Patents by Inventor George W. Cox
George W. Cox has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10079678Abstract: Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed.Type: GrantFiled: July 24, 2012Date of Patent: September 18, 2018Assignee: Intel CorporationInventors: Ned M. Smith, George W. Cox, David Johnston
-
Patent number: 9544139Abstract: A hardware-based digital random number generator is provided. In one embodiment, a processor includes a digital random number generator (DRNG) to condition entropy data provided by an entropy source, to generate a plurality of deterministic random bit (DRB) strings, and to generate a plurality of nondeterministic random bit (NRB) strings, and an execution unit coupled to the DRNG, in response to a first instruction to read a seed value, to retrieve one of the NRB strings from the DRNG and to store the NRB string in a destination register specified by the first instruction.Type: GrantFiled: December 29, 2011Date of Patent: January 10, 2017Assignee: Intel CorporationInventors: George W. Cox, David Johnston, Martin G. Dixon, Stephen A. Fischer, Jason W. Brandt
-
Patent number: 9467430Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: GrantFiled: February 10, 2015Date of Patent: October 11, 2016Assignee: Intel CorporationInventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
-
Patent number: 9390291Abstract: A processor of an aspect includes root key generation logic to generate a root key. The root key generation logic includes a source of static and entropic bits. The processor also includes key derivation logic coupled with the root key generation logic. The key derivation logic is to derive one or more keys from the root key. The processor also includes cryptographic primitive logic coupled with the root key generation logic. The cryptographic primitive logic is to perform cryptographic operations. The processor also includes a security boundary containing the root key generation logic, the key derivation logic, and the cryptographic primitive logic. Other processors, methods, and systems are also disclosed.Type: GrantFiled: December 29, 2012Date of Patent: July 12, 2016Assignee: Intel CorporationInventors: George W. Cox, David Johnston, Jiangtao Li, Anand Rajan
-
Publication number: 20150319150Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: ApplicationFiled: February 10, 2015Publication date: November 5, 2015Inventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
-
Publication number: 20150055778Abstract: A hardware-based digital random number generator is provided. In one embodiment, a processor includes a digital random number generator (DRNG) to condition entropy data provided by an entropy source, to generate a plurality of deterministic random bit (DRB) strings, and to generate a plurality of nondeterministic random bit (NRB) strings, and an execution unit coupled to the DRNG, in response to a first instruction to read a seed value, to retrieve one of the NRB strings from the DRNG and to store the NRB string in a destination register specified by the first instruction.Type: ApplicationFiled: December 29, 2011Publication date: February 26, 2015Inventors: George W. Cox, David Johnston, Martin G. Dixon, Stephen A. Fischer, Jason W. Brandt
-
Patent number: 8954735Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: GrantFiled: September 28, 2012Date of Patent: February 10, 2015Assignee: Intel CorporationInventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
-
Patent number: 8928347Abstract: An integrated circuit substrate of an aspect includes a plurality of exposed electrical contacts. The integrated circuit substrate also includes an inaccessible set of Physically Unclonable Function (PUF) cells to generate an inaccessible set of PUF bits that are not accessible through the exposed electrical contacts. The integrated circuit substrate also includes an accessible set of PUF cells to generate an accessible set of PUF bits that are accessible through the exposed electrical contacts. Other apparatus, methods, and systems are also disclosed.Type: GrantFiled: September 28, 2012Date of Patent: January 6, 2015Assignee: Intel CorporationInventors: Kevin C. Gotze, Gregory M. Iovino, Jiangtao Li, David Johnston, Sanu K. Mathew, George W. Cox, Anand Rajan
-
Publication number: 20140189365Abstract: A processor of an aspect includes root key generation logic to generate a root key. The root key generation logic includes a source of static and entropic bits. The processor also includes key derivation logic coupled with the root key generation logic. The key derivation logic is to derive one or more keys from the root key. The processor also includes cryptographic primitive logic coupled with the root key generation logic. The cryptographic primitive logic is to perform cryptographic operations. The processor also includes a security boundary containing the root key generation logic, the key derivation logic, and the cryptographic primitive logic. Other processors, methods, and systems are also disclosed.Type: ApplicationFiled: December 29, 2012Publication date: July 3, 2014Inventors: George W. Cox, David Johnston, Jiangtao Li, Anand Rajan
-
Publication number: 20140095867Abstract: A method and device for securely provisioning trust anchors includes generating a database wrapper key as a function of computing device hardware. The database wrapper key encrypts a key database when it is not in use by a trusted execution environment and may be generated using a Physical Unclonable Function (PUF). A local computing device establishes a secure connection and security protocols with a remote computing device. In establishing the secure connection, the local computing device and remote computing device may exchange and/or authenticate cryptographic keys, including Enhanced Privacy Identification (EPID) keys, and establish a session key and device identifier(s). One or more trust anchors are then provisioned depending on whether unilateral, bilateral, or multilateral trust is established. The local computing device may act as a group or domain controller in establishing multilateral trust. Any of the devices may also require user presence to be verified.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Inventors: Ned M. Smith, David Johnston, George W. Cox, Adi Shaliv
-
Publication number: 20140091832Abstract: An integrated circuit substrate of an aspect includes a plurality of exposed electrical contacts. The integrated circuit substrate also includes an inaccessible set of Physically Unclonable Function (PUF) cells to generate an inaccessible set of PUF bits that are not accessible through the exposed electrical contacts. The integrated circuit substrate also includes an accessible set of PUF cells to generate an accessible set of PUF bits that are accessible through the exposed electrical contacts. Other apparatus, methods, and systems are also disclosed.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Inventors: Kevin C. Gotze, Gregory M. Iovino, Jiangtao Li, David Johnston, Sanu K. Mathew, George W. Cox, Anand Rajan
-
Publication number: 20140032933Abstract: Embodiments of methods, systems, and storage medium associated with providing access to encrypted data for authorized users are disclosed herein. In one instance, the method may include obtaining a derived value for an authenticated user based on user personalization data of the authenticated user, and generating a user-specific encryption key based on the derived value. The derived value may have entropy in excess of a predetermined level. The user-specific encryption key may enable the authenticated user to access the encrypted data stored at the storage device. Other embodiments may be described and/or claimed.Type: ApplicationFiled: July 24, 2012Publication date: January 30, 2014Inventors: Ned M. Smith, George W. Cox, David Johnston
-
Patent number: 8489660Abstract: A hardware-based digital random number generator is provided. The digital random number generator is a randomly behaving random number generator based on a set of nondeterministic behaviors. The nondeterministic behaviors include temporal asynchrony between subunits, entropy source “extra” bits, entropy measurement, autonomous deterministic random bit generator reseeding and consumption from a shared resource.Type: GrantFiled: June 26, 2009Date of Patent: July 16, 2013Assignee: Intel CorporationInventors: Howard C. Herbert, George W. Cox, Shay Gueron, Jesse Walker, Charles E. Dike, Stephen A. Fischer, Ernie Brickell, Martin G. Dixon, David Johnston, Gunendran Thuraisingham, Edward V. Gamsaragan, James S. Coke, Greg W. Piper
-
Publication number: 20100332574Abstract: A hardware-based digital random number generator is provided. The digital random number generator is a randomly behaving random number generator based on a set of nondeterministic behaviors. The nondeterministic behaviors include temporal asynchrony between subunits, entropy source “extra” bits, entropy measurement, autonomous deterministic random bit generator reseeding and consumption from a shared resource.Type: ApplicationFiled: June 26, 2009Publication date: December 30, 2010Inventors: Howard C. Herbert, George W. Cox, Shay Gueron, Jesse Walker, Charles E. Dike, Stephen A. Fischer, Ernie Brickell, Martin G. Dixon, David Johnston, Gunendran Thuraisingham, Edward V. Gamsaragan, James S. Coke, Greg W. Piper
-
Patent number: 6253323Abstract: Briefly, in accordance with one embodiment of the invention, a method of using a digital signature includes: electronically referencing at least one plurality of electronic signals with a digital signature remotely stored from the plurality.Type: GrantFiled: November 1, 1996Date of Patent: June 26, 2001Assignee: Intel CorporationInventors: George W. Cox, David W. Aucsmith, Paul E. Onnen
-
Patent number: 6165082Abstract: An above-ground device that semi-automatically tees golf balls at practice areas such as driving ranges, without requiring the golfer to bend down and tee each golf ball by hand following each practice shot. The device comprises a U-shaped conduit which is embedded in the foam rubber backing of the playing surface mat typically found at a teeing area of a driving range in such a way that the openings in the conduit directly communicate with two holes drilled though the playing surface mat so as to create a continuous pathway between the two holes through the conduit. A semi-rigid rod is inserted into the conduit of such length that when one end is flush with the playing surface mat the other end protrudes above the playing surface mat approximately to the height of a standard golf tee. The ends of the rod are flared to substantially the shape of a standard golf tee.Type: GrantFiled: January 19, 1999Date of Patent: December 26, 2000Inventor: George W. Cox
-
Patent number: 5896533Abstract: The method and apparatus of the present invention allows for all applications running on a computer which conform to the Object Linking and Embedding Application Programming Interface (OLE API) to automatically become capable of accessing World-Wide Web (WWW) files of arbitrary type.Type: GrantFiled: July 6, 1995Date of Patent: April 20, 1999Assignee: Intel CorporationInventors: Daniel Ramos, George W. Cox, Kevin Altis
-
Patent number: 5634043Abstract: A computer system having at least a first microprocessor for processing information and a first memory coupled to the first microprocessor via a first point-to-point interface. The first point-to-point interface provides communication of signals between the first microprocessor and the first memory irrespective of the phase of the signals received by either the first microprocessor or the first memory. The first point-to-point interface includes a first point-to-point circuit in the microprocessor for receiving the signals from the first memory. The first point-to-point circuit and the microprocessor comprise a single integrated circuit in some implemented embodiments, providing ease of construction and design of systems having a variety of topologies.Type: GrantFiled: August 25, 1994Date of Patent: May 27, 1997Assignee: Intel CorporationInventors: Keith-Michael W. Self, Craig B. Peterson, James A. Sutton, II, John A. Urbanski, George W. Cox, Linda J. Rankin, David W. Archer, Shekhar Y. Borkar
-
Patent number: 4829425Abstract: An I/O processor for controlling data transfer between a local bus and an I/O bus. An Execution Unit, an I/O bus sequencer, and a local bus sequencer are connected to a register file. The register file is uniformly addressed and each of the Execution Unit, the local bus sequencer, and the I/O bus sequencer have read/write access to the register file. The register file is comprised of a plurality of register sets. The Execution Unit includes a programmed processor which is programmed to allocate the register sets among tasks running on the processor by passing register-set descriptors between the tasks in the form of messages. The local bus sequencer includes a packet-oriented multiprocessor bus, there being a variable number of bytes in each of the packets. The I/O sequencer includes logic for multibyte sequencing of data at a bus-dependent data rate between the I/O bus and the register file. Each of the tasks includes a task frame, each task frame including register-set pointers.Type: GrantFiled: March 1, 1988Date of Patent: May 9, 1989Assignee: Intel CorporationInventors: William L. Bain, Jr., David G. Carson, George W. Cox, Robert C. Duzett, Brad W. Hosler, Scott A. Ogilvie, Craig B. Peterson, John L. Wipfli
-
Patent number: 4803622Abstract: An I/O bus sequencer for providing a data path between an execution Unit (EU-10), a register file (14) and devices connected to a bus (28). A programmable logic array (PLA-18) stores a program which controls a service table (20). The service table includes a plurality of entries divided into fields. One of the fields when decoded instructs the PLA as to what kind of operation the bus sequencer is to perform. Line selection (priority) logic (22) connected to I/O request lines (30) and to the service table (20) determines which service table entry the PLA is to use. A bus interface connected to the I/O bus ports (26) and to the PLA (18) routes data between the I/O bus ports (26) and the register file (14), entries of which are controlled by use of register sets. The service table fields include register set descriptors for storing the status of register set buffers.Type: GrantFiled: May 7, 1987Date of Patent: February 7, 1989Assignee: Intel CorporationInventors: William L. Bain, Jr., Robert C. Bedichek, George W. Cox, Gerhard Grassl, Craig B. Peterson, Justin R. Rattner, Gurbir Singh, Gurbir Singh, John L. Wipfli