Patents by Inventor C. Brendan Traw

C. Brendan Traw has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10146657
    Abstract: Platform controller, computer-readable storage media, and methods associated with initialization of a computing device. In embodiments, a platform controller may comprise a boot controller and one or more non-volatile memory modules, coupled with the boot controller. In embodiments, the one or more non-volatile memory modules may have first instructions and second instructions stored thereon. The first instructions may, when executed by a processor of a computing device hosting the platform controller, cause initialization of the computing device. The second instructions, when executed by the boot controller, may cause the boot controller to monitor at least a portion of the execution of the first instructions by the computing device and may generate a trace of the monitored portion of the execution of the first instructions. In embodiments, the trace may be stored in the one or more non-volatile memory modules. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: March 26, 2014
    Date of Patent: December 4, 2018
    Assignee: Intel Corporation
    Inventors: Robert C. Swanson, C. Brendan Traw, Vincent J. Zimmer, Mallik Bulusu, John R. Lindsley, Mahesh S. Natu, Dimitrios Ziakas, Robert W. Cone, Madhusudhan Rangarajan, Babak Nikjou, Kirk D. Brannock, Russell J. Wunderlich, Miles F. Schwartz, Stephen S. Pawlowski
  • Publication number: 20150278068
    Abstract: Platform controller, computer-readable storage media, and methods associated with initialization of a computing device. In embodiments, a platform controller may comprise a boot controller and one or more non-volatile memory modules, coupled with the boot controller. In embodiments, the one or more non-volatile memory modules may have first instructions and second instructions stored thereon. The first instructions may, when executed by a processor of a computing device hosting the platform controller, cause initialization of the computing device. The second instructions, when executed by the boot controller, may cause the boot controller to monitor at least a portion of the execution of the first instructions by the computing device and may generate a trace of the monitored portion of the execution of the first instructions. In embodiments, the trace may be stored in the one or more non-volatile memory modules. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: March 26, 2014
    Publication date: October 1, 2015
    Inventors: Robert C. Swanson, C. Brendan Traw, Vincent J. Zimmer, Mallik Bulusu, John R. Lindsley, Mahesh S. Natu, Dimitrios Ziakas, Robert W. Cone, Madhusudhan Rangarajan, Babak Nikjou, Kirk D. Brannock, Russell J. Wunderlich, Miles F. Schwartz, Stephen S. Pawlowski
  • Publication number: 20140185617
    Abstract: Methods and apparatus are disclosed for limiting transmission of data to a localized area in a networked environment. A method according to one embodiment includes receiving a request to transmit data from a source device to a sink device. If the data to be transmitted is localized data, a hop value associated with the data is set to a first predetermined value. If the data to be transmitted is not localized data, a hop value associated with the data is set to a second predetermined value.
    Type: Application
    Filed: December 20, 2011
    Publication date: July 3, 2014
    Applicant: INTEL CORPORATION
    Inventors: Michael R. Andre, C. Brendan Traw
  • Publication number: 20120167133
    Abstract: In a content delivery client device, real-time dynamic content insertion into digital content may be performed by scanning the digital content by the client device, prior to rendering the digital content, to detect a content signature from the content. A server may be queried by the client device, the query including the detected content signature. In response to the query, the client device receives a first database corresponding to the detected content signature, including at least one entry for the detected content signature and at least one associated action to be performed by the client device. The client device searches the first database for the detected content signature; and performs an action associated with the detected content signature on the client device prior to rendering the digital content. The action may include inserting advertising content into the digital content.
    Type: Application
    Filed: December 23, 2010
    Publication date: June 28, 2012
    Inventors: John W. Carroll, C. Brendan Traw
  • Patent number: 7600118
    Abstract: In a cryptographic system, a nonce is removed from a communication stream. The nonce is encrypted based on a shared secret. The encrypted nonce is inserted into the communication stream. The encrypted nonce is removed from the communication stream. The encrypted nonce is decrypted based on the shared secret formed by an authenticated key exchange. The decrypted nonce is inserted into the communication stream. The nonce may be an An value generated by a HDCP function. The authenticated key exchange may use Diffie-Hellman Key Exchange.
    Type: Grant
    Filed: September 27, 2002
    Date of Patent: October 6, 2009
    Assignee: Intel Corporation
    Inventors: David A. Lee, Gary L Graunke, C. Brendan Traw
  • Publication number: 20080075284
    Abstract: Protected content distribution is accomplished by a first entity generating a set of asymmetric key pairs, creating a plurality of sets of private keys by selecting a combination of private keys from the set of asymmetric key pairs for each created set, and distributing the sets of private keys to playback devices. A second entity produces protected content including encrypted content and a public key media key block, encrypts a symmetric content key with each public key in the set of asymmetric key pairs to form the public key media key block and encrypts a content title with the symmetric content key to form the encrypted content. A playback device stores one set of private keys, receives the protected content, and decrypts and plays the content title stored in the protected content when a selected one of the set of private keys stored by the playback device successfully decrypts the encrypted symmetric content key stored in the public key media key block of the received protected content.
    Type: Application
    Filed: October 24, 2007
    Publication date: March 27, 2008
    Inventors: Carl Ellison, C. Brendan Traw, Michael Ripley, Gary Graunke
  • Publication number: 20070033394
    Abstract: A system and method relating to the production and rendering of pre-recorded audiovisual titles, such as movies or other programs sold on digital versatile discs (DVDs), or other digital storage mediums. In at least one embodiment, the present invention is intended to thwart unauthorized mass distribution of titles. Embodiments of the invention may be used to identify the replicator of any given pre-recorded title, to prevent rendering of a title for which the replicator which produced the title is not identified or not licensed, or where the contents of the title have been tampered with, and to revoke rendering by a player device of one or more unauthorized titles originating from a given replicator.
    Type: Application
    Filed: October 16, 2006
    Publication date: February 8, 2007
    Inventors: Michael Ripley, C. Brendan Traw
  • Publication number: 20040064694
    Abstract: In a cryptographic system, a nonce is removed from a communication stream. The nonce is encrypted based on a shared secret. The encrypted nonce is inserted into the communication stream. The encrypted nonce is removed from the communication stream. The encrypted nonce is decrypted based on the shared secret formed by an authenticated key exchange. The decrypted nonce is inserted into the communication stream. The nonce may be an An value generated by a HDCP function. The authenticated key exchange may use Diffie-Hellman Key Exchange.
    Type: Application
    Filed: September 27, 2002
    Publication date: April 1, 2004
    Inventors: David A. Lee, Gary L. Graunke, C. Brendan Traw