Patents by Inventor Mark E. Scott-Nash
Mark E. Scott-Nash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11557082Abstract: There is disclosed in an example, a pourable smart matter having a plurality of compute nodes, the compute nodes having: a mechanical structure having a plurality of faces, the faces having abutting face detectors; a network interface; and one or more logic elements comprising a positional engine to: identify a neighbor compute node abutting at least one of the faces; and build an individual positional profile based at least in part on the identifying. The pourable smart matter may be used, for example, to determine the geometry or volume of a container.Type: GrantFiled: March 31, 2016Date of Patent: January 17, 2023Assignee: Intel CorporationInventors: Simon Hunt, Mark E. Scott-Nash
-
Patent number: 10754703Abstract: In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.Type: GrantFiled: December 22, 2015Date of Patent: August 25, 2020Assignee: McAfee, LLCInventors: Howard C. Herbert, Jennifer Eligius Mankin, Simon Hunt, Venkata Ramanan Sambandam, Mark E. Scott-Nash, Katalin Klara Bartfai-Walcott, Rameshkumar Illikkal
-
Publication number: 20200207472Abstract: Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. When the modules are coupled, the communications ports are connected to create a bus for communications between the modules. The modular device structure where modules are removable and replaceable allows for an unmanned aerial vehicle to perform maintenance on the device.Type: ApplicationFiled: March 9, 2020Publication date: July 2, 2020Applicant: McAfee, LLCInventors: Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Cedric Cochin, Igor Muttik
-
Patent number: 10604251Abstract: Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. When the modules are coupled, the communications ports are connected to create a bus for communications between the modules. The modular device structure where modules are removable and replaceable allows for an unmanned aerial vehicle to perform maintenance on the device.Type: GrantFiled: September 29, 2016Date of Patent: March 31, 2020Assignee: McAfee, LLCInventors: Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Cedric Cochin, Igor G. Muttik
-
Publication number: 20180096412Abstract: In some embodiments, the disclosed subject matter involves a digital brokerage service to match data, services and compute capacity of subscribers and publishers in a trusted execution environment (TEE). In an embodiment, data is generated by an Internet of Things IoT device. Publishers register available resources with the digital brokerage service, including TEE capabilities. Subscribers request data or services with a quality of service or service level agreement requirements and define required TEE capabilities. Other embodiments are described and claimed.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: Mark E. Scott-Nash, Howard C. Herbert
-
Publication number: 20180086453Abstract: Particular embodiments described herein provide for modular device assemblies and methods for enabling maintenance and servicing, particularly by an unmanned aerial vehicle. A device assembly comprises a plurality of modules, each module having control circuitry, a communications port and contact points to couple the modules. When the modules are coupled, the communications ports are connected to create a bus for communications between the modules. The modular device structure where modules are removable and replaceable allows for an unmanned aerial vehicle to perform maintenance on the device.Type: ApplicationFiled: September 29, 2016Publication date: March 29, 2018Applicant: McAfee, LLCInventors: Mark E. Scott-Nash, Glen J. Anderson, Ned M. Smith, Cedric Cochin, Igor G. Muttik
-
Publication number: 20170284797Abstract: There is disclosed in an example, a pourable smart matter having a plurality of compute nodes, the compute nodes having: a mechanical structure having a plurality of faces, the faces having abutting face detectors; a network interface; and one or more logic elements comprising a positional engine to: identify a neighbor compute node abutting at least one of the faces; and build an individual positional profile based at least in part on the identifying. The pourable smart matter may be used, for example, to determine the geometry or volume of a container.Type: ApplicationFiled: March 31, 2016Publication date: October 5, 2017Applicant: Intel CorporationInventors: Simon Hunt, Mark E. Scott-Nash
-
Patent number: 9740882Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.Type: GrantFiled: September 10, 2014Date of Patent: August 22, 2017Assignee: Intel CorporationInventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta
-
Publication number: 20170177417Abstract: In an example, there is disclosed a computing apparatus, having a computing resource; a bespoke sensor for measuring at least one parameter of usage of the computing resource; and one or more logic elements providing a trusted compute meter (TCM) agent to: receive an external workload; provision a workload enclave; execute the external workload within the TCM enclave; and measure resource usage of the external workload via the bespoke sensor. There is also disclosed a computer-readable medium having stored thereon executable instructions for providing a TCM agent, and a method of providing a TCM agent.Type: ApplicationFiled: December 22, 2015Publication date: June 22, 2017Applicant: McAfee, Inc.Inventors: Howard C. Herbert, Jennifer Eligius Mankin, Simon Hunt, Venkata Ramanan Sambandam, Mark E. Scott-Nash, Katalin Klara Bartfai-Walcott, Rameshkumar Illikkal
-
Patent number: 9678895Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.Type: GrantFiled: May 29, 2015Date of Patent: June 13, 2017Assignee: Intel CorporationInventor: Mark E. Scott-Nash
-
Patent number: 9461994Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.Type: GrantFiled: November 26, 2014Date of Patent: October 4, 2016Assignee: Intel CorporationInventors: Mark E. Scott-Nash, Annapurna Dasari, Willard M. Wiseman
-
Publication number: 20160149912Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.Type: ApplicationFiled: November 26, 2014Publication date: May 26, 2016Inventors: Mark E. Scott-Nash, Annapurna Dasari, Willard M. Wiseman
-
Publication number: 20150286582Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.Type: ApplicationFiled: May 29, 2015Publication date: October 8, 2015Inventor: Mark E. Scott-Nash
-
Publication number: 20150248566Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.Type: ApplicationFiled: September 10, 2014Publication date: September 3, 2015Inventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta
-
Patent number: 9053059Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.Type: GrantFiled: March 6, 2013Date of Patent: June 9, 2015Assignee: Intel CorporationInventor: Mark E. Scott-Nash
-
Publication number: 20140258733Abstract: Embodiments of techniques and systems associated with roots-of-trust (RTMs) for measurement of virtual machines (VMs) are disclosed. In some embodiments, a computing platform may provide a virtual machine RTM (vRTM) in a first secure enclave of the computing platform. The computing platform may be configured to perform an integrity measurement of the first secure enclave. The computing platform may provide a virtual machine trusted platform module (vTPM), for a guest VM, outside the first secure enclave of the computing platform. The computing platform may initiate a chain of integrity measurements between the vRTM and a resource of the guest VM. Other embodiments may be described and/or claimed.Type: ApplicationFiled: March 6, 2013Publication date: September 11, 2014Inventor: Mark E. Scott-Nash
-
Patent number: 8769228Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.Type: GrantFiled: December 17, 2010Date of Patent: July 1, 2014Assignee: Intel CorporationInventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
-
Publication number: 20120159041Abstract: An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to them may not be made by an anti-malware entity.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Inventors: Paritosh Saxena, Nicholas D. Triantafillou, Paul J. Thadikaran, Mark E. Scott-Nash, Sanjeev N. Trika, Akshay Kadam, Karthikeyan Vaidyanathan, Richard Mangold
-
Publication number: 20100128874Abstract: A method and system to allow encryption/decryption to be performed substantially in parallel using one or more media associated keys. The system has an input buffer to store a plurality of media data from a plurality of media channels. A plurality of cryptographic engines is coupled with the input buffer to obtain a plurality of cipher keys and each cipher key is associated with one or more of a plurality of media channels The system encrypts or decrypts, substantially in parallel, each of the plurality of media data with a cryptographic algorithm using one or more of the obtained cipher keys.Type: ApplicationFiled: November 25, 2008Publication date: May 27, 2010Inventor: Mark E. Scott-Nash