Patents by Inventor Moshe Maor

Moshe Maor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140208435
    Abstract: This disclosure is directed to software modification that may be used to prevent software piracy and prevent unauthorized modification of applications. In some embodiments, a software vendor may modify software prior to distribution to a user. The software vendor may extract cutouts from an application to create a modified application. The modified application and the cutouts may be downloaded by a user device. The user device may run the application using the modified application and by executing the cutouts in a secure execution environment that conceals the underlying code in the cutouts.
    Type: Application
    Filed: December 29, 2011
    Publication date: July 24, 2014
    Inventors: Moshe Maor, Shay Gueron
  • Publication number: 20140094121
    Abstract: Systems and methods may provide for establishing an out-of-band (OOB) channel between a local wireless interface and a remote backend receiver, and receiving information from a peripheral device via the local wireless interface. Additionally, the information may be sent to the backend receiver via the OOB channel, wherein the OOB channel bypasses a local operating system. In one example, a secure Bluetooth stack is used to receive the information from the peripheral device.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Moshe Maor
  • Publication number: 20140047245
    Abstract: Embodiments of apparatus, computer-implemented methods, systems, devices, and computer-readable media are described herein for identifying and encrypting a subset of a plurality of instructions, for execution in a more secure execution environment. In various embodiments, the subset may include a single entry point and a single exit point. In various embodiments, one or more instructions of the plurality of instructions that precede or follow the subset may be executed in a first execution environment with a first security level. In various embodiments, the subset may be executed in a second execution environment with a second security level that is more secure than the first security level.
    Type: Application
    Filed: June 1, 2012
    Publication date: February 13, 2014
    Inventors: Sergei Goffman, Alex Berenzon, Oron Lenz, Tevi Devor, Bo Zhang, Yoram Zahavi, Moshe Maor
  • Patent number: 8468365
    Abstract: A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. An incrementing mechanism using the “time stamp” indicator generates a tweak which separates different contexts over different times such that the effect of “Type 2 replay attacks” is mitigated.
    Type: Grant
    Filed: September 24, 2010
    Date of Patent: June 18, 2013
    Assignee: Intel Corporation
    Inventors: Shay Gueron, Gideon Gerzon, Ittai Anati, Jacob Doweck, Moshe Maor
  • Patent number: 8276595
    Abstract: A lice comb (10) including a plurality of teeth (14) for capturing lice when the teeth (14) are passed through hair. The lice comb (10) is provided with a receptacle (22) including an adhesive inner surface and a means for moving lice captured by the teeth (14) into the receptacle (22) such that the lice come into contact with the adhesive surface, preventing escape of the lice.
    Type: Grant
    Filed: August 23, 2007
    Date of Patent: October 2, 2012
    Inventors: Moshe Maor, Edward J. Khoury, Robert C. A. Culley
  • Publication number: 20120079285
    Abstract: A method and apparatus for protecting against hardware attacks on system memory is provided. A mode of operation for block ciphers enhances the standard XTS-AES mode of operation to perform memory encryption by extending a tweak to include a “time stamp” indicator. An incrementing mechanism using the “time stamp” indicator generates a tweak which separates different contexts over different times such that the effect of “Type 2 replay attacks” is mitigated.
    Type: Application
    Filed: September 24, 2010
    Publication date: March 29, 2012
    Inventors: SHAY GUERON, GIDEON GERZON, ITTAI ANATI, JACOB DOWECK, MOSHE MAOR
  • Patent number: 8104485
    Abstract: A lice comb (10) comprising a plurality of parallel teeth (12) having upper surfaces (16) and lower surfaces (18). Each pair of adjacent teeth (12) includes a first set of projections (22) on a side surface (24) of one tooth and a second set of projections (26) on a side surface (28) of the adjacent tooth. The first set of projections (22) are provided along at least a portion of the length of the tooth such that hair moving downwardly between the pair of teeth (12) passes through gaps (32) defined between the first set of projections (22). The second set of projections (26) are interspersed between and in a direction toward the lower surface (18) of the teeth (12) such that the strands of hair passing through the gaps (32) are deflected in a direction parallel to the teeth (12) in use by the second set of projections (26).
    Type: Grant
    Filed: August 23, 2007
    Date of Patent: January 31, 2012
    Inventors: Moshe Maor, Edward J. Khoury, Robert C. A. Culley
  • Patent number: 7979702
    Abstract: In one embodiment, a method includes receiving a decommission command from a management console, determining that the decommission command is authentic, and disabling the manageability functions of a management subsystem on a managed device.
    Type: Grant
    Filed: December 29, 2004
    Date of Patent: July 12, 2011
    Assignee: Intel Corporation
    Inventors: Howard Herbert, Moshe Maor
  • Publication number: 20110005540
    Abstract: A lice comb (10) including a plurality of teeth (14) for capturing lice when the teeth (14) are passed through hair. The lice comb (10) is provided with a receptacle (22) including an adhesive inner surface and a means for moving lice captured by the teeth (14) into the receptacle (22) such that the lice come into contact with the adhesive surface, preventing escape of the lice.
    Type: Application
    Filed: August 23, 2007
    Publication date: January 13, 2011
    Inventors: Moshe Maor, Edward J. Khoury, Robert C.A. Culley
  • Publication number: 20100252060
    Abstract: A lice comb (10) comprising a plurality of parallel teeth (12) having upper surfaces (16) and lower surfaces (18). Each pair of adjacent teeth (12) includes a first set of projections (22) on a side surface (24) of one tooth and a second set of projections (26) on a side surface (28) of the adjacent tooth. The first set of projections (22) are provided along at least a portion of the length of the tooth such that hair moving downwardly between the pair of teeth (12) passes through gaps (32) defined between the first set of projections (22).
    Type: Application
    Filed: August 23, 2007
    Publication date: October 7, 2010
    Inventors: Moshe Maor, Edward J. Khoury, Robert C.A. Culley
  • Patent number: 7770003
    Abstract: A method according to one embodiment may include: receiving a first encrypted signal at a server of a computing network, the first encrypted signal comprising firmware encrypted by a first encryption algorithm having a first complexity level; sending a second encrypted signal over the computing network to at least one managed client in response to the first encrypted signal, the second encrypted signal comprising the firmware encrypted by a second encryption algorithm having a second complexity level, wherein said first complexity level is greater than said second complexity level; and updating existing firmware of the at least one managed client in response to receipt of the second signal at the at least one managed client. Of course, many alternatives, variations, and modifications are possible without departing from this embodiment.
    Type: Grant
    Filed: December 29, 2004
    Date of Patent: August 3, 2010
    Assignee: Intel Corporation
    Inventors: Howard C. Herbert, Moshe Maor
  • Publication number: 20100169152
    Abstract: In some embodiments targeted messaging and ads are delivered to a target customer in response to end user demographic information and end user computing platform behavior. The delivering is prevented from being overridden by a user or by any software running on the computing platform. Other embodiments are described and claimed.
    Type: Application
    Filed: December 30, 2008
    Publication date: July 1, 2010
    Inventors: Moshe Maor, Gidi Etzion, Christopher E. Cukor
  • Patent number: 7634629
    Abstract: A computer system is disclosed. The computer system includes a storage device, a device controller and a chipset. The device controller includes lock registers having values that correspond to the ranges of locked sectors of the storage device. The lock registers verify if a storage device access request is targeted for ranges of sectors of the storage device that are locked. The chipset includes an embedded controller to authenticate the storage device access request and to manage configuration of the storage device.
    Type: Grant
    Filed: December 19, 2005
    Date of Patent: December 15, 2009
    Assignee: Intel Corporation
    Inventors: Daniel Nemiroff, Howard C. Herbert, Nimrod Diamant, Moshe Maor, Carey W. Smith, Amber Huffman, Fran Corrado, Michael A. Rothman, Vincent J. Zimmer
  • Publication number: 20090172389
    Abstract: In some embodiments a controller establishes a secured connection between a remote computer and a user input device and/or a user output device of a computer. Information is securely transmitted in both directions between the remote computer and the user input device and/or user output device in a manner such that a user of the user input device and/or the user output device securely interacts with the remote computer in a manner that cannot be maliciously interfered with by software running on the computer. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: INTEL CORPORATION
    Inventor: Moshe Maor
  • Publication number: 20090172396
    Abstract: In some embodiments input information received at an input device is encrypted before it is sent to a computer to be coupled to the input device. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: INTEL CORPORATION
    Inventors: Douglas Gabel, Moshe Maor
  • Publication number: 20090172823
    Abstract: In some embodiments a controller controls an input device, receives input information from the input device, excludes a host processor from controlling the input device, and secures the input information received from the input device so that the input information is not received by the host processor or by any software running on the host processor. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Inventor: Moshe Maor
  • Publication number: 20090172410
    Abstract: In some embodiments data input to an input device is encrypted before it is received by any software, and information is stored securely so that the information is not accessible to any software. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: INTEL CORPORATION
    Inventor: Moshe Maor
  • Publication number: 20090172388
    Abstract: In some embodiments data input to an input device is encrypted before it is received by any software. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2007
    Publication date: July 2, 2009
    Applicant: INTEL CORPORATION
    Inventor: Moshe Maor
  • Publication number: 20070143555
    Abstract: A computer system is disclosed. The computer system includes a storage device, a device controller and a chipset. The device controller includes lock registers having values that correspond to the ranges of locked sectors of the storage device. The lock registers verify if a storage device access request is targeted for ranges of sectors of the storage device that are locked. The chipset includes an embedded controller to authenticate the storage device access request and to manage configuration of the storage device.
    Type: Application
    Filed: December 19, 2005
    Publication date: June 21, 2007
    Inventors: Daniel Nemiroff, Howard Herbert, Nimrod Diamant, Moshe Maor, Carey Smith, Amber Huffman, Fran Corrado, Michael Rothman, Vincent Zimmer
  • Publication number: 20060168196
    Abstract: In one embodiment, a networked device includes a main platform having a processor, a memory and a basic input/output system (BIOS), and a management subsystem coupled to the main platform to provision the main platform irrespective of the presence of an operating system on the main platform.
    Type: Application
    Filed: December 30, 2004
    Publication date: July 27, 2006
    Inventors: Howard Herbert, Moshe Maor