Patents by Inventor Mark E. Scott-Nash

Mark E. Scott-Nash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11557082
    Abstract: There is disclosed in an example, a pourable smart matter having a plurality of compute nodes, the compute nodes having: a mechanical structure having a plurality of faces, the faces having abutting face detectors; a network interface; and one or more logic elements comprising a positional engine to: identify a neighbor compute node abutting at least one of the faces; and build an individual positional profile based at least in part on the identifying. The pourable smart matter may be used, for example, to determine the geometry or volume of a container.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: January 17, 2023
    Assignee: Intel Corporation
    Inventors: Simon Hunt, Mark E. Scott-Nash
  • Patent number: 10754703
    Abstract: In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: August 25, 2020
    Assignee: McAfee, LLC
    Inventors: Howard C. Herbert, Jennifer Eligius Mankin, Simon Hunt, Venkata Ramanan Sambandam, Mark E. Scott-Nash, Katalin Klara Bartfai-Walcott, Rameshkumar Illikkal
  • Publication number: 20200207472
    Abstract: Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. When the modules are coupled, the communications ports are connected to create a bus for communications between the modules. The modular device structure where modules are removable and replaceable allows for an unmanned aerial vehicle to perform maintenance on the device.
    Type: Application
    Filed: March 9, 2020
    Publication date: July 2, 2020
    Applicant: McAfee, LLC
    Inventors: Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Cedric Cochin, Igor Muttik
  • Patent number: 10604251
    Abstract: Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. When the modules are coupled, the communications ports are connected to create a bus for communications between the modules. The modular device structure where modules are removable and replaceable allows for an unmanned aerial vehicle to perform maintenance on the device.
    Type: Grant
    Filed: September 29, 2016
    Date of Patent: March 31, 2020
    Assignee: McAfee, LLC
    Inventors: Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Cedric Cochin, Igor G. Muttik
  • Publication number: 20180096412
    Abstract: In some embodiments, the disclosed subject matter involves a digital brokerage service to match data, services and compute capacity of subscribers and publishers in a trusted execution environment (TEE). In an embodiment, data is generated by an Internet of Things IoT device. Publishers register available resources with the digital brokerage service, including TEE capabilities. Subscribers request data or services with a quality of service or service level agreement requirements and define required TEE capabilities. Other embodiments are described and claimed.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Inventors: Mark E. Scott-Nash, Howard C. Herbert
  • Publication number: 20180086453
    Abstract: Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. When the modules are coupled, the communications ports are connected to create a bus for communications between the modules. The modular device structure where modules are removable and replaceable allows for an unmanned aerial vehicle to perform maintenance on the device.
    Type: Application
    Filed: September 29, 2016
    Publication date: March 29, 2018
    Applicant: McAfee, LLC
    Inventors: Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Cedric Cochin, Igor G. Muttik
  • Publication number: 20170284797
    Abstract: There is disclosed in an example, a pourable smart matter having a plurality of compute nodes, the compute nodes having: a mechanical structure having a plurality of faces, the faces having abutting face detectors; a network interface; and one or more logic elements comprising a positional engine to: identify a neighbor compute node abutting at least one of the faces; and build an individual positional profile based at least in part on the identifying. The pourable smart matter may be used, for example, to determine the geometry or volume of a container.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Applicant: Intel Corporation
    Inventors: Simon Hunt, Mark E. Scott-Nash
  • Patent number: 9740882
    Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.
    Type: Grant
    Filed: September 10, 2014
    Date of Patent: August 22, 2017
    Assignee: Intel Corporation
    Inventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta
  • Publication number: 20170177417
    Abstract: In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.
    Type: Application
    Filed: December 22, 2015
    Publication date: June 22, 2017
    Applicant: McAfee, Inc.
    Inventors: Howard C. Herbert, Jennifer Eligius Mankin, Simon Hunt, Venkata Ramanan Sambandam, Mark E. Scott-Nash, Katalin Klara Bartfai-Walcott, Rameshkumar Illikkal
  • Patent number: 9678895
    Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: May 29, 2015
    Date of Patent: June 13, 2017
    Assignee: Intel Corporation
    Inventor: Mark E. Scott-Nash
  • Patent number: 9461994
    Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 26, 2014
    Date of Patent: October 4, 2016
    Assignee: Intel Corporation
    Inventors: Mark E. Scott-Nash, Annapurna Dasari, Willard M. Wiseman
  • Publication number: 20160149912
    Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.
    Type: Application
    Filed: November 26, 2014
    Publication date: May 26, 2016
    Inventors: Mark E. Scott-Nash, Annapurna Dasari, Willard M. Wiseman
  • Publication number: 20150286582
    Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: May 29, 2015
    Publication date: October 8, 2015
    Inventor: Mark E. Scott-Nash
  • Publication number: 20150248566
    Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.
    Type: Application
    Filed: September 10, 2014
    Publication date: September 3, 2015
    Inventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta
  • Patent number: 9053059
    Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.
    Type: Grant
    Filed: March 6, 2013
    Date of Patent: June 9, 2015
    Assignee: Intel Corporation
    Inventor: Mark E. Scott-Nash
  • Publication number: 20140258733
    Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.
    Type: Application
    Filed: March 6, 2013
    Publication date: September 11, 2014
    Inventor: Mark E. Scott-Nash
  • Patent number: 8769228
    Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
    Type: Grant
    Filed: December 17, 2010
    Date of Patent: July 1, 2014
    Assignee: Intel Corporation
    Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
  • Publication number: 20120159041
    Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
  • Publication number: 20100128874
    Abstract: A method and system to allow encryption/decryption to be performed substantially in parallel using one or more media associated keys. The system has an input buffer to store a plurality of media data from a plurality of media channels. A plurality of cryptographic engines is coupled with the input buffer to obtain a plurality of cipher keys and each cipher key is associated with one or more of a plurality of media channels The system encrypts or decrypts, substantially in parallel, each of the plurality of media data with a cryptographic algorithm using one or more of the obtained cipher keys.
    Type: Application
    Filed: November 25, 2008
    Publication date: May 27, 2010
    Inventor: Mark E. Scott-Nash