Patents by Inventor Jesse Walker

Jesse Walker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9307409
    Abstract: Some demonstrative embodiments include apparatuses, systems and/or methods of protecting domains of a multimode wireless radio transceiver. For example, an apparatus may include a protection domain controller (PDC) to restrict access of a configuration software to a protection domain of a plurality of protection domains of a multimode wireless radio transceiver based on a security level of the configuration software, wherein the protection domain includes one or more radio configuration parameters of the multimode wireless radio transceiver.
    Type: Grant
    Filed: December 27, 2013
    Date of Patent: April 5, 2016
    Assignee: INTEL CORPORATION
    Inventors: Farhana Asrar Sheikh, Patrick Koeberl, Jesse Walker, Hossein Alavi, Men Long, Ram Kumar Krishnamurthy, Alpa T. Narendra Trivedi
  • Patent number: 9282232
    Abstract: Systems and methods of conducting collaborative sessions between mobile devices may provide for determining a time delay associated with a set of participating mobile devices, and determining a command execution time based at least in part on a clock of a managing device and the time delay. One or more control messages may be transmitted to the participating mobile devices, wherein the control messages include the command and the command execution time. Upon receiving a control message, each participating mobile device may determine a local execution time based at least in part on the command execution time and an offset of the clock of the managing device relative to a local clock. Execution of the command can therefore be coordinated across the set of participating mobile devices.
    Type: Grant
    Filed: June 17, 2014
    Date of Patent: March 8, 2016
    Assignee: Intel Corporation
    Inventors: Michelle X. Gong, Roy Want, Horst W. Haussecker, Jesse Walker, Sai P. Balasundaram
  • Patent number: 9246679
    Abstract: A system and method for negotiating a pairwise master key (“PMK”) in wireless mesh networks. The system includes a plurality of mesh points that are configured to perform an abbreviated handshake protocol in negotiating a PMK and establishing a secure connection. The method for establishing a negotiated PMK is based on selecting a PMK before transmitting any data, and arranging available PMKs in a predetermined list so that a PMK can be negotiated in a limited number of exchanges.
    Type: Grant
    Filed: December 28, 2007
    Date of Patent: January 26, 2016
    Assignee: INTEL CORPORATION
    Inventors: Meiyuan Zhao, Jesse Walker
  • Publication number: 20160021615
    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.
    Type: Application
    Filed: September 26, 2015
    Publication date: January 21, 2016
    Applicant: INTEL CORPORATION
    Inventors: Xiaohong Gong, Jesse Walker
  • Patent number: 9226240
    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.
    Type: Grant
    Filed: December 2, 2013
    Date of Patent: December 29, 2015
    Assignee: INTEL CORPORATION
    Inventors: Xiaohong Gong, Jesse Walker
  • Patent number: 9225521
    Abstract: Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data.
    Type: Grant
    Filed: October 6, 2014
    Date of Patent: December 29, 2015
    Assignee: Intel Corporation
    Inventors: Farhana Sheikh, Jesse Walker, Sanu K. Mathew, Ram K. Krishnamurthy
  • Publication number: 20150358320
    Abstract: Various embodiments are generally directed to techniques to form secure communications between two computing devices in which the chain of trust of those communications is extended to a particular application routine executed by one of the two computing devices. An apparatus includes a processor component; a verifying component to verify a link attestation credential received from a server to verify an ability of the server to form a secure pipeline, and to signal an application routine with an indication of a result of the verification by the verifying component; and a hash component to generate a return hash of a return signature associated with the application routine to indicate to the server that the application routine has also verified the link attestation credential to form the secure pipeline between the server and the application routine. Other embodiments are described and claimed.
    Type: Application
    Filed: November 26, 2013
    Publication date: December 10, 2015
    Inventors: Adi Shaliv, Jesse Walker
  • Patent number: 9167525
    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: October 20, 2015
    Assignee: INTEL CORPORATION
    Inventors: Xiaohong Gong, Jesse Walker
  • Patent number: 9146833
    Abstract: In an embodiment a software application may include a “baseline trace” indicating proper application execution. The baseline trace may include counts for various types of instructions (e.g., how many times each of a LR instruction and a MV instruction occurs during an execution of code). The finished application includes the baseline trace. Upon execution the application randomly selects which of the various types of instructions to count during execution (e.g., LR or MV instruction) to produce a “real time trace”. The application executes and produces the real-time trace. The baseline trace is then compared to the real-time trace, which is specific to the randomly chosen type of instruction. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are described herein.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: September 29, 2015
    Assignee: Intel Corporation
    Inventors: David W. Grawrock, David Ott, Corey Malone, Jesse Walker
  • Patent number: 9143944
    Abstract: Apparatuses for peer-to-peer network setup are presented. In one embodiment, an apparatus comprises a wireless processing unit to communicate with a master device. The wireless processing unit is operable to receive encoded data in a two-dimensional (2D) barcode. The encoded data comprise at least user information associated with the master device including a user identifier, a device identifier, or both. The encoded data further comprise network information including a network identifier, a password, and a profile lifetime value. In one embodiment, the apparatus further comprises a display unit to display at least part of the user information and the network information to a user. The wireless processing unit is operable to initiate a peer-to-peer network setup with the master device based at least on a response from the user.
