Patents by Inventor Alex Nayshtut

Alex Nayshtut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160066184
    Abstract: In an embodiment, an apparatus includes a security engine to operate in a trusted execution environment to perform security operations and to authenticate a user of the apparatus, and a pairing logic to receive an indication of discovery of a peer device and to determine whether the user of the apparatus corresponds to a user of the peer device, and if so to enable a pairing with the peer device according to a first security ring if the correspondence is determined, and to enable the pairing with the peer device according to a second security ring if no correspondence is detected and the user of the apparatus is authenticated. Other embodiments are described and claimed.
    Type: Application
    Filed: August 29, 2014
    Publication date: March 3, 2016
    Inventors: Abhilasha Bhargav-Spantzel, Ned M. Smith, Hormuzd M. Khosravi, Michael Raziel, Alex Nayshtut
  • Publication number: 20160057142
    Abstract: Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.
    Type: Application
    Filed: July 27, 2015
    Publication date: February 25, 2016
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Terry H. Yoshii
  • Publication number: 20160044001
    Abstract: Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a storage device; listening logic to wirelessly receive a plurality of key fragments from a corresponding plurality of peer devices, to cause storage of the plurality of key fragments in the storage device, and to receive an encrypted provisioning message from a management device; key generation logic to generate a decryption key based on the plurality of key fragments stored in the storage device to decrypt the encrypted provisioning message, and to decrypt the encrypted provisioning message using the decryption key; and control logic to provision the network-enabled device in accordance with instructions included in the decrypted provisioning message. Other embodiments may be disclosed and/or claimed.
    Type: Application
    Filed: August 11, 2014
    Publication date: February 11, 2016
    Inventors: Oleg Pogorelik, Efrat Levy, Alex Nayshtut
  • Publication number: 20160036826
    Abstract: Technologies for secure content packaging include a source computing device that transmits a secure package to a destination computing device. The destination computing device establishes a content policy trusted execution environment and a key policy trusted execution environment. The content policy trusted execution environment may be established in a secure enclave using processor support. The key policy trusted execution environment may be established using a security engine. The key policy trusted execution environment evaluates a key access policy and decrypts a content key using a master wrapping key. The content policy trusted execution environment evaluates a content access policy and decrypts the content using the decrypted content key. Similarly, the source computing device authors the secure package using a content policy trusted execution environment and a key policy trusted execution environment. The master wrapping key may be provisioned to the computing devices during manufacture.
    Type: Application
    Filed: July 29, 2014
    Publication date: February 4, 2016
    Inventors: Oleg Pogorelik, Alex Nayshtut, Ned M. Smith, Igor Muttik, Ido Lapidot
  • Publication number: 20160026581
    Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a code segment identified as suspicious and detects a transactional abort during execution of the code segment. The computing device may execute a security support thread concurrently with the code segment that reads one or more monitored memory locations. A transactional abort may be caused by a read of the security support thread conflicting with a write from the code segment. The computing device may set a breakpoint within the code segment, and a transactional abort may be caused by execution of the code segment reaching the breakpoint. An abort handler determines whether a security event has occurred and reports the security event. The abort handler may determine whether the security event has occurred based on the cause of the transactional abort. Other embodiments are described and claimed.
