Patents by Inventor Jesse Walker

Jesse Walker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10853516
    Abstract: In a method for protecting electronic data, a data processing system (20, 20A, 20B) uses (a) a master electrocardiogram (ECG) identifier (44) for an authorized user of the system and (b) a secret chip key (26) for the system to encrypt data in the system. Also, before allowing the encrypted data to be decrypted, the system collects an ECG reading for a current user of the system and uses (a) the collected ECG reading for the current user and (b) at least one predetermined ECG identifier (EID) vector for the authorized user to determine whether the current user is the authorized user. In response to determining that the current user is the authorized user, the system uses the master ECG identifier (44) for the authorized user and the secret chip key (26) for the system to decrypt the data.
    Type: Grant
    Filed: December 9, 2015
    Date of Patent: December 1, 2020
    Assignee: INTEL CORPORATION
    Inventors: Hua He, Jixing Gu, Ke Han, Guoquan Shen, Jesse Walker
  • Patent number: 10715335
    Abstract: In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (AKs). After saving the current AKs, the data processing system receives an update package for a new version of the software component. The data processing system extracts a digital signature and two or more new AKs from the update package. The data processing system uses at least one current AK to determine whether the digital signature is valid. In response to a determination that the digital signature is valid, the data processing system uses a software image from the update package to update the software component, and the data processing system saves the new AKs, for subsequent utilization as the current AKs.
    Type: Grant
    Filed: July 3, 2018
    Date of Patent: July 14, 2020
    Assignee: Intel Corporation
    Inventors: Steffen Schulz, Rafael Misoczki, Manoj R. Sastry, Jesse Walker
  • Publication number: 20200210589
    Abstract: Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function (VNF) bootstrap service (VBS) in secure network communication with a VBS agent of a VNF instance. The VBS agent is configured to execute a secure VNF bootstrap capture protocol in the NFV network architecture. Accordingly, the VBS agent can be configured to register with the VBS via secure communications transmitted between the VBS and the VBS agent. The secure communications include transmitting a security quote from a TEE of a platform on which the VNF instance is instantiated and a security credential request to the VBS, as well as receiving a security credential in response to validating the security quote and the security credential request. Other embodiments are described and claimed.
    Type: Application
    Filed: August 13, 2019
    Publication date: July 2, 2020
    Inventors: Kapil Sood, Jesse Walker
  • Patent number: 10701039
    Abstract: Various embodiments are generally directed to the providing for mutual authentication and secure distributed processing of multi-party data. In particular, an experiment may be submitted to include the distributed processing of private data owned by multiple distrustful entities. Private data providers may authorize the experiment and securely transfer the private data for processing by trusted computing nodes in a pool of trusted computing nodes.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 30, 2020
    Assignee: INTEL CORPORATION
    Inventors: Vinay Phegade, Huaiyu Liu, Jesse Walker
  • Patent number: 10623177
    Abstract: Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user.
    Type: Grant
    Filed: August 30, 2017
    Date of Patent: April 14, 2020
    Assignee: Intel Corporation
    Inventors: Jesse Walker, Gyan Prakash, David Stanasolovich, James R. Gregg
  • Patent number: 10602791
    Abstract: Provided herein are multi-layered protective coverings, wearable multi-layered protective devices, and methods of using the multi-layered protective coverings and wearable multi-layered protective devices.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: March 31, 2020
    Assignees: North Carolina State University, The United States of America as Represented by the Secretary of the Army
    Inventors: Jesse S. Jur, Russell E. Gorga, Macon Adams, Shannyn A. Holder, Hilary Walker, Caryn A. Siggins, Carson Binns, Austin W. Teague, Andrew Nesbitt, Albena Ivanisevic, Jon Rust, James A. Murdock, Carly M. Bohnenblusch, Andrew M. Thomas, II, Benjamin Anthony, Paul Reid, Stephen Lee, Clinton R. George
  • Publication number: 20200049441
    Abstract: Embodiments are directed to a cover for firearm barrels and/or suppressors. The cover may include a cover body that is sized and dimensioned to house a barrel or suppressor of a firearm having one or more sights. The body may have a longitudinal axis, a lateral axis, an upper portion, and a lower portion. The body may be coupleable to the firearm below the one or more sights. The body may have one or more intake ports that are disposed in the lower portion of the body. The body may have one or more exhaust ports that are disposed in the upper portion of the body and that are laterally spaced apart from the one or more sights when the body is coupled to the firearm.
    Type: Application
    Filed: October 11, 2019
    Publication date: February 13, 2020
    Inventors: Jesse Brian Thompson, Tarrol Walker Peterson
  • Patent number: 10516654
    Abstract: In one embodiment, a computing device includes at least one hardware processor to execute instructions, a network interface to enable communication with a second computing device and a third computing device, and at least one storage medium. Such medium may store instructions that when executed by the computing device enable the computing device to request delegation of a key provisioning privilege for the second computing device from the third computing device via a parent-guardian delegation protocol comprising a three-party key distribution protocol with the second computing device and the third computing device, the three-party key distribution protocol having interposed therein a two-party authenticated key exchange protocol between the computing device and the third computing device. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: December 24, 2019
    Assignee: Intel Corporation
    Inventors: Meiyuan Zhao, Jesse Walker, Xiruo Liu, Steffen Schulz, Jianqing Zhang
  • Publication number: 20190342835
    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.
    Type: Application
    Filed: March 5, 2018
    Publication date: November 7, 2019
    Applicant: Intel Corporation
    Inventors: Xiaohong Gong, Jesse Walker
  • Patent number: 10466003
    Abstract: Embodiments are directed to a suppressor cover for firearm suppressors. The suppressor cover may include a cover body that is sized and dimensioned to house a suppressor of a firearm having one or more sights. The body may have a longitudinal axis, a lateral axis, an upper portion, and a lower portion. The body may be coupleable to the firearm below the one or more sights. The body may have one or more intake ports that are disposed in the lower portion of the body. The body may have one or more exhaust ports that are disposed in the upper portion of the body and that are laterally spaced apart from the one or more sights when the body is coupled to the firearm.
    Type: Grant
    Filed: April 9, 2018
    Date of Patent: November 5, 2019
    Assignee: Jelis Incorporated
    Inventors: Jesse Brian Thompson, Tarrol Walker Peterson
  • Patent number: 10404468
    Abstract: Technologies for counter with CBC-MAC (CCM) mode encryption include a computing device that performs a CBC-MAC authentication operation on a message with an encryption key, using a 64-bit block cipher to generate a message authentication code. The computing device generates a first 64-bit authentication block including an 8-bit flag field and a length field of between 11 and 32 bits. The flag field indicates the length of the length field. Performing the CBC-MAC authentication operation includes formatting the message into one or more 64-bit authentication blocks. The computing device performs a counter mode encryption operation on the message with the encryption key using the 64-bit block cipher to generate a cipher text. Performing the counter mode encryption includes generating multiple 64-bit keystream blocks. The computing device generates an authentication tag based on the message authentication code and a first keystream block of keystream blocks. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 15, 2016
    Date of Patent: September 3, 2019
    Assignee: Intel Corporation
    Inventors: Santosh Ghosh, Manoj R. Sastry, Jesse Walker, Li Zhao, Rafael Misoczki
  • Patent number: 10380346
    Abstract: Technologies for bootstrapping virtual network functions in a network functions virtualization (NFV) network architecture include a virtual network function (VNF) bootstrap service (VBS) in secure network communication with a VBS agent of a VNF instance. The VBS agent is configured to execute a secure VNF bootstrap capture protocol in the NFV network architecture. Accordingly, the VBS agent can be configured to register with the VBS via secure communications transmitted between the VBS and the VBS agent. The secure communications include transmitting a security quote from a TEE of a platform on which the VNF instance is instantiated and a security credential request to the VBS, as well as receiving a security credential in response to validating the security quote and the security credential request. Other embodiments are described and claimed.
    Type: Grant
    Filed: January 5, 2018
    Date of Patent: August 13, 2019
    Assignee: Intel Corporation
    Inventors: Kapil Sood, Jesse Walker
  • Publication number: 20190246268
    Abstract: Method and system of secured direct link set-up (DLS) for wireless networks. In accordance with aspects of the method, techniques are disclosed for setting up computationally secure direct links between stations in a wireless network in a manner that is computationally secure. A direct link comprising a new communication session is set up between first and second stations in a wireless local area network (WLAN) hosted by an access point (AP), the direct link comprising a new communication session. The AP generates a unique session key for the new communication session and transfers secured copies of the session key to each of the first and second stations in a manner under which only the first and second stations can obtain the session key. A security mechanism is then implemented on the unsecured direct link to secure the direct link between the first and second stations using a secure session key derived from the session key.
    Type: Application
    Filed: November 13, 2018
    Publication date: August 8, 2019
    Applicant: INTEL CORPORATION
    Inventors: Jesse Walker, Shlomo Ovadia, Suman Sharma
  • Patent number: 10374793
    Abstract: An instruction and logic for a Simon-based hashing for validation are described. In one embodiment, a processor comprises: a memory the memory to store a plurality of values; and a hash circuit comprising a Simon cipher circuit operable to receive the plurality of values from the memory, to apply a Simon cipher, and to generate an output for each of the plurality of values; and circuitry coupled to the Simon cipher circuit to combine outputs from the Simon cipher circuit for each value of the plurality of values into a hash digest that is indicative of whether the values in the memory are valid.
    Type: Grant
    Filed: December 9, 2016
    Date of Patent: August 6, 2019
    Assignee: INTEL CORPORATION
    Inventors: Himanshu Kaul, Sanu Mathew, Mark Anders, Jesse Walker, Jason Sandri
  • Patent number: 10326590
    Abstract: Technologies for trusted device on-boarding include a first computing device to generate a first public Diffie-Hellman key based on a private Diffie-Hellman key and a first unique identifier of the first computing device. The first unique identifier is retrieved from secure memory of the first computing device. The first computing device transmits the first public Diffie-Hellman key to a second computing device and receives, from the second computing device, a second public Diffie-Hellman key of the second computing device. The second public Diffie-Hellman key incorporates a second unique identifier of the second computing device. Further, the first computing device removes a contribution of the second unique identifier from the second public Diffie-Hellman key to generate a modified public Diffie-Hellman key and generates a shared Diffie-Hellman key based on the modified public Diffie-Hellman key and the private Diffie-Hellman key of the first computing device.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: June 18, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Jesse Walker, Mats Agerstam, Ravi S. Subramaniam, Eduardo Cabre
  • Publication number: 20190141035
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Application
    Filed: January 2, 2019
    Publication date: May 9, 2019
    Applicant: INTEL CORPORATION
    Inventors: Adi Shaliv, Jesse Walker
  • Patent number: 10187385
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 26, 2013
    Date of Patent: January 22, 2019
    Assignee: INTEL CORPORATION
    Inventors: Adi Shaliv, Jesse Walker
  • Publication number: 20180330116
    Abstract: In a method for protecting electronic data, a data processing system (20, 20A, 20B) uses (a) a master electrocardiogram (ECG) identifier (44) for an authorized user of the system and (b) a secret chip key (26) for the system to encrypt data in the system. Also, before allowing the encrypted data to be decrypted, the system collects an ECG reading for a current user of the system and uses (a) the collected ECG reading for the current user and (b) at least one predetermined ECG identifier (EID) vector for the authorized user to determine whether the current user is the authorized user. In response to determining that the current user is the authorized user, the system uses the master ECG identifier (44) for the authorized user and the secret chip key (26) for the system to decrypt the data.
    Type: Application
    Filed: December 9, 2015
    Publication date: November 15, 2018
    Inventors: Hua HE, Jixing GU, Ke HAN, Guoquan SHEN, Jesse WALKER
  • Publication number: 20180316508
    Abstract: In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (AKs). After saving the current AKs, the data processing system receives an update package for a new version of the software component. The data processing system extracts a digital signature and two or more new AKs from the update package. The data processing system uses at least one current AK to determine whether the digital signature is valid. In response to a determination that the digital signature is valid, the data processing system uses a software image from the update package to update the software component, and the data processing system saves the new AKs, for subsequent utilization as the current AKs.
    Type: Application
    Filed: July 3, 2018
    Publication date: November 1, 2018
    Inventors: Steffen Schulz, Rafael Misoczki, Manoj R. Sastry, Jesse Walker
  • Patent number: D862342
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: October 8, 2019
    Assignee: Faraday & Future Inc.
    Inventors: Charles LeFranc, Brian E. Spencer, Giancarlo Viganego, Axel Kurkjian, Richard S. Kim, Page Brullau Beermann, Jesse Walker