Patents by Inventor Marcio Juliato

Marcio Juliato has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220224501
    Abstract: Time recovery techniques are described. A method comprises receiving messages from the first device by the second device in the first network domain, the messages to comprise time information to synchronize a first clock for the first device and a second clock for the second device to a network time, determining the second clock is to recover the network time for the second device without new messages from the first device, retrieving a first set of timestamps previously stored for events in the first network domain using the network time from the second clock, retrieving a second set of timestamps previously stored for the events in the first network domain using a redundant time from a third clock, where the third clock is not synchronized with the first and second clocks, and recovering the network time using a regression model and the redundant time from the third clock.
    Type: Application
    Filed: March 29, 2022
    Publication date: July 14, 2022
    Applicant: Intel Corporation
    Inventors: Vuk Lesi, Christopher Gutierrez, Manoj Sastry, Christopher Hall, Marcio Juliato, Shabbir Ahmed, Qian Wang
  • Patent number: 11388598
    Abstract: Systems, apparatus, methods, and techniques for reporting an attack or intrusion into an in-vehicle network are provided. The attack can be broadcast to connected vehicles over a vehicle-to-vehicle network. The broadcast can include an indication of a sub-system involved in the attack and can include a request for assistance in recovering from the attack. Connected vehicles can broadcast responses over the vehicle-to-vehicle network. The responses can include indications of data related to the compromised sub-system. The vehicle can receive the responses and can use the responses to recover from the attack, such as, estimate data.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: July 12, 2022
    Assignee: INTEL CORPORATION
    Inventors: Liuyang Yang, Xiruo Liu, Manoj Sastry, Marcio Juliato, Shabbir Ahmed, Christopher Gutierrez
  • Patent number: 11386204
    Abstract: A platform comprising numerous reconfigurable circuit components arranged to operate as primary and redundant circuits is provided. The platform further comprises security circuitry arranged to monitor the primary circuit for anomalies and reconfigurable circuit arranged to disconnect the primary circuit from a bus responsive to detection of an anomaly. Furthermore, the present disclosure provides for the quarantine, refurbishment and designation as redundant, the anomalous circuit.
    Type: Grant
    Filed: September 24, 2020
    Date of Patent: July 12, 2022
    Assignee: INTEL CORPORATION
    Inventors: Marcio Juliato, Manoj Sastry, Shabbir Ahmed, Christopher Gutierrez, Qian Wang, Vuk Lesi
  • Patent number: 11354406
    Abstract: Methods and apparatus relating to a physics-based approach for attack detection and/or localization in closed-loop controls for autonomous vehicles are described. In an embodiment, multiple state estimators are used to compute a set of residuals to detect, classify, and/or localize attacks. This allows for determination of an attacker's location and the kind of attack being perpetrated. Other embodiments are also disclosed and claimed.
    Type: Grant
    Filed: June 28, 2018
    Date of Patent: June 7, 2022
    Assignee: INTEL CORPORATION
    Inventors: Marcio Juliato, Shabbir Ahmed, Manoj Sastry, Liuyang L. Yang, Vuk Lesi, Li Zhao
  • Publication number: 20220174479
    Abstract: Various embodiments are generally directed to techniques for providing improved privacy protection against vehicle tracking for connected vehicles of a vehicular network. For example, at least one road side unit may: identify a set of vehicles that require pseudonym changes and send an invitation for a pseudonym change event to each of the vehicles, determine at least a total number of the acceptances, determine whether the total number meets or exceeds a predetermined threshold number, send acknowledgement messages to the accepting vehicles if the threshold number is met, and form a vehicle group to coordinate the pseudonym change event during a privacy period. During the privacy period, the RSU and the vehicles may communicate with each other in a confidential and private manner via key-session-based unicast transmission, and coordinate transmission power and vehicle trajectory adjustments to maximize the benefits for safety and obfuscation for privacy.
    Type: Application
    Filed: December 10, 2021
    Publication date: June 2, 2022
    Applicant: INTEL CORPORATION
    Inventors: Xiruo LIU, Shabbir AHMED, Ralf GRAEFE, Christopher GUTIERREZ, Marcio JULIATO, Rafael ROSALES, Manoj SASTRY, Liuyang YANG
  • Publication number: 20220083439
    Abstract: A data processing system includes technology for detecting and tolerating faults. The data processing system comprises an electronic control unit (ECU) with a processing core and a fault-tolerant elliptic curve digital signature algorithm (ECDSA) engine. The fault-tolerant ECDSA engine comprises multiple verification state machines (VSMs). The data processing system also comprises nonvolatile storage in communication with the processing core and ECU software in the nonvolatile storage. The ECU software, when executed, enables the data processing system to operate as a node in a distributed data processing system, including receiving digitally signed messages from other nodes in the distributed data processing system. The ECU further comprises a known-answer built-in self-test unit (KA-BISTU). Also, the ECU software comprises fault-tolerant ECDSA engine (FTEE) management software which, when executed by the processing core, utilizes the KA-BISTU to periodically test the fault-tolerant ECDSA engine for faults.
