Patents by Inventor Carol A. Bell

Carol A. Bell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8555044
    Abstract: A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described.
    Type: Grant
    Filed: March 29, 2010
    Date of Patent: October 8, 2013
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Duncan Glendinning, Saurabh Dadu, Mojtaba Mojy Mirashrafi, Mousumi M. Hazra, Carol A. Bell
  • Patent number: 8403998
    Abstract: A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: March 26, 2013
    Assignee: Intel Corporation
    Inventors: Mousumi M. Hazra, Gyan Prakash, Carol A. Bell, Selim Aissi
  • Patent number: 8346305
    Abstract: Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: January 1, 2013
    Assignee: Intel Corporation
    Inventors: Duncan Glendinning, Mojtaba Mirashrafi, Saurabh Dadu, Mousumi M. Hazra, Gyan Prakash, Carol A. Bell
  • Publication number: 20110238970
    Abstract: A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described.
    Type: Application
    Filed: March 29, 2010
    Publication date: September 29, 2011
    Inventors: Gyan Prakash, Duncan Glendinning, Saurabh Dadu, Mojtaba Mojy Mirashrafi, Mousumi M. Hazra, Carol A. Bell
  • Publication number: 20110076986
    Abstract: Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Inventors: Duncan Glendinning, Mojtaba Mirashrafi, Saurabh Dadu, Mousumi M. Hazra, Gyan Prakash, Carol A. Bell
  • Publication number: 20090296634
    Abstract: An open and extensible framework for ubiquitous radio management and services in heterogeneous wireless networks is disclosed. A radio interface manager abstracts interface attributes of multiple heterogeneous network interfaces into a set of abstracted attributes for access by one or more applications.
    Type: Application
    Filed: July 30, 2009
    Publication date: December 3, 2009
    Inventors: Vivek G. Gupta, Christian Maciocco, Carol A. Bell, Russell J. Fenger, Shriharsha S. Hegde, Amol A. Kulkarni
  • Publication number: 20090248827
    Abstract: A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Inventors: Mousumi M. Hazra, Gyan Prakash, Carol A. Bell, Selim Aissi
  • Patent number: 7505460
    Abstract: Provided is an address validating data structure used for validating addresses. A data structure comprising a plurality of arrays is buffered. Each array includes a plurality of words, wherein one word in each array indicates address words in the array having valid addresses. At least one mask word provides mask information for at least one address word having a valid address, wherein the mask information for one address word indicates bits in the address word. The data structure is used to validate an address received from a transmitting node.
    Type: Grant
    Filed: April 26, 2004
    Date of Patent: March 17, 2009
    Assignee: Intel Corporation
    Inventor: Carol A. Bell
  • Patent number: 6880005
    Abstract: Policy rules are disseminated on a network and are received by one or more devices on the network. Each device is configured with a proxy agent that translates the policy data into a format that is meaningful to the device. The agent translates the policy rules into an access list that generates permit and deny filters that determine the access that the device is allowed on the network.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: April 12, 2005
    Assignees: Intel Corporation, Hewlett-Packard Company
    Inventors: Carol A. Bell, Michael D. Shipley, Scott D. Hahn