Patents by Inventor Ned M. Smith

Ned M. Smith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190222518
    Abstract: Technologies for load balancing on a network device in an edge network are disclosed. According to one embodiment, a network device receives, in the edge network, a request to access a function. The request includes one or more performance requirements. The network device identifies, as a function of an evaluation of the performance requirements and on monitored properties of each device associated with the network device, one or more of the devices to service the request. The network device selects one of the identified devices according to a load balancing policy and sends the request to the selected device.
    Type: Application
    Filed: March 29, 2019
    Publication date: July 18, 2019
    Inventors: Francesc Guim Bernat, Karthik Kumar, Ned M. Smith, Monica Kenguva, Rashmin Patel
  • Patent number: 10355854
    Abstract: An embodiment includes a method executed by at least one processor of a first computing node comprising: form a first group of computing nodes, wherein forming the first group comprises providing (a)(i) a public key and a first seed value to each of second and third nodes, (a)(ii) second and third private keys, which both correspond to the public key and are unequal to each other, respectively to the second and third nodes; determine a first key encryption key (KEK) pair based on the first seed value; determine a second KEK pair based on (b)(i) a second seed value that is derived from the first seed value, and (b)(ii) determining a predetermined time period has expired; and receive a symmetric key encrypted with a public key of the second KEK and decrypting the encrypted symmetric key with a private key of the second KEK. Other embodiments are described herein.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: July 16, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Rajesh Poornachandran
  • Patent number: 10348499
    Abstract: Various embodiments are directed to techniques for controlling access to data in a decentralized manner. An apparatus includes an apportioning component to divide an item of data into multiple portions based on an organizational structure of the item of data; a tree component to generate a PRN tree including a multitude of nodes and a branching structure based on the organizational structure, the multitude including at least one branching node and multiple leaf nodes that correspond to the multiple portions; a PRN component to generate a PRN for each node of the multitude, the PRN component to use a PRN of a branching node of the PRN tree to generate a PRN for a leaf node that depends therefrom; and a communications component to transmit the multiple portions and multiple addresses based on PRNs of leaf nodes of the PRN tree to a server. Other embodiments are described and claimed.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: July 9, 2019
    Assignee: INTEL CORPORATION
    Inventors: William C. Deleeuw, Ned M. Smith
  • Patent number: 10339014
    Abstract: Disclosed herein are distributed ledger systems and methods for efficiently creating and updating a query optimized distributed ledger. In particular, the present disclosure introduces methods and apparatuses for efficiently updating indexes when new blocks are added to the distributed ledger by using snapshots of data and appending new snapshot tables and indexes to previous snapshot tables and indexes.
    Type: Grant
    Filed: September 28, 2016
    Date of Patent: July 2, 2019
    Assignee: McAfee, LLC
    Inventors: Ned M. Smith, Vincent J. Zimmer, Rajesh Poornachandran, Cedric Cochin, Igor G. Muttik
  • Patent number: 10341348
    Abstract: A method to onboard a slave node to a high performance computing system that includes a fabric switch network that includes a fabric switch master and a group of slave nodes, wherein the fabric switch master is configured to route messages between slave nodes of the group comprising: receiving a fabric switch master address message, at an onboarding slave node, over an external network; providing an identification message, by the onboarding slave node, over the fabric switch network; receiving the identification message, at the fabric switch master, over the fabric switch network; providing the permission message, by the fabric switch master, over the fabric switch network; and receiving, a permission message, at the onboarding slave node, over the fabric switch network.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: July 2, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Barry E. Huntley, Simon Hunt
  • Patent number: 10331906
    Abstract: Embodiments of the present disclosure are directed toward publication and/or removal of attributes in a multi-user computing environment. In some embodiments, a consumer information manager (CIM) associated with a user of a multi-user computing system may receive a notification, from a dimension authority (DA), of a decrease in a population count of users of the computing system who have published an attribute within the computing system, and may determine whether the user has published the attribute. In response to receiving the notification of the decrease and determining that the user has published the attribute, the CIM may determine a likelihood that continued publication of the attribute will enable identification of the user, compare the likelihood to a threshold, and, when the likelihood exceeds the threshold, remove the attribute from publication. Other embodiments may be disclosed and/or claimed.
