Patents by Inventor Christopher Gutierrez
Christopher Gutierrez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200377057Abstract: Systems, apparatuses, and methods to identify an electronic control unit transmitting a message on a communication bus, such as an in-vehicle network bus, are provided. ECUs transmit messages by manipulating voltage on conductive lines of the bus. Observation circuitry can observe voltage transitions associated with the transmission at a point on the in-vehicle network bus. A domain bitmap can be generated from the observed voltage transitions. ECUs can be identified and/or fingerprinted based on the domain bitmaps.Type: ApplicationFiled: August 14, 2020Publication date: December 3, 2020Applicant: Intel CorporationInventors: Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, Qian Wang, Vuk Lesi, Manoj Sastry
-
Publication number: 20200372460Abstract: Systems, apparatuses, and methods to attest to and verify the integrity of cargo during transport by an autonomous vehicle are provided. An autonomous vehicle can discretize parameters associated with transportation of cargo and can generate a keyed hash digest from the discretized parameters. The keyed hash digest can be sent to a stakeholder in the transportation of the cargo to attest to the integrity of the cargo during transport.Type: ApplicationFiled: August 14, 2020Publication date: November 26, 2020Applicant: Intel CorporationInventors: Christopher Gutierrez, Marcio Juliato, Qian Wang, Shabbir Ahmed, Vuk Lesi, Manoj Sastry
-
Publication number: 20200372148Abstract: Systems, apparatuses, and methods to identify an electronic control unit transmitting a message on a communication bus, such as an in-vehicle network bus, are provided. ECUs transmit messages by manipulating voltage on conductive lines of the bus. Observation circuitry can observe voltage signals associated with the transmission at a point on the in-vehicle network bus. A distribution can be generated from densities of the voltage signals. ECUs can be identified and/or fingerprinted based on the distributions.Type: ApplicationFiled: August 14, 2020Publication date: November 26, 2020Applicant: Intel CorporationInventors: Eduardo Alban, Shabbir Ahmed, Marcio Juliato, Christopher Gutierrez, Qian Wang, Vuk Lesi, Manoj Sastry
-
Publication number: 20200202007Abstract: A method and system for remediating vulnerable code libraries, including open source libraries, in a software application are disclosed. The method includes receiving an application that uses code libraries and information regarding known library vulnerabilities, then determining if one or more libraries in the application is vulnerable based upon the information. For each of the one or more vulnerable libraries a library version that minimizes risk is determined. The determined library version is incorporated into the application to form a test application, and an application test is performed on the test application. If the application test is below a predetermined threshold, the determined library version is incorporated into a final application precursor. A final application can be determined from the final application precursor for each vulnerable library.Type: ApplicationFiled: December 20, 2018Publication date: June 25, 2020Inventors: Vinjith Nagaraja, Raymond Brammer, James Myers, Christopher Gutierrez, Ireneusz Pazdzierniak, Shanshan Jiang, Karim Mawani, Pankaj Rathore, Jerry Wald, David Worth, Dhruv Vig, Archana Taparia, Robert Chifamba, Vamshi Ramarapu
-
Publication number: 20200162901Abstract: Various embodiments are generally directed to techniques for providing improved privacy protection against vehicle tracking for connected vehicles of a vehicular network. For example, at least one road side unit may: identify a set of vehicles that require pseudonym changes and send an invitation for a pseudonym change event to each of the vehicles, determine at least a total number of the acceptances, determine whether the total number meets or exceeds a predetermined threshold number, send acknowledgement messages to the accepting vehicles if the threshold number is met, and form a vehicle group to coordinate the pseudonym change event during a privacy period. During the privacy period, the RSU and the vehicles may communicate with each other in a confidential and private manner via key-session-based unicast transmission, and coordinate transmission power and vehicle trajectory adjustments to maximize the benefits for safety and obfuscation for privacy.Type: ApplicationFiled: December 9, 2019Publication date: May 21, 2020Applicant: INTEL CORPORATIONInventors: XIRUO LIU, SHABBIR AHMED, RALF GRAEFE, CHRISTOPHER GUTIERREZ, MARCIO JULIATO, RAFAEL ROSALES, MANOJ SASTRY, LIUYANG YANG
-
Publication number: 20200145188Abstract: Systems, apparatus, methods, and techniques for functional safe execution of encryption operations are provided. A fault tolerant counter and a complementary pair of encryption flows are provided. The fault tolerant counter may be based on a gray code counter and a hamming distance checker. The complementary pair of encryption flows have different implementations. The output from the complementary pair of encryption flows can be compared, and where different, errors generated.Type: ApplicationFiled: December 23, 2019Publication date: May 7, 2020Applicant: Intel CorporationInventors: SANTOSH GHOSH, MARCIO JULIATO, RAFAEL MISOCZKI, MANOJ SASTRY, LIUYANG YANG, SHABBIR AHMED, CHRISTOPHER GUTIERREZ, XIRUO LIU
