Patents by Inventor Hormuzd Khosravi

Hormuzd Khosravi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8099718
    Abstract: A method and system for whitelisting software components is disclosed. In a first operating environment, runtime information may be collected about a first loaded and executing software component. The collected information may be communicated to a second software component operating in a second operating environment that is isolated from the first operating environment. The collect runtime information may be compared with a validated set of information about the first software component. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 13, 2007
    Date of Patent: January 17, 2012
    Assignee: Intel Corporation
    Inventors: Gayathri Nagabhushan, Ravi Sahita, Hormuzd Khosravi, Satyajit Grover
  • Publication number: 20110289146
    Abstract: A method and device allowing a scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an out-of-band (OOB) configured to compute a first hash value for data stored in one or more sectors of a data storage device at a first time; receive, using communication circuitry, a request to transmit a portion of the data stored in the one or more sectors of the data storage device at a second time, the second time being subsequent to the first time; compute a second hash value for the data stored in the one or more sectors of the data storage device at the second time; and transmit, using the communication circuitry, the requested portion of the data, only if the second hash value does not match the first hash value.
    Type: Application
    Filed: May 21, 2010
    Publication date: November 24, 2011
    Inventors: Hormuzd Khosravi, David Durham, David A. Edwards, Venkat R. Gokulrangan, Men Long, Yasser Rasheed
  • Publication number: 20110246633
    Abstract: Embodiments provide methods, apparatus, and systems that enable an embedded processor to detect and configure one or more network access settings. The network access settings may enable the embedded processor to communicate over a network, via out-of-band messages, with a management server or service. Other embodiments may be disclosed or claimed.
    Type: Application
    Filed: April 2, 2010
    Publication date: October 6, 2011
    Inventors: Hormuzd Khosravi, Dominic Fulginiti, Avigdor Eldar, Michael Navon
  • Publication number: 20110246722
    Abstract: A method and system may include fetching a first pre-fetched data block having a first length greater than the length of a first requested data block, storing the first pre-fetched data block in a cache, and then fetching a second pre-fetched data block having a second length, greater than the length of a second requested data block, if data in the second requested data block is not entirely stored in a valid part of the cache. The first and second pre-fetched data blocks may be associated with a storage device over a channel. Other embodiments are described and claimed.
    Type: Application
    Filed: April 2, 2010
    Publication date: October 6, 2011
    Inventors: Nadim Taha, Hormuzd Khosravi
  • Patent number: 8010965
    Abstract: A system, apparatus and method to receive, schedule, and perform a task automatically on a multi-processor device are described herein. In various embodiments, the multi-processor device is a member of a home network environment.
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: August 30, 2011
    Assignee: Intel Corporation
    Inventors: Bernard Keany, Hormuzd Khosravi
  • Publication number: 20110161145
    Abstract: A method and device for securely displaying digital content, such as an advertisement, on a computing device includes establishing an advertisement enforcement module in a secured environment on the computing device. The computing device receives advertisements from a remote advertisement server, which are validated by the advertisement enforcement module. The advertisement enforcement module ensures that the advertisement is displayed on the computing device in a secure manner and monitors for tampering of the advertisement and advertisement service by the user of the device.
    Type: Application
    Filed: December 26, 2009
    Publication date: June 30, 2011
    Inventors: Ayeshwarya B. Mahajan, Gyan Prakash, Saurabh Dadu, Ajay Sharma, Neel H. Bhatia, Rajesh Poornachandran, Hormuzd Khosravi, K. P. Sameer, Munier Shah
  • Publication number: 20110151854
    Abstract: A method and device for remote management over a wireless wide-area network includes receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message.
