Patents by Inventor Jayesh Desai

Jayesh Desai has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190042732
    Abstract: Technologies for USB controller state integrity protection are disclosed. A computing device reserves an isolated memory region in system memory and programs a base address register of a USB controller with the address of the isolated memory region. The computing device locks the base address register from further chances. The USB controller may store controller state data in a scratchpad buffer located within the isolated memory region. Software executed by a processor may read controller state data from the scratchpad buffer. Secure routing hardware of the computing device controls access to the isolated memory region. The secure routing hardware may allow read and write access by the USB controller and read-only access by software executed by the processor. After storing the controller state data, the computing device may power down the I/O controller. Other embodiments are described and claimed.
    Type: Application
    Filed: December 28, 2017
    Publication date: February 7, 2019
    Inventors: Soham Jayesh Desai, Pradeep Pappachan, Reshma Lal, Siddhartha Chhabra
  • Publication number: 20190042800
    Abstract: Technologies for USB device policy enforcement include a computing device having a USB controller and secure enclave support. On boot, a firmware enclave randomly generates a binding identity and then securely provisions the binding identity to the USB controller. The firmware enclave also seals the binding identity to a policy enforcement enclave. At runtime, the policy enforcement enclave unseals the binding identity and includes the binding identity in a policy enforcement command sent to the USB controller. The USB controller verifies that the binding identity included in the command matches the binding identity that was previously provisioned. If the binding identities are successfully verified, the USB controller enforces the command. The USB controller may block data transfers or device configuration changes for one or more specified devices. Each of the firmware enclave and the policy enforcement enclave are trusted execution environments. Other embodiments are described and claimed.
    Type: Application
    Filed: December 6, 2017
    Publication date: February 7, 2019
    Inventors: Soham Jayesh Desai, Reshma Lal, Pradeep Pappachan, David Hines
  • Publication number: 20190042805
    Abstract: Technologies for secure enumeration of USB devices include a computing device having a USB controller and a trusted execution environment (TEE). The TEE may be a secure enclave protected secure enclave support of the processor. In response to a USB device connecting to the USB controller, the TEE sends a secure command to the USB controller to protect a device descriptor for the USB device. The secure command may be sent over a secure channel to a static USB device. A driver sends a get device descriptor request to the USB device, and the USB device responds with the device descriptor. The USB controller redirects the device descriptor to a secure memory buffer, which may be located in a trusted I/O processor reserved memory region. The TEE retrieves and validates the device descriptor. If validated, the TEE may enable the USB device for use. Other embodiments are described and claimed.
    Type: Application
    Filed: January 11, 2018
    Publication date: February 7, 2019
    Inventors: Soham Jayesh Desai, Reshma Lal, Pradeep Pappachan, Bin Xing
  • Patent number: 10198600
    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
    Type: Grant
    Filed: September 19, 2017
    Date of Patent: February 5, 2019
    Assignee: Intel Corporation
    Inventors: Jeffrey C. Sedayao, Ivan Jibaja, Srikanth Varadarajan, Reshma Lal, Soham Jayesh Desai
  • Publication number: 20180004982
    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
    Type: Application
    Filed: September 19, 2017
    Publication date: January 4, 2018
    Applicant: Intel Corporation
    Inventors: JEFFREY C. SEDAYAO, IVAN JIBAJA, SRIKANTH VARADARAJAN, RESHMA LAL, SOHAM JAYESH DESAI
  • Publication number: 20170364688
    Abstract: Technologies for trusted I/O include a computing device having a hardware cryptographic agent, a cryptographic engine, and an I/O controller. The hardware cryptographic agent intercepts a message from the I/O controller and identifies boundaries of the message. The message may include multiple DMA transactions, and the start of message is the start of the first DMA transaction. The cryptographic engine encrypts the message and stores the encrypted data in a memory buffer. The cryptographic engine may skip and not encrypt header data starting at the start of message or may read a value from the header to determine the skip length. In some embodiments, the cryptographic agent and the cryptographic engine may be an inline cryptographic engine. In some embodiments, the cryptographic agent may be a channel identifier filter, and the cryptographic engine may be processor-based. Other embodiments are described and claimed.
