Patents by Inventor Lawrence A. Booth
Lawrence A. Booth has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240143802Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.Type: ApplicationFiled: October 27, 2023Publication date: May 2, 2024Applicant: Intel CorporationInventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
-
Patent number: 11836272Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.Type: GrantFiled: July 28, 2022Date of Patent: December 5, 2023Assignee: INTEL CORPORATIONInventors: Lawrence A. Booth, Jr., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
-
Patent number: 11836262Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.Type: GrantFiled: October 3, 2022Date of Patent: December 5, 2023Assignee: INTEL CORPORATIONInventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
-
Publication number: 20230026602Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.Type: ApplicationFiled: October 3, 2022Publication date: January 26, 2023Applicant: Intel CorporationInventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, JR., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
-
Publication number: 20220366081Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.Type: ApplicationFiled: July 28, 2022Publication date: November 17, 2022Applicant: Intel CorporationInventors: Lawrence A. Booth, JR., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
-
Patent number: 11461483Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.Type: GrantFiled: January 28, 2020Date of Patent: October 4, 2022Assignee: Intel CorporationInventors: Salessawi Ferede Yitbarek, Lawrence A. Booth, Jr., Brent D. Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
-
Publication number: 20220311594Abstract: An accelerator includes a memory, a compute zone to receive an encrypted workload downloaded from a tenant application running in a virtual machine on a host computing system attached to the accelerator, and a processor subsystem to execute a cryptographic key exchange protocol with the tenant application to derive a session key for the compute zone and to program the session key into the compute zone. The compute zone is to decrypt the encrypted workload using the session key, receive an encrypted data stream from the tenant application, decrypt the encrypted data stream using the session key, and process the decrypted data stream by executing the workload to produce metadata.Type: ApplicationFiled: January 5, 2022Publication date: September 29, 2022Applicant: Intel CorporationInventors: Akshay Kadam, Sivakumar B, Lawrence Booth, JR., Niraj Gupta, Steven Tu, Ricardo Becker, Subba Mungara, Tuyet-Trang Piel, Mitul Shah, Raynald Lim, Mihai Bogdan Bucsa, Cliodhna Ni Scanaill, Roman Zubarev, Dmitry Budnikov, Lingyun Zhu, Yi Qian, Stewart Taylor
-
Patent number: 11423171Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.Type: GrantFiled: December 23, 2019Date of Patent: August 23, 2022Assignee: Intel CorporationInventors: Lawrence A. Booth, Jr., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent D. Thomas
-
Patent number: 11221268Abstract: A method determines a total velocity average cross-section parameter ?tot? in a relationship of the form ?loss(U)=nb?tot?·ƒ(U, Ud), where: ?loss(U) is a rate of exponential loss of sensor atoms from a cold atom sensor trap of trap depth potential energy U in a vacuum environment due to collisions with residual particles in the vacuum environment; nb is a number density of residual particles in the vacuum environment; Ud is a parameter given by U d = 2 ? k B ? T / m bg ? 4 ? ? ? ? ? 2 m t ? ? ? tot ? v ? which relates the masses of the sensor atoms mt and residual particles mbg to the total velocity average cross-section parameter ?tot?; and ƒ(U, Ud) is a function of the trap depth potential energy U and the parameter Ud which models a naturally occurring dependence of the loss rate ?loss(U) on the trap depth potential energy U and the parameter Ud, where ƒ(U=0, Ud) is unity for all Ud.Type: GrantFiled: July 23, 2019Date of Patent: January 11, 2022Assignees: The University of British Coumbia, British Columbia Institute of TechnologyInventors: Kirk W. Madison, James Lawrence Booth, Pinrui Shen, Roman V. Krems
-
Publication number: 20210374247Abstract: The present invention discloses a secure ML pipeline to improve the robustness of ML models against poisoning attacks and utilizing data provenance as a tool. Two components are added to the ML pipeline, a data quality pre-processor, which filters out untrusted training data based on provenance derived features and an audit post-processor, which localizes the malicious source based on training dataset analysis using data provenance.Type: ApplicationFiled: August 10, 2021Publication date: December 2, 2021Applicant: Intel CorporationInventors: Salmin Sultana, Lawrence Booth, JR., Mic Bowman, Jason Martin, Micah Sheller
-
Publication number: 20210152530Abstract: Various systems and methods for implementing tiered access to regions of interest in video frames are described herein. A system for implementing tiered access to regions of interest in video frames, comprising: a memory device to store a mapping table, the mapping table to store a correspondence between a protection level and a consumer; video processing circuitry to: compress a video stream using a lossless video compression standard, the video stream comprising a plurality of frames, each frame comprising a plurality of image blocks; and encrypt each block in each frame of the video stream using an encryption key; and inference circuitry to: use an object detection and classification process on the video stream to identify an object in the video stream; access a policy store to determine a corresponding protection level for the object; and store the corresponding protection level in lossless video compression metadata.Type: ApplicationFiled: December 22, 2020Publication date: May 20, 2021Inventors: Praveen Prasad Nair, Steven J. Tu, Lawrence A Booth, JR., Werner Adam Metz, JR.
