Patents by Inventor Alex Nayshtut

Alex Nayshtut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9507938
    Abstract: A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. The security monitoring thread executes as a transaction and determines if a transactional conflict occurs to the read-only memory region during parallel execution of a monitored thread in the output code.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: November 29, 2016
    Assignee: McAfee, Inc.
    Inventors: Igor Muttik, Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev
  • Patent number: 9503433
    Abstract: In an embodiment, a system includes a processor that includes private key decryption logic to decrypt an encrypted private key received from a consuming device to produce a private key, and symmetric key decryption logic to receive the private key from the private key decryption logic and to decrypt an encrypted symmetric key received from the consuming device using the private key. The system also includes a dynamic random access memory (DRAM) coupled to the processor. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: November 22, 2016
    Assignee: Intel Corporation
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Ned M. Smith, Edward V. Jimison, Jr., Hormuzd M. Khosravi
  • Publication number: 20160328561
    Abstract: A collection of techniques allow for the detection of covert malware that attempts to hide its existence on a system by leveraging both trusted hardware event counters and the particular memory addresses (as well as the sequences of such addresses) of the instructions that are generating the suspected malicious activity. By monitoring the address distribution's specific patterns over time, one can build a behavioral model (i.e., “fingerprint”) of a particular process—and later attempt to match suspected malicious processes to the stored behavioral models. Whenever the actual measured behavior of a suspected malicious process fails to match said stored behavioral models, the system or system administrator may attempt to perform rehabilitative actions on the computer system to locate and remove the malware hiding on the system.
    Type: Application
    Filed: May 8, 2015
    Publication date: November 10, 2016
    Inventors: Eliezer Tamir, Andreas Kleen, Alex Nayshtut, Vadim Sukhomlinov, Igor Muttik, Eliel Louzoun
  • Publication number: 20160323264
    Abstract: An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and a corresponding first private key; receiving an instance of a certificate, including a second public key, from a second computing node located remotely from the first computing node; associating the instance of the certificate with the key pair; receiving an additional instance of the certificate; verifying the additional instance of the certificate is associated with the key pair; and encrypting and exporting the first private key in response to verifying the additional instance of the certificate is associated with the key pair. Other embodiments are described herein.
    Type: Application
    Filed: December 20, 2013
    Publication date: November 3, 2016
    Inventors: Alex Nayshtut, Hormuzd M. Khosravi, Omer Ben-Shalom, Barry R. Pivitt, Ned M. Smith
  • Publication number: 20160315917
    Abstract: Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing device associated with a first user of a cloud service, an encrypted archive file and a wrapped encryption key from a second computing device associated with a second user of the cloud service, the wrapped encryption key wrapped with key data associated with the first user of the cloud service at the second computing device, unwrapping the wrapped encryption key with the key data to obtain an unwrapped encryption key, and decrypting the encrypted archive file with the unwrapped encryption key to obtain a decrypted archive file.
    Type: Application
    Filed: June 30, 2016
    Publication date: October 27, 2016
    Inventors: Ned M. Smith, Omer Ben-Shalom, Alex Nayshtut
  • Patent number: 9449200
    Abstract: Methods, systems, apparatus and articles of manufacture are disclosed to secure devices. An example disclosed apparatus includes a platform detector to determine when the device is within a threshold proximity to a platform, a device locking manager to initiate a locking service for the device when within the threshold proximity, and a device tampering manager to initiate a tampering remedy in response to detecting an indication of tampering.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: September 20, 2016
    Assignee: Intel Corporation
    Inventors: Avi Priev, Alex Nayshtut, Hong Li, Shahar Porat
  • Patent number: 9411975
    Abstract: Methods and apparatus to securely share data are disclosed. An example includes generating, at a first device of a first user of cloud services, an archive file representative of a drive of the first device; encrypting, via a processor, the archive file to form an encrypted archive file; and conveying the encrypted archive file to a cloud service provider, the encrypted archive file to be decrypted by a second device of a second user of the cloud services, the decrypted archive file to be mounted to an operating system of the second device.
