Patents by Inventor Hormuzd M. Khosravi

Hormuzd M. Khosravi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8589302
    Abstract: A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: November 19, 2013
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Saurabh Dadu, Selim Aissi, Hormuzd M. Khosravi, Duncan Glendinning, Cris Rhodes
  • Publication number: 20130304986
    Abstract: Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system for management of one or more host device drivers from an isolated execution environment. Further embodiments include methods for querying and receiving event data from manageable resources on a host device. Further embodiments include data structures for the reporting of event data from one or more host device drivers to one or more capability modules.
    Type: Application
    Filed: July 16, 2013
    Publication date: November 14, 2013
    Inventors: David M. Durham, Tisson Mathew, Travis Schluessler, Priya Rajagopal, Hormuzd M. Khosravi
  • Publication number: 20130283383
    Abstract: A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions.
    Type: Application
    Filed: June 17, 2013
    Publication date: October 24, 2013
    Inventors: Hormuzd M. Khosravi, Venkat R. Gokulrangan, Yasser Rasheed, Men Long
  • Publication number: 20130275769
    Abstract: A method, device, and system for protecting and securely delivering media content includes configuring a memory controller of a system-on-a-chip (SOC) to establish a protected memory region, authenticating a firmware of a hardware peripheral using a security engine of the SOC, and storing the authenticated firmware in the protected memory region. The security engine may authenticate the firmware by authenticating a peripheral cryptographic key used to encrypt the firmware. Only authenticated hardware peripherals may access the protected memory region.
    Type: Application
    Filed: December 15, 2011
    Publication date: October 17, 2013
    Inventors: Hormuzd M. Khosravi, Sudheer Mogilappagari, Priyalee Kushwaha, Sunil A. Cheruvu, David A. Schollmeyer
  • Publication number: 20130276146
    Abstract: Embodiments of systems, apparatuses, and methods to securely download digital rights managed content with a client are described. In some embodiments, a system establishes a secure root of trust for the client. In addition, the system establishes a secure tunnel between an agent of the client and a storage system of the client. Furthermore, the system securely downloads the digital rights managed content to the storage system via the secure tunnel and securely provides the digital rights managed content from the storage system to a display.
    Type: Application
    Filed: December 22, 2011
    Publication date: October 17, 2013
    Applicant: Imtel Corporation
    Inventors: Manish Gilani, Paritosh Saxena, Nicholas D. Triantaffillou, Azam Barkatullah, Hormuzd M. Khosravi
  • Patent number: 8510760
    Abstract: Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system for management of one or more host device drivers from an isolated execution environment. Further embodiments include methods for querying and receiving event data from manageable resources on a host device. Further embodiments include data structures for the reporting of event data from one or more host device drivers to one or more capability modules.
    Type: Grant
    Filed: January 10, 2011
    Date of Patent: August 13, 2013
    Assignee: Intel Corporation
    Inventors: David M. Durham, Tisson Mathew, Travis Schluessler, Priva Rajagopal, Hormuzd M. Khosravi
  • Patent number: 8504693
    Abstract: A method and apparatus for traversing a firewall between an Intranet and the Internet without the use of a proxy server is provided. Internet Small Computer Systems Interface (iSCSI) streaming over a firewall is provided by tunneling iSCSI over Hypertext Transport Protocol (Security) (HTTP(S)).
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: August 6, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, Yasser Rasheed
  • Patent number: 8499151
    Abstract: Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by authenticated, authorized and verified software components. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy to receive verification for any component. The verification or voucher helps assure to the remote entity that no malware running in the platform or on the network will have access to provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the software component.
    Type: Grant
    Filed: March 5, 2012
    Date of Patent: July 30, 2013
    Assignee: Intel Corporation
    Inventors: David Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
  • Patent number: 8490189
    Abstract: A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: July 16, 2013
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Saurabh Dadu, Hormuzd M. Khosravi, Mousumi M. Hazra
  • Patent number: 8468279
    Abstract: A platform to support verification of the contents of an input-output device. The platform includes a platform hardware, which may verify the contents of the I/O device. The platform hardware may comprise components such as manageability engine and verification engine that are used to verify the contents of the I/O device even before the contents of the I/O device are exposed to an operating system supported by a host. The platform components may delete the infected portions of the contents of I/O device if the verification process indicates that the contents of the I/O device include the infected portions.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: June 18, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, Venkat R. Gokulrangan, Yasser Rasheed, Men Long
  • Patent number: 8417945
    Abstract: Methods and systems to detect virtualization of computer system resources, such as by malware, include methods and systems to evaluate information corresponding to a computer processor operating environment, outside of or secure from the operating environment, which may include one or more of a system management mode of operation and a management controller system. Information may include processor register values. Information may be obtained from within the operating environment, such as with a host application running within the operating environment. Information may be obtained outside of the operating environment, such as from a system state map. Information obtained from within the operating environment may be compared to corresponding information obtained outside of the operating environment. Direct memory address (DMA) translation information may be used to determine whether an operating environment is remapping DMA accesses.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: April 9, 2013
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, David Durham
  • Publication number: 20130080764
    Abstract: An embodiment uses hardware secrets secured within a security engine to provide a secure solution for field key provisioning. An embodiment is operating system independent due to the out-of-band communications with the security engine. Secrets need not be provisioned during manufacturing time. An embodiment may ensure only security engine specific provisioned secrets are used at runtime. Other embodiments are addressed herein.
