Patents by Inventor Jason Martin

Jason Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140205085
    Abstract: In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical with ECB encryption. The injection of noise may include modifying pixel values for at least a subset of pixels in the bitmap. The pixel values may be modified by using a counter, a known modification pattern, or a random number generator. The bitmap may be analyzed to determine how the bitmap can be modified to maximize the randomness of the bitmap while ensuring that the noisy bitmap is visually perceptually similar when presented. The noise may be injected into a block of pixels prior to the block being encrypted.
    Type: Application
    Filed: December 30, 2011
    Publication date: July 24, 2014
    Inventors: Scott Janus, Jason Martin, UDAY Savagaonkar
  • Publication number: 20140189356
    Abstract: A method of enforcing a virtual corporate boundary may include a client device requesting sensitive content from a network site on a server device responsive to a user's interaction with the client device. The server device can determine whether the user and/or client device are permitted to access the sensitive content. A secure element on the client device can establish a session key between the server device and the client device. The server device can render the sensitive content and send it to the client device, which can display the content to the user.
    Type: Application
    Filed: December 29, 2011
    Publication date: July 3, 2014
    Applicant: Intel Corporation
    Inventors: Vinay Phegade, Jason Martin, Reshma Lal, Micah Sheller, Tobias Kohlenberg
  • Publication number: 20140189807
    Abstract: Methods, systems and apparatus are disclosed to facilitate client-based authentication. An example method includes associating an identity authority with a client platform in an isolated execution environment, associating a user identity with the identity authority, generating a first key pair associated with a first service provider, generating an attestation based on a first authorization sequence of the client platform, and signing the attestation with a portion of the key pair and sending the signed attestation to the first service provider to authorize communication between the client platform and the first service provider.
    Type: Application
    Filed: November 18, 2011
    Publication date: July 3, 2014
    Inventors: Conor P. Cahill, Vinay Phegade, Jason Martin, Anand Rajan, Nikhil M. Deshpande, Radia Perlman
  • Publication number: 20140181925
    Abstract: In an embodiment, a security engine of a processor includes an identity provider logic to generate a first key pair of a key pairing associating system user and a service provider that provides a web service and having a second system coupled to the system via a network, to perform a secure communication with the second system to enable the second system to verify that the identity provider logic is executing in a trusted execution environment, and responsive to the verification, to send a first key of the first key pair to the second system. This key may enable the second system to verify an assertion communicated by the identity provider logic that the user has been authenticated to the system according to a multi-factor authentication. Other embodiments are described and claimed.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: Ned M. Smith, Conor P. Cahill, Victoria C. Moore, Jason Martin, Micah J. Sheller
  • Publication number: 20140179698
    Abstract: The present invention relates to compounds of formula I or pharmaceutically acceptable salts thereof: wherein R1, R2, R3, A, Q, W and X are as defined in the description. These compounds selectively modulate, regulate, and/or inhibit signal transduction mediated by certain native and/or mutant protein kinases implicated in a variety of human and animal diseases such as cell proliferative, metabolic, allergic, and degenerative disorders. More particularly, these compounds are potent and selective native and/or mutant c-kit inhibitors.
    Type: Application
    Filed: July 24, 2012
    Publication date: June 26, 2014
    Applicant: AB SCIENCE
    Inventors: Abdellah Benjahad, Alain Moussy, Emmanuel Chevenier, Willy Picoul, Anne Lermet, Didier Pez, Jason Martin, Franck Sandrinelli
  • Publication number: 20140157410
    Abstract: In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments.
    Type: Application
    Filed: November 30, 2012
    Publication date: June 5, 2014
    Inventors: Prashant Dewan, Uday R. Savagaonkar, David M. Durham, Paul S. Schmitz, Jason Martin, Michael Goldsmith, Ravi L. Sahita, Frank X McKeen, Carlos Rozas, Vembu Balaji, Scott Janus, Geoffrey S. Strongin, Xiaozhu Kang, Karanvir S. Grewal, Siddhartha Chhabra, Alpha T. Narendra Trivedi
  • Publication number: 20140157404
    Abstract: Embodiments of an invention for virtualizing a hardware monotonic counter are disclosed. In one embodiment, an apparatus includes a hardware monotonic counter, virtualization logic, a first non-volatile storage location, and a second non-volatile storage location. The virtualization logic is to create a virtual monotonic counter from the hardware monotonic counter. The first non-volatile storage location is to store an indicator that the count of the hardware monotonic counter has changed. The second non-volatile storage location is to store an indicator that the count of the virtual monotonic counter has changed.
    Type: Application
    Filed: November 30, 2012
    Publication date: June 5, 2014
    Inventors: Siddhartha Chhabra, Reshma Lal, Jason Martin, Daniel Nemiroff
  • Publication number: 20140157349
    Abstract: Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.
    Type: Application
    Filed: November 30, 2012
    Publication date: June 5, 2014
    Inventors: Scott H. Robinson, Jason Martin, Howard C. Herbert, Michael LeMay, Karanvir Ken S. Grewal, Keith L. Shippy, Geoffrey Strongin
  • Publication number: 20140123235
    Abstract: Enabling access control caches for co-processors to be charged using a VMX-nonroot instruction. As a result a transition to VMX-root is not needed, saving the cycles involved in such a transition.
    Type: Application
    Filed: December 28, 2011
    Publication date: May 1, 2014
    Inventors: Prashant Dewan, Jason Martin, Uday R. Savagaonkar, Carlos V. Rozas
  • Patent number: 8696286
    Abstract: A pivoting hub nut, or hub clamp, for manually securing an object to a rotatable shaft provides a first hub defining a first radial slot and a second hub pivotally attached to the first hub defining a second radial slot. A first handle extends from the first hub, and a second handle extends from the second hub. A latch is disposed on the clamp for selectively locking the clamp in a closed position. An axial bore is defined along the centerline, or hub axis of rotation, of the clamp. The clamp includes a threaded region facing the axial bore for engaging corresponding threads on the shaft. Upon installation of the clamp onto the shaft, the clamp can be rotated relative to the shaft in a closed position for adjusting the longitudinal, or axial, placement of the clamp on the shaft, and the clamp can be tightened against a wheel rim or other object for securing the object on the shaft.
    Type: Grant
    Filed: September 17, 2010
    Date of Patent: April 15, 2014
    Assignee: Hennessy Industries, Inc.
    Inventor: Jason Martin
  • Publication number: 20140096068
    Abstract: A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Prashant Dewan, Siddhartha Chhabra, Xiaozhu Kang, Xiaoning Li, Uday R. Savagaonkar, David M. Durham, Paul S. Schmitz, Michael A. Goldsmith, Jason Martin
  • Patent number: 8685753
    Abstract: Methods are provided for detecting and optionally quantitating multiple analytes, including nucleic acid and/or polypeptide analytes, in particle-based assays that can be highly multiplexed. Compositions, systems, and kits related to the methods are also featured.
    Type: Grant
    Filed: January 10, 2012
    Date of Patent: April 1, 2014
    Assignee: Affymetrix, Inc.
    Inventors: Jason Martin, Quan Ngoc Nguyen
  • Patent number: D690696
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: October 1, 2013
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D690697
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: October 1, 2013
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D690698
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: October 1, 2013
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D690699
    Type: Grant
    Filed: June 12, 2012
    Date of Patent: October 1, 2013
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D702235
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: April 8, 2014
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D708622
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: July 8, 2014
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D709077
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: July 15, 2014
    Assignee: Wacom Co., Ltd
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato
  • Patent number: D709078
    Type: Grant
    Filed: February 27, 2012
    Date of Patent: July 15, 2014
    Assignee: Wacom Co., Ltd.
    Inventors: Carl Jonsson, Jason Martin, Patrick Triato, Nobuyuki Akita