-
Publication number: 20200139980Abstract: Systems, apparatus, methods, and techniques for an ego vehicle to respond to detecting misbehaving information from remote vehicles are provided. An ego vehicle, in addition to reporting misbehaving vehicles to a misbehavior authority via a vehicle-to-anything communication network, can, take additional actions based in part on how confident the ego vehicle is about the evidence of misbehavior. Where the confidence is high the ego vehicle can simply discard the misbehaving data and provide an alternative estimate for such data from alternative sources. Where the confidence is not high the ego vehicle can request assistance from neighboring vehicles and roadside units to provide independent estimates of the data to increase confidence in the evidence of misbehavior.Type: ApplicationFiled: December 26, 2019Publication date: May 7, 2020Applicant: Intel CorporationInventors: XIRUO LIU, LIUYANG YANG, MANOJ SASTRY, MARCIO JULIATO, SHABBIR AHMED, CHRISTOPHER GUTIERREZ
-
Publication number: 20200127848Abstract: Various embodiments are generally directed to providing authentication and confidentiality mechanisms for message communication over an in-vehicle network. For example, authentication data associated with a communicating node may be transmitted over the network by encoding different predefined voltage levels on top of the message bits of the message being communicated. Different voltage levels may represent different encodings, such as a bit-pair or any bit combination of the authentication data. In a further example, messaging confidentiality between at least two communicating nodes may be achieved by pseudo-randomly flipping, or scrambling, the dominant and recessive voltages of the entire message frame at the analog level based on a pseudo-random control bit sequence.Type: ApplicationFiled: December 19, 2019Publication date: April 23, 2020Applicant: Intel CorporationInventors: MARCIO JULIATO, SHABBIR AHMED, CHRISTOPHER GUTIERREZ, XIRUO LIU, MANOJ SASTRY, LIUYANG YANG
-
Publication number: 20200128031Abstract: Systems, methods, computer-readable storage media, and apparatuses to provide active attack detection in autonomous vehicle networks. An apparatus may comprise a plurality of electronic control units communicably coupled by a network, and logic, at least a portion of which is implemented in hardware, the logic to: receive an indication from a first electronic control unit (ECU) of the plurality of ECUs specifying to transmit a first data frame via the network, determine, based on a message identifier (ID) of the first ECU, whether a transmit window for the first ECU is open, and permit the first ECU to transmit the first data frame via the network based on a determination that the transmit window for the first ECU is open.Type: ApplicationFiled: December 20, 2019Publication date: April 23, 2020Applicant: Intel CorporationInventors: MARCIO JULIATO, VUK LESI, SHABBIR AHMED, CHRISTOPHER GUTIERREZ, MANOJ SASTRY, LIUYANG YANG, XIRUO LIU
-
Publication number: 20200128030Abstract: Systems, apparatuses, and methods to identify an electronic control unit transmitting a message on a communication bus, such as an in-vehicle network bus, are provided. ECUs transmit messages by manipulating voltage on conductive lines of the bus. Observation circuitry can observe voltage transitions associated with the transmission at multiple points on the in-vehicle network bus. A voltage waveform can be generated from the observed voltage transitions. ECUs can be identified and/or fingerprinted based on the generated waveforms.Type: ApplicationFiled: December 19, 2019Publication date: April 23, 2020Applicant: Intel CorporationInventors: SHABBIR AHMED, MARCIO JULIATO, CHRISTOPHER GUTIERREZ, MANOJ SASTRY, LIUYANG YANG, XIRUO LIU
-
Publication number: 20200125097Abstract: Systems, methods, computer program products, and apparatuses for low latency, fully reconfigurable hardware logic for ensemble classification methods, such as random forests. An apparatus may comprise circuitry for an interconnect and circuitry for a random forest implemented in hardware. The random forest comprising a plurality of decision trees connected via the interconnect, each decision tree comprising a plurality of nodes connected via the interconnect. A first decision tree of the plurality of decision trees comprising a first node of the plurality of nodes to: receive a plurality of elements of feature data via the interconnect, select a first element of feature data, of the plurality of elements of feature data, based on a configuration of the first node, and generate an output based on the first element of feature data, an operation, and a reference value, the operation and reference value specified in the configuration of the first node.Type: ApplicationFiled: December 18, 2019Publication date: April 23, 2020Applicant: Intel CorporationInventors: MARCIO JULIATO, CHRISTOPHER GUTIERREZ, SHABBIR AHMED, MANOJ SASTRY, LIUYANG YANG, XIRUO LIU
-