    Type: Application
    Filed: September 28, 2011
    Publication date: March 28, 2013
    Inventors: Hormuzd M. Khosravi, Peter R. Munguia, Adrian R. Pearson, Steve J. Brown, David A. Schollmeyer
  • Patent number: 8375430
    Abstract: Secure re-authentication of host devices roaming between different connection and/or access points within a network controlled by the same administrative domain is described. Platform overhead associated with exchanging information for authentication and/or validation on each new connection during mobility is reduced by enabling prior authenticated network access to influence subsequent network access.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: February 12, 2013
    Assignee: Intel Corporation
    Inventors: Karanvir Grewal, Kapil Sood, Travis Schluessler, Hormuzd M. Khosravi
  • Patent number: 8332631
    Abstract: Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key.
    Type: Grant
    Filed: November 22, 2010
    Date of Patent: December 11, 2012
    Assignee: Intel Corporation
    Inventors: Saurabh Dadu, Rajesh Poornachandran, Gyan Prakash, Selim Aissi, Hormuzd M. Khosravi
  • Patent number: 8321501
    Abstract: Embodiments of the present disclosure provide methods and computing devices configured to establish secure out-of-band storage control. In various embodiments, a management module in a client device may be used to communicate with a server device independent of an operating system of the client device, to facilitate remote storage services. Other embodiments may be disclosed and claimed.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: November 27, 2012
    Assignee: Intel Corporation
    Inventors: David A. Edwards, Hormuzd M. Khosravi, Yasser Rasheed, Divya Naidu Kolar Sunder, Josephe E. Clark
  • Patent number: 8307175
    Abstract: Methods and systems to access data in a computer system independent of an operating environment of the computer system, including to recover data to a remote system, to overwrite data, and to copy data to a hidden partition. A management system may directly access a storage device of the computer system and communicate with the remote system over a data channel that is secure from an operating environment of the computer system. The management system may access the storage device on a block basis, using a device driver associated with a storage device controller, and may include a virtualization engine to access the storage device. The remote system may include logic to request meta-data, to identify disk blocks corresponding to files of interest from the meta-data, and to construct the files of interest from the disk blocks.
    Type: Grant
    Filed: June 26, 2009
    Date of Patent: November 6, 2012
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, Mojtaba Mojy Mirashrafi, Duncan Glendinning, Gyan Prakash
  • Patent number: 8286238
    Abstract: Methods and apparatuses enable in-memory patching of a program loaded in volatile memory. A service processor identifies a program to be patched and an associated patch for the program. The patch is loaded into memory, including applying relocation fix-ups to the patch. The service processor directs the program to the patch in place of the segment of the program to be patched. The program implements the patch while maintaining program state, and without suspending execution of the program.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: October 9, 2012
    Assignee: Intel Corporation
    Inventors: David M. Durham, Hormuzd M. Khosravi, Travis Schluessler, Ravi Sahita, Uday R. Savagaonkar
  • Patent number: 8281387
    Abstract: A computer system includes a service partition, not directly accessible to a user, having a security agent to inspect data entering and exiting the computer system on a virtual private network (VPN) tunnel, and a service partition VPN unit to communicate with a VPN gateway. The computer system also includes a user partition, accessible to a user, having a user partition VPN unit to initiate construction of the VPN tunnel with the VPN gateway. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: October 2, 2012
    Assignee: Intel Corporation
    Inventors: Ajay Gupta, Jeong Yoon, Jesse Walker, Kapil Sood, Karanvir Grewal, Hormuzd M. Khosravi
  • Patent number: 8281043
    Abstract: A method, apparatus, system, and computer program product for enabling out-of-band access to storage devices through port-sharing hardware. Providing out-of-band access to storage devices enables system management functions to be performed when an operating system is non-functional as well as when the operating system is active. Storage commands originating with a management service can be interleaved with storage commands issued by the host operating system. The host operating system maintains ownership and control over its storage devices, but management activities can be performed while the host operating system is operational.
    Type: Grant
    Filed: July 14, 2010
    Date of Patent: October 2, 2012
    Assignee: Intel Corporation
    Inventors: David A. Edwards, Eng Hun Ooi, Venkat R. Gokulrangan, Hormuzd M. Khosravi, Chai Huat Gan
  • Publication number: 20120226903
    Abstract: Apparatuses, articles, methods, and systems for secure platform voucher service for software within an execution environment. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by authenticated, authorized and verified software components. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy to receive verification for any component. The verification or voucher helps assure to the remote entity that no malware running in the platform or on the network will have access to provisioned material. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the software component.
    Type: Application
    Filed: March 5, 2012
    Publication date: September 6, 2012
    Inventors: David Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long