    Type: Application
    Filed: June 20, 2017
    Publication date: December 21, 2017
    Inventors: Soham Jayesh Desai, Siddhartha Chhabra, Bin Xing, Pradeep M. Pappachan, Reshma Lal
  • Patent number: 9767324
    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
    Type: Grant
    Filed: November 22, 2014
    Date of Patent: September 19, 2017
    Assignee: INTEL CORPORATION
    Inventors: Jeffrey C Sedayao, Ivan Jibaja, Srikanth Varadarajan, Reshma Lal, Soham Jayesh Desai
  • Publication number: 20160147982
    Abstract: The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
    Type: Application
    Filed: November 22, 2014
    Publication date: May 26, 2016
    Applicant: Intel Corporation
    Inventors: JEFFREY C. SEDAYAO, IVAN JIBAJA, SRIKANTH VARADARAJAN, RESHMA LAL, SOHAM JAYESH DESAI
  • Patent number: 8139698
    Abstract: A system and method utilize a dual correlation, one for the synchronization pattern (sync correlation) and one for the channel equalization pattern (CE correlation), to determine where the channel equalization pattern starts and thus establish frame synchronization. The system and method compare the two correlations and decides on the start of the channel equalization symbols when the CE correlation is larger than the sync correlation.
    Type: Grant
    Filed: May 6, 2008
    Date of Patent: March 20, 2012
    Assignee: Sigma Designs, Inc.
    Inventors: Catherine A. French, Jayesh Desai
  • Patent number: 7986736
    Abstract: An ultra wideband receiver, based on multiband orthogonal frequency division multiplexing (MB-OFDM), combines digital data from multiple channels after signal processing and before decoding. The receiver provides a master controller that synthesizes packet synchronization, frame synchronization, and sampling frequency offset information from multiple channels into signals that simultaneously control all channels of the receiver.
    Type: Grant
    Filed: August 28, 2006
    Date of Patent: July 26, 2011
    Assignee: Sigma Designs, Inc.
    Inventors: Hung C. Nguyen, Catherine A. French, Jayesh Desai, Ruoyang Lu, Ali D. Pirooz
  • Publication number: 20090257483
    Abstract: A system and method utilize a dual correlation, one for the synchronization pattern (sync correlation) and one for the channel equalization pattern (CE correlation), to determine where the channel equalization pattern starts and thus establish frame synchronization. The system and method compare the two correlations and decides on the start of the channel equalization symbols when the CE correlation is larger than the sync correlation.
    Type: Application
    Filed: May 6, 2008
    Publication date: October 15, 2009
    Inventors: Catherine A. French, Jayesh Desai
  • Patent number: 7551907
    Abstract: The invention enables automatic gain control in ultra wideband applications over multiple channels and frequency bands.
    Type: Grant
    Filed: June 8, 2006
    Date of Patent: June 23, 2009
    Assignee: Sigma Designs, Inc.
    Inventors: Catherine A. French, Ruoyang Lu, Jayesh Desai, Can Tri Nguyen, Hung C. Nguyen, John Tero
  • Patent number: 7542516
    Abstract: A method is presented for packet detection and symbol boundary location using a two-step sign correlation procedure. When the correlation crosses a threshold, a packet detection signal is generated to initiate processing of downstream blocks, and a symbol boundary location signal is generated for use in aligning data during processing.
    Type: Grant
    Filed: November 28, 2005
    Date of Patent: June 2, 2009
    Assignee: Sigma Designs, Inc.
    Inventors: Ali D. Pirooz, Catherine A. French, Jayesh Desai, Hung C. Nguyen
  • Publication number: 20070058736
    Abstract: An ultra wideband receiver combines digital data from multiple channels after signal processing and before decoding and provides a master controller that combines control signals from multiple channels to control the receiver.
    Type: Application
    Filed: August 28, 2006
    Publication date: March 15, 2007
    Inventors: Hung Nguyen, Catherine French, Jayesh Desai, Ruoyang Lu, Ali Pirooz
  • Publication number: 20060203925
    Abstract: A method is presented for packet detection and symbol boundary location using a two-step sign correlation procedure. When the correlation crosses a threshold, a packet detection signal is generated to initiate processing of downstream blocks, and a symbol boundary location signal is generated for use in aligning data during processing.
    Type: Application
    Filed: November 28, 2005
    Publication date: September 14, 2006
    Inventors: Ali Pirooz, Catherine French, Jayesh Desai, Hung Nguyen