Publication number: 20200128409Abstract: Systems, apparatus, methods, and techniques for reporting an attack or intrusion into an in-vehicle network are provided. The attack can be broadcast to connected vehicles over a vehicle-to-vehicle network. The broadcast can include an indication of a sub-system involved in the attack and can include a request for assistance in recovering from the attack. Connected vehicles can broadcast responses over the vehicle-to-vehicle network. The responses can include indications of data related to the compromised sub-system. The vehicle can receive the responses and can use the responses to recover from the attack, such as, estimate data.Type: ApplicationFiled: December 19, 2019Publication date: April 23, 2020Applicant: Intel CorporationInventors: LIUYANG YANG, XIRUO LIU, MANOJ SASTRY, MARCIO JULIATO, SHABBIR AHMED, CHRISTOPHER GUTIERREZ
-
Publication number: 20200117794Abstract: Systems, apparatuses, and techniques for establishing “ground truth” are provided. Particularly, establishing ground truth for electronic control units on a communication network after a context change has occurred are provided. Circuitry and instructions to generate unique feature sets from messages (e.g., transmitted by ECUs after a context change) and to match the unique feature sets to unique feature sets from ECU fingerprints to establish ground truth for the ECUs after the context shift.Type: ApplicationFiled: December 12, 2019Publication date: April 16, 2020Applicant: Intel CorporationInventors: SHABBIR AHMED, MARCIO JULIATO, CHRISTOPHER GUTIERREZ, MANOJ SASTRY, LIUYANG YANG, XIRUO LIU
-
Publication number: 20200120114Abstract: Techniques and screening messages based on tags in an automotive environment, such as, messages communicated via a communication bus, like the CAN bus. Messages can be tagged with either a binary or probabilistic tag indicating whether the message is fraudulent. ECUs coupled to the CAN bus can receive the messages and the message tags and can determine whether to fully consume the message based on the tag.Type: ApplicationFiled: December 12, 2019Publication date: April 16, 2020Applicant: Intel CorporationInventors: MARCIO JULIATO, MANOJ SASTRY, MICHAEL KARA-IVANOV, AVIAD KIPNIS, SHABBIR AHMED, CHRISTOPHER GUTIERREZ, VUK LESI
-
Publication number: 20190260772Abstract: Various systems and methods for bus-off attack detection are described herein. An electronic device for bus-off attack detection and prevention includes bus-off prevention circuitry coupled to a protected node on a bus, the bus-off prevention circuitry to: detect a transmitted message from the protected node to the bus; detect a bit mismatch of the transmitted message on the bus; suspend further transmissions from the protected node while the bus is analyzed; determine whether the bit mismatch represents a bus fault or an active attack against the protected node; and signal the protected node indicating whether a fault has occurred.Type: ApplicationFiled: May 3, 2019Publication date: August 22, 2019Inventors: Marcio Rogerio Juliato, Shabbir Ahmed, Santosh Ghosh, Christopher Gutierrez, Manoj R. Sastry
-
Publication number: 20190158521Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.Type: ApplicationFiled: December 28, 2018Publication date: May 23, 2019Inventors: Marcio Juliato, Liuyang Lily Yang, Manoj Sastry, Christopher Gutierrez, Shabbir Ahmed, Vuk Lesi
-
Publication number: 20140282868Abstract: A system is provided to determine whether to re-authenticate a user based on identification parameter measurements of low power sensors. According to an embodiment of the invention, a system may include a processor that includes analysis logic to determine whether to re-authenticate the user based on parameter values received from at least one of one or more agents. The system may also include authentication logic to re-authenticate the user that includes a confirmation of whether the user is authenticated based on input received from one or more authentication sensors. Other embodiments are described and claimed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Inventors: Micah Sheller, Christopher Gutierrez, Conor Cahill, Jason Martin, Brandon Baker
-
Patent number: 7065195Abstract: A multipurpose card serves as an effective marketing tool in today's competitive marketplace. The multipurpose card includes a main portion and a key ring portion. The key ring portion may be separated from the main portion.Type: GrantFiled: July 6, 2000Date of Patent: June 20, 2006Assignee: MCI, Inc.Inventors: Denise E. Smith, Christopher A. Gutierrez
-
Publication number: 20060036608Abstract: Content is provided to electronic mail, commonly known as e-mail, over a network, such as the Internet. This content is provided in accordance with keywords, typically organized in a hierarchy. The presently highest ranked keyword, that is active, is passed to various content servers, along the network, in response to a request, returned from the e-mail client of a recipient user. The keywords are managed, such that after a certain number of responses from the recipients of the electronic mails, to content in each e-mail generated from a particular keyword, use of that particular keyword is terminated, as the keyword is inactivated. Content is then delivered in accordance with another keyword, typically the next highest ranked keyword.Type: ApplicationFiled: April 8, 2005Publication date: February 16, 2006Inventor: Christopher Gutierrez
-
Patent number: D454910Type: GrantFiled: July 6, 2000Date of Patent: March 26, 2002Assignee: MCI WorldCom, Inc.Inventors: Denise E. Smith, Christopher A. Gutierrez