-
Publication number: 20200167488Abstract: Embodiments are directed to protection of communications between a trusted execution environment and a hardware accelerator utilizing enhanced end-to-end encryption and inter-context security. An embodiment of an apparatus includes one or more processors having one or more trusted execution environments (TEEs) including a first TEE to include a first trusted application; an interface with a hardware accelerator, the hardware accelerator including trusted embedded software or firmware; and a computer memory to store an untrusted kernel mode driver for the hardware accelerator, the one or more processors to establish an encrypted tunnel between the first trusted application in the first TEE and the trusted software or firmware, generate a call for a first command from the first trusted application, generate an integrity tag for the first command, and transfer command parameters for the first command and the integrity tag to the kernel mode driver to generate the first command.Type: ApplicationFiled: January 28, 2020Publication date: May 28, 2020Applicant: Intel CorporationInventors: Salessawi Ferede Yitbarek, Lawrence A. Booth Jr., Brent Thomas, Reshma Lal, Pradeep M. Pappachan, Akshay Kadam
-
Publication number: 20200134230Abstract: Embodiments are directed to protection of privacy and data on smart edge devices. An embodiment of an apparatus includes a sensor to produce a stream of sensor data; an analytics mechanism; and a trusted execution environment (TEE) including multiple keys for data security, the apparatus to exchange keys with a host server to establish one or more secure communication channels between the apparatus and a TEE on a host server, process the stream of sensor data utilizing the analytics mechanism to generate metadata, perform encryption and integrity protection of the metadata utilizing a key from the TEE for the sensor, sign the metadata utilizing a private key for the analytics mechanism, and transfer the encrypted and integrity protected metadata and the signature to the host server via the one or more secure communication channels in a manner that prevents privileged users on the host from accessing the data.Type: ApplicationFiled: December 23, 2019Publication date: April 30, 2020Applicant: Intel CorporationInventors: Lawrence A. Booth, JR., Salessawi Ferede Yitbarek, Reshma Lal, Pradeep M. Pappachan, Brent Thomas
-
Publication number: 20200025639Abstract: A method determines a total velocity average cross-section parameter ?tot? in a relationship of the form ?loss(U)=nb?tot?·ƒ(U, Ud), where: ?loss(U) is a rate of exponential loss of sensor atoms from a cold atom sensor trap of trap depth potential energy U in a vacuum environment due to collisions with residual particles in the vacuum environment; nb is a number density of residual particles in the vacuum environment; Ud is a parameter given by U d = 2 ? k B ? T / m bg ? 4 ? ? ? ? ? 2 m t ? ? ? tot ? v ? which relates the masses of the sensor atoms mt and residual particles mbg to the total velocity average cross-section parameter ?tot?; and ƒ(U, Ud) is a function of the trap depth potential energy U and the parameter Ud which models a naturally occurring dependence of the loss rate ?loss(U) on the trap depth potential energy U and the parameter Ud, where ƒ(U=0, Ud) is unity for all Ud.Type: ApplicationFiled: July 23, 2019Publication date: January 23, 2020Inventors: Kirk W. MADISON, James Lawrence BOOTH, Pinrui SHEN, Roman V. KREMS
-