    Type: Grant
    Filed: July 14, 2017
    Date of Patent: June 25, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Nathan Heldt-Sheller, Thomas G. Willis
  • Patent number: 10331945
    Abstract: A mechanism is described for facilitating fair, secured, and efficient completely automated public turing test to tell computers and humans apart (CAPTCHA) according to one embodiment. A method of embodiments, as described herein, includes receiving distinctive data relating to a user, where the distinctive data includes a video clip of the user, where the distinguishing data is captured using one or more cameras. The method may further include recognizing one or more features of the user from the video clip to determine whether the user is a human, and testing one or more characteristics of the user or the video clip to determine whether the human is a live human. The method may further include allowing access to the user to an application, if the user is determined to be the live human.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: June 25, 2019
    Assignee: Intel Corporation
    Inventors: Jose P. Piccolotto, Ned M. Smith
  • Patent number: 10326590
    Abstract: Technologies for trusted device on-boarding include a first computing device to generate a first public Diffie-Hellman key based on a private Diffie-Hellman key and a first unique identifier of the first computing device. The first unique identifier is retrieved from secure memory of the first computing device. The first computing device transmits the first public Diffie-Hellman key to a second computing device and receives, from the second computing device, a second public Diffie-Hellman key of the second computing device. The second public Diffie-Hellman key incorporates a second unique identifier of the second computing device. Further, the first computing device removes a contribution of the second unique identifier from the second public Diffie-Hellman key to generate a modified public Diffie-Hellman key and generates a shared Diffie-Hellman key based on the modified public Diffie-Hellman key and the private Diffie-Hellman key of the first computing device.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: June 18, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Jesse Walker, Mats Agerstam, Ravi S. Subramaniam, Eduardo Cabre
  • Patent number: 10318738
    Abstract: Systems and methods may be used to securely booting multiple devices. A method may include initiating a boot sequence at a first device in an array of devices, booting a first distributed boot executive (DBE) on the first device, updating a Platform Configuration Register (PCR) with a first boot measurement, sharing the first boot measurement with a second DBE on a second device of the devices before booting a next boot step at the first device, receiving a second boot measurement from the second DBE, and booting the first device into a next boot stage in response to receiving the second boot measurement from the second DBE.
    Type: Grant
    Filed: December 27, 2016
    Date of Patent: June 11, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Rajesh Poornachandran
  • Patent number: 10318746
    Abstract: There is disclosed in an example, a computing apparatus, including: a trusted execution environment (TEE); and one or more logic elements providing a collaboration engine within the TEE, operable to: receive a change to a secured document via a trusted channel; apply a change to the secured document; log the change to a ledger; and display the document to a client device via a protected audio-video path (PAVP). There is also disclosed a method of providing a collaboration engine, and a computer-readable medium having stored thereon executable instructions for providing a collaboration engine.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: June 11, 2019
    Assignee: McAfee, LLC
    Inventors: Oleg Pogorelik, Alex Nayshtut, Ned M. Smith, Igor Muttik, Omer Ben-Shalom
  • Publication number: 20190173861
    Abstract: There is disclosed in one example a sentinel device, including: a hardware platform including at least a processor and configured to provide a trusted execution environment (TEE); and a security engine operable to instruct the hardware platform to: determine that an internet of things (IoT) device in a first realm R1 requires a secure communication channel with a second device in a second realm R2; query a key server for a service appliance key for the secure communication channel; establish a secure communication channel with the endpoint device using the service appliance key and the TEE; and provide a security service function within R1 including brokering communication via the secure communication channel between the IoT device and the second device.
    Type: Application
    Filed: February 12, 2019
    Publication date: June 6, 2019
    Applicant: McAfee, LLC
    Inventors: Ned M. Smith, Simon Hunt, Venkata Ramanan Sambandam
  • Publication number: 20190171510
    Abstract: There is disclosed in one example a network device, including: a hardware platform including at least a processor and a memory; a communication interface; and stored instructions on the memory to instruct the processor to provide a health monitoring engine (HME) configured to: communicatively couple to a network via the network interface; construct a reference template during a training period; observe watchdog behavior on the network during an observation period; identify an abnormality in the watchdog behavior including a substantial variance from the reference template; and trigger a resilience response to the substantial variance.
