Patents by Inventor Michael Goldsmith

Michael Goldsmith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140352045
    Abstract: A fluid inlet portion for a waterless urinal cartridge is presented. The fluid inlet portion comprises to fluid director comprising a non-linear surface proximate a throat portion of the cartridge formed to impart a horizontal velocity component to fluid flowing through the throat portion of the cartridge to reduce vertical turbulence within the fluid. The fluid director can be formed so that it is in fluid communication with at least part of a fluid layer within the cartridge. The non-linear surface imparts a horizontal velocity component, thereby reducing disruption of the fluid layer by fluid flowing through the throat portion of the cartridge. The fluid director may be positioned within the cartridge to impart a substantially horizontal swirling motion to fluid within the cartridge. A fluid deflector proximate the fluid director can receive fluid from the fluid deflector and for re-directing the fluid from the fluid director.
    Type: Application
    Filed: May 28, 2014
    Publication date: December 4, 2014
    Inventor: Edward Michael Goldsmith
  • Publication number: 20140310414
    Abstract: A method and system for establishing a helpdesk session between a subscriber device and a customer support representative (CSR) device following a request for a helpdesk session. The system issuing, on receipt of said request, a credential pair comprising subscriber credentials for a subscriber device and CSR credentials for a CSR device which is paired with the subscriber device. The subscriber credentials are transferred to the subscriber device and the CSR credentials are transferred to the CSR device. The subscriber and CSR credentials are then transferred to a core node for authentication. If the credentials are authentic the helpdesk session between the paired subscriber device and the CSR device is established.
    Type: Application
    Filed: December 4, 2013
    Publication date: October 16, 2014
    Applicant: RealVNC Ltd
    Inventors: Nicolas David Reeves, Christopher Michael Goldsmith, Antony Clive Mann, Philip John Richards, Thomas Henry Lynn, Katarzyna Maria Czeczot
  • Publication number: 20140297962
    Abstract: Instructions and logic provide advanced paging capabilities for secure enclave page caches. Embodiments include multiple hardware threads or processing cores, a cache to store secure data for a shared page address allocated to a secure enclave accessible by the hardware threads. A decode stage decodes a first instruction specifying said shared page address as an operand, and execution units mark an entry corresponding to an enclave page cache mapping for the shared page address to block creation of a new translation for either of said first or second hardware threads to access the shared page. A second instruction is decoded for execution, the second instruction specifying said secure enclave as an operand, and execution units record hardware threads currently accessing secure data in the enclave page cache corresponding to the secure enclave, and decrement the recorded number of hardware threads when any of the hardware threads exits the secure enclave.
    Type: Application
    Filed: March 31, 2013
    Publication date: October 2, 2014
    Inventors: CARLOS V ROZAS, ILYA ALEXANDROVICH, ITTAI ANATI, ALEX BERENZON, MICHAEL A GOLDSMITH, BARRY E HUNTLEY, ANTON IVANOV, SIMON P JOHNSON, REBEKAH M. LESLIE-HURD, FRANCIS X. MCKEEN, GILBERT NEIGER, RINAT RAPPOPORT, SCOTT DION RODGERS, UDAY R. SAVAGAONKAR, VINCENT R. SCARLATA, VEDVYAS SHANBHOGUE, WESLEY H SMITH, WILLIAM COLIN WOOD
  • Publication number: 20140267332
    Abstract: A protected graphics module can send its output to a display engine securely. Secure communications with the display can provide a level of confidentiality of content generated by protected graphics modules against software and hardware attacks.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Siddhartha Chhabra, Uday R. Savagaonkar, Prashant Dewan, Michael A. Goldsmith, David M. Durham
  • Publication number: 20140189325
    Abstract: Embodiments of an invention for paging in secure enclaves are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first instruction. The execution unit is to execute the first instruction, wherein execution of the first instruction includes evicting a first page from an enclave page cache.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Francis X. Mckeen, Michael A. Goldsmith, Barry E. Huntley, Simon P. Johnson, Rebekah Leslie, Carlos V. Rozas, Uday R. Savagaonkar, Vincent R. Scarlata, Vedvyas Shanbhogue, Wesley H. Smith, Ittai Anati, Ilya Alexandrovich, Alex Berenzon
  • Publication number: 20140189242
    Abstract: Embodiments of an invention for logging in secure enclaves are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction having an associated enclave page cache address. The execution unit is to execute the instruction without causing a virtual machine exit, wherein execution of the instruction includes logging the instruction and the associated enclave page cache address.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Francis X. Mckeen, Michael A. Goldsmith, Barrey E. Huntley, Simon P. Johnson, Rebekah Leslie, Carlos V. Rozas, Uday R. Savagaonkar, Vincent R. Scarlata, Vedvyas Shanbhogue, Wesley H. Smith
  • Publication number: 20140189326
