Patents by Inventor Jasmeet Chhabra

Jasmeet Chhabra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130091590
    Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
    Type: Application
    Filed: November 26, 2012
    Publication date: April 11, 2013
    Inventors: Jasmeet Chhabra, Gyan Prakash
  • Publication number: 20130007466
    Abstract: Systems and methods of managing keystroke data in embedded keyboard environments may involve transferring a mode request from a management controller to an embedded controller of a keyboard via a dedicated communication channel. Keystroke activity can be detected at the keyboard, and keystroke data may be transferred from the embedded controller to the management controller via the dedicated communication channel in response to the keystroke activity and the mode request. In addition, the management controller may be used to encrypt the keystroke data, wherein the encrypted keystroke data can be transmitted from the management controller to an off-platform service via a network controller.
    Type: Application
    Filed: July 1, 2011
    Publication date: January 3, 2013
    Inventors: Nitin V. Sarangdhar, Jasmeet Chhabra
  • Patent number: 8317878
    Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 30, 2008
    Date of Patent: November 27, 2012
    Assignee: Intel Corporation
    Inventors: Jasmeet Chhabra, Gyan Prakash
  • Patent number: 8321916
    Abstract: An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
    Type: Grant
    Filed: December 19, 2008
    Date of Patent: November 27, 2012
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
  • Publication number: 20120284499
    Abstract: Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.
    Type: Application
    Filed: May 9, 2012
    Publication date: November 8, 2012
    Inventors: Gyan Prakash, Mousumi M. Hazra, Selim Aissi, Jasmeet Chhabra
  • Patent number: 8298295
    Abstract: A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: October 30, 2012
    Assignee: Intel Corporation
    Inventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
  • Publication number: 20120272057
    Abstract: In a computing device that includes a host operating system and a management engine separate from the host operating system, if the primary operating system is not operating, a management engine may obtain from a credential server via a first network connection logon information for a secured network and the management engine connects to the secure network through a secured connection using the logon information. If the operating system is operating the operating system provides the logon information to the management engine. Certificate verification may be performed by a remote server on behalf of the management engine. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: December 22, 2011
    Publication date: October 25, 2012
    Inventors: Jasmeet CHHABRA, Ranjit NARJALA, Amol KULKARNI, Michael BERGER
  • Patent number: 8234697
    Abstract: A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: July 31, 2012
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Patent number: 8181032
    Abstract: Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.
    Type: Grant
    Filed: May 13, 2008
    Date of Patent: May 15, 2012
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Mousumi M. Hazra, Selim Aissi, Jasmeet Chhabra
  • Patent number: 8091123
    Abstract: In a computing device that includes a host operating system and a management engine separate from the host operating system, if the primary operating system is not operating, a management engine may obtain from a credential server via a first network connection logon information for a secured network and the management engine connects to the secure network through a secured connection using the logon information. If the operating system is operating the operating system provides the logon information to the management engine. Certificate verification may be performed by a remote server on behalf of the management engine. Other embodiments are disclosed and claimed.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: January 3, 2012
    Assignee: Intel Corporation
    Inventors: Jasmeet Chhabra, Ranjit Narjala, Amol Kulkarni, Michael Berger
  • Patent number: 7870382
    Abstract: An auditable and track-able key distribution and installation method and system for wireless networks. The method includes registering an installation device and writing a one time use key to the installation device. When an installer installs nodes onto a network, with each installation of a node, the one time use key is read by the node using the installation device to enable the node to be authenticated onto the network and the one time use key on the installation device is overwritten with another one time use key for installing the next node onto the network. After the nodes have been installed, an installation closeout and audit process is performed to make sure that none of the one time use keys have been stolen or copied.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: January 11, 2011
    Assignee: Intel Corporation
    Inventor: Jasmeet Chhabra
  • Publication number: 20100169965
    Abstract: A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed.
    Type: Application
    Filed: December 30, 2008
    Publication date: July 1, 2010
    Inventors: Jasmeet Chhabra, Gyan Prakash
  • Publication number: 20100162368
    Abstract: An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible.
    Type: Application
    Filed: December 19, 2008
    Publication date: June 24, 2010
    Inventors: Selim Aissi, Jasmeet Chhabra, Gyan Prakash
  • Publication number: 20100082955
    Abstract: In general, in one aspect, the disclosure describes an apparatus that includes updatable non-volatile memory to store firmware and non-updateable non-volatile memory to store an interrupt sequence. The apparatus includes a chip interface to receive an interrupt instruction from management firmware. Receipt of the interrupt instruction controls access to and initiation of the interrupt sequence. After initiation of the interrupt sequence the apparatus may receive a firmware update and/or validate the firmware is from a valid source. The validation of the firmware may include utilizing the management firmware to verify the cryptographic signature for the firmware.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Inventors: Jasmeet Chhabra, Mazen Gedeon, Sanjay Bakshi, Eli Kupermann
  • Publication number: 20100023782
    Abstract: Key-to-policy association and hardware-based policy enforcement for file/folder encryption (FFE) and/or full-disk encryption (FDE) are provided. A CPU independent microprocessor (CIM) is coupled to a platform and provides a secure storage service, secure non-volatile storage, secure policy enforcement engine, and system interface for communication with platform components independent of the CPU. The CIM stores a key and its associated policies by generating a hardware-derived key to wrap the key prior to securely storing it in non-volatile storage on the CIM. Upon receiving a request for key-access by an application, policy status and credentials are verified before the key is returned.
    Type: Application
    Filed: December 21, 2007
    Publication date: January 28, 2010
    Inventors: Gyan Prakash, Selim Aissi, Jasmeet Chhabra, Tobias Kohlenberg
  • Publication number: 20090292924
    Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.
    Type: Application
    Filed: September 12, 2008
    Publication date: November 26, 2009
    Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
  • Publication number: 20090287938
    Abstract: Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices.
    Type: Application
    Filed: May 13, 2008
    Publication date: November 19, 2009
    Inventors: Gyan Prakash, Mousumi M. Hazra, Selim Aissi, Jasmeet Chhabra
  • Publication number: 20090282265
    Abstract: A method of preventing access of data in a node quickly and securely when the node is lost or stolen. The data is first encrypted using an encryption algorithm with a cryptographic key-material. Heuristic methods of detecting un-authorized access to the node are implemented to generate a theft-trigger. The theft-trigger is received and sent to a central authority. The validity of the trigger is verified and the central authority sends an acknowledgement of the trigger. When approval is given from the central authority, access to the data is prevented by deleting or concealing some cryptographic key-material.
    Type: Application
    Filed: May 7, 2008
    Publication date: November 12, 2009
    Inventors: Selim Aissi, Gyan Prakash, Jasmeet Chhabra
  • Publication number: 20090249463
    Abstract: In a computing device that includes a host operating system and a management engine separate from the host operating system, if the primary operating system is not operating, a management engine may obtain from a credential server via a first network connection logon information for a secured network and the management engine connects to the secure network through a secured connection using the logon information. If the operating system is operating the operating system provides the logon information to the management engine. Certificate verification may be performed by a remote server on behalf of the management engine. Other embodiments are disclosed and claimed.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Inventors: Jasmeet Chhabra, Ranjit Narjala, Amol Kulkarni, Michael Berger
  • Publication number: 20090249462
    Abstract: A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
    Type: Application
    Filed: March 31, 2008
    Publication date: October 1, 2009
    Inventor: Jasmeet CHHABRA