    Type: Application
    Filed: December 17, 2013
    Publication date: January 28, 2016
    Inventors: Igor MUTTIK, Roman DEMENTIEV, Alex NAYSHTUT
  • Patent number: 9246678
    Abstract: An embodiment of the invention allows a user to back-up/store data to a cloud-based storage system and synchronize that data on the user's devices coupled to the storage system. The devices have secure out-of-band cryptoprocessors that conceal a private key. The private key corresponds to a public key that is used to encrypt a session key and information, both of which are passed to and through cloud based storage, all while remaining encrypted. The encrypted material is communicated from the cloud to another of the user's devices where the encrypted material is decrypted within a secure out-of-band cryptoprocessor (using the private key that corresponds to the aforementioned public key) located within the device. The embodiment allows for secure provisioning of the private key to the devices. The private key is only decrypted within the cryptoprocessor so the private key is not “in the open”. Other embodiments are described herein.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: January 26, 2016
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Edward V. Jimison, Omer Ben-Shalom, Michael Raziel
  • Publication number: 20150380971
    Abstract: Systems and methods for power distribution allocation are provided. A system may establish a first wireless connection between the system and a first mobile device. The system may receive a first charge request from the first mobile device comprising first mobile device information, and may identify charging system policies based at least in part on the first charge request. The system may determine a first charge program for the first mobile device based at least in part on the first charge request and the one or more charging system policies, where the first charge program comprises a power allocation of the first mobile device with respect to other mobile devices connected to the charging system. The system may wirelessly charge the first mobile device, based at least in part on the first charge program.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: AVI APRIEV PRIEV, OLEG POGORELIK, SHAHAR PORAT, ALEX NAYSHTUT
  • Publication number: 20150365427
    Abstract: Various embodiments are generally directed to techniques to detect and eradicate malware attacks by employing information indicative of malware activity received from both endpoint devices and network devices proving network services to endpoint devices. An apparatus to detect malware includes a processor component, an analysis component for execution by the processor component to employ a trust level assigned to a device in a network as a factor in an analysis of an indication received from the device of a malware attack, and an eradication component for execution by the processor component to determine an action to take through the network to eradicate the malware attack based on the analysis. Other embodiments are described and claimed.
    Type: Application
    Filed: December 18, 2013
    Publication date: December 17, 2015
    Inventors: Omer Ben-Shalom, Igor Muttik, Alex Nayshtut, Yaniv Avidan
  • Patent number: 9197654
    Abstract: A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in an operating system environment, then comparing the monitor data, attempts to hide network traffic can be detected, allowing the possibility of performing rehabilitative actions on the computer system to locate and remove the malware hiding the network traffic.
    Type: Grant
    Filed: June 28, 2013
    Date of Patent: November 24, 2015
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Igor Muttik
  • Publication number: 20150286839
    Abstract: Example methods, systems, apparatus and articles of manufacture to protect content based on persona are disclosed. An example system includes a content encryption manager to encrypt a first content with an unencrypted first content key in response to identifying a first persona mode of a computing device, a persona encryption manager to encrypt the unencrypted first content key with a first public key to generate an encrypted first content key, and a metadata integrator to embed the encrypted first content key into the encrypted first content.
    Type: Application
    Filed: December 2, 2013
    Publication date: October 8, 2015
    Inventors: Omer Ben-Shalom, Avishai Goldberg, Alex Nayshtut
  • Publication number: 20150278123
    Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a transactional memory execution envelope within a security thread. Within the transactional envelope, the security thread reads one or more memory locations. The computing device detects a transactional abort originating from the transactional envelope, and determines whether a security event has occurred. A security event may include an unauthorized write to the monitored memory locations from outside the transactional envelope, including from non-transactional code. The computing device reports any security events that are detected. The computing device may execute several security threads that each monitor a different, non-overlapping memory location. The computing device may spawn a new security thread to monitor a memory location while a previous security thread is handling a transactional abort. Other embodiments are described and claimed.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Inventors: Alex Nayshtut, Igor Muttik, Roman Dementiev
  • Publication number: 20150278531
    Abstract: Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file representative of a drive of the first device; encrypting, via a processor, the archive file to form an encrypted archive file; and conveying the encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of a second user of the cloud services, the decrypted archive file to be mounted to an operating system of the second device.
    Type: Application
    Filed: March 31, 2014
    Publication date: October 1, 2015
    Inventors: Ned M. Smith, Omer Ben-Shalom, Alex Nayshtut
  • Publication number: 20150281189
    Abstract: In an embodiment, a system includes a processor that includes private key decryption logic to decrypt an encrypted private key received from a consuming device to produce a private key, and symmetric key decryption logic to receive the private key from the private key decryption logic and to decrypt an encrypted symmetric key received from the consuming device using the private key. The system also includes a dynamic random access memory (DRAM) coupled to the processor. Other embodiments are described and claimed.
