Patents by Inventor Akshay Kadam

Akshay Kadam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11836262
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Grant
    Filed: October 3, 2022
    Date of Patent: December 5, 2023
    Assignee: INTEL CORPORATION
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Publication number: 20230026602
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Application
    Filed: October 3, 2022
    Publication date: January 26, 2023
    Applicant: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, JR., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Patent number: 11461483
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: October 4, 2022
    Assignee: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Publication number: 20220311594
    Abstract: An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata.
    Type: Application
    Filed: January 5, 2022
    Publication date: September 29, 2022
    Applicant: Intel Corporation
    Inventors: Akshay Kadam, Sivakumar B, Lawrence Booth, JR., Niraj Gupta, Steven Tu, Ricardo Becker, Subba Mungara, Tuyet-Trang Piel, Mitul Shah, Raynald Lim, Mihai Bogdan Bucsa, Cliodhna Ni Scanaill, Roman Zubarev, Dmitry Budnikov, Lingyun Zhu, Yi Qian, Stewart Taylor
  • Publication number: 20200167488
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Application
    Filed: January 28, 2020
    Publication date: May 28, 2020
    Applicant: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth Jr., Brent Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Patent number: 8769228
    Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: July 1, 2014
    Assignee: Intel Corporation
    Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
  • Publication number: 20120159041
    Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
  • Publication number: 20050193229
    Abstract: Software architecture for developing distributed fault-tolerant systems independent of the underlying hardware architecture and operating system. Systems built using architecture components are scalable and allow a set of computer applications to operate in fault-tolerant/high-availability mode, distributed processing mode, or many possible combinations of distributed and fault-tolerant modes in the same system without any modification to the architecture components. The software architecture defines system components that are modular and address problems in present systems. The architecture uses a System Controller, which controls system activation, initial load distribution, fault recovery, load redistribution, and system topology, and implements system maintenance procedures. An Application Distributed Fault-Tolerant/High-Availability Support Module (ADSM) enables an application(s) to operate in various distributed fault-tolerant modes.
    Type: Application
    Filed: February 2, 2005
    Publication date: September 1, 2005
    Inventors: Ashwani Garg, Akshay Kadam, Pradeep Malhotra, Sagar Pratap, Chirayu Patel
  • Publication number: 20040128372
    Abstract: A computer system management module includes a common object module. The management module further includes an object resource manager, an edge resource manager coupled, and a transaction manager coupled to the common object module. The management module further includes an alarm manager coupled to the object resource manager.
    Type: Application
    Filed: December 16, 2002
    Publication date: July 1, 2004
    Inventors: Amit Mukherjee, Anantha P. Rathnam, Lakshmi Ramachandran, Chirayu Patel, Santosh Balakrishnan, Martin Frey, Akshay Kadam, Rishi Mukhopadhyay