Patents by Inventor Moshe Maor

Moshe Maor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9465946
    Abstract: Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions, for execution in a more secure execution environment. In various embodiments, the subset may include a single entry point and a single exit point. In various embodiments, one or more instructions of the plurality of instructions that precede or follow the subset may be executed in a first execution environment with a first security level. In various embodiments, the subset may be executed in a second execution environment with a second security level that is more secure than the first security level.
    Type: Grant
    Filed: June 1, 2012
    Date of Patent: October 11, 2016
    Assignee: Intel Corporation
    Inventors: Sergei Goffman, Alex Berenzon, Oron Lenz, Tevi Devor, Bo Zhang, Yoram Zahavi, Moshe Maor
  • Publication number: 20160088322
    Abstract: Methods, systems, and computer readable media can be operable to facilitate an analysis and control of video quality of experience (VQoE) of services delivered to one or more client devices. A content version segment may be selected for delivery to a client device based upon an estimation of the video quality experienced by the client device and the bandwidth available for delivering content to the client device. Video quality estimation may be based upon information associated with the encoding of a media stream coupled with one or more parameters of the client device receiving the media stream. Video quality estimation for one or more client devices may be aggregated and displayed to a service operator and/or may be used to inform content selection decisions in an adaptive bit-rate delivery method.
    Type: Application
    Filed: September 22, 2015
    Publication date: March 24, 2016
    Inventors: Zvika Horev, Moshe Maor, Chris Busch, Uzi Cohen
  • Patent number: 9158902
    Abstract: This disclosure is directed to software modification that may be used to prevent software piracy and prevent unauthorized modification of applications. In some embodiments, a software vendor may modify software prior to distribution to a user. The software vendor may extract cutouts from an application to create a modified application. The modified application and the cutouts may be downloaded by a user device. The user device may run the application using the modified application and by executing the cutouts in a secure execution environment that conceals the underlying code in the cutouts.
    Type: Grant
    Filed: December 29, 2011
    Date of Patent: October 13, 2015
    Assignee: Intel Corporation
    Inventors: Moshe Maor, Shay Gueron
  • Patent number: 9076019
    Abstract: A method and apparatus to provide cryptographic integrity checks and replay protection to protect against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. A tree-based replay protection scheme uses standard XTS-AES to encrypt contents of a cache line in the system memory. A Message-Authentication Code (MAC) for the cache line is encrypted using enhanced XTS-AES and a “time stamp” indicator associated with the cache line. The “time stamp indicator” is stored in a processor.
    Type: Grant
    Filed: June 29, 2011
    Date of Patent: July 7, 2015
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Uday Savagaonkar, Francis X. McKeen, Carlos V. Rozas, David M. Durham, Jacob Doweck, Ofir Mulla, Ittai Anati, Zvika Greenfield, Moshe Maor
  • Publication number: 20140223197
    Abstract: A method and apparatus to provide cryptographic integrity checks and replay protection to protect against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. A tree-based replay protection scheme uses standard XTS-AES to encrypt contents of a cache line in the system memory. A Message-Authentication Code (MAC) for the cache line is encrypted using enhanced XTS-AES and a “time stamp” indicator associated with the cache line. The “time stamp indicator” is stored in a processor.
    Type: Application
    Filed: June 29, 2011
    Publication date: August 7, 2014
    Inventors: Shay Gueron, Uday Savagaonkar, Francis X. McKeen, Carlos V. Rozas, David M. Durham, Jacob Doweck, Ofir Mulla, Ittai Anati, Zvika Greenfield, Moshe Maor
  • Patent number: 8799428
    Abstract: In one embodiment, a networked device includes a main platform having a processor, a memory and a basic input/output system (BIOS), and a management subsystem coupled to the main platform to provision the main platform irrespective of the presence of an operating system on the main platform.
    Type: Grant
    Filed: December 30, 2004
    Date of Patent: August 5, 2014
    Assignee: Intel Corporation
    Inventors: Howard Herbert, Moshe Maor
  • Publication number: 20140208435
    Abstract: This disclosure is directed to software modification that may be used to prevent software piracy and prevent unauthorized modification of applications. In some embodiments, a software vendor may modify software prior to distribution to a user. The software vendor may extract cutouts from an application to create a modified application. The modified application and the cutouts may be downloaded by a user device. The user device may run the application using the modified application and by executing the cutouts in a secure execution environment that conceals the underlying code in the cutouts.
    Type: Application
    Filed: December 29, 2011
    Publication date: July 24, 2014
    Inventors: Moshe Maor, Shay Gueron
  • Publication number: 20140094121
    Abstract: Systems and methods may provide for establishing an out-of-band (OOB) channel between a local wireless interface and a remote backend receiver, and receiving information from a peripheral device via the local wireless interface. Additionally, the information may be sent to the backend receiver via the OOB channel, wherein the OOB channel bypasses a local operating system. In one example, a secure Bluetooth stack is used to receive the information from the peripheral device.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Moshe Maor
  • Publication number: 20140047245
    Abstract: Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions, for execution in a more secure execution environment. In various embodiments, the subset may include a single entry point and a single exit point. In various embodiments, one or more instructions of the plurality of instructions that precede or follow the subset may be executed in a first execution environment with a first security level. In various embodiments, the subset may be executed in a second execution environment with a second security level that is more secure than the first security level.
    Type: Application
    Filed: June 1, 2012
    Publication date: February 13, 2014
    Inventors: Sergei Goffman, Alex Berenzon, Oron Lenz, Tevi Devor, Bo Zhang, Yoram Zahavi, Moshe Maor
  • Patent number: 8468365
    Abstract: A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. An incrementing mechanism using the “time stamp” indicator generates a tweak which separates different contexts over different times such that the effect of “Type 2 replay attacks” is mitigated.
    Type: Grant
    Filed: September 24, 2010
    Date of Patent: June 18, 2013
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Gideon Gerzon, Ittai Anati, Jacob Doweck, Moshe Maor
  • Patent number: 8276595
    Abstract: A lice comb (10) including a plurality of teeth (14) for capturing lice when the teeth (14) are passed through hair. The lice comb (10) is provided with a receptacle (22) including an adhesive inner surface and a means for moving lice captured by the teeth (14) into the receptacle (22) such that the lice come into contact with the adhesive surface, preventing escape of the lice.
    Type: Grant
    Filed: August 23, 2007
    Date of Patent: October 2, 2012
    Inventors: Moshe Maor, Edward J. Khoury, Robert C. A. Culley
  • Publication number: 20120079285
    Abstract: A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. An incrementing mechanism using the “time stamp” indicator generates a tweak which separates different contexts over different times such that the effect of “Type 2 replay attacks” is mitigated.
    Type: Application
    Filed: September 24, 2010
    Publication date: March 29, 2012
    Inventors: SHAY GUERON, GIDEON GERZON, ITTAI ANATI, JACOB DOWECK, MOSHE MAOR
  • Patent number: 8104485
    Abstract: A lice comb (10) comprising a plurality of parallel teeth (12) having upper surfaces (16) and lower surfaces (18). Each pair of adjacent teeth (12) includes a first set of projections (22) on a side surface (24) of one tooth and a second set of projections (26) on a side surface (28) of the adjacent tooth. The first set of projections (22) are provided along at least a portion of the length of the tooth such that hair moving downwardly between the pair of teeth (12) passes through gaps (32) defined between the first set of projections (22). The second set of projections (26) are interspersed between and in a direction toward the lower surface (18) of the teeth (12) such that the strands of hair passing through the gaps (32) are deflected in a direction parallel to the teeth (12) in use by the second set of projections (26).
    Type: Grant
    Filed: August 23, 2007
    Date of Patent: January 31, 2012
    Inventors: Moshe Maor, Edward J. Khoury, Robert C. A. Culley
  • Patent number: 7979702
    Abstract: In one embodiment, a method includes receiving a decommission command from a management console, determining that the decommission command is authentic, and disabling the manageability functions of a management subsystem on a managed device.
    Type: Grant
    Filed: December 29, 2004
    Date of Patent: July 12, 2011
    Assignee: Intel Corporation
    Inventors: Howard Herbert, Moshe Maor
  • Publication number: 20110005540
    Abstract: A lice comb (10) including a plurality of teeth (14) for capturing lice when the teeth (14) are passed through hair. The lice comb (10) is provided with a receptacle (22) including an adhesive inner surface and a means for moving lice captured by the teeth (14) into the receptacle (22) such that the lice come into contact with the adhesive surface, preventing escape of the lice.
    Type: Application
    Filed: August 23, 2007
    Publication date: January 13, 2011
    Inventors: Moshe Maor, Edward J. Khoury, Robert C.A. Culley
  • Publication number: 20100252060
    Abstract: A lice comb (10) comprising a plurality of parallel teeth (12) having upper surfaces (16) and lower surfaces (18). Each pair of adjacent teeth (12) includes a first set of projections (22) on a side surface (24) of one tooth and a second set of projections (26) on a side surface (28) of the adjacent tooth. The first set of projections (22) are provided along at least a portion of the length of the tooth such that hair moving downwardly between the pair of teeth (12) passes through gaps (32) defined between the first set of projections (22).
    Type: Application
    Filed: August 23, 2007
    Publication date: October 7, 2010
    Inventors: Moshe Maor, Edward J. Khoury, Robert C.A. Culley
  • Patent number: 7770003
    Abstract: A method according to one embodiment may include: receiving a first encrypted signal at a server of a computing network, the first encrypted signal comprising firmware encrypted by a first encryption algorithm having a first complexity level; sending a second encrypted signal over the computing network to at least one managed client in response to the first encrypted signal, the second encrypted signal comprising the firmware encrypted by a second encryption algorithm having a second complexity level, wherein said first complexity level is greater than said second complexity level; and updating existing firmware of the at least one managed client in response to receipt of the second signal at the at least one managed client. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Grant
    Filed: December 29, 2004
    Date of Patent: August 3, 2010
    Assignee: Intel Corporation
    Inventors: Howard C. Herbert, Moshe Maor
  • Publication number: 20100169152
    Abstract: In some embodiments targeted messaging and ads are delivered to a target customer in response to end user demographic information and end user computing platform behavior. The delivering is prevented from being overridden by a user or by any software running on the computing platform. Other embodiments are described and claimed.
    Type: Application
    Filed: December 30, 2008
    Publication date: July 1, 2010
    Inventors: Moshe Maor, Gidi Etzion, Christopher E. Cukor
  • Patent number: 7634629
    Abstract: A computer system is disclosed. The computer system includes a storage device, a device controller and a chipset. The device controller includes lock registers having values that correspond to the ranges of locked sectors of the storage device. The lock registers verify if a storage device access request is targeted for ranges of sectors of the storage device that are locked. The chipset includes an embedded controller to authenticate the storage device access request and to manage configuration of the storage device.
    Type: Grant
    Filed: December 19, 2005
    Date of Patent: December 15, 2009
    Assignee: Intel Corporation
    Inventors: Daniel Nemiroff, Howard C. Herbert, Nimrod Diamant, Moshe Maor, Carey W. Smith, Amber Huffman, Fran Corrado, Michael A. Rothman, Vincent J. Zimmer
  • Publication number: 20090172396
    Abstract: In some embodiments input information received at an input device is encrypted before it is sent to a computer to be coupled to the input device. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: INTEL CORPORATION
    Inventors: Douglas Gabel, Moshe Maor