Patents by Inventor Jesse Walker

Jesse Walker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8955039
    Abstract: Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data.
    Type: Grant
    Filed: September 12, 2012
    Date of Patent: February 10, 2015
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Jesse Walker, Saurabh Dadu
  • Publication number: 20150030153
    Abstract: Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution hardware. The encryption engine is to perform an encryption operation using the root key, wherein the root key is accessible only to the encryption engine. The execution hardware is to execute instructions to deterministically generate an application-specific encryption key using the encryption algorithm.
    Type: Application
    Filed: February 9, 2012
    Publication date: January 29, 2015
    Applicant: Intel Corporation
    Inventors: Rajesh P. Banginwar, Taeho Kgil, Jesse Walker, Gary L. Graunke
  • Publication number: 20150023500
    Abstract: Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data.
    Type: Application
    Filed: October 6, 2014
    Publication date: January 22, 2015
    Inventors: Farhana Sheikh, Jesse Walker, Sanu K. Mathew, Ram K. Krishnamurthy
  • Publication number: 20150019869
    Abstract: Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user.
    Type: Application
    Filed: April 9, 2012
    Publication date: January 15, 2015
    Inventors: Jesse Walker, Gyan Prakash, David Stanasolovich, James R. Gregg
  • Patent number: 8930580
    Abstract: In a processor based system comprising a plurality of logical machines, selecting a logical machine of the system to serve as a host; the host communicating with a policy decision point (PDP) of a network to provision a data channel interconnecting the processor based system and the network and to provision a logical data channel interconnecting each logical machine of the system to the network.
    Type: Grant
    Filed: May 15, 2012
    Date of Patent: January 6, 2015
    Assignee: Intel Corporation
    Inventors: Ned Smith, Jesse Walker, Kapil Sood
  • Publication number: 20140358713
    Abstract: A method and system enables the formation of an ad hoc group to negotiate a bulk purchase of a product or service in an online user networking environment and to execute the bulk purchase using an electronic commerce transaction.
    Type: Application
    Filed: December 30, 2011
    Publication date: December 4, 2014
    Inventors: Gyan Prakash, Jesse Walker, David Stanasolovich, James R. Gregg, Rajesh Poornachandran
  • Patent number: 8903084
    Abstract: Both end-to-end security and traffic visibility may be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes the derivation key to information technology monitoring devices and a server to provide traffic visibility. For large key sizes, the key may be derived using a derivation formula as follows: client_key_MSB=AES128(base_key_1,client_ID),??(1) client_key_LSB=AES128(base_key_2,client_ID+pad),and??(2) client_key=client_key_MSB?client_key_LSB, where (1) and (2) are executed in parallel. The client key and a client identifier may be used so that end-to-end security may be achieved.
    Type: Grant
    Filed: June 12, 2013
    Date of Patent: December 2, 2014
    Assignee: Intel Corporation
    Inventors: Men Long, Jesse Walker, Karanvir S. Grewal
  • Patent number: 8855302
    Abstract: Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are pipelined by registers; and a counter, coupled to the block cipher, to determine a sequence of the UBI modes and to cause the block cipher to process at least two input data simultaneously for generating the hashed output data.
    Type: Grant
    Filed: June 21, 2011
    Date of Patent: October 7, 2014
    Assignee: Intel Corporation
    Inventors: Farhana Sheikh, Jesse Walker, Sanu K. Mathew, Ram Krishnamurthy
  • Publication number: 20140293013
    Abstract: Systems and methods of conducting collaborative sessions between mobile devices may provide for determining a time delay associated with a set of participating mobile devices, and determining a command execution time based at least in part on a clock of a managing device and the time delay. One or more control messages may be transmitted to the participating mobile devices, wherein the control messages include the command and the command execution time. Upon receiving a control message, each participating mobile device may determine a local execution time based at least in part on the command execution time and an offset of the clock of the managing device relative to a local clock. Execution of the command can therefore be coordinated across the set of participating mobile devices.
    Type: Application
    Filed: June 17, 2014
    Publication date: October 2, 2014
    Inventors: Michelle X. Gong, Roy Want, Horst W. Haussecker, Jesse Walker, Sai P. Balasundaram
  • Patent number: 8850204
    Abstract: A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: September 30, 2014
    Assignee: Intel Corporation
    Inventors: Robert Stacey, Jesse Walker, Emily H. Qi
  • Publication number: 20140281531
    Abstract: Generally, this disclosure describes a system and method for trusted data processing in the public cloud. A system may include a cloud server including a trusted execution environment, the cloud server one of a plurality of cloud servers, a cloud storage device coupled to the cloud server, and a RKM server including a key server module, the RKM server configured to sign the key server module using a private key and a gateway server configured to provide the signed key server module to the cloud server, the trusted execution environment configured to verify the key server module using a public key related to the private key and to launch the key server module, the key server module configured to establish a secure communication channel between the gateway server and the key server module, and the gateway server configured to provide a cryptographic key to the key server module via the secure communication channel.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventors: Vinay Phegade, Nilesh K Jain, Jesse Walker
  • Publication number: 20140230039
    Abstract: Mobile device, client device and server associated with client-server authentication are described. In embodiments, the mobile device may comprise a camera and a token extractor. The token extractor may be coupled to the camera and configured to analyze an image, captured by the camera. The captured image may contain a barcode and may be displayed on a client device in response to a request of a server for access to a resource. The barcode may contain a token, which may be extracted by the token extractor to be used to gain access to a resource requested from a server. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: February 8, 2013
    Publication date: August 14, 2014
    Inventors: Gyan Prakash, Venkatesh Ramamurthy, Hong Li, Jesse Walker
  • Patent number: 8799656
    Abstract: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The device remains anonymous to the remote entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).
    Type: Grant
    Filed: October 27, 2010
    Date of Patent: August 5, 2014
    Assignee: Intel Corporation
    Inventors: Ernest F. Brickell, Jiangtao Li, Jesse Walker
  • Publication number: 20140181794
    Abstract: In an embodiment a software application may include a “baseline trace” indicating proper application execution. The baseline trace may include counts for various types of instructions (e.g., how many times each of a LR instruction and a MV instruction occurs during an execution of code). The finished application includes the baseline trace. Upon execution the application randomly selects which of the various types of instructions to count during execution (e.g., LR or MV instruction) to produce a “real time trace”. The application executes and produces the real-time trace. The baseline trace is then compared to the real-time trace, which is specific to the randomly chosen type of instruction. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are described herein.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: David GRAWROCK, David OTT, Corey MALONE, Jesse WALKER
  • Patent number: 8755785
    Abstract: Systems and methods of conducting collaborative sessions between mobile devices may provide for determining a time delay associated with a set of participating mobile devices, and determining a command execution time based at least in part on a clock of a managing device and the time delay. One or more control messages may be transmitted to the participating mobile devices, wherein the control messages include the command and the command execution time. Upon receiving a control message, each participating mobile device may determine a local execution time based at least in part on the command execution time and an offset of the clock of the managing device relative to a local clock. Execution of the command can therefore be coordinated across the set of participating mobile devices.
    Type: Grant
    Filed: March 31, 2011
    Date of Patent: June 17, 2014
    Assignee: Intel Corporation
    Inventors: Michelle X. Gong, Roy Want, Horst W. Haussecker, Jesse Walker, Sai P. Balasundaram
  • Publication number: 20140143608
    Abstract: An embodiment provides a level of assurance regarding correct operation of software. An embodiment creates baseline and real-time measurements of software and compares the measurements to determine whether the software is operating correctly. An application provider may include “tracing elements” in target software application. While producing the application the trace elements are detected and provide trace events, which collectively provide a “baseline trace” indicating proper application execution. The provider supplies the application and the baseline trace to a user. The user operates the application in real-time to produce a “real-time trace” based on the application still having trace elements that produce trace events (which collectively form the “real-time” trace). A comparator compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. Other embodiments are included herein.
    Type: Application
    Filed: March 29, 2012
    Publication date: May 22, 2014
    Inventors: David W. Grawrock, Jesse Walker
  • Publication number: 20140123972
    Abstract: Disclosed herein are devices and methods that aid in providing high efficiency stoves for developing and underdeveloped regions. In some embodiments, the stoves are plancha-style stoves comprise cast iron planchas that are more durable and efficient that existing stoves. The plancha-style stoves, described herein may comprise a combustion chamber comprising an inlet, a stack chamber comprising an inlet and an outlet; a gas path chamber, comprising a ceiling and a floor, wherein the ceiling is defined by a removable plancha cooking surface having a substantially planar upper surface and a lower surface; a chimney box; and a chimney. In many embodiments, the stack chamber defines a cross-sectional area that is larger than the cross-sectional area of the inlet to the combustion chamber to prevent smoke from escaping the combustion chamber through the inlet.
    Type: Application
    Filed: November 6, 2013
    Publication date: May 8, 2014
    Applicant: ENVIROFIT INTERNATIONAL, LTD.
    Inventors: Jason A. Prapas, Jesse Walker, Nathan Lorenz, Sean Babbs, Timothy Bauer
  • Patent number: 8707046
    Abstract: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a first entity and a second entity. The first entity remains anonymous to the second entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication between the entities, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).
    Type: Grant
    Filed: May 3, 2011
    Date of Patent: April 22, 2014
    Assignee: Intel Corporation
    Inventors: Jesse Walker, Jiangtao Li
  • Publication number: 20140095936
    Abstract: In an embodiment of the invention an application provider may include “tracing elements” in a target software application. While working with the application the trace elements are detected and provide a “baseline trace” indicating proper application execution. The provider then supplies the application, which still includes the trace elements, and the baseline trace to a user. The user operates the application to produce a “real-time trace” based on the application still having trace elements that produce trace events. A comparator then compares the baseline and real-time traces. If the traces are within a pre-determined range of each other the user has a level of assurance the software is operating correctly. If the level of assurance is low, an embodiment may trigger a hardware interrupt or similar event to prevent further execution of software. Other embodiments are described herein.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: David W. Grawrock, Jesse Walker, Yuriy Bulygin, Kirk D. Brannock, Matthew L. King
  • Publication number: 20140086129
    Abstract: Embodiments provide techniques for device power management in wireless networks. For instance, an apparatus may include a power management module, and a transceiver module. The power management module determines a beacon interval and a wakeup interval. The transceiver module to send a transmission to one or more remote devices that includes the beacon interval and the wakeup interval. The beacon interval indicates a time interval between consecutive beacon transmissions of the apparatus, and the wakeup interval indicates a time interval between when the apparatus receives two consecutive beacons from a peer device.
    Type: Application
    Filed: December 2, 2013
    Publication date: March 27, 2014
    Inventors: Xiaohong Gong, Jesse Walker