Patents by Inventor Lawrence A. Booth

Lawrence A. Booth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143802
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Application
    Filed: October 27, 2023
    Publication date: May 2, 2024
    Applicant: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Patent number: 11836272
    Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: December 5, 2023
    Assignee: INTEL CORPORATION
    Inventors: Lawrence A. Booth, Jr., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
  • Patent number: 11836262
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Grant
    Filed: October 3, 2022
    Date of Patent: December 5, 2023
    Assignee: INTEL CORPORATION
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Publication number: 20230026602
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Application
    Filed: October 3, 2022
    Publication date: January 26, 2023
    Applicant: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, JR., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Publication number: 20220366081
    Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.
    Type: Application
    Filed: July 28, 2022
    Publication date: November 17, 2022
    Applicant: Intel Corporation
    Inventors: Lawrence A. Booth, JR., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
  • Patent number: 11461483
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Grant
    Filed: January 28, 2020
    Date of Patent: October 4, 2022
    Assignee: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Publication number: 20220311594
    Abstract: An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata.
    Type: Application
    Filed: January 5, 2022
    Publication date: September 29, 2022
    Applicant: Intel Corporation
    Inventors: Akshay Kadam, Sivakumar B, Lawrence Booth, JR., Niraj Gupta, Steven Tu, Ricardo Becker, Subba Mungara, Tuyet-Trang Piel, Mitul Shah, Raynald Lim, Mihai Bogdan Bucsa, Cliodhna Ni Scanaill, Roman Zubarev, Dmitry Budnikov, Lingyun Zhu, Yi Qian, Stewart Taylor
  • Patent number: 11423171
    Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: August 23, 2022
    Assignee: Intel Corporation
    Inventors: Lawrence A. Booth, Jr., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
  • Patent number: 11221268
    Abstract: A method determines a total velocity average cross-section parameter ?tot? in a relationship of the form ?loss(U)=nb?tot?·ƒ(U, Ud), where: ?loss(U) is a rate of exponential loss of sensor atoms from a cold atom sensor trap of trap depth potential energy U in a vacuum environment due to collisions with residual particles in the vacuum environment; nb is a number density of residual particles in the vacuum environment; Ud is a parameter given by U d = 2 ? k B ? T / m bg ? 4 ? ? ? ? ? 2 m t ? ? ? tot ? v ? which relates the masses of the sensor atoms mt and residual particles mbg to the total velocity average cross-section parameter ?tot?; and ƒ(U, Ud) is a function of the trap depth potential energy U and the parameter Ud which models a naturally occurring dependence of the loss rate ?loss(U) on the trap depth potential energy U and the parameter Ud, where ƒ(U=0, Ud) is unity for all Ud.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: January 11, 2022
    Assignees: The University of British Coumbia, British Columbia Institute of Technology
    Inventors: Kirk W. Madison, James Lawrence Booth, Pinrui Shen, Roman V. Krems
  • Publication number: 20210374247
    Abstract: The present invention discloses a secure ML pipeline to improve the robustness of ML models against poisoning attacks and utilizing data provenance as a tool. Two components are added to the ML pipeline, a data quality pre-processor, which filters out untrusted training data based on provenance derived features and an audit post-processor, which localizes the malicious source based on training dataset analysis using data provenance.
    Type: Application
    Filed: August 10, 2021
    Publication date: December 2, 2021
    Applicant: Intel Corporation
    Inventors: Salmin Sultana, Lawrence Booth, JR., Mic Bowman, Jason Martin, Micah Sheller
  • Publication number: 20210152530
    Abstract: Various systems and methods for implementing tiered access to regions of interest in video frames are described herein. A system for implementing tiered access to regions of interest in video frames, comprising: a memory device to store a mapping table, the mapping table to store a correspondence between a protection level and a consumer; video processing circuitry to: compress a video stream using a lossless video compression standard, the video stream comprising a plurality of frames, each frame comprising a plurality of image blocks; and encrypt each block in each frame of the video stream using an encryption key; and inference circuitry to: use an object detection and classification process on the video stream to identify an object in the video stream; access a policy store to determine a corresponding protection level for the object; and store the corresponding protection level in lossless video compression metadata.
    Type: Application
    Filed: December 22, 2020
    Publication date: May 20, 2021
    Inventors: Praveen Prasad Nair, Steven J. Tu, Lawrence A Booth, JR., Werner Adam Metz, JR.
  • Publication number: 20200167488
    Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.