    Type: Grant
    Filed: September 1, 2011
    Date of Patent: September 22, 2015
    Assignee: Intel Corporation
    Inventors: Michelle X. Gong, Jesse Walker, Roy Want, Horst W. Haussecker
  • Patent number: 9118639
    Abstract: Generally, this disclosure describes a system and method for trusted data processing in the public cloud. A system may include a cloud server including a trusted execution environment, the cloud server one of a plurality of cloud servers, a cloud storage device coupled to the cloud server, and a RKM server including a key server module, the RKM server configured to sign the key server module using a private key and a gateway server configured to provide the signed key server module to the cloud server, the trusted execution environment configured to verify the key server module using a public key related to the private key and to launch the key server module, the key server module configured to establish a secure communication channel between the gateway server and the key server module, and the gateway server configured to provide a cryptographic key to the key server module via the secure communication channel.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: August 25, 2015
    Assignee: Intel Corporation
    Inventors: Vinay Phegade, Nilesh K Jain, Jesse Walker
  • Publication number: 20150189509
    Abstract: Some demonstrative embodiments include apparatuses, systems and/or methods of protecting domains of a multimode wireless radio transceiver. For example, an apparatus may include a protection domain controller (PDC) to restrict access of a configuration software to a protection domain of a plurality of protection domains of a multimode wireless radio transceiver based on a security level of the configuration software, wherein the protection domain includes one or more radio configuration parameters of the multimode wireless radio transceiver.
    Type: Application
    Filed: December 27, 2013
    Publication date: July 2, 2015
    Inventors: Farhana Asrar Sheikh, Patrick Koeberl, Jesse Walker, Hossein Alavi, Men Long, Ram Kumar Krishnamurthy, Alpa T. Narendra Trivedi
  • Publication number: 20150188702
    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES 128(base_key_1, client_ID), ??(1) client_key_LSB=AES 128(base_key_2, client_ID+pad), and ??(2) client_key=client_key_MSB?client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.
    Type: Application
    Filed: December 1, 2014
    Publication date: July 2, 2015
    Applicant: Intel Corporation
    Inventors: Long Men, Jesse Walker, Karanvir S. Grewal
  • Publication number: 20150178226
    Abstract: Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a plurality of processing devices communicatively coupled to the architecturally protected memory, each processing device comprising a first processing logic to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory, or preventing an unauthorized access to the architecturally protected memory; wherein each processing device further comprises a second processing logic to establish a secure communication channel with a second processing device of the processing system, employ the secure communication channel to synchronize a platform identity key representing the processing system, and transmit a platform manifest comprising the platform identity key to a certification system.
    Type: Application
    Filed: December 24, 2013
    Publication date: June 25, 2015
    Inventors: Vincent R. Scarlata, Simon P. Johnson, Vladimir Beker, Jesse Walker, Carlos V. Rozas, Amy L. Santoni, Ittai Anati, Raghunandan Makaram, Francis X. McKeen, Uday R. Savagaonkar
  • Publication number: 20150172054
    Abstract: An embodiment includes a method executed by at least one processor comprising: an out-of-band cryptoprocessor receiving security credentials from a battery, which is included in a mobile computing node that comprises the at least one processor, while the mobile computing node is engaged in at least one of (a) booting, and (b) exchanging the battery after booting and during run-time; the cryptoprocessor accessing an authentication key; and the cryptoprocessor successfully authenticating the battery, via out-of-band processing, based on the security credentials and the authentication key. In an embodiment the security credentials are included in a certificate. Other embodiments are described herein.
    Type: Application
    Filed: June 13, 2013
    Publication date: June 18, 2015
    Inventors: Gyan Prakash, Venkatesh Ramamurthy, Rajesh Poornachandran, Hong Li, Jesse Walker
  • Patent number: 9049592
    Abstract: Key derivation procedures and key hierarchies compatible with the mesh link establishment protocol for use in a mesh network. A single cryptographic primitive may be utilized, which is a key derivation function, denoted as kdfK, where K is a cached pairwise master key. The result of the function kdfK may be used to derive the keys used to secure both link establishment and the data subsequently exchanged over the link.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: June 2, 2015
    Assignee: Intel Corporation
    Inventors: Jesse Walker, Meiyuan Zhao
  • Patent number: 9003236
    Abstract: In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: April 7, 2015
    Assignee: Intel Corporation
    Inventors: David W. Grawrock, Jesse Walker, Yuriy Bulygin, Kirk D. Brannock, Matthew L. King
  • Publication number: 20150095654
    Abstract: In an embodiment, an apparatus includes a processor including a first core. The first core includes multi-biometric logic to output first biometric data wi (i=1 to n, n?2), each wi determined based on a corresponding one of first biometric input Mi (i=1 to n, n?2) received during a first time period. The apparatus also includes setup logic to transform a cryptographic key k via a transformation that uses the first biometric data wi, where transformation of the cryptographic key k results in output of helper data hi (i=1 to n). Other embodiments are described and claimed.
    Type: Application
    Filed: September 30, 2013
    Publication date: April 2, 2015
    Inventors: Jiangtao Li, Jesse Walker
  • Patent number: D722811
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: February 24, 2015
    Assignee: Envirofit International, Inc.
    Inventors: Jesse Walker, Nathan Lorenz, Chris Stefko
  • Patent number: D727677
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: April 28, 2015
    Assignee: Envirofit International, Inc.
    Inventors: Jesse Walker, Nathan Lorenz