Patents by Inventor Hormuzd M. Khosravi

Hormuzd M. Khosravi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8214902
    Abstract: An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine, independently of the operating system and the host processor, the authenticity of signature list information, based at least in part upon authentication information received by the circuitry from a remote server. The circuitry also may be to determine, independently of the operating system and the host processor, based at least in part upon comparison of at least one portion of the signature list information with at least one portion of contents of the memory, whether authorized and/or malicious data are present in the at least one portion of the contents of the memory. Of course, many variations, modifications, and alternatives are possible without departing from this embodiment.
    Type: Grant
    Filed: June 19, 2009
    Date of Patent: July 3, 2012
    Assignee: Intel Corporation
    Inventors: Hormuzd M. Khosravi, Vincent E. Von Bokern, Men Long
  • Publication number: 20120159137
    Abstract: In some embodiments, the invention involves a method and apparatus for secure/authenticated local boot of a host operating system on a computing platform using active management technology (AMT) with a third party data store (3PDS)-based ISO firmware image. A portion of non-volatile memory is hardware secured against access by the host processor and OS, and accessible only to the AMT. The AMT comprises an AT/ATAPI protocol emulator to access an ISO boot image from secured memory, while appearing to the host processor as a communication with an AT/ATAPI device. Other embodiments are described and claimed.
    Type: Application
    Filed: December 16, 2010
    Publication date: June 21, 2012
    Inventors: Hormuzd M. Khosravi, Divya Naidu Kolar Sundar, David M. Durham
  • Publication number: 20120131345
    Abstract: Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key.
    Type: Application
    Filed: November 22, 2010
    Publication date: May 24, 2012
    Inventors: Saurabh Dadu, Rajesh Poornachandran, Gyan Prakash, Selim Aissi, Hormuzd M. Khosravi
  • Publication number: 20120117348
    Abstract: Techniques for a data storage device to locally implement security management functionality. In an embodiment, a security management process of the data storage device is to determine whether an access to non-volatile media of the data storage device is authorized. In certain embodiments, the data storage device is to restrict access to a secure region of the non-volatile storage media, the secure region to store information used and/or generated by a security management process of the data storage device.
    Type: Application
    Filed: November 8, 2010
    Publication date: May 10, 2012
    Inventors: Nicholas D. Triantafillou, Paritosh Saxena, Robert W. Strong, Richard J. Heiler, Eliezer Tamir, Simoni Ben-Michael, Brad W. Stewart, Akshay R. Kadam, Men Long, James T. Doyle, Hormuzd M. Khosravi, Lokpraveen B. Mosur, Edward J. Pullin, Paul S. Schmitz, Carol L. Barrett, Paul J. Thadikaran
  • Patent number: 8132003
    Abstract: Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy in order to receive verification proof for any component in the platform. The verification proof or voucher helps to assure to the remote entity that no man-in-the-middle, rootkit, spyware or other malware running in the platform or on the network will have access to the provisioned material.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: March 6, 2012
    Assignee: Intel Corporation
    Inventors: David Durham, Hormuzd M. Khosravi, Uri Blumenthal, Men Long
  • Publication number: 20120017011
    Abstract: A method, apparatus, system, and computer program product for enabling out-of-band access to storage devices through port-sharing hardware. Providing out-of-band access to storage devices enables system management functions to be performed when an operating system is non-functional as well as when the operating system is active. Storage commands originating with a management service can be interleaved with storage commands issued by the host operating system. The host operating system maintains ownership and control over its storage devices, but management activities can be performed while the host operating system is operational.
    Type: Application
    Filed: July 14, 2010
    Publication date: January 19, 2012
    Inventors: David A. Edwards, Eng Hun Ooi, Venkat R. Gokulrangan, Hormuzd M. Khosravi, Chai Huat Gan
  • Publication number: 20110289306
    Abstract: A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an in-band processor configured to execute an operating system and at least one host driver, communication circuitry configured to communicate with a remote server, and an out-of-band (OOB) processor capable of communicating with the remote server using the communication circuitry irrespective of the state of the operating system. The OOB processor may be configured to receive a block read request from the remote server, instruct the at least one host driver to send a storage command to a data storage device, receive data retrieved from the data storage device and authentication metadata generated by the data storage device, and transmit the data and the authentication metadata to the remote server.
    Type: Application
    Filed: May 21, 2010
    Publication date: November 24, 2011
    Inventors: Hormuzd M. Khosravi, David A. Edwards, Venkat R. Gokulrangan, Yasser Rasheed
  • Publication number: 20110161551
    Abstract: A system reserves and manages a hidden service partition through components of the hardware platform of a computing device. The hidden partition is not accessible by way of a host operating system on the computing device. A hardware platform controller provisions a portion of nonvolatile storage through configuration settings of the hardware platform controller. When the host system requests settings related to storage in the system, the request is routed through the interfaces of the hardware platform, and the hardware platform controller reports in accordance with the configuration settings, hiding the service partition. The hidden partition is dynamically modifiable through secure remote access to the hardware platform controller, not through the host system such as operating system or BIOS.
    Type: Application
    Filed: December 27, 2009
    Publication date: June 30, 2011
    Applicant: Intel Corporation
    Inventors: Hormuzd M. Khosravi, Yasser Rasheed, Venkat R. Gokulrangan
  • Publication number: 20110154316
    Abstract: In accordance with some embodiments, software may be downloaded to an end point, even when that said end point is not fully functional. An indication that software is available for distribution may be stored in a dedicated location within a non-volatile memory. That location may be checked for software to download, for example, on each boot up. The software may then be downloaded and verified. Thereafter, the location is marked to indicate that the software has already been downloaded.
    Type: Application
    Filed: December 21, 2009
    Publication date: June 23, 2011
    Inventors: Hormuzd M. Khosravi, Ajith K. Illendula, Ned M. Smith, Yasser Rasheed, Bryan K. Jorgensen, Tracie L. Zenti
  • Publication number: 20110153725
    Abstract: Embodiments of the present disclosure provide methods and computing devices configured to establish secure out-of-band storage control. In various embodiments, a management module in a client device may be used to communicate with a server device independent of an operating system of the client device, to facilitate remote storage services. Other embodiments may be disclosed and claimed.
    Type: Application
    Filed: December 23, 2009
    Publication date: June 23, 2011
    Inventors: David A. Edwards, Hormuzd M. Khosravi, Yasser Rasheed, Divya Naidu Kolar Sunder, Joseph E. Clark
  • Publication number: 20110145558
    Abstract: A management engine may be used to trap configuration cycles during the boot process and thereafter in response to operating system enumeration. As a result, a virtual bus device can be created. The bus device may be used to provision software to the platform even when the operating system is corrupted or non-functional.
    Type: Application
    Filed: December 14, 2009
    Publication date: June 16, 2011
    Inventors: Hormuzd M. Khosravi, Ajith K. Illendula, Ned M. Smith, Yasser Rasheed, Tracie L. Zenti, Bryan K. Jorgensen
  • Publication number: 20110131447
    Abstract: A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted.
    Type: Application
    Filed: November 30, 2009
    Publication date: June 2, 2011
    Inventors: Gyan Prakash, Saurabh Dadu, Selim Aissi, Hormuzd M. Khosravi, Duncan Glendinning, Cris Rhodes
  • Publication number: 20110107423
    Abstract: A computer platform may support anti-virus agents that may be provided access to directly scan the memory. The computer platform may comprise a platform control hub, which may comprise a manageability engine and a virtualizer engine, wherein the manageability engine may allow the anti-virus agents to be downloaded to a platform hardware space that is isolated from an operating system. The manageability engine may authenticate the anti-virus agents and provide an access for the anti-virus agents to directly scan a memory or a storage device coupled to the platform hardware.
    Type: Application
    Filed: October 30, 2009
    Publication date: May 5, 2011
    Inventors: Divya Naidu Kolar Sunder, David M. Durham, Hormuzd M. Khosravi
  • Publication number: 20110107355
    Abstract: Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system for management of one or more host device drivers from an isolated execution environment. Further embodiments include methods for querying and receiving event data from manageable resources on a host device. Further embodiments include data structures for the reporting of event data from one or more host device drivers to one or more capability modules.
    Type: Application
    Filed: January 10, 2011
    Publication date: May 5, 2011
    Inventors: David M. Durham, Tisson Mathew, Travis Schluessler, Priva Rajagopal, Hormuzd M. Khosravi
  • Publication number: 20110078791
    Abstract: A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system.
    Type: Application
    Filed: September 25, 2009
    Publication date: March 31, 2011
    Inventors: Gyan Prakash, Saurabh Dadu, Hormuzd M. Khosravi, Mousumi M. Hazra
  • Publication number: 20110078799
    Abstract: In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service.
    Type: Application
    Filed: February 17, 2010
    Publication date: March 31, 2011
    Inventors: Ravi L. Sahita, David M. Durham, Steve Orrin, Yasser Rasheed, Prasanna G. Mulgaonkar, Paul S. Schmitz, Hormuzd M. Khosravi
  • Patent number: 7870565
    Abstract: Systems and methods are described herein to provide for secure host resource management on a computing device. Other embodiments include apparatus and system for management of one or more host device drivers from an isolated execution environment. Further embodiments include methods for querying and receiving event data from manageable resources on a host device. Further embodiments include data structures for the reporting of event data from one or more host device drivers to one or more capability modules.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: January 11, 2011
    Assignee: Intel Corporation
    Inventors: David M. Durham, Tisson Mathew, Travis Schluessler, Priya Rajagopal, Hormuzd M. Khosravi
  • Patent number: 7865683
    Abstract: Embodiments of apparatuses, articles, methods, and systems for associating identifiers with memory locations for controlling memory accesses are generally described herein. Other embodiments may be described and claimed.
    Type: Grant
    Filed: June 25, 2010
    Date of Patent: January 4, 2011
    Assignee: Intel Corporation
    Inventors: David Durham, Ravi Sahita, Uday R. Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi
  • Publication number: 20100332744
    Abstract: Methods and systems to access data in a computer system independent of an operating environment of the computer system, including to recover data to a remote system, to overwrite data, and to copy data to a hidden partition. A management system may directly access a storage device of the computer system and communicate with the remote system over a data channel that is secure from an operating environment of the computer system. The management system may access the storage device on a block basis, using a device driver associated with a storage device controller, and may include a virtualization engine to access the storage device. The remote system may include logic to request meta-data, to identify disk blocks corresponding to files of interest from the meta-data, and to construct the files of interest from the disk blocks.
    Type: Application
    Filed: June 26, 2009
    Publication date: December 30, 2010
    Inventors: Hormuzd M. Khosravi, Mojtaba Mojy Mirashrafi, Duncan Glendinning, Gyan Prakash
  • Publication number: 20100325729
    Abstract: An embodiment may include circuitry that may be comprised in a host. The host may include memory and a host processor to execute an operating system. The circuitry may be to determine, independently of the operating system and the host processor, the authenticity of signature list information, based at least in part upon authentication information received by the circuitry from a remote server. The circuitry also may be to determine, independently of the operating system and the host processor, based at least in part upon comparison of at least one portion of the signature list information with at least one portion of contents of the memory, whether authorized and/or malicious data are present in the at least one portion of the contents of the memory. Of course, many variations, modifications, and alternatives are possible without departing from this embodiment.
    Type: Application
    Filed: June 19, 2009
    Publication date: December 23, 2010
    Inventors: Hormuzd M. Khosravi, Vincent E. Von Bokern, Men Long