    Type: Application
    Filed: March 27, 2014
    Publication date: October 1, 2015
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Ned M. Smith, Edward V. Jimison, JR., Hormuzd M. Khosravi
  • Publication number: 20150278558
    Abstract: Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 1, 2015
    Inventors: Avi Priev, Alex Nayshtut, Hong Li, Shahar Porat
  • Publication number: 20150248418
    Abstract: Described herein is technology for managing cloud storage. In particular, systems, devices and methods for managing cloud storage are described. In some embodiments, management of cloud storage may result in the designation of storage allocated to a first storage pool as obsolete, and the reallocation and/or reclamation of such storage to a second storage pool and/or a general cloud storage pool. Management may occur in accordance with one or more policies.
    Type: Application
    Filed: October 9, 2013
    Publication date: September 3, 2015
    Inventors: Rahul M. Bhardwaj, Vishwa Hassan, Thomas A. Mant, Christian D. Black, Jeffrey C. Sedayao, Terry H. Yoshii, Alex Nayshtut, Michael S. Breton, Douglas P. Devetter
  • Patent number: 9116849
    Abstract: Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.
    Type: Grant
    Filed: March 13, 2013
    Date of Patent: August 25, 2015
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Terry H. Yoshii
  • Publication number: 20150222667
    Abstract: This disclosure is directed to a protection system including security rule evaluation. A device may comprise a protection module to identify threats to at least one of the device or to a network including the device. The protection module may include, for example, a rule evaluator (RE) module to evaluate proposed security rules for identifying the threats based on at least one ground truth scenario and to determine whether to promote the proposed security rules to new security rules. The proposed security rules may be generated by the protection module or received from other devices in the network or other networks. New security rules may be shared with the other devices and/or networks. The RE module may further trigger an independent evaluation of the proposed security rules, which may also be considered when determining whether to add the proposed security rules to the set of active rules in the device.
    Type: Application
    Filed: December 2, 2013
    Publication date: August 6, 2015
    Inventors: Alex Nayshtut, Igor Muttik, Yaniv Avidan
  • Publication number: 20150113631
    Abstract: Various embodiments are generally directed to an apparatus, method and other techniques for detecting an input comprising an object contacting a surface of an apparatus, determining object characteristics based on the detected input and selecting a user profile based on the determined object characteristics.
    Type: Application
    Filed: October 23, 2013
    Publication date: April 23, 2015
    Inventors: Anna Lerner, Alex Nayshtut, Tomer Rider
  • Publication number: 20150007316
    Abstract: A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in an operating system environment, then comparing the monitor data, attempts to hide network traffic can be detected, allowing the possibility of performing rehabilitative actions on the computer system to locate and remove the malware hiding the network traffic.
    Type: Application
    Filed: June 28, 2013
    Publication date: January 1, 2015
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Igor Muttik
  • Publication number: 20140281477
    Abstract: An embodiment of the invention allows a user to back-up/store data to a cloud-based storage system and synchronize that data on the user's devices coupled to the storage system. The devices have secure out-of-band cryptoprocessors that conceal a private key. The private key corresponds to a public key that is used to encrypt a session key and information, both of which are passed to and through cloud based storage, all while remaining encrypted. The encrypted material is communicated from the cloud to another of the user's devices where the encrypted material is decrypted within a secure out-of-band cryptoprocessor (using the private key that corresponds to the aforementioned public key) located within the device. The embodiment allows for secure provisioning of the private key to the devices. The private key is only decrypted within the cryptoprocessor so the private key is not “in the open”. Other embodiments are described herein.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: ALEX NAYSHTUT, EDWARD JIMISON, OMER BEN-SHALOM, MICHAEL RAZIEL