Patents by Inventor Hormuzd Khosravi

Hormuzd Khosravi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090125885
    Abstract: A method and system for whitelisting software components is disclosed. In a first operating environment, runtime information may be collected about a first loaded and executing software component. The collected information may be communicated to a second software component operating in a second operating environment that is isolated from the first operating environment. The collect runtime information may be compared with a validated set of information about the first software component. Other embodiments are described and claimed.
    Type: Application
    Filed: November 13, 2007
    Publication date: May 14, 2009
    Inventors: Nagabhushan Gayathri, Ravi Sahita, Hormuzd Khosravi, Satyajit Grover
  • Publication number: 20090083844
    Abstract: In network access controlled networks, it is desirable to prevent access to the network by any non-authenticated entities. Access control may be established through a trusted agent that, in some embodiments, may be implemented with a management co-processor. In some cases, active management technology may establish a connection while a host is inactive. Then, after the host becomes active, the host can attempt to use the management co-processor connection without obtaining the necessary authentications. This may be prevented, in some embodiments, by scanning for an active host and, if such an active host is found, blocking the host from using a layer 2 authentication channel unless the host is properly authenticated and has a proper Internet Protocol address.
    Type: Application
    Filed: September 26, 2007
    Publication date: March 26, 2009
    Inventors: Avigdor Eldar, Tal Roth, Hormuzd Khosravi, Tal Shustak, Yael Yanai
  • Publication number: 20090070467
    Abstract: In network access control networks, it may be difficult to provide certain remote accesses such as remote boot or remote storage access. An available network connection established through chipset firmware (e.g. active management technology (AMT)) may be utilized to establish a connection and to enable the remote access. Then as soon the completion of the activity is detected, such as remote booting, then the connection may be immediately terminated to prevent access by improper agents.
    Type: Application
    Filed: September 7, 2007
    Publication date: March 12, 2009
    Inventors: Hormuzd Khosravi, Venkat R. Gokulrangan, Tal Shustak, Avigdor Eldar
  • Publication number: 20090038017
    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    Type: Application
    Filed: August 2, 2007
    Publication date: February 5, 2009
    Inventors: David Durham, Hormuzd Khosravi, Uri Blumenthal, Men Long
  • Publication number: 20090006714
    Abstract: In a virtualized processor based system causing a transition to a virtual machine monitor executing on the processor based system in response to a modification of a page table of a guest executing in a virtual machine of the processor based system, and the virtual machine monitor responding to the transition by performing a verification action, and for each bit modified in the page table of the guest, reading a status indicator for the bit to determine if the bit is significant; and causing the transition only if the status indicator for any bit modified in the page table indicates that the bit is significant.
    Type: Application
    Filed: June 26, 2007
    Publication date: January 1, 2009
    Inventors: David Durham, Hormuzd Khosravi, Gayathri Nagabhushan, Uday Savagaonkar
  • Patent number: 7453797
    Abstract: A method to provide high availability in network elements using distributed architectures. The method employs multiple software components that are distributed across data/forwarding plane and control plane elements in a network element. The software components in the data/forwarding plane include active and standby components. Components in the control plane a re provided to communicate with the components in the data/forwarding plane. A keep-alive messaging mechanism is used to monitor operation of the various elements in the network element. Upon detection of a failure to a hardware or software component, the data/forwarding plane and/or control plane elements are reconfigured, as applicable, to replace a failed active component with a corresponding standby component. This enables the network element to be reconfigured in a manner that is transparent to other network elements, and provided high availability for the network element.
    Type: Grant
    Filed: September 29, 2004
    Date of Patent: November 18, 2008
    Assignee: Intel Corporation
    Inventors: Manasi Deval, Suhail Ahmed, Santosh Balakrishnan, Hormuzd Khosravi, Sanjay Bakshi
  • Publication number: 20080244114
    Abstract: A runtime integrity check may be implemented for a chain or execution path. When the chain or execution path calls other functions, the correctness of an entity called from the execution path is verified. As a result, attacks by malicious software that attempt to circumvent interrupt handlers can be combated.
    Type: Application
    Filed: March 29, 2007
    Publication date: October 2, 2008
    Inventors: Travis T. Schluessler, David Durham, Hormuzd Khosravi
  • Publication number: 20080162849
    Abstract: Hardware of a virtualized processor based system detecting a specified type of memory access to an identified region of memory and in response to the detecting generating an interrupt for a virtual machine monitor (VMM) of the virtualized processor based system.
    Type: Application
    Filed: December 27, 2006
    Publication date: July 3, 2008
    Inventors: Uday Savagaonkar, Travis T. Schluessler, Hormuzd Khosravi, Ravi Sahita, Gayathri Nagabhushan, David Durham
  • Publication number: 20080155656
    Abstract: Embodiments of the present invention provide apparatuses, methods, and systems for authenticated distributed detection and inference. Other embodiments may be described and claimed.