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: August 9, 2016
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Omer Ben-Shalom, Alex Nayshtut
  • Patent number: 9384148
    Abstract: Technologies for detecting unauthorized memory accesses include a computing device having transactional memory support. The computing device executes a code segment identified as suspicious and detects a transactional abort during execution of the code segment. The computing device may execute a security support thread concurrently with the code segment that reads one or more monitored memory locations. A transactional abort may be caused by a read of the security support thread conflicting with a write from the code segment. The computing device may set a breakpoint within the code segment, and a transactional abort may be caused by execution of the code segment reaching the breakpoint. An abort handler determines whether a security event has occurred and reports the security event. The abort handler may determine whether the security event has occurred based on the cause of the transactional abort. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 17, 2013
    Date of Patent: July 5, 2016
    Assignee: Intel Corporation
    Inventors: Igor Muttik, Roman Dementiev, Alex Nayshtut
  • Publication number: 20160188243
    Abstract: Technologies for detecting unauthorized memory accesses include a computing device with a processor having transactional memory support. The computing device executes a security assistance thread that starts a transaction using the transactional memory support. Within the transaction, the security assistance thread writes arbitrary data to one or more monitored memory locations. The security assistance thread waits without committing the transaction. The security assistance thread may loop endlessly. The transactional memory support of the computing device detects a transactional abort caused by an external read of the monitored memory location. The computing device analyzes the transactional abort and determines whether a security event has occurred. The computing device performs a security response if a security event has occurred.
    Type: Application
    Filed: March 27, 2015
    Publication date: June 30, 2016
    Inventors: Roman Dementiev, Igor Muttik, Alex Nayshtut
  • Publication number: 20160183033
    Abstract: Described herein are architectures, platforms and methods for offloading process or application from a near field communication (NFC) master device for proxy delegation to a proxy NFC device.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Applicant: Intel Corporation
    Inventors: OLEG POGORELIK, SHAHAR PORAT, GENNADY GOLTMAN, SERGEY SOFER, ALEX NAYSHTUT, AVISHAY SHARAGA, MIGUEL BALLESTEROS
  • Publication number: 20160180085
    Abstract: A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking includes creating output code, identifying read-only memory regions in the output code and creating a map that is provided to a security monitoring thread. The security monitoring thread executes as a transaction and determines if a transactional conflict occurs to the read-only memory region during parallel execution of a monitored thread in the output code.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Igor Muttik, Alex Nayshtut, Yuriy Bulygin, Andrew A. Furtak, Roman Dementiev
  • Publication number: 20160182499
    Abstract: Technologies are provided in embodiments to establish trust between a trusted execution environment (TEE) and a peripheral device. Embodiments are configured to communicate with an attestation server to generate an encryption key, and to establish, using the encryption key, a secure connection with an authentication server to enable communication between the authentication server and the peripheral device. Embodiments are also configured to receive a pairwise master key if the peripheral device is authenticated and to receive a trusted communication from the peripheral device based, at least in part, on the pairwise master key. Embodiments may also be configured to identify a connection to the peripheral device before the peripheral device is authenticated to the authentication server, receive an identifier from the peripheral device, and establish a connection to an attestation server based on at least a portion of the identifier.
    Type: Application
    Filed: December 22, 2014
    Publication date: June 23, 2016
    Inventors: Avishay Sharaga, Alex Nayshtut, Oleg Pogorelik, Igor Muttik, Ned M. Smith
  • Publication number: 20160180061
    Abstract: Technologies for 3D printing digital rights management (DRM) include a 3D printing device communicatively coupled with a 3D model storage server and a rights management server over a network. The 3D printing device may establish a model unlock engine in a first trusted execution environment and a key release engine in a second trusted execution environment. The model unlock engine may extract a content access policy and a content key from an encrypted 3D model and generate a content key request to the key release engine. The key release engine may validate the content key request and decrypt the content key in response to the content access policy being satisfied. The model unlock engine may further decrypt 3D model content included in the 3D model using the decrypted content key to facilitate the printing of the 3D model.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Oleg Pogorelik, Ned M. Smith, Alex Nayshtut, Avishay Sharaga
  • Publication number: 20160183032
    Abstract: Techniques for connecting using NFC communications are provided. Specifically, methods are presented, that when taken alone or together, provide a device or group of devices with a secure way of transferring data from a wireless device to a reader. The present disclosure includes a method that provides a wireless device with network connectivity options that enable a more secure means for using NFC communications for completing a secure transaction using a secondary code.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Oleg Olegp POGORELIK, Alex NAYSHTUT, Avi Apriev PRIEV, Shahar PORAT, Michael RAZIEL
  • Publication number: 20160182240
    Abstract: In an example, a DHN (DHN) is provided for enabling grantees to access digitally-controlled assets of a principal. The principal (level 0) establishes a digital testament (DT), identifying one or more grantees on levels 1-n. Each grantee receives a digital heritage certificate (DHC), which may be based on the PKI certificate definition. The DHC includes a “PREDECESSORS” field, identifying one or more predecessor certificates that must be revoked before the DHC is valid. All grantee DHCs have the principal's level 0 DHC as a predecessor certificate. Level n certificates may also be valid only if all certificates at level n?1 have been revoked. In practice, a DHC may be revoked when a user of the certificate passes away, so that nth generation grantees inherit only when generation n?1 has passed away.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Alex Nayshtut, Oleg Pogorelik, Avishay Sharaga, Ned M. Smith, Igor Muttik
  • Publication number: 20160173512
    Abstract: A technique allows detection of covert malware that attempts to hide network traffic. By monitoring network traffic both in a secure trusted environment and in an operating system environment, then comparing the monitor data, attempts to hide network traffic can be detected, allowing the possibility of performing rehabilitative actions on the computer system to locate and remove the malware hiding the network traffic.
    Type: Application
    Filed: November 2, 2015
    Publication date: June 16, 2016
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Igor Muttik
  • Publication number: 20160162269
    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for application installation security and privacy evaluation and indication. The system may include an application installation module configured to receive an application package for installation on a device, wherein the package comprises a list of device resources to be accessed by the application. The system may also include memory configured to store an impact score table comprising one or more security impact scores, each security impact score associated with access to one of the device resources. The system may further include a security/privacy evaluation module configured to calculate a security impact indicator (SII) based on a sum of the security impact scores selected by the accessed device resources listed in the package.
    Type: Application
    Filed: December 3, 2014
    Publication date: June 9, 2016
    Inventors: Oleg Pogorelik, Alex Nayshtut, Tobias M. Kohlenberg, James S. Baca
  • Publication number: 20160149878
    Abstract: A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members of a body area network of wearable devices. A shared secret algorithm is used to allow unlocking the personal identity information with fragmental keys from less than all of the wearable devices in the body area network. The wearable devices may also provide protection for other personal user data by employing a disconnect and erase protocol that causes wearable devices to drop connections with an external personal data space and erase locally stored personal information if a life pulse from a connectivity root device is not received within a configurable predefined period.
    Type: Application
    Filed: November 21, 2014
    Publication date: May 26, 2016
    Inventors: Oleg Pogorelik, Alex Nayshtut, Igor Muttik, Justin Lipman
  • Publication number: 20160125180
    Abstract: A computing device is described. The computing device includes input/output (I/O) circuitry to receive sensory data and a trusted execution environment to monitor the I/O circuitry to detect one or more context characteristics of the computing device and to authenticate user identity based on context characteristics.
    Type: Application
    Filed: December 12, 2013
    Publication date: May 5, 2016
    Inventors: Ned M. Smith, Victoria C. Moore, Avi Kannon, Ehud Reshef, Alex Nayshtut, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Craig T. Owen, Hormuzd M. Khosravi
  • Publication number: 20160092697
    Abstract: In an example, a client-server platform identity architecture is disclosed. The platform identity architecture may be used to enable a venue operator to provide online services and to collect telemetry data and metrics while giving end users greater control over privacy. When entering a compatible venue, the user's device generates a signed temporary pseudonymous identity (TPI) in secure hardware or software. Any telemetry uploaded to the venue server includes the signature so that the server can verify that the data are valid. The TPI may have a built-in expiry. The venue server may thus receive useful tracking data during the term of the TPI, while the user is assured that the data are not kept permanently or correlated to personally-identifying information.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Alex Nayshtut, Ned Smith, Avishay Sharaga, Oleg Pogorelik, Abhilasha Bhargav-Spantzel, Michael Raziel, Avi Priev, Adi Shaliv, Igor Muttik