    Type: Application
    Filed: January 28, 2020
    Publication date: May 28, 2020
    Applicant: Intel Corporation
    Inventors: Salessawi Ferede Yitbarek, Lawrence A. Booth Jr., Brent Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
  • Publication number: 20200134230
    Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Applicant: Intel Corporation
    Inventors: Lawrence A. Booth, JR., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent Thomas
  • Publication number: 20200025639
    Abstract: A method determines a total velocity average cross-section parameter ?tot? in a relationship of the form ?loss(U)=nb?tot?·ƒ(U, Ud), where: ?loss(U) is a rate of exponential loss of sensor atoms from a cold atom sensor trap of trap depth potential energy U in a vacuum environment due to collisions with residual particles in the vacuum environment; nb is a number density of residual particles in the vacuum environment; Ud is a parameter given by U d = 2 ? k B ? T / m bg ? 4 ? ? ? ? ? 2 m t ? ? ? tot ? v ? which relates the masses of the sensor atoms mt and residual particles mbg to the total velocity average cross-section parameter ?tot?; and ƒ(U, Ud) is a function of the trap depth potential energy U and the parameter Ud which models a naturally occurring dependence of the loss rate ?loss(U) on the trap depth potential energy U and the parameter Ud, where ƒ(U=0, Ud) is unity for all Ud.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 23, 2020
    Inventors: Kirk W. MADISON, James Lawrence BOOTH, Pinrui SHEN, Roman V. KREMS
  • Patent number: 10241624
    Abstract: A display that includes energy sensors within the display itself is disclosed. An Organic Light Emitting Diode (OLED) can be made to operate both as a light emitter and as an energy detector. When forward biased with an appropriate driving signal, the OLED emits light via electroluminescence, which can be used to make a portion of an image on the display. In another mode, the OLED can detect energy by converting incoming photons or energy into an electrical signal by the photoelectric effect. By operating OLEDs in the display in both emissive and sensing modes, energy that shines on the display, such as from an outside source can be detected at the same time an image is shown. Additionally, a display including OLEDs can detect light energy generated by the display itself.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: March 26, 2019
    Assignee: INTEL CORPORATION
    Inventors: Lawrence A. Booth, Daniel Seligson
  • Publication number: 20170357379
    Abstract: A display that includes energy sensors within the display itself is disclosed. An Organic Light Emitting Diode (OLED) can be made to operate both as a light emitter and as an energy detector. When forward biased with an appropriate driving signal, the OLED emits light via electroluminescence, which can be used to make a portion of an image on the display. In another mode, the OLED can detect energy by converting incoming photons or energy into an electrical signal by the photoelectric effect. By operating OLEDs in the display in both emissive and sensing modes, energy that shines on the display, such as from an outside source can be detected at the same time an image is shown. Additionally, a display including OLEDs can detect light energy generated by the display itself.
    Type: Application
    Filed: May 18, 2017
    Publication date: December 14, 2017
    Applicant: Intel Corporation
    Inventors: Lawrence A. Booth, Daniel Seligson
  • Patent number: 9665211
    Abstract: A display that includes energy sensors within the display itself is disclosed. An Organic Light Emitting Diode (OLED) can be made to operate both as a light emitter and as an energy detector. When forward biased with an appropriate driving signal, the OLED emits light via electroluminescence, which can be used to make a portion of an image on the display. In another mode, the OLED can detect energy by converting incoming photons or energy into an electrical signal by the photoelectric effect. By operating OLEDs in the display in both emissive and sensing modes, energy that shines on the display, such as from an outside source can be detected at the same time an image is shown. Additionally, a display including OLEDs can detect light energy generated by the display itself.
    Type: Grant
    Filed: February 23, 2015
    Date of Patent: May 30, 2017
    Assignee: INTEL CORPORATION
    Inventors: Lawrence A. Booth, Daniel Seligson
  • Patent number: 9607579
    Abstract: A method and apparatus for integrating a personal information device (PID) on a mobile computer that includes activating a first mode to display data originating with the PID in a first display area of a display. The mobile computer switches to a second mode to display data associated with the second mode in a second display area of the display.
    Type: Grant
    Filed: May 11, 2012
    Date of Patent: March 28, 2017
    Assignee: INTEL CORPORATION
    Inventors: John F. L. Potts, Lawrence A. Booth, Jr.
  • Publication number: 20160379401
    Abstract: The present invention discloses a method comprising: calculating an X separation distance between a left eye and a right eye, said X separation distance corresponding to an interpupilary distance in a horizontal direction; and transforming geometry and texture only once for said left eye and said right eye.
    Type: Application
    Filed: September 10, 2016
    Publication date: December 29, 2016
    Inventors: Lawrence A. Booth, JR., George Chen
  • Publication number: 20160171752
    Abstract: The present invention discloses a method comprising: calculating an X separation distance between a left eye and a right eye, said X separation distance corresponding to an interpupilary distance in a horizontal direction; and transforming geometry and texture only once for said left eye and said right eye.
    Type: Application
    Filed: February 22, 2016
    Publication date: June 16, 2016
    Inventors: Lawrence A. Booth, JR., George Chen