Patents by Inventor Nathan Heldt-Sheller
Nathan Heldt-Sheller has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200275273Abstract: Various systems and methods for establishing network connectivity and onboarding for Internet of Things (IoT) devices and trusted platforms, including in Open Connectivity Foundation (OCF) specification device deployments, are discussed. In an example, a zero touch owner transfer method includes operations of: receiving a first request from a new device for network access to begin an onboarding procedure with a network platform; transmitting credentials of a first network to the new device, the first network used to access a rendezvous server and obtain onboarding information associated with the network platform; receiving a second request from the new device for network access to continue the onboarding procedure; and transmitting credentials of a second network to the new device, as the new device uses the second network to access the onboarding server of the network platform and perform or complete the onboarding procedure with the network platform.Type: ApplicationFiled: September 28, 2018Publication date: August 27, 2020Inventors: Ned M. Smith, Mats Gustav Agerstam, Nathan Heldt-Sheller, Abhilasha Bhargav-Spantzel
-
Publication number: 20200204556Abstract: Various systems and methods for implementing an access control policy that provides subject matching in distributed access control scenarios, such as Internet of Things (IoT) device interconnection settings, are described. An access evaluator 330 intermediates and evaluates IoT subject(s) requesting access to IoT object(s).Type: ApplicationFiled: May 9, 2017Publication date: June 25, 2020Inventors: Ned M. Smith, Nathan Heldt-Sheller
-
Publication number: 20200186998Abstract: Various systems and methods for discovery and onboarding in an interconnected network framework of Internet of Things (IoT) devices are described. In an example, a technique for onboarding and provisioning a device onto an interconnected network framework includes operations to: receive a unique temporary device identifier from a device instance, the device instance indicating availability for onboarding onto a network; onboard the device instance onto the network; establish a secure session with the device instance via the network; receive, in the secure session, a secure device identifier; and initiate provisioning of the device instance in a secure directory based on the secure device identifier. In a further example, techniques are provided to securely identify and provision a second device instance (a doppelganger device instance) operating on a physical device that hosts both the first device instance and the second device instance.Type: ApplicationFiled: May 9, 2017Publication date: June 11, 2020Inventors: Ned M. Smith, Nathan Heldt-Sheller
-
Publication number: 20200097353Abstract: Various systems and methods for implementing a soft reset state. A server device includes processing circuitry; and at least one storage device including instructions embodied thereon, wherein the instructions, which when executed by the processing circuitry, configure the processing circuitry to perform operations of a soft reset operation, the operations to: define a soft reset state; cause a check of a secure virtual resource (SVR) of the server device, while in the soft reset state; and transition from the soft reset state in response to an event.Type: ApplicationFiled: December 29, 2017Publication date: March 26, 2020Inventors: Ned M. Smith, Nathan Heldt-Sheller
-
Publication number: 20200067938Abstract: Systems and techniques for defining and operating management services within a “domain” portion of an Internet of Things (IoT) network are disclosed herein. An example technique for implementing management functions of a device in a domain of the IoT network, for a device that is a defined within a hierarchy managed in the domain, may include: defining a resource structure in a secure virtual resource of the device, for a resource structure that identifies and defines at least one management service of the device; establishing properties of the at least one management service resource on the device within a resource structure, with the use of properties that are associated with a management function to be performed in the domain; and operating the device in the domain according to the management function. Further integration and use of management services and other management functions are also disclosed.Type: ApplicationFiled: January 11, 2018Publication date: February 27, 2020Inventors: Ned M. Smith, Nathan Heldt-Sheller
-
Patent number: 10419438Abstract: In one embodiment, a method includes: presenting, in a user interface of an authoring tool, a plurality of levels of abstraction for a network having a plurality of devices; receiving information from a user regarding a subset of the plurality of devices to be provisioned with one or more security keys and an access control policy; automatically provisioning a key schedule for the subset of the plurality of devices in the network based on the user input and a topological context of the network; and automatically provisioning the access control policy for the subset of the plurality of devices in the network based on the user input and the topological context of the network.Type: GrantFiled: December 26, 2015Date of Patent: September 17, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Shao-Wen Yang, Nathan Heldt-Sheller, Thomas G. Willis
-
Patent number: 10389756Abstract: In one embodiment, an apparatus comprises a first logic to receive security attribute information from a plurality of devices, generate a connectivity graph of the plurality of devices based at least in part on the security attribute information and identify an interoperability issue between a first device and a second device based on the connectivity graph. The apparatus may further include a second logic to generate a recommendation to resolve the interoperability issue and a third logic to provide provisioning information to at least one of the first device and the second device based on the recommendation. Other embodiments are described and claimed.Type: GrantFiled: February 17, 2016Date of Patent: August 20, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Rajesh Poornachandran, Nathan Heldt-Sheller
-
Patent number: 10331906Abstract: Embodiments of the present disclosure are directed toward publication and/or removal of attributes in a multi-user computing environment. In some embodiments, a consumer information manager (CIM) associated with a user of a multi-user computing system may receive a notification, from a dimension authority (DA), of a decrease in a population count of users of the computing system who have published an attribute within the computing system, and may determine whether the user has published the attribute. In response to receiving the notification of the decrease and determining that the user has published the attribute, the CIM may determine a likelihood that continued publication of the attribute will enable identification of the user, compare the likelihood to a threshold, and, when the likelihood exceeds the threshold, remove the attribute from publication. Other embodiments may be disclosed and/or claimed.Type: GrantFiled: July 14, 2017Date of Patent: June 25, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Nathan Heldt-Sheller, Thomas G. Willis
-
Patent number: 10244001Abstract: In one embodiment, a method includes receiving a first request from a first device to access a first resource of the system and determining whether to grant access to the first resource based on a first access control list stored in the system, the first access control list associated with the first device, the first device having a first relevance value, and based on the determination, granting the access to the first resource; and receiving a second request from a second device to access a second resource of the system and forwarding the second request to an access manager service coupled to the system to determine whether to grant access to the second resource based on a second access control list stored in the access manager service associated with the second device, the second device having a second relevance value, receive an access grant from the access manager service and based thereon, granting the access to the second resource.Type: GrantFiled: September 8, 2016Date of Patent: March 26, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Mats G. Agerstam, Nathan Heldt-Sheller
-
Patent number: 10237682Abstract: Various embodiments are generally directed to the provision and use of geometric location based security systems that use multiple beacons for determining a location. A beacon transmitted from an ultrasound broadcast as well as one or more different wireless broadcasts can be used to geo-locate a device and provide access controls based on the geo-location.Type: GrantFiled: April 5, 2017Date of Patent: March 19, 2019Assignee: INTEL CORPORATIONInventors: Ned M. Smith, Micah J. Sheller, Nathan Heldt-Sheller
-
Patent number: 10230696Abstract: In one embodiment, a method includes: request enrollment of the device with an identity provider, the enrollment including at least one role for the device for a publish-subscribe protocol of a distributed network; receiving a device identity credential from the identity provider and store the device identity credential in the device; receiving a ticket credential for a first topic associated with a first publisher, the ticket credential including the at least one role for the device; receiving a group key from a key manager for a group associated with the publish-subscribe protocol; and receiving content for the first topic in the device, the content protected by the group key.Type: GrantFiled: September 25, 2015Date of Patent: March 12, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Nathan Heldt-Sheller
-
Publication number: 20190041853Abstract: Apparatuses, methods, and systems for performing a distributed compute task by a computer-assisted or autonomous driving (CA/AD) vehicle are disclosed herein. In embodiments, an apparatus may include a communication interface disposed in the CA/AD vehicle to receive the compute task. In embodiments, the compute task is part of a collection of distributed compute tasks that are assigned to the CA/AD vehicle or other compute apparatuses based at least in part on resources available to the CA/AD vehicle and to the other computer apparatuses. In embodiments, a compute engine may perform the compute task using, at least in part, the available resources of the CA/AD vehicle. Other embodiments may be disclosed and claimed.Type: ApplicationFiled: June 29, 2018Publication date: February 7, 2019Inventors: Siddharth Jain, Ned M. Smith, Nathan Heldt-Sheller, Shantanu Kulkarni
-
Patent number: 10187389Abstract: Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the technologies include a client device having an architectural enclave which may function to identify one of a plurality of digital rights management protocols for protecting digital information to be received from a content provider or a sensor. The architectural enclave select a preexisting secure information processing environment (SIPE) to process said digital information, if a preexisting SIPE supporting the DRM protocol is present on the client. If a preexisting SIPE supporting the DRM protocol is not present on the client, the architectural enclave may general a new SIPE that supports the DRM protocol on the client. Transmission of the digital information may then be directed to the selected preexisting SIPE or the new SIPE, as appropriate.Type: GrantFiled: July 18, 2017Date of Patent: January 22, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Nathan Heldt-Sheller, Reshma Lal, Micah J. Sheller, Matthew E. Hoekstra
-
Publication number: 20180341756Abstract: Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of various context states of a mobile computing device based on sensor data generated by sensors of the mobile computing device. An authentication manager of the computing device implements an authentication state machine to authenticate a user of the computing device. The authentication state machine includes a number of authentication states, and each authentication state includes one or more transitions to another authentication state. Each of the transitions is dependent upon a context state output. The computing device may also include a device security manager, which implements a security state machine that includes a number of security states. Transition between security states is dependent upon the present authentication state of the user. The device security manager may implement a different security function in each security state.Type: ApplicationFiled: May 17, 2018Publication date: November 29, 2018Inventors: Ned M. Smith, Nathan Heldt-Sheller, Micah J. Sheller, Kevin C. Wells, Hannah L. Scurfield, Nathaniel J. Goss, Sindhu Pandian, Brad H. Needham
-
Patent number: 10083304Abstract: Technologies for information security include a computing device with one or more sensors. The computing device may authenticate a user and, after successful authentication, analyze sensor data to determine whether it is likely that the user authenticated under duress. If so, the computing device performs a security operation such as generating an alert or presenting false but plausible data to the user. Additionally or alternatively, the computing device, within a trusted execution environment, may monitor sensor data and apply a machine-learning classifier to the sensor data to identify an elevated risk of malicious attack. For example, the classifier may identify potential user identification fraud. The computing device may trigger a security response if elevated risk of attack is detected. For example, the trusted execution environment may trigger increased authentication requirements or increased anti-theft monitoring for the computing device. Other embodiments are described and claimed.Type: GrantFiled: February 28, 2017Date of Patent: September 25, 2018Assignee: Intel CorporationInventors: Jasmeet Chhabra, Ned M. Smith, Micah J. Sheller, Nathan Heldt-Sheller
-
Patent number: 10075443Abstract: In one embodiment, a system includes a processor having a first logic to execute in a trusted execution environment, and a storage to store a plurality of access control policies, each of the plurality of access control policies associated with a composite device state of the system and including an access policy for a resource to be protected by the first logic, where the first logic is to apply one or more of the plurality of access control policies to a request for access to the resource, responsive to a matching of the associated composite device state of the one or more access control policies with a current composite device state of the system. Other embodiments are described and claimed.Type: GrantFiled: September 24, 2015Date of Patent: September 11, 2018Assignee: Intel CorporationInventors: Nathan Heldt-Sheller, Ned M. Smith
-
Patent number: 10055556Abstract: Technologies for authenticating a user of a computing device based on an authentication context state includes generating context state outputs indicative of various context states of a mobile computing device based on sensor data generated by sensors of the mobile computing device. An authentication manager of the computing device implements an authentication state machine to authenticate a user of the computing device. The authentication state machine includes a number of authentication states, and each authentication state includes one or more transitions to another authentication state. Each of the transitions is dependent upon a context state output. The computing device may also include a device security manager, which implements a security state machine that includes a number of security states. Transition between security states is dependent upon the present authentication state of the user. The device security manager may implement a different security function in each security state.Type: GrantFiled: September 26, 2015Date of Patent: August 21, 2018Assignee: Intel CorporationInventors: Ned M. Smith, Nathan Heldt-Sheller, Micah J. Sheller, Kevin C. Wells, Hannah L. Scurfield, Nathaniel J. Goss, Sindhu Pandian, Brad H. Needham
-
Publication number: 20180218548Abstract: The present disclosure is directed to secure vehicular data management with enhanced privacy. A vehicle may comprise at least a vehicular control architecture (VCA) for controlling operation of the vehicle and a device. The VCA may record operational data identifying at least one vehicle operator and vehicular operational data recorded during operation of the vehicle by the at least one vehicle operator. The device may include at least a communication module and a trusted execution environment (TEE) including a privacy enforcement module (PEM). The PEM may receive the operational data from the VCA via the communication module, may generate filtered data by filtering the operational data based on privacy settings and may cause the filtered data to be transmitted via the communication module. The filtered data may be transmitted to at least one data consumer. The privacy settings may be configured in the PEM by the at least one operator.Type: ApplicationFiled: March 22, 2018Publication date: August 2, 2018Applicant: INTEL CORPORATIONInventors: Ned M. Smith, Thomas G. Willis, Nathan Heldt-Sheller
-
Patent number: 10037544Abstract: Generally, this disclosure provides technologies for collecting ad statistics in a privacy sensitive manner. In some embodiments the technology includes a system which includes a plurality of client devices, each hosting a context information management (CIMM) module in a secure processing environment. Each CIMM may be operable to select ads for display and calculate statistics for each of the selected ads. The CIMMs may generate a vector representative of those statistics, and may encrypt that vector using additive homomorphic encryption. The encrypted vector may be associated with a statistics collection counter, which may be incremented each time an encrypted vector is calculated. Each CIMM may compare the incremented counter value to a threshold, and may distribute the encrypted vector to another CIMM for further statistical tabulation if the incremented value is less than the threshold.Type: GrantFiled: December 18, 2013Date of Patent: July 31, 2018Assignee: Intel CorporationInventors: Ned M. Smith, Nathan Heldt Sheller
-
Patent number: 10009359Abstract: In one embodiment, a method includes receiving, in an on-boarding system for a first network, a request to transfer ownership of a first device to a new owner; receiving, in the on-boarding system, notification information from a spectrum analyzer regarding wireless signal information within the first network; determining if a potential attacker is within a radio range of the first network based on the wireless signal information; responsive to determining that the potential attacker is within the radio range, manipulating a signal strength of the on-boarding system and the first device, to limit an emission range of the on-boarding system and the first device; and performing a native communication protocol to communicate ownership information, and to cause the first device to store the ownership information in a storage of the first device.Type: GrantFiled: September 25, 2015Date of Patent: June 26, 2018Assignee: Intel CorporationInventors: Ned M. Smith, Nathan Heldt-Sheller, Sachin Agrawal, Mats G. Agerstam