    Abstract: Embodiments of an invention for memory management in secure enclaves are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first instruction and a second instruction. The execution unit is to execute the first instruction, wherein execution of the first instruction includes allocating a page in an enclave page cache to a secure enclave. The execution unit is also to execute the second instruction, wherein execution of the second instruction includes confirming the allocation of the page.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Rebekah Leslie, Carlos V. Rozas, Vincent R. Scarlata, Simon P. Johnson, Uday R. Savagaonkar, Barry E. Huntley, Vedvyas Shanbhogue, Ittai Anati, Francis X. Mckeen, Michael A. Goldsmith, Ilya Alexandrovich, Alex Berenzon, Wesley H. Smith
  • Publication number: 20140189274
    Abstract: An apparatus and method for managing a protection table by a processor. For example, a processor according to one embodiment of the invention comprises: protection table management logic to manage a protection table, the protection table having an entry for each protected page or each group of protected pages in memory; wherein the protection table management logic prevents direct access to the protection table by user application program code and operating system program code but permits direct access by the processor.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Gur Hildesheim, Ittai Anati, Hisham Shafi, Shlomo Raikin, Gideon Gerzon, Uday R Savagaonkar, Carlos V Rozas, Francis X McKeen, Michael A Goldsmith, Dewan Prashant
  • Publication number: 20140189246
    Abstract: Embodiments of an invention for measuring applications loaded in secure enclaves at runtime are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to extend a first measurement of a secure enclave with a second measurement. The execution unit is to execute the instruction after initialization of the secure enclave.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Inventors: Bin Xing, Matthew E. Hoekstra, Michael A. Goldsmith, Carlos V. Rozas, Vincent R. Scarlata, Simon P. Johnson, Uday R. Savagaonkar, Francis X. Mckeen, Stephen J. Tolopka
  • Publication number: 20140157410
    Abstract: In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments.
    Type: Application
    Filed: November 30, 2012
    Publication date: June 5, 2014
    Inventors: Prashant Dewan, Uday R. Savagaonkar, David M. Durham, Paul S. Schmitz, Jason Martin, Michael Goldsmith, Ravi L. Sahita, Frank X McKeen, Carlos Rozas, Vembu Balaji, Scott Janus, Geoffrey S. Strongin, Xiaozhu Kang, Karanvir S. Grewal, Siddhartha Chhabra, Alpha T. Narendra Trivedi
  • Publication number: 20140096068
    Abstract: A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Prashant Dewan, Siddhartha Chhabra, Xiaozhu Kang, Xiaoning Li, Uday R. Savagaonkar, David M. Durham, Paul S. Schmitz, Michael A. Goldsmith, Jason Martin
  • Publication number: 20140059817
    Abstract: Described, is a paper clip with improved performance and appearance. The paper clip comprises a lower envelope section formed from a face and a lower back part connected by a set of edges. An upper envelope section is formed from the face and an upper back part connected by a set of edges. A fold line is formed along the face. The upper envelope section is folded along the fold line such that by folding the upper envelope section along the fold line, the lower envelope section is able to receive corners of several pieces of paper. The lower envelope section is formed such that it serves as a fulcrum for the corners of the pieces of paper to be bent around to secure the pieces of paper. In a desired aspect, the paper clip is formed of paper or other sheet stock material.
    Type: Application
    Filed: August 30, 2013
    Publication date: March 6, 2014
    Inventors: Nadim William George, Edward Michael Goldsmith
  • Patent number: 8659424
    Abstract: A system to detect subsurface activity. The system employs vibration sensor pairs, with each sensor pair having a shallow sensor and a deep sensor. Outputs of the sensors of a pair are processed together and events are detected based on the relative values detected by the sensors of the pair. When signal energy departs from a detected background level, the relative amplitude and frequency content of vibrations measured at the shallow and deep sensors may be compared. The comparison may be performed, at least in part, using a classifier that discriminates between subsurface activity and surface activity. The outputs of sensor pairs may be aggregated to make a determination of whether subsurface activity exists and/or its location. Aggregation may involve comparing the outputs of the same sensor pair at multiple time intervals or may involve comparing the outputs of arrayed sensor pairs.
    Type: Grant
    Filed: February 9, 2010
    Date of Patent: February 25, 2014
    Assignees: Raytheon BBN Technologies, Corp., US Army Corps of Enginees
    Inventors: Peter Allen Krumhansl, William Coney, Richard Mullen, Jason R. McKenna, Michael Goldsmith
  • Publication number: 20140013422
    Abstract: A method and computing device for continuous multi-factor authentication are included in which a plurality of valid authentication credentials may be detected. Also, an authorized user may be detected within a viewing area. Additionally, an unauthorized object may be detected in the viewing area. Furthermore, a display device may be prevented from displaying content.