    Type: Application
    Filed: December 22, 2006
    Publication date: June 26, 2008
    Inventors: John Mark Agosta, Hormuzd Khosravi
  • Publication number: 20080082772
    Abstract: Methods, apparatuses, articles, and systems for comparing a first security domain of a first memory page of a physical device to a second security domain of a second memory page of the physical device, the security domains being stored in one or more registers of a processor of the physical device, are described herein. Based on the comparison, the processor disallows an instruction from the first memory page to access the second memory page if the first security domain is different from the second security domain. Resultantly, software agents, in particular, critical software agents, may be protected in a VT environment more efficiently and effectively.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Uday Savagaonkar, Ravi Sahita, David Durham, Hormuzd Khosravi
  • Publication number: 20080082680
    Abstract: A method of providing a secure download of a boot image to a remote boot environment of a computer system. In one embodiment of the invention, the remote boot environment and a boot image source engage in a boot image exchange through an authentication channel. In another embodiment, data related to the boot image exchange is tunneled in the authentication channel to protect the boot image exchange from security attacks.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 3, 2008
    Inventors: Karanvir Grewal, Vincent Zimmer, Hormuzd Khosravi, Alan D. Ross
  • Publication number: 20080059275
    Abstract: A system, apparatus and method to receive, schedule, and perform a task automatically on a multi-processor device are described herein. In various embodiments, the multi-processor device is a member of a home network environment.
    Type: Application
    Filed: August 31, 2006
    Publication date: March 6, 2008
    Inventors: Bernard Keany, Hormuzd Khosravi
  • Publication number: 20080022129
    Abstract: Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise comprised operating system environment. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy in order to receive verification proof for any component in the platform. The verification proof or voucher helps to assure to the remote entity that no man-in-the-middle, rootkit, spyware or other malware running in the platform or on the network will have access to the provisioned material.
    Type: Application
    Filed: September 28, 2007
    Publication date: January 24, 2008
    Inventors: David Durham, Hormuzd Khosravi, Uri Blumenthal, Men Long
  • Publication number: 20080022355
    Abstract: A method and apparatus for detection of network environment to aid policy selection for network access control. An embodiment of a method includes receiving a request to connect a device to a network and, if a security policy is received for the connection of the device, applying the policy for the device. If a security policy for the connection of the device is not received, the domain of the device is determined by determining whether the device is in an enterprise domain and determining whether the device is in a network access control domain, which allows selection of an appropriate domain/environment specific policy.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 24, 2008
    Inventors: Hormuzd Khosravi, Karanvir Grewal, Ahuva Kroiser, Avigdor Eldar
  • Publication number: 20080022388
    Abstract: A method and apparatus to define multiple zones in a data packet for inclusion in processing by security operations of a security protocol. In one embodiment, each defined zone has an associated list of security operations to which the zone is subjected. In another embodiment, the list of security operations for a zone includes parameters to be passed when performing the security operations on the zone.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 24, 2008
    Inventors: Karanvir Grewal, David Durham, Hormuzd Khosravi, Men Long, Prashant Dewan
  • Publication number: 20080002724
    Abstract: A method and apparatus to define multiple zones in a data packet for exclusion from processing by security operations of a security protocol. In one embodiment, each defined zone has an associated list of security operations from which the zone is protected.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: Karanvir Grewal, David Durham, Hormuzd Khosravi, Men Long, Prashant Dewan
  • Publication number: 20070271360
    Abstract: According to embodiments of the present invention, host platform device includes an embedded firmware agent that may detect an attempt by the host platform device to fully connect to a network. The firmware agent may restrict traffic between the host platform device and the network to bootstrap traffic, test the device to determine device vulnerability, may temporarily stop access to other peripheral devices, and transmit a report of the device vulnerability to a remote policy server. After the test(s) are performed, the firmware agent may receive an indication from the remote policy server as to whether the device is permitted to fully connect to the network and, if so, whether there are any further restrictions on traffic flow, for example, and if the peripheral device access may be allowed.
    Type: Application
    Filed: May 16, 2006
    Publication date: November 22, 2007
    Inventors: Ravi Sahita, Uday Savagaonkar, Hormuzd Khosravi, Uri Blumenthal
  • Publication number: 20070239953
    Abstract: An embodiment of the present invention is a technique to protect memory. A memory identifiers storage stores memory identifiers associated with protected components. The memory identifiers include exclusive memory identifiers and shared memory identifiers. The memory identifier storage is protected from access by a host operating system. A memory identifier management service (MMS) manages the memory identifiers. The MMS resides in a protected environment. An access control enforcer (ACE) enforces an access control policy with the memory identifiers.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 11, 2007
    Inventors: Uday Savagaonkar, Ravi Sahita, Hormuzd Khosravi, Priya Rajagopal
  • Publication number: 20070240197
    Abstract: Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy Decision Point) and for receiving policy information to be enforced on the trusted host platform and respective applications for data processing and communication are described herein.
    Type: Application
    Filed: March 30, 2006
    Publication date: October 11, 2007
    Inventors: Uri Blumenthal, Hormuzd Khosravi, Karanvir Grewal
  • Publication number: 20070234402
    Abstract: A method that includes initiating a network access request from an access requester on a platform that couples to a network, the network access request made to a policy decision point for the network. The method also includes establishing a secure communication channel over a communication link between the policy decision point and a policy enforcement point on the platform. Another secure communication channel is established over another communication link. The other communication link is between at least the policy enforcement point and a manageability engine resident on the platform. The manageability engine forwards posture information associated with the access requester via the other secure communication channel. The posture information is then forwarded to the policy decision point via the secure communication channel between the policy enforcement point and the policy decision point.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Inventors: Hormuzd Khosravi, David Durham, Karanvir Grewal