    Type: Application
    Filed: January 29, 2019
    Publication date: June 6, 2019
    Applicant: McAfee, LLC
    Inventors: Ned M. Smith, Thiago Jose Macieira, Zheng Zhang, Tobias M. Kohlenberg, Igor G. Muttik
  • Patent number: 10303456
    Abstract: Technologies for performing energy efficient software distribution include a mesh node. The mesh node is to obtain fingerprint data of a plurality of other mesh nodes in a network. The mesh node is also to determine corresponding characteristics of the mesh nodes from the obtained fingerprint data, including an energy status of each of the mesh nodes. The mesh node is also to perform an analysis of a software update, determine, as a function of the analysis of the software update, one or more target mesh nodes of the plurality of mesh nodes for the software update, and determine a path through the mesh nodes to the one or more target mesh nodes as a function of the fingerprint data. Other embodiments are also described and claimed.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: May 28, 2019
    Assignee: Intel Corporation
    Inventors: Simon Hunt, Ned M. Smith, Barry E. Huntley, Rita H. Wouhaybi
  • Publication number: 20190158300
    Abstract: An architecture to allow Multi-Access Edge Computing (MEC) billing and charge tracking, is disclosed. In an example, a tracking process, such as is performed by an edge computing apparatus, includes: receiving a computational processing request for a service operated with computing resources of the edge computing apparatus from a connected edge device within the first access network, wherein the computational processing request includes an identification of the connected edge device; identifying a processing device, within the first access network, for performing the computational processing request; and storing the identification of the connected edge device, a processing device identification, and data describing the computational processes completed by the processing device in association with the computational processing request.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 23, 2019
    Inventors: Dario Sabella, Ned M. Smith, Neal Oliver, Kshitij Arun Doshi, Suraj Prabhakaran, Miltiadis Filippou, Francesc Guim Bernat
  • Publication number: 20190158606
    Abstract: An architecture to perform resource management among multiple network nodes and associated resources is disclosed. Example resource management techniques include those relating to: proactive reservation of edge computing resources; deadline-driven resource allocation; speculative edge QoS pre-allocation; and automatic QoS migration across edge computing nodes.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 23, 2019
    Inventors: FRANCESC GUIM BERNAT, PATRICK BOHAN, KSHITIJ ARUN DOSHI, BRINDA GANESH, ANDREW J. HERDRICH, MONICA KENGUVA, KARTHIK KUMAR, PATRICK G. KUTCH, FELIPE PASTOR BENEYTO, RASHMIN PATEL, SURAJ PRABHAKARAN, NED M. SMITH, PETAR TORRE, ALEXANDER VUL
  • Publication number: 20190146778
    Abstract: Examples for device-driven auto-recovery using multiple recovery sources are disclosed herein. At least one storage device or storage disk includes instructions that, when executed, cause at least one processor to at least detect a flaw in a first configuration of a program to be installed on a programmable device, the first configuration recorded on a first chain of a distributed ledger of a blockchain; correct the flaw in the first configuration to generate a corrected configuration; commit the corrected configuration to the distributed ledger, the corrected configuration to create a second chain of the distributed ledger; detect an update of the first configuration to a first updated configuration and an update to the corrected configuration to an updated corrected configuration; and prevent the first updated configuration from being installed on the programmable device by replacing the first updated configuration with the updated corrected configuration on the second chain.
    Type: Application
    Filed: December 18, 2018
    Publication date: May 16, 2019
    Inventors: Ned M. Smith, Zheng Zhang, Thiago J. Macieira
  • Publication number: 20190141536
    Abstract: A service coordinating entity device includes communications circuitry to communicate with a first access network, processing circuitry, and a memory device. The processing circuitry is to perform operations to, in response to a request for establishing a connection with a user equipment (UE) in a second access network, retrieve a first Trusted Level Agreement (TLA) including trust attributes associated with the first access network. One or more exchanges of the trust attributes of the first TLA and trust attributes of a second TLA associated with the second access network are performed using a computing service executing on the service coordinating entity. A common TLA with trust attributes associated with communications between the first and second access networks is generated based on the exchanges. Data traffic is routed from the first access network to the UE in the second access network based on the trust attributes of the common TLA.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: Alexander Bachmutsky, Dario Sabella, Francesc Guim Bernat, John J. Browne, Kapil Sood, Kshitij Arun Doshi, Mats Gustav Agerstam, Ned M. Smith, Rajesh Poornachandran, Tarun Viswanathan
  • Publication number: 20190138294
    Abstract: Various systems and methods for enabling derivation and distribution of an attestation manifest for a software update image are described. In an example, these systems and methods include orchestration functions and communications, providing functionality and components for a software update process which also provides verification and attestation among multiple devices and operators.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: Ned M. Smith, Kshitij Arun Doshi, John J. Browne, Vincent J. Zimmer, Francesc Guim Bernat, Kapil Sood
  • Publication number: 