Patent number: 10241624Abstract: A display that includes energy sensors within the display itself is disclosed. An Organic Light Emitting Diode (OLED) can be made to operate both as a light emitter and as an energy detector. When forward biased with an appropriate driving signal, the OLED emits light via electroluminescence, which can be used to make a portion of an image on the display. In another mode, the OLED can detect energy by converting incoming photons or energy into an electrical signal by the photoelectric effect. By operating OLEDs in the display in both emissive and sensing modes, energy that shines on the display, such as from an outside source can be detected at the same time an image is shown. Additionally, a display including OLEDs can detect light energy generated by the display itself.Type: GrantFiled: May 18, 2017Date of Patent: March 26, 2019Assignee: INTEL CORPORATIONInventors: Lawrence A. Booth, Daniel Seligson
-
Publication number: 20170357379Abstract: A display that includes energy sensors within the display itself is disclosed. An Organic Light Emitting Diode (OLED) can be made to operate both as a light emitter and as an energy detector. When forward biased with an appropriate driving signal, the OLED emits light via electroluminescence, which can be used to make a portion of an image on the display. In another mode, the OLED can detect energy by converting incoming photons or energy into an electrical signal by the photoelectric effect. By operating OLEDs in the display in both emissive and sensing modes, energy that shines on the display, such as from an outside source can be detected at the same time an image is shown. Additionally, a display including OLEDs can detect light energy generated by the display itself.Type: ApplicationFiled: May 18, 2017Publication date: December 14, 2017Applicant: Intel CorporationInventors: Lawrence A. Booth, Daniel Seligson
-
Patent number: 9665211Abstract: A display that includes energy sensors within the display itself is disclosed. An Organic Light Emitting Diode (OLED) can be made to operate both as a light emitter and as an energy detector. When forward biased with an appropriate driving signal, the OLED emits light via electroluminescence, which can be used to make a portion of an image on the display. In another mode, the OLED can detect energy by converting incoming photons or energy into an electrical signal by the photoelectric effect. By operating OLEDs in the display in both emissive and sensing modes, energy that shines on the display, such as from an outside source can be detected at the same time an image is shown. Additionally, a display including OLEDs can detect light energy generated by the display itself.Type: GrantFiled: February 23, 2015Date of Patent: May 30, 2017Assignee: INTEL CORPORATIONInventors: Lawrence A. Booth, Daniel Seligson
-
Patent number: 9607579Abstract: A method and apparatus for integrating a personal information device (PID) on a mobile computer that includes activating a first mode to display data originating with the PID in a first display area of a display. The mobile computer switches to a second mode to display data associated with the second mode in a second display area of the display.Type: GrantFiled: May 11, 2012Date of Patent: March 28, 2017Assignee: INTEL CORPORATIONInventors: John F. L. Potts, Lawrence A. Booth, Jr.
-
Publication number: 20160379401Abstract: The present invention discloses a method comprising: calculating an X separation distance between a left eye and a right eye, said X separation distance corresponding to an interpupilary distance in a horizontal direction; and transforming geometry and texture only once for said left eye and said right eye.Type: ApplicationFiled: September 10, 2016Publication date: December 29, 2016Inventors: Lawrence A. Booth, JR., George Chen
-
Publication number: 20160171752Abstract: The present invention discloses a method comprising: calculating an X separation distance between a left eye and a right eye, said X separation distance corresponding to an interpupilary distance in a horizontal direction; and transforming geometry and texture only once for said left eye and said right eye.Type: ApplicationFiled: February 22, 2016Publication date: June 16, 2016Inventors: Lawrence A. Booth, JR., George Chen