    Type: Application
    Filed: September 14, 2021
    Publication date: March 17, 2022
    Inventors: Santosh Ghosh, Marcio Juliato, Manoj R. Sastry
  • Patent number: 11240659
    Abstract: Various embodiments are generally directed to techniques for providing improved privacy protection against vehicle tracking for connected vehicles of a vehicular network. For example, at least one road side unit may: identify a set of vehicles that require pseudonym changes and send an invitation for a pseudonym change event to each of the vehicles, determine at least a total number of the acceptances, determine whether the total number meets or exceeds a predetermined threshold number, send acknowledgement messages to the accepting vehicles if the threshold number is met, and form a vehicle group to coordinate the pseudonym change event during a privacy period. During the privacy period, the RSU and the vehicles may communicate with each other in a confidential and private manner via key-session-based unicast transmission, and coordinate transmission power and vehicle trajectory adjustments to maximize the benefits for safety and obfuscation for privacy.
    Type: Grant
    Filed: December 9, 2019
    Date of Patent: February 1, 2022
    Assignee: INTEL CORPORATION
    Inventors: Xiruo Liu, Shabbir Ahmed, Ralf Graefe, Christopher Gutierrez, Marcio Juliato, Rafael Rosales, Manoj Sastry, Liuyang Yang
  • Publication number: 20220012331
    Abstract: Systems, apparatuses, and methods to establish ground truth for an intrusion detection system in the presence of an attacker electronic control unit transmitting masqueraded messages on a communication bus, such as an in-vehicle network bus, are provided.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Applicant: Intel Corporation
    Inventors: Shabbir Ahmed, Marcio Juliato, Vuk Lesi, Qian Wang, Manoj Sastry
  • Publication number: 20220014532
    Abstract: Systems and methods to detect attacks on the clocks of devices. In time sensitive networks are described. Particularly, the disclosed systems and methods provide detection and mitigation of timing synchronization attacks based on key performance indicators related to the protecting transmission windows in data streams of the time sensitive networks.
    Type: Application
    Filed: September 23, 2021
    Publication date: January 13, 2022
    Inventors: Javier Perez-Ramirez, Mikhail Galeev, Marcio Juliato, Christopher Gutierrez, Dave Cavalcanti, Manoj Sastry, Kevin Stanton, Vuk Lesi
  • Publication number: 20220012371
    Abstract: Systems, apparatuses, and methods to mitigate effects of glitch attacks on a broadcast communication bus are provided. The voltage levels of the communication bus are repeatedly sampled to identify glitch attacks. The voltage level on the communication bus can be overdriven or overwritten to either corrupt received messages or correct received messages.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Applicant: Intel Corporation
    Inventors: Marcio Juliato, Vuk Lesi, Christopher Gutierrez, Shabbir Ahmed, Qian Wang, Manoj Sastry
  • Publication number: 20220014529
    Abstract: Systems and methods to detect attacks on the clocks of devices in time sensitive networks are described. Particularly, the disclosed systems and methods provide detection and mitigation of timing synchronization attacks based on pseudo-random numbers generated and used to select and authenticate timing of transmission of messages in protected transmission windows.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Applicant: Intel Corporation
    Inventors: Marcio Juliato, Javier Perez-Ramirez, Mikhail Galeev, Christopher Gutierrez, Dave Cavalcanti, Manoj Sastry, Vuk Lesi
  • Publication number: 20220014540
    Abstract: Systems, apparatuses and methods may provide for technology that detects one or more non-compliant nodes with respect to a timing schedule, detects one or more compliant nodes with respect to the timing schedule, and identifies a malicious node based on positions of the one or more non-compliant nodes and the one or more compliant nodes in a network topography. The non-compliant node(s) and the compliant node(s) may be detected based on post-synchronization messages, historical attribute data and/or plane diversity data.
    Type: Application
    Filed: September 24, 2021
    Publication date: January 13, 2022
    Inventors: Marcio Juliato, Javier Perez-Ramirez, Vuk Lesi, Dave Cavalcanti, Manoj Sastry, Christopher Gutierrez, Qian Wang, Shabbir Ahmed
  • Publication number: 20210385239
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for anomaly detection and recovery. An apparatus to isolate a first controller in an autonomous vehicle includes a first controller to control a reference signal of the autonomous vehicle via a communication bus, a second controller to control the reference signal of the autonomous vehicle when the first controller is compromised, and a message neutralizer to neutralize messages transmitted by the first controller when the first controller is compromised, the neutralized messages to cause the first controller to become isolated from the communication bus.
    Type: Application
    Filed: June 14, 2021
    Publication date: December 9, 2021
    Inventors: Marcio Juliato, Liuyang Lily Yang, Manoj Sastry, Christopher Gutierrez, Shabbir Ahmed, Vuk Lesi
  • Publication number: 20210370954
    Abstract: Disclosed herein is a passenger monitoring system for monitoring an observed attribute of a passenger in a vehicle. The observed attribute may include a gaze of the passenger, a head track of the passenger, and other observations about the passenger in the vehicle. Based on the observed attribute(s), a field of view of the passenger may be determined. Based on the field of view, a focus point of the passenger may be determined, where the focus point is estimated to be within the field of view. If a sign (e.g., a road sign, a billboard, etc.) is within the field of view of the passenger, record an attention score for the sign based on a duration of time during which the sign is within the field of view and estimated to be the focus point of the passenger.
