record a portion of the of the audible speech as a digital audio recording of the audible speech. Packaging logic can create a trusted speech transcription data record that includes the text and the digital audio recording and to digitally sign the transcription file to securely associate the text with the digital audio recording.Type: ApplicationFiled: October 30, 2015Publication date: May 4, 2017Applicant: McAfee, Inc.Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Adi Shaliv
-
Patent number: 9564773Abstract: Methods and systems for optimizing wireless charging are provided. The method may include identifying, by a charging controller, charging apparatus location information associated with a wireless charging apparatus configured to direct charging beams, and identifying, by the charging controller, an optimal charging zone of the wireless charging apparatus based at least in part on the charging apparatus location information. The method may include receiving, by the charging controller, a first location information associated with a mobile device, and determining, by the charging controller, a first proximity of the mobile device to the optimal charging zone of the wireless charging apparatus based at least in part on the first location information. The method may include transmitting, by the charging controller, first optimal charging indicator information to the mobile device, the first optimal charging indicator information based at least in part on the first proximity.Type: GrantFiled: September 24, 2014Date of Patent: February 7, 2017Assignee: Intel IP CorportationInventors: Oleg Pogorelik, Adi Shaliv, Justin Lipman, Shahar Porat
-
Patent number: 9479998Abstract: Systems and methods are described herein for authenticating a user device that uses a wireless local area network, determining the location of the device, and complying with wireless guidelines based at least in part on the location. The user device may communicate with a location server to determine the user device's location. The user device will determine which wireless guidelines are applicable to that location and configure the wireless system or any device feature to comply with the guidelines. For example, some locations prohibit the operation of wireless devices with a frequency of greater than 5 GHz. If the location of the user device dictates compliance with that guideline, the user device will not transmit wireless signals with a frequency of greater than 5 GHz.Type: GrantFiled: June 29, 2012Date of Patent: October 25, 2016Assignee: Intel CorporationInventors: David Birnbaum, Guy Halperin, Adi Shaliv, Eran Friedlander
-
Patent number: 9467430Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: GrantFiled: February 10, 2015Date of Patent: October 11, 2016Assignee: Intel CorporationInventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
-
Patent number: 9319835Abstract: Systems and techniques for securely managed location-and-tracking service (LTS) access are described herein. A trusted execution environment (TEE) may establish a connection to an LTS. The TEE may provide verification to the LTS that the connection origination from the TEE. The TEE may request an LTS location for the mobile device from the LTS using the connection. The TEE may provide the LTS location to applications of the mobile device.Type: GrantFiled: September 19, 2013Date of Patent: April 19, 2016Assignee: Intel CorporationInventors: Ned M. Smith, Adi Shaliv
-
Publication number: 20160092697Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.Type: ApplicationFiled: September 25, 2014Publication date: March 31, 2016Inventors: Alex Nayshtut, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik
-
Publication number: 20160087486Abstract: Methods and systems for optimizing wireless charging are provided. The method may include identifying, by a charging controller, charging apparatus location information associated with a wireless charging apparatus configured to direct charging beams, and identifying, by the charging controller, an optimal charging zone of the wireless charging apparatus based at least in part on the charging apparatus location information. The method may include receiving, by the charging controller, a first location information associated with a mobile device, and determining, by the charging controller, a first proximity of the mobile device to the optimal charging zone of the wireless charging apparatus based at least in part on the first location information. The method may include transmitting, by the charging controller, first optimal charging indicator information to the mobile device, the first optimal charging indicator information based at least in part on the first proximity.Type: ApplicationFiled: September 24, 2014Publication date: March 24, 2016Inventors: OLEG POGORELIK, ADI SHALIV, JUSTIN LIPMAN, SHAHAR PORAT
-
Publication number: 20150358320Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.Type: ApplicationFiled: November 26, 2013Publication date: December 10, 2015Inventors: Adi Shaliv, Jesse Walker
-
Publication number: 20150319150Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: ApplicationFiled: February 10, 2015Publication date: November 5, 2015Inventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv