Patents by Inventor Hao-Chi Wong
Hao-Chi Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8984316Abstract: Secure fast platform hibernation and resumption for computing systems. An embodiment of an apparatus includes a processor to operate according to an operating system, the processor to transition the apparatus to a first reduced power state in response to a request, the transition to the first reduced power state including the processor to store context data for the apparatus in a volatile system memory, and logic to transition the apparatus to a second reduced power state, the logic to write the context data from the volatile system memory to a nonvolatile memory for the transition to the second reduced power state, wherein the logic is to implement one or more security measures for the writing of the context data into the nonvolatile memory.Type: GrantFiled: December 29, 2011Date of Patent: March 17, 2015Assignee: Intel CorporationInventors: Jeff Forristal, Faraz Siddiqi, Lukasz Mielicki, Hao-Chi Wong
-
Patent number: 8515389Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: GrantFiled: February 14, 2011Date of Patent: August 20, 2013Assignee: Palo Alto Research Center IncorporatedInventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
-
Publication number: 20130173942Abstract: Secure fast platform hibernation and resumption for computing systems. An embodiment of an apparatus includes a processor to operate according to an operating system, the processor to transition the apparatus to a first reduced power state in response to a request, the transition to the first reduced power state including the processor to store context data for the apparatus in a volatile system memory, and logic to transition the apparatus to a second reduced power state, the logic to write the context data from the volatile system memory to a nonvolatile memory for the transition to the second reduced power state, wherein the logic is to implement one or more security measures for the writing of the context data into the nonvolatile memory.Type: ApplicationFiled: December 29, 2011Publication date: July 4, 2013Inventors: Jeff Forristal, Faraz Siddiqi, Lukasz Mielicki, Hao-Chi Wong
-
Patent number: 8156337Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authentication data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-based protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.Type: GrantFiled: April 3, 2006Date of Patent: April 10, 2012Assignee: Palo Alto Research Center IncorporatedInventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong
-
Publication number: 20110134847Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: ApplicationFiled: February 14, 2011Publication date: June 9, 2011Applicant: PALO ALTO RESEARCH CENTER INCORPORATEDInventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
-
Patent number: 7937089Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: GrantFiled: September 5, 2003Date of Patent: May 3, 2011Assignee: Palo Alto Research Center IncorporatedInventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
-
Patent number: 7904720Abstract: System and method for providing secure resource management. The system includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space. The first device associates one or more resources that it can access with the shared space. The first device invites one or more other devices to join as members of the space, and establishes secure communication channels with the devices that accept this invitation. The first device generates a member certificate for each accepting device, and sends the root certificate and the generated member certificate to the device through the secure channel. These devices may then access resources associated with the shared space by presenting their member certificates. Further, members of the shared space may invite other device to join the space, and may create member certificates in the same manner as the first device.Type: GrantFiled: November 6, 2002Date of Patent: March 8, 2011Assignee: Palo Alto Research Center IncorporatedInventors: Diana Kathryn Smetters, Warren Keith Edwards, Dirk Balfanz, Hao-Chi Wong, Mark Webster Newman, Jana Zdislava Sedivy, Trevor Smith, Shahram Izadi
-
Patent number: 7757076Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including enabling secure communications to components of a vehicle, and enabling secure communications between the vehicle and associated infrastructure.Type: GrantFiled: April 30, 2004Date of Patent: July 13, 2010Assignee: Palo Alto Research Center IncorporatedInventors: Paul J. Stewart, Diana K. Smetters, Rebecca E. Grinter, Dirk Balfanz, Glenn E. Durfee, Hao-Chi Wong
-
Patent number: 7581096Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: GrantFiled: September 5, 2003Date of Patent: August 25, 2009Assignee: Xerox CorporationInventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
-
Patent number: 7454619Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: GrantFiled: September 5, 2003Date of Patent: November 18, 2008Assignee: Palo Alto Research Center IncorporatedInventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
-
Patent number: 7275156Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: GrantFiled: September 5, 2003Date of Patent: September 25, 2007Assignee: Xerox CorporationInventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
-
Publication number: 20060174116Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authentication data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-based protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.Type: ApplicationFiled: April 3, 2006Publication date: August 3, 2006Applicant: Xerox CorporationInventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong
-
Publication number: 20050125669Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including enabling secure communications to components of a vehicle, and enabling secure communications between the vehicle and associated infrastructure.Type: ApplicationFiled: April 30, 2004Publication date: June 9, 2005Applicant: Palo Alto Research Center IncorporatedInventors: Paul Stewart, Diana Smetters, Rebecca Grinter, Dirk Balfanz, Glenn Durfee, Hao-Chi Wong
-
Publication number: 20040268119Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: ApplicationFiled: September 5, 2003Publication date: December 30, 2004Applicant: Palo Alto Research Center, IncorporatedInventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
-
Publication number: 20040266449Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: ApplicationFiled: September 5, 2003Publication date: December 30, 2004Applicant: Palo Alto Research Center, IncorporatedInventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
-
Publication number: 20040107366Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: ApplicationFiled: September 5, 2003Publication date: June 3, 2004Applicant: Xerox CorporationInventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
-
Publication number: 20040098581Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.Type: ApplicationFiled: September 5, 2003Publication date: May 20, 2004Applicant: Xerox CorporationInventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
-
Publication number: 20040088548Abstract: System and method for providing secure resource management. The system includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space. The first device associates one or more resources that it can access with the shared space. The first device invites one or more other devices to join as members of the space, and establishes secure communication channels with the devices that accept this invitation. The first device generates a member certificate for each accepting device, and sends the root certificate and the generated member certificate to the device through the secure channel. These devices may then access resources associated with the shared space by presenting their member certificates. Further, members of the shared space may invite other device to join the space, and may create member certificates in the same manner as the first device.Type: ApplicationFiled: November 6, 2002Publication date: May 6, 2004Applicant: Xerox CorporationInventors: Diana Kathryn Smetters, Warren Keith Edwards, Dirk Balfanz, Hao-Chi Wong, Mark Webster Newman, Jana Zdislava Sedivy, Trevor Smith, Shahram Izadi
-
Publication number: 20030149874Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authenticate data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.Type: ApplicationFiled: February 6, 2002Publication date: August 7, 2003Applicant: XEROX CORPORATIONInventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong