Patents by Inventor Jasmeet Chhabra

Jasmeet Chhabra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10356060
    Abstract: Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file, displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device.
    Type: Grant
    Filed: October 19, 2015
    Date of Patent: July 16, 2019
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Publication number: 20180351941
    Abstract: An unmanned vehicle may be utilized to perform various tasks, such as delivering packages and picking up packages for delivery in coordination with a physical access control device. Authentication and authorization processes may be used to grant the unmanned vehicle access to a physical space controlled by a physical access control device. A subsystem of the unmanned vehicle and the physical access control device may both support execution of computer instructions in a protected execution environment. A protected execution environment may be configured to provide an attestation to a remote counterparty, receive a purported attestation associated with the counterparty, verify the purported attestation is authentic using a root of trust in common with the remote counterparty, and perform authentication and authorization routines in connection with access policies of the unmanned vehicle, the physical access control device, or both.
    Type: Application
    Filed: June 5, 2017
    Publication date: December 6, 2018
    Inventor: Jasmeet Chhabra
  • Patent number: 10083304
    Abstract: Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: September 25, 2018
    Assignee: Intel Corporation
    Inventors: Jasmeet Chhabra, Ned M. Smith, Micah J. Sheller, Nathan Heldt-Sheller
  • Publication number: 20170374113
    Abstract: A communication system may include a plurality of geographically proximate nodes that communicate via one or more range-limited wireless technologies such as BLUETOOTH® low energy (BLE). An origin node may generate and communicate a first message responsive to detecting an event occurrence. The message may include an identifier associated with the origin node, data indicative of the event occurrence, a hop count, a maximum hop count, and a number of designated recipient nodes within the communication system. A first designated recipient node may, upon receiving the first message, attempt to confirm the event occurrence included in the first message. Upon confirming the event occurrence, the first designated recipient node may communicate a notification to an external third party. If unable to confirm the event occurrence, the first designated recipient node may generate and communicate a second message to a second designated recipient node included in the first message.
    Type: Application
    Filed: June 27, 2016
    Publication date: December 28, 2017
    Applicant: INTEL CORPORATION
    Inventors: CORY J. BOOTH, ADAM JORDAN, MICHAEL J. PAYNE, ALEXANDRA C. ZAFIROGLU, JOSHUA EKANDEM, JASMEET CHHABRA
  • Publication number: 20170359333
    Abstract: Generally, this disclosure provides devices, systems, methods and computer readable media for context based switching to a secure OS environment including cloud based data synchronization and filtration. The device may include a storage controller to provide access to the secure OS stored in an initially provisioned state; a context determination module to monitor web site access, classify a transaction between the device and the website and identify a match between the web site and a list of web sites associated with secure OS operation or a match between the transaction classification and a list of transaction types associated with secure OS operation; and an OS switching module to switch from a main OS to the secure OS in response to the identified match. The switch may include updating state data associated with the secure OS, the state data received from a secure cloud-based data synchronization server.
    Type: Application
    Filed: August 1, 2017
    Publication date: December 14, 2017
    Applicant: Intel Corporation
    Inventors: Faraz A. Siddiqi, Jasmeet Chhabra
  • Publication number: 20170302509
    Abstract: A mechanism is described for facilitating dynamic and trusted cloud-based extension upgrades for computing systems according to one embodiment of the invention. A method of embodiments of the invention includes detecting a computing device needing an upgrade. The upgrade may relate to a hardware component at the computing device needing an upgrade element for the upgrade. The method may further include calling a first cloud server to provide the upgrade over a network. The first cloud server may have first resources including the upgrade element. The method may further include facilitating the hardware component to access the upgrade element at the first cloud server without having to upgrade or replace the hardware component.
    Type: Application
    Filed: March 2, 2017
    Publication date: October 19, 2017
    Inventor: Jasmeet CHHABRA
  • Publication number: 20170289159
    Abstract: Methods and apparatus to support secure Wi-Fi AP protocols are disclosed. An example method includes in response to receiving a request from a computing device to connect to a network, limiting, with a processor of a Wi-Fi access point, access of the computing device to the network to connect to a server; authenticating, with the processor of the Wi-Fi access point, the computing device based on data received from the server; and expanding, with the processor of the Wi-Fi access point, the access of the computing device to connect to the network.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Farid Adrangi, Jasmeet Chhabra
  • Publication number: 20170262341
    Abstract: A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present.
    Type: Application
    Filed: March 27, 2017
    Publication date: September 14, 2017
    Inventors: Selim Aissi, Hani Elgebaly, Venkat Gokulrangan, Ayeshwarya B. Mahajan, Jasmeet Chhabra
  • Publication number: 20170169231
    Abstract: Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.
    Type: Application
    Filed: February 28, 2017
    Publication date: June 15, 2017
    Inventors: Jasmeet Chhabra, Ned M. Smith, Micah J. Sheller, Nathan Heldt-Sheller
  • Patent number: 9667493
    Abstract: A mechanism is described for facilitating dynamic and trusted cloud-based extension upgrades for computing systems according to one embodiment of the invention. A method of embodiments of the invention includes detecting a computing device needing an upgrade. The upgrade may relate to a hardware component at the computing device needing an upgrade element for the upgrade. The method may further include calling a first cloud server to provide the upgrade over a network. The first cloud server may have first resources including the upgrade element. The method may further include facilitating the hardware component to access the upgrade element at the first cloud server without having to upgrade or replace the hardware component.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: May 30, 2017
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Patent number: 9612915
    Abstract: A method, apparatus, and system are disclosed. In one embodiment, the method determines whether one or more manageability conditions are present in a computer system, and then invokes an out-of-service manageability remediation environment stored within a portion of a flash device in the computer system when one or more manageability conditions are present.
    Type: Grant
    Filed: January 23, 2014
    Date of Patent: April 4, 2017
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Hani Elgebaly, Venkat Gokulrangan, Ayeshwarya B. Mahajan, Jasmeet Chhabra
  • Patent number: 9509677
    Abstract: A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: November 29, 2016
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Publication number: 20160180078
    Abstract: Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Jasmeet Chhabra, Ned M. Smith, Micah J. Sheller, Nathan Heldt-Sheller
  • Publication number: 20160072788
    Abstract: A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
    Type: Application
    Filed: November 13, 2015
    Publication date: March 10, 2016
    Inventor: Jasmeet Chhabra
  • Publication number: 20160044008
    Abstract: Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file, displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device.
    Type: Application
    Filed: October 19, 2015
    Publication date: February 11, 2016
    Inventor: Jasmeet Chhabra
  • Patent number: 9236911
    Abstract: Technologies for securely transferring whiteboard content data from a smart whiteboard device to another smart whiteboard device are disclosed. The smart whiteboard device may securely transfer the whiteboard content data to a mobile device. In response to receiving the whiteboard content data from the smart whiteboard device, the mobile device may transfer the received whiteboard content data to the other smart whiteboard device. The other smart whiteboard device may display the transferred whiteboard content data and enable manipulation thereof.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: January 12, 2016
    Assignee: Intel Corporation
    Inventors: Erik J. Johnson, Jasmeet Chhabra, Rita H. Wouhaybi
  • Patent number: 9219725
    Abstract: A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 8, 2014
    Date of Patent: December 22, 2015
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Patent number: 9166959
    Abstract: Systems and methods may provide for implementing a secure communication using physical proximity. In one example, the method may include transmitting an encrypted first communication including a sensitive information file, decrypting the encrypted first communication to generate a decrypted first communication including the sensitive information file, displaying the decrypted first communication, capturing a version of the decrypted first communication displayed on the intermediary device, and extracting the sensitive information file at a user device.
    Type: Grant
    Filed: March 31, 2012
    Date of Patent: October 20, 2015
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Patent number: 9141946
    Abstract: Systems and methods may provide for implementing a dynamic payment service. In one example, the method may generate a request communication including purchase detail information relating to an item to request credit from a vendor to conduct a transaction relating to the item, determine a scope of credit to be issued to conduct the transaction relating to the item based on the purchase detail information, and generate a payment communication including the transaction information to complete the transaction relating to the item.
    Type: Grant
    Filed: April 17, 2012
    Date of Patent: September 22, 2015
    Assignee: Intel Corporation
    Inventors: Eli Kupermann, Jasmeet Chhabra, Irena Riji, Sanjay Bakshi
  • Publication number: 20150195127
    Abstract: A mechanism is described for facilitating dynamic and trusted cloud-based extension upgrades for computing systems according to one embodiment of the invention. A method of embodiments of the invention includes detecting a computing device needing an upgrade. The upgrade may relate to a hardware component at the computing device needing an upgrade element for the upgrade. The method may further include calling a first cloud server to provide the upgrade over a network. The first cloud server may have first resources including the upgrade element. The method may further include facilitating the hardware component to access the upgrade element at the first cloud server without having to upgrade or replace the hardware component.
    Type: Application
    Filed: February 3, 2015
    Publication date: July 9, 2015
    Inventor: Jasmeet CHHABRA