Patents by Inventor David Durham

David Durham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11952769
    Abstract: Disclosed herein is a modular process plant structural system which includes numerous modules, all ISO-certified under ISO 1496 and capable of holding within the entire module at least one chemical (or non-chemical) production plant piece of equipment, capable of individually being shipped or transported. The modules can be stacked vertically, horizontally, or mixed (both vertical and horizontal arrangement). The modules are pre-fabricated offsite, built with the desired equipment within the module, pre-plumbed with piping, instrumentation, and electrical wiring, and then the multiple modules are shipped multimodally as ISO 1496 containers to the desired location and assembled to form a plant. Generally, two or more modules are connected together to form a complete plant. The plant can be of any type, e.g., chemical, mechanical/production, thermal, and the like, or of any size, e.g., production, small, micro, or pilot plant scale.
    Type: Grant
    Filed: February 25, 2019
    Date of Patent: April 9, 2024
    Assignee: Modular Plant Solutions LLC
    Inventors: Russell Richard Hillenburg, David Wayne Townsend, Joel Durham Hendricks
  • Patent number: 11568211
    Abstract: The present disclosure is directed to systems and methods for the selective introduction of low-level pseudo-random noise into at least a portion of the weights used in a neural network model to increase the robustness of the neural network and provide a stochastic transformation defense against perturbation type attacks. Random number generation circuitry provides a plurality of pseudo-random values. Combiner circuitry combines the pseudo-random values with a defined number of least significant bits/digits in at least some of the weights used to provide a neural network model implemented by neural network circuitry. In some instances, selection circuitry selects pseudo-random values for combination with the network weights based on a defined pseudo-random value probability distribution.
    Type: Grant
    Filed: December 27, 2018
    Date of Patent: January 31, 2023
    Assignee: Intel Corporation
    Inventors: David Durham, Michael Kounavis, Oleg Pogorelik, Alex Nayshtut, Omer Ben-Shalom, Antonios Papadimitriou
  • Patent number: 11520611
    Abstract: A host Virtual Machine Monitor (VMM) operates “blindly,” without the host VMM having the ability to access data within a guest virtual machine (VM) or the ability to access directly control structures that control execution flow of the guest VM. Guest VMs execute within a protected region of memory (called a key domain) that even the host VMM cannot access. Virtualization data structures that pertain to the execution state (e.g., a Virtual Machine Control Structure (VMCS)) and memory mappings (e.g., Extended Page Tables (EPTs)) of the guest VM are also located in the protected memory region and are also encrypted with the key domain key. The host VMM and other guest VMs, which do not possess the key domain key for other key domains, cannot directly modify these control structures nor access the protected memory region. The host VMM, however, using VMPageIn and VMPageOut instructions, can build virtual machines in key domains and page VM pages in and out of key domains.
    Type: Grant
    Filed: March 30, 2019
    Date of Patent: December 6, 2022
    Assignee: Intel Corporation
    Inventors: David Durham, Siddhartha Chhabra, Geoffrey Strongin, Ronald Perez
  • Patent number: 11469902
    Abstract: The present disclosure is directed to systems and methods for the secure transmission of plaintext data blocks encrypted using a NIST standard encryption to provide a plurality of ciphertext data blocks, and using the ciphertext data blocks to generate a Galois multiplication-based authentication tag and parity information that is communicated in parallel with the ciphertext blocks and provides a mechanism for error detection, location and correction for a single ciphertext data block or a plurality of ciphertext data blocks included on a storage device. The systems and methods include encrypting a plurality of plaintext blocks to provide a plurality of ciphertext blocks. The systems and methods include generating a Galois Message Authentication Code (GMAC) authentication tag and parity information using the ciphertext blocks.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: October 11, 2022
    Assignee: Intel Corporation
    Inventors: Michael Kounavis, Sergej Deutsch, David Durham, Karanvir Grewal
  • Publication number: 20220160082
    Abstract: A protective footwear includes a foot engagement portion, a lower-leg engagement portion, and a cable closure system. The lower-leg engagement portion defines a cable end interface and a buckle interface. The cable closure system is configured to facilitate at least partially securing the protective footwear to a leg of a wearer. The cable closure system includes a buckle assembly configured to releasably couple to the buckle interface and a cable extending between the cable end interface and the buckle assembly. The cable has a first end coupled to the cable end interface and an opposing second end coupled to the buckle assembly.
    Type: Application
    Filed: December 3, 2021
    Publication date: May 26, 2022
    Inventors: Andre Lee, Luis Cosio, David Durham, David Munn
  • Patent number: 11216556
    Abstract: The present disclosure is directed to systems and methods that maintain consistency between a system architectural state and a microarchitectural state in the system cache circuitry to prevent a side-channel attack from accessing secret information. Speculative execution of one or more instructions by the processor circuitry causes memory management circuitry to transition the cache circuitry from a first microarchitectural state to a second microarchitectural state. The memory management circuitry maintains the cache circuitry in the second microarchitectural state in response to a successful completion and/or retirement of the speculatively executed instruction. The memory management circuitry reverts the cache circuitry from the second microarchitectural state to the first microarchitectural state in response to an unsuccessful completion, flushing, and/or retirement of the speculatively executed instruction.
    Type: Grant
    Filed: December 17, 2018
    Date of Patent: January 4, 2022
    Assignee: Intel Corporation
    Inventors: Ken Grewal, Ravi Sahita, David Durham, Erdem Aktas, Sergej Deutsch, Abhishek Basak
  • Patent number: 11202486
    Abstract: A protective footwear includes a foot engagement portion, a lower-leg engagement portion, and a cable closure system. The lower-leg engagement portion defines a cable end interface and a buckle interface. The cable closure system is configured to facilitate at least partially securing the protective footwear to a leg of a wearer. The cable closure system includes a buckle assembly configured to releasably couple to the buckle interface and a cable extending between the cable end interface and the buckle assembly. The cable has a first end coupled to the cable end interface and an opposing second end coupled to the buckle assembly.
    Type: Grant
    Filed: July 20, 2018
    Date of Patent: December 21, 2021
    Assignee: Fox Head, Inc.
    Inventors: Andre Lee, Luis Cosio, David Durham, David Munn
  • Patent number: 11019098
    Abstract: The present disclosure is directed to systems and methods for providing protection against replay attacks on memory, by refreshing or updating encryption keys. The disclosed replay protected computing system may employ encryption refresh of memory so that unauthorized copies of data are usable for a limited amount of time (e.g., 500 milliseconds or less). The replay protected computing system initially encrypts protected data prior to storage in memory. After a predetermined time or after a number of memory accesses have occurred, the replay protected computing system decrypts the data with the existing key and re-encrypts data with a new key. Unauthorized copies of data (such as those made by an adversary system/program) are not refreshed with subsequent new keys. When an adversary program attempts to use the unauthorized copies of data, the unauthorized copies of data are decrypted with the incorrect keys, which renders the decrypted data unintelligible.
    Type: Grant
    Filed: June 29, 2018
    Date of Patent: May 25, 2021
    Assignee: Intel Corporation
    Inventors: Sergej Deutsch, David Durham, Karanvir Grewal, Rajat Agarwal
  • Patent number: 10929527
    Abstract: Logic may implement implicit integrity techniques to maintain integrity of data. Logic may perform operations on data stored in main memory, cache, flash, data storage, or any other memory. Logic may perform more than one pattern check to determine repetitions of entities within the data. Logic may determine entropy index values and/or Boolean values and/or may compare the results to threshold values to determine if a data unit is valid. Logic may merge a tag with the data unit without expanding the data unit to create an encoded data unit. Logic may decode and process the encoded data unit to determine the data unit and the tag. Logic may determine value histograms for two or more entities, determine a sum of repetitions of the two or more entities, and compare the sum to a threshold value. Logic may determine that a data unit is valid or is corrupted.
    Type: Grant
    Filed: December 20, 2017
    Date of Patent: February 23, 2021
    Assignee: INTEL CORPORATION
    Inventors: Michael Kounavis, David Durham, Sergej Deutsch, Saeedeh Komijani, Amitabh Das
  • Patent number: 10901772
    Abstract: Embodiments of an invention for virtualization exceptions are disclosed. In one embodiment, a processor includes instruction hardware, control logic, and execution hardware. The instruction hardware is to receive a plurality of instructions, including an instruction to enter a virtual machine. The control logic is to determine, in response to a privileged event occurring within the virtual machine, whether to generate a virtualization exception. The execution hardware is to generate a virtualization exception in response to the control logic determining to generate a virtualization exception.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: January 26, 2021
    Assignee: Intel Corporation
    Inventors: Gilbert Neiger, Mayank Bomb, Manohar Castelino, Robert Chappell, David Durham, Barry Huntley, Anton Ivanov, Madhavan Parthasarathy, Scott Rodgers, Ravi Sahita, Vedvyas Shanbhogue
  • Patent number: 10885202
    Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
    Type: Grant
    Filed: September 6, 2018
    Date of Patent: January 5, 2021
    Assignee: Intel Corporation
    Inventors: Francis X. McKeen, Carlos V. Rozas, Uday R. Savagaonkar, Simon P. Johnson, Vincent Scarlata, Michael A. Goldsmith, Ernie Brickell, Jiang Tao Li, Howard C. Herbert, Prashant Dewan, Stephen J. Tolopka, Gilbert Neiger, David Durham, Gary Graunke, Bernard Lint, Don A. Van Dyke, Joseph Cihula, Stalinselvaraj Jeyasingh, Stephen R. Van Doren, Dion Rodgers, John Garney, Asher Altman
  • Patent number: 10725849
    Abstract: An embodiment of a semiconductor package apparatus may include technology to determine if an access request (e.g., a read or write request) to a memory location would result in an integrity failure and, if so determined, read previous data from the memory location, set an indicator to indicate the integrity failure, and store the previous data together with the indicator and previous authentication information. Other embodiments are disclosed and claimed.
    Type: Grant
    Filed: July 27, 2018
    Date of Patent: July 28, 2020
    Assignee: Intel Corporation
    Inventors: David Durham, Siddhartha Chhabra, Kai Cong, Ron Gabor
  • Publication number: 20200057664
    Abstract: A host Virtual Machine Monitor (VMM) operates “blindly,” without the host VMM having the ability to access data within a guest virtual machine (VM) or the ability to access directly control structures that control execution flow of the guest VM. Guest VMs execute within a protected region of memory (called a key domain) that even the host VMM cannot access. Virtualization data structures that pertain to the execution state (e.g., a Virtual Machine Control Structure (VMCS)) and memory mappings (e.g., Extended Page Tables (EPTs)) of the guest VM are also located in the protected memory region and are also encrypted with the key domain key. The host VMM and other guest VMs, which do not possess the key domain key for other key domains, cannot directly modify these control structures nor access the protected memory region. The host VMM, however, using VMPageIn and VMPageOut instructions, can build virtual machines in key domains and page VM pages in and out of key domains.
    Type: Application
    Filed: March 30, 2019
    Publication date: February 20, 2020
    Applicant: Intel Corporation
    Inventors: David Durham, Siddhartha Chhabra, Geoffrey Strongin, Ronald Perez
  • Patent number: 10565370
    Abstract: Various embodiments are generally directed to an apparatus, method, and other techniques to provide direct-memory access, memory-mapped input-output, and/or other memory transactions between devices designated for use by an enclave and the enclave itself. A secure device address map may be configured to map addresses for the enslave device and the enclave, and a register filter component may grant access to the enclave device to the enclave.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: February 18, 2020
    Assignee: INTEL CORPORATION
    Inventors: Alpa Narendra Trivedi, Ravi Sahita, David Durham, Karanvir Grewal, Prashant Dewan, Siddhartha Chhabra
  • Publication number: 20190370048
    Abstract: Embodiments of an invention for virtualization exceptions are disclosed. In one embodiment, a processor includes instruction hardware, control logic, and execution hardware. The instruction hardware is to receive a plurality of instructions, including an instruction to enter a virtual machine. The control logic is to determine, in response to a privileged event occurring within the virtual machine, whether to generate a virtualization exception. The execution hardware is to generate a virtualization exception in response to the control logic determining to generate a virtualization exception.
    Type: Application
    Filed: April 10, 2019
    Publication date: December 5, 2019
    Inventors: Gilbert Neiger, Mayank Bomb, Manohar Castelino, Robert Chappell, David Durham, Barry Huntley, Anton Ivanov, Madhavan Parthasarathy, Scott Rodgers, Ravi Sahita, Vedvyas Shanbhogue
  • Patent number: 10395028
    Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.
    Type: Grant
    Filed: July 21, 2017
    Date of Patent: August 27, 2019
    Assignee: Intel Corporation
    Inventors: Prashant Dewan, Uttam Sengupta, Siddhartha Chhabra, David Durham, Xiaozhu Kang, Uday Savagaonkar, Alpa Narendra Trivedi
  • Patent number: 10296366
    Abstract: Embodiments of an invention for virtualization exceptions are disclosed. In one embodiment, a processor includes instruction hardware, control logic, and execution hardware. The instruction hardware is to receive a plurality of instructions, including an instruction to enter a virtual machine. The control logic is to determine, in response to a privileged event occurring within the virtual machine, whether to generate a virtualization exception. The execution hardware is to generate a virtualization exception in response to the control logic determining to generate a virtualization exception.
    Type: Grant
    Filed: December 27, 2016
    Date of Patent: May 21, 2019
    Assignee: Intel Corporation
    Inventors: Gilbert Neiger, Mayank Bomb, Manohar Castelino, Robert Chappell, David Durham, Barry Huntley, Anton Ivanov, Madhavan Parthasarathy, Scott Rodgers, Ravi Sahita, Vedvyas Shanbhogue
  • Publication number: 20190133216
    Abstract: A garment includes a first plurality of panels including a rigid material and a second plurality of panels including a stretch fabric material. According to an exemplary embodiment, the first plurality of panels are selectively positioned so as to correspond in location to desired anatomical regions of a wearer of the garment. According to an exemplary embodiment, the second plurality of panels are selectively positioned to facilitate independent movement of each of the first plurality of panels relative to one another.
    Type: Application
    Filed: November 16, 2016
    Publication date: May 9, 2019
    Inventor: David Durham
  • Publication number: 20190138720
    Abstract: The present disclosure is directed to systems and methods that maintain consistency between a system architectural state and a microarchitectural state in the system cache circuitry to prevent a side-channel attack from accessing secret information. Speculative execution of one or more instructions by the processor circuitry causes memory management circuitry to transition the cache circuitry from a first microarchitectural state to a second microarchitectural state. The memory management circuitry maintains the cache circuitry in the second microarchitectural state in response to a successful completion and/or retirement of the speculatively executed instruction. The memory management circuitry reverts the cache circuitry from the second microarchitectural state to the first microarchitectural state in response to an unsuccessful completion, flushing, and/or retirement of the speculatively executed instruction.
    Type: Application
    Filed: December 17, 2018
    Publication date: May 9, 2019
    Applicant: Intel Corporation
    Inventors: Ken Grewal, Ravi Sahita, David Durham, Erdem Aktas, Sergej Deutsch, Abhishek Basak
  • Publication number: 20190108447
    Abstract: A mechanism is described for facilitating multifunction perceptron-based machine learning in computing environments, according to one embodiment. A method of embodiments, as described herein, includes generating a multifunction perceptron architecture having a plurality of neurons to perform one or more neuron functions in a machine learning environment, wherein the plurality of neurons includes one or more of splitter neurons, mixer neurons, and counter neurons, wherein the plurality of neurons include heterogenous neurons.
    Type: Application
    Filed: November 29, 2018
    Publication date: April 11, 2019
    Applicant: Intel Corporation
    Inventors: Michael Kounavis, David Durham