    Type: Application
    Filed: August 13, 2021
    Publication date: December 2, 2021
    Inventors: Ignacio J. ALVAREZ, Cornelius BUERKLE, Florian GEISSLER, Marcio JULIATO, Fabian OBORIL, Frederik PASCH, Ivan SIMOES GASPAR
  • Publication number: 20210325508
    Abstract: Systems, apparatuses, and methods to response to distinguish a ghost target from an actual target based on radar signals is provided. In particular, the disclosure provides an intrusion detection system adapted to receive radar signals and distinguish a potential ghost target from a legitimate target based on a signal to noise ratio of the radar signals and a range to the ghost target and the legitimate target.
    Type: Application
    Filed: June 24, 2021
    Publication date: October 21, 2021
    Applicant: Intel Corporation
    Inventors: Qian Wang, Shabbir Ahmed, Christopher Gutierrez, Wen-Ling Huang, Marcio Juliato, Saiveena Kesaraju, Vuk Lesi, Manoj Sastry, Ivan Simoes Gaspar
  • Publication number: 20210326437
    Abstract: Systems, apparatuses, and methods to response to detected attacks in an autonomous system based on context of the autonomous system are described. In particular, the disclosure provides an intrusion detection system receiving contexts and contracts dictating particular response guide rails from a higher level components or stack on the autonomous system. The intrusion detection system is arranged to respond to attacks according to the contract without intervention by the higher level components or stack.
    Type: Application
    Filed: June 24, 2021
    Publication date: October 21, 2021
    Applicant: Intel Corporation
    Inventors: Marcio Juliato, Shabbir Ahmed, Christopher Gutierrez, Vuk Lesi, Manoj Sastry, Qian Wang
  • Patent number: 11151007
    Abstract: A data processing system includes technology for detecting and tolerating faults. The data processing system comprises an electronic control unit (ECU) with a processing core and a fault-tolerant elliptic curve digital signature algorithm (ECDSA) engine. The fault-tolerant ECDSA engine comprises multiple verification state machines (VSMs). The data processing system also comprises nonvolatile storage in communication with the processing core and ECU software in the nonvolatile storage. The ECU software, when executed, enables the data processing system to operate as a node in a distributed data processing system, including receiving digitally signed messages from other nodes in the distributed data processing system. The ECU further comprises a known-answer built-in self-test unit (KA-BISTU). Also, the ECU software comprises fault-tolerant ECDSA engine (FTEE) management software which, when executed by the processing core, utilizes the KA-BISTU to periodically test the fault-tolerant ECDSA engine for faults.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: October 19, 2021
    Assignee: Intel Corporation
    Inventors: Santosh Ghosh, Marcio Juliato, Manoj R. Sastry
  • Publication number: 20210318414
    Abstract: Systems, apparatuses, and methods to response to distinguish a ghost target from an actual target based on radar signals and ranges determined from the radar signals. In particular, the disclosure provides an intrusion detection system receiving ranges and velocities for targets detected based on radar signals, determining a potential ghost target from the received velocities and confirming the potential ghost target based on estimated ranges and perturbations of the vehicle speed.
    Type: Application
    Filed: June 24, 2021
    Publication date: October 14, 2021
    Applicant: Intel Corporation
    Inventors: Vuk Lesi, Shabbir Ahmed, Christopher Gutierrez, Wen-Ling Huang, Marcio Juliato, Saiveena Kesaraju, Manoj Sastry, Ivan Simoes Gaspar, Qian Wang
  • Publication number: 20210320933
    Abstract: Systems, apparatuses, and methods to identify bus-off and masquerade attacks against ECUs transmitting on a communication bus from behind a gateway coupled to the communication bus. The disclosure further describes systems, apparatuses, and methods to mitigate against bus-off attacks made against an ECU coupled to a communication bus through a gateway.
    Type: Application
    Filed: June 23, 2021
    Publication date: October 14, 2021
    Applicant: Intel Corporation
    Inventors: Marcio Juliato, Shabbir Ahmed, Christopher Gutierrez, Vuk Lesi, Manoj Sastry, Qian Wang
  • Publication number: 20210218756
    Abstract: Systems, apparatuses, and methods to establish a mapping between message identifications for messages transmitted on a communication bus and electronic control units transmitting the messages is provided. In particular, retransmission of a low priority message onto the bus is forced such that the retransmitted low priority message overlaps with a higher priority message to determine whether the messages originated from the same ECU.
    Type: Application
    Filed: March 26, 2021
    Publication date: July 15, 2021
    Applicant: Intel Corporation
    Inventors: Christopher Gutierrez, Shabbir Ahmed, Marcio Juliato, Vuk Lesi, Manoj Sastry, Qian Wang