Patents by Inventor Hao-Chi Wong

Hao-Chi Wong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8984316
    Abstract: Secure fast platform hibernation and resumption for computing systems. An embodiment of an apparatus includes a processor to operate according to an operating system, the processor to transition the apparatus to a first reduced power state in response to a request, the transition to the first reduced power state including the processor to store context data for the apparatus in a volatile system memory, and logic to transition the apparatus to a second reduced power state, the logic to write the context data from the volatile system memory to a nonvolatile memory for the transition to the second reduced power state, wherein the logic is to implement one or more security measures for the writing of the context data into the nonvolatile memory.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: March 17, 2015
    Assignee: Intel Corporation
    Inventors: Jeff Forristal, Faraz Siddiqi, Lukasz Mielicki, Hao-Chi Wong
  • Patent number: 8515389
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: August 20, 2013
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Publication number: 20130173942
    Abstract: Secure fast platform hibernation and resumption for computing systems. An embodiment of an apparatus includes a processor to operate according to an operating system, the processor to transition the apparatus to a first reduced power state in response to a request, the transition to the first reduced power state including the processor to store context data for the apparatus in a volatile system memory, and logic to transition the apparatus to a second reduced power state, the logic to write the context data from the volatile system memory to a nonvolatile memory for the transition to the second reduced power state, wherein the logic is to implement one or more security measures for the writing of the context data into the nonvolatile memory.
    Type: Application
    Filed: December 29, 2011
    Publication date: July 4, 2013
    Inventors: Jeff Forristal, Faraz Siddiqi, Lukasz Mielicki, Hao-Chi Wong
  • Patent number: 8156337
    Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authentication data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-based protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.
    Type: Grant
    Filed: April 3, 2006
    Date of Patent: April 10, 2012
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong
  • Publication number: 20110134847
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: February 14, 2011
    Publication date: June 9, 2011
    Applicant: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Patent number: 7937089
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: May 3, 2011
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Patent number: 7904720
    Abstract: System and method for providing secure resource management. The system includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space. The first device associates one or more resources that it can access with the shared space. The first device invites one or more other devices to join as members of the space, and establishes secure communication channels with the devices that accept this invitation. The first device generates a member certificate for each accepting device, and sends the root certificate and the generated member certificate to the device through the secure channel. These devices may then access resources associated with the shared space by presenting their member certificates. Further, members of the shared space may invite other device to join the space, and may create member certificates in the same manner as the first device.
    Type: Grant
    Filed: November 6, 2002
    Date of Patent: March 8, 2011
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Diana Kathryn Smetters, Warren Keith Edwards, Dirk Balfanz, Hao-Chi Wong, Mark Webster Newman, Jana Zdislava Sedivy, Trevor Smith, Shahram Izadi
  • Patent number: 7757076
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including enabling secure communications to components of a vehicle, and enabling secure communications between the vehicle and associated infrastructure.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: July 13, 2010
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Paul J. Stewart, Diana K. Smetters, Rebecca E. Grinter, Dirk Balfanz, Glenn E. Durfee, Hao-Chi Wong
  • Patent number: 7581096
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: August 25, 2009
    Assignee: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Patent number: 7454619
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: November 18, 2008
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Patent number: 7275156
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: September 25, 2007
    Assignee: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Publication number: 20060174116
    Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authentication data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-based protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.
    Type: Application
    Filed: April 3, 2006
    Publication date: August 3, 2006
    Applicant: Xerox Corporation
    Inventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong
  • Publication number: 20050125669
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including enabling secure communications to components of a vehicle, and enabling secure communications between the vehicle and associated infrastructure.
    Type: Application
    Filed: April 30, 2004
    Publication date: June 9, 2005
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Paul Stewart, Diana Smetters, Rebecca Grinter, Dirk Balfanz, Glenn Durfee, Hao-Chi Wong
  • Publication number: 20040268119
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: December 30, 2004
    Applicant: Palo Alto Research Center, Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Publication number: 20040266449
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: December 30, 2004
    Applicant: Palo Alto Research Center, Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Publication number: 20040107366
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: June 3, 2004
    Applicant: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Publication number: 20040098581
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: May 20, 2004
    Applicant: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Publication number: 20040088548
    Abstract: System and method for providing secure resource management. The system includes a first device that creates a secure, shared resource space and a corresponding root certificate for the shared space. The first device associates one or more resources that it can access with the shared space. The first device invites one or more other devices to join as members of the space, and establishes secure communication channels with the devices that accept this invitation. The first device generates a member certificate for each accepting device, and sends the root certificate and the generated member certificate to the device through the secure channel. These devices may then access resources associated with the shared space by presenting their member certificates. Further, members of the shared space may invite other device to join the space, and may create member certificates in the same manner as the first device.
    Type: Application
    Filed: November 6, 2002
    Publication date: May 6, 2004
    Applicant: Xerox Corporation
    Inventors: Diana Kathryn Smetters, Warren Keith Edwards, Dirk Balfanz, Hao-Chi Wong, Mark Webster Newman, Jana Zdislava Sedivy, Trevor Smith, Shahram Izadi
  • Publication number: 20030149874
    Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authenticate data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.
    Type: Application
    Filed: February 6, 2002
    Publication date: August 7, 2003
    Applicant: XEROX CORPORATION
    Inventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong