Patents by Inventor John B. Vicente
John B. Vicente has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180103099Abstract: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information.Type: ApplicationFiled: July 24, 2017Publication date: April 12, 2018Inventors: Hong Li, John B. Vicente, Mark D. Yarvis, James R. Blakley
-
Patent number: 9942317Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.Type: GrantFiled: August 31, 2015Date of Patent: April 10, 2018Assignee: Intel CorporationInventors: John B. Vicente, James R. Blakley, Hong Li, Mark D. Yarvis
-
Publication number: 20170324731Abstract: Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server.Type: ApplicationFiled: July 26, 2017Publication date: November 9, 2017Inventors: Hong Li, Suman Sharma, John B. Vicente, Luis A. Gimenez, Carlton D. Ashley, Navneet Malpani
-
Patent number: 9781118Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.Type: GrantFiled: March 14, 2013Date of Patent: October 3, 2017Assignee: Intel CorporationInventors: Hong C. Li, John B. Vicente, Prashant Dewan
-
Publication number: 20170279813Abstract: Apparatuses, methods, and computer-readable media for a context-based access mediator (“CAM”) are described. The CAM may be configured to mediate access to computer-accessible resources by a user using a computing device after receiving a request from the computing device for the computing device to access a computer-accessible resource. The computer-accessible resource may be local or remote to the computing device. The CAM may be configured to receive the request and to mediate access to the requested resource. Such mediation may be performed through the CAM determining whether the resource may be accessed by the computing device and/or through the CAM determining which resources are available to the be accessed by the computing device. The CAM may be configured to mediate access to computer-accessible resources based on information about a context for the computing device and/or computer-accessible resource. Other embodiments are described and claimed.Type: ApplicationFiled: September 26, 2014Publication date: September 28, 2017Inventors: John B. VICENTE, Christiaan M. METS, Justin LIPMAN
-
Patent number: 9749310Abstract: Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server.Type: GrantFiled: March 27, 2015Date of Patent: August 29, 2017Assignee: Intel CorporationInventors: Hong Li, Suman Sharma, John B. Vicente, Luis A. Gimenez, Carlton D. Ashley, Navneet Malpani
-
Patent number: 9716756Abstract: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information.Type: GrantFiled: February 12, 2016Date of Patent: July 25, 2017Assignee: Intel CorporationInventors: Hong Li, John B. Vicente, Mark D. Yarvis, James R. Blakley
-
Publication number: 20160337451Abstract: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information.Type: ApplicationFiled: February 12, 2016Publication date: November 17, 2016Inventors: Hong Li, John B. Vicente, Mark D. Yarvis, James R. Blakley
-
Publication number: 20160292575Abstract: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.Type: ApplicationFiled: May 29, 2016Publication date: October 6, 2016Inventors: John C. Weast, Joshua J. Ratcliff, Rita H. Wouhaybi, Adam Jordan, Charles C. Smith, Glen J. Anderson, John B. Vicente, Lama Nachman
-
Publication number: 20160285858Abstract: Technologies for remote device authentication include a client computing device, an identity provider, and an application server in communication over a network. The identity provider sends an authentication challenge to the client. A capability proxy of the client intercepts an authentication challenge response and retrieves one or more security assertions from a secure environment of the client computing device. The capability proxy may be an embedded web server providing an HTTP interface to platform features of the client. The client sends a resource access token based on the security assertions to the identity provider. The identity provider verifies the resource access token and authenticates the client computing device based on the resource access token in addition to user authentication factors such as username and password. The identity provider sends an authentication response to the client, which forwards the authentication response to the application server.Type: ApplicationFiled: March 27, 2015Publication date: September 29, 2016Inventors: Hong Li, Suman Sharma, John B. Vicente, Luis A. Gimenez, Carlton D. Ashley, Navneet Malpani
-
Patent number: 9430640Abstract: A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system.Type: GrantFiled: September 28, 2012Date of Patent: August 30, 2016Assignee: Intel CorporationInventors: Hong Li, James R. Blakley, Rita H. Wouhaybi, John B. Vicente, Mark D. Yarvis
-
Publication number: 20160164967Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.Type: ApplicationFiled: August 31, 2015Publication date: June 9, 2016Inventors: John B. Vicente, James R. Blakley, Hong Li, Mark D. Yarvis
-
Patent number: 9355356Abstract: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.Type: GrantFiled: October 25, 2013Date of Patent: May 31, 2016Assignee: Intel CorporationInventors: John C. Weast, Joshua J. Ratcliff, Rita H. Wouhaybi, Adam Jordan, Charles C. Smith, Glen J. Anderson, John B. Vicente, Lama Nachman
-
Patent number: 9264499Abstract: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information.Type: GrantFiled: December 14, 2012Date of Patent: February 16, 2016Assignee: Intel CorporationInventors: Hong Li, John B. Vicente, Mark D. Yarvis, James R. Blakley
-
Patent number: 9130939Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.Type: GrantFiled: December 28, 2012Date of Patent: September 8, 2015Assignee: Intel CorporationInventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley
-
Publication number: 20150195301Abstract: This disclosure is directed to a context-aware proactive threat management system. In general, a device may use internal activity data along with data about external activities (e.g., provided by remote resources) for threat assessment and mitigation. A device may comprise, for example, a hostile environment detection (HED) module to coordinate threat assessment and mitigation. The HED module may accumulate internal activity data (e.g., from security services in the device), and external activity data regarding a system environment and/or a physical environment from the remote resources. The HED module may then assess threats based on the activity data and determine automated and/or manual mitigation operations to respond to the threats. In one embodiment, visualization features may also be used to, for example, visualize threats to a user, visualize automatic/manual mitigation operations, request user confirmation regarding the performance of manual mitigation operations, etc.Type: ApplicationFiled: November 19, 2013Publication date: July 9, 2015Inventors: Abhilasha Bhargav-Spantzel, John B. Vicente, Mohammad R. Haghighat, Oliver W. Chen, Hormuzd M. Khosravi, Uri Kahana
-
Publication number: 20150120617Abstract: Embodiments of apparatus and methods for capturing and generating user experiences are described. In embodiments, an apparatus may include a processor. The apparatus may also include a data storage module, coupled with the processor, to store sensor data collected by a plurality of sensors attached to one or more devices. The apparatus may further include an experience correlation module, coupled with the data storage module, to associate at least a portion of the sensor data with a user experience based at least in part on one or more rules identifying the user experience, to enable regenerating at least a part of the user experience for a user based at least in part on the portion of the sensor data. Other embodiments may be described and/or claimed.Type: ApplicationFiled: October 25, 2013Publication date: April 30, 2015Inventors: Weast John C., Joshua J. Ratcliff, Rita H. Wouhaybi, Adam Jordan, Charles C. Smith, Glen J. Anderson, John B. Vicente, Lama Nachman
-
Patent number: 8972713Abstract: Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation.Type: GrantFiled: December 21, 2012Date of Patent: March 3, 2015Assignee: Intel CorporationInventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley
-
Publication number: 20140282890Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.Type: ApplicationFiled: March 14, 2013Publication date: September 18, 2014Inventors: Hong C. Li, John B. Vicente, Prashant Dewan
-
Publication number: 20140189120Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.Type: ApplicationFiled: December 28, 2012Publication date: July 3, 2014Inventors: John B. Vicente, Hong C. Li, Mark D. Yarvis, James R. Blakley