    Type: Application
    Filed: July 3, 2012
    Publication date: January 9, 2014
    Inventors: Scott Janus, Kenneth T. Layton, Michael A. Goldsmith
  • Publication number: 20140006746
    Abstract: Embodiments of apparatuses and methods including virtual address memory range registers are disclosed. In one embodiment, a processor includes a memory interface, address translation hardware, and virtual memory address comparison hardware. The memory interface is to access a system memory using a physical memory address. The address translation hardware is to support translation of a virtual memory address to the physical memory address. The virtual memory address is used by software to access a virtual memory location in the virtual memory address space of the processor. The virtual memory address comparison hardware is to determine whether the virtual memory address is within a virtual memory address range.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: Gur Hildesheim, Shlomo Raikin, Ittai Anati, Gideon Gerzon, Uday Savagaonkar, Francis Mckeen, Carlos Rozas, Michael Goldsmith, Prashant Dewan
  • Patent number: 8549529
    Abstract: Various embodiments herein provide one or more systems, methods, software, and data structures for executing multiple functions using more than one resource within a computing system. Examples of functions comprise data processing filters and effects. Resources include, for example, a central processing unit (CPU) and a graphics processing unit (GPU). Based on an input graph received from a user, one or more execution graphs may be generated to indicate the resources to be used and data conversions to be performed.
    Type: Grant
    Filed: May 29, 2009
    Date of Patent: October 1, 2013
    Assignee: Adobe Systems Incorporated
    Inventors: Axel Schildan, Frank Jargstorff, Kevin Michael Goldsmith, Gavin Miller
  • Patent number: 8532650
    Abstract: Various embodiments for a communication control configuration and a communication control method are described for wireless communication devices having at least two radios that can potentially interfere with one another. The control schemes described herein reduce the likelihood that the two radios will interfere with one another during operation.
    Type: Grant
    Filed: August 29, 2006
    Date of Patent: September 10, 2013
    Assignee: BlackBerry Limited
    Inventor: Michael Goldsmith
  • Publication number: 20130198853
    Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
    Type: Application
    Filed: March 13, 2013
    Publication date: August 1, 2013
    Inventors: Francis X. McKEEN, Carlos V. ROZAS, Uday R. SAVAGAONKAR, Simon P. JOHNSON, Vincent SCARLATA, Michael A. GOLDSMITH, Ernie BRICKELL, Jiang Tao LI, Howard C. HERBERT, Prashant DEWAN, Stephen J. TOLOPKA, Gilbert NEIGER, David DURHAM, Gary GRAUNKE, Bernard LINT, Don A. VAN DYKE, Joseph CIHULA, Stalinselvaraj JEYASINGH, Stephen R. VAN DOREN, Dion RODGERS, John GARNEY, Asher ALTMAN
  • Publication number: 20130159726
    Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
    Type: Application
    Filed: June 19, 2012
    Publication date: June 20, 2013
    Inventors: Francis X. MCKEEN, Carlos V. Rozas, Uday R. Savagaonkar, Simon P. Johnson, Vincent Scarlata, Michael A. Goldsmith, Ernie Brickell, Jiang Tao Li, Howard C. Herbert, Prashant Dewan, Stephen J. Tolopka, Gilbert Neiger, David Durham, Gary Graunke, Bernard Lint, Don A. Van Dyke, Joseph Cihula, Stalinselvaraj Jeyasingh, Stephen R. Van Doren, Dion Rodgers, John Garney, Asher Altman
  • Patent number: 8041866
    Abstract: The disclosure describes a system and method for controlling interfacing parameters for a device when connected to a host. In the system and method, the communications interface is configurable to be in operable connection to a host using a microprocessor in the device having a first bus controller and a second bus controller, the second bus controller external to the microprocessor. The method comprises: establishing an initial connection by the device; conducting negotiations by the device to set a first data transmission rate for the device for the initial connection utilizing a communication bus controller contained in the microprocessor; and after detecting completion of enumeration of the device, re-establishing the connection by the device using the second bus controller in the device that processes the communications at a second transmission rate that is higher than the first data transmission rate.
    Type: Grant
    Filed: November 6, 2009
    Date of Patent: October 18, 2011
    Assignee: Research in Motion Limited
    Inventors: Omar Barake, Michael Goldsmith, Maxime Matton, Jerry Mailloux, Robert Wood, Lyall Winger