    Type: Application
    Filed: December 23, 2009
    Publication date: June 23, 2011
    Inventors: Gyan Prakash, Farid Adrangi, Selim Aissi, Hormuzd Khosravi, Saurabh Dadu
  • Publication number: 20110125990
    Abstract: In some embodiments, a secure authenticated remote boot of computing device over a wireless network is performed in a pre-boot execution environment (PXE) using active management technology (AMT) for remote discovery. In these embodiments, a management engine (ME) may maintain full control of a wireless interface and a wireless connection as booting begins. The ME may relinquish control of the wireless interface after a PXE timeout, in response to a shutdown command, or once the device has booted. The ME controls the use of an operating system received from a remote location.
    Type: Application
    Filed: November 23, 2009
    Publication date: May 26, 2011
    Inventors: Hormuzd Khosravi, Venkat R. Gokulrangan, Michael Berger, Izoslav Tchigevsky, Gary Joe Calhoun
  • Patent number: 7921453
    Abstract: Embodiments of the present invention provide apparatuses, methods, and systems for authenticated distributed detection and inference. In various embodiments, an apparatus comprises an interface configured to communicatively couple a node hosting the apparatus to a network, and a distributed detection and inference (DDI) agent coupled to the interface and configured to receive, via the interface, DDI collaboration parameters from an authentication node is disclosed. Other embodiments may be described and claimed.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: April 5, 2011
    Assignee: Intel Corporation
    Inventors: John Mark Agosta, Hormuzd Khosravi
  • Patent number: 7882318
    Abstract: Methods, apparatuses, articles, and systems for comparing a first security domain of a first memory page of a physical device to a second security domain of a second memory page of the physical device, the security domains being stored in one or more registers of a processor of the physical device, are described herein. Based on the comparison, the processor disallows an instruction from the first memory page to access the second memory page if the first security domain is different from the second security domain. Resultantly, software agents, in particular, critical software agents, may be protected in a virtual technology (VT) environment more efficiently and effectively.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: February 1, 2011
    Assignee: Intel Corporation
    Inventors: Uday Savagaonkar, Ravi Sahita, David Durham, Hormuzd Khosravi
  • Patent number: 7814531
    Abstract: A method and apparatus for detection of network environment to aid policy selection for network access control. An embodiment of a method includes receiving a request to connect a device to a network and, if a security policy is received for the connection of the device, applying the policy for the device. If a security policy for the connection of the device is not received, the domain of the device is determined by determining whether the device is in an enterprise domain and determining whether the device is in a network access control domain, which allows selection of an appropriate domain/environment specific policy.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: October 12, 2010
    Assignee: Intel Corporation
    Inventors: Hormuzd Khosravi, Karanvir Grewal, Ahuva Kroiser, Avigdor Eldar
  • Patent number: 7757035
    Abstract: In a virtualized processor based system causing a transition to a virtual machine monitor executing on the processor based system in response to a modification of a page table of a guest executing in a virtual machine of the processor based system, and the virtual machine monitor responding to the transition by performing a verification action, and for each bit modified in the page table of the guest, reading a status indicator for the bit to determine if the bit is significant; and causing the transition only if the status indicator for any bit modified in the page table indicates that the bit is significant.
    Type: Grant
    Filed: June 26, 2007
    Date of Patent: July 13, 2010
    Assignee: Intel Corporation
    Inventors: David Durham, Hormuzd Khosravi, Gayathri Nagabhushan, Uday Savagaonkar
  • Patent number: 7748037
    Abstract: A system and process are described to enable at least one of a plurality of host agents executing on a system to update memory region types of a system memory, register the at least one host agent in a registry stored in system management memory, receive a system management interrupt (SMI) from one of the plurality of host agents to update a memory region type, determine if the host agent issuing the SMI is listed in the registry stored in system management memory, update the memory region in response to determining the host agent issuing the SMI is listed in the registry, and maintain the memory region type in response to determining the host agent issuing the SMI is not listed in the registry.
    Type: Grant
    Filed: September 22, 2005
    Date of Patent: June 29, 2010
    Assignee: Intel Corporation
    Inventors: Priya Rajagopal, Uday Savagaonkar, David Durham, Ravi Sahita, Hormuzd Khosravi
  • Publication number: 20100162356
    Abstract: A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point.
    Type: Application
    Filed: March 1, 2010
    Publication date: June 24, 2010
    Inventors: Hormuzd Khosravi, David Durham, Karanvir Grewal
  • Patent number: 7743245
    Abstract: “Honest” is a nice word. Sadly, some people in this world are not honest. In an increasingly wired world, dishonest people have found myriad opportunities to illicitly acquire one's confidential data, to monitor or interfere with one's networking activities, e.g., to monitor what you are doing, downloading, accessing, etc., to eavesdrop on or hijack telephony control and voice data or other protocols on your network, etc. To address such risks, typically a secured communication protocol, e.g., TLS or SSL, is utilized to protect communication. Unfortunately, TLS, SSL, and many other security environments require the underlying communication protocol to be TCP/IP, while some protocols needing communication protection, such as VoIP, RTP, SNMP, etc. only operate on UDP and not TCP/IP. Thus, a network shim or other embodiments disclosed herein may be used to allow such UDP based application programs and protocols to use security environments requiring a TCP/IP type transport.
    Type: Grant
    Filed: March 10, 2005
    Date of Patent: June 22, 2010
    Assignee: Intel Corporation
    Inventor: Hormuzd Khosravi
  • Patent number: 7703126
    Abstract: A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: April 20, 2010
    Assignee: Intel Corporation
    Inventors: Hormuzd Khosravi, David Durham, Karanvir Grewal
  • Publication number: 20090328164
    Abstract: A method and system for a platform-based trust verifying service for multi-party verification. In one embodiment, the method includes a client platform accessing an service provider over a network. Upon accessing the service provider, the client platform receives a request from the service provider for platform measurement and verification. The client platform collects platform information and performs measurement and verification, including performing an integrity manifest comparison. If the integrity manifest comparison indicates a good client platform posture, then the client platform signs the client platform posture and sends an approval notification to the service provider indicating that the client platform has not been compromised. The client platform may then receive the service of the service provider.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Inventors: Divya Naidu Sunder, Hormuzd Khosravi, David Durham, Dan Dahle, Prashant Dewan
  • Patent number: 7624242
    Abstract: An embodiment of the present invention is a technique to protect memory. A memory identifiers storage stores memory identifiers associated with protected components. The memory identifiers include exclusive memory identifiers and shared memory identifiers. The memory identifier storage is protected from access by a host operating system. A memory identifier management service (MMS) manages the memory identifiers. The MMS resides in a protected environment. An access control enforcer (ACE) enforces an access control policy with the memory identifiers.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: November 24, 2009
    Assignee: Intel Corporation
    Inventors: Uday Savagaonkar, Ravi Sahita, Hormuzd Khosravi, Priya Rajagopal
  • Publication number: 20090249481
    Abstract: A method and device are disclosed. In one embodiment the method includes determining that a packet attempting to be sent from a first computer system has at least a portion of a human communication message that may contain spam. The method then increments a spam counter when the difference in time between a first time value in a time stamp within the packet and a second time value of a most recent activity from a human input device coupled to the first computer system is greater than a threshold difference in time value. The method also disallows the packet to be sent to a remote location if the spam counter exceeds a spam outbound threshold value.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Inventors: Men Long, David Durham, Hormuzd Khosravi
  • Publication number: 20090172814
    Abstract: A measurement engine generates an integrity manifest for a software program and uses it to perform active platform observation. The integrity manifest indicates an integrity check value for a section of the program's code. The measurement engine computes a comparison value on the program's image in memory and determines if the comparison value matches the expected integrity check value. If the values do not match, the program's image is determined to be modified, and appropriate remedial action may be triggered.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventors: Hormuzd Khosravi, David Durham, Prashant Dewan, Ravi Sahita, Uday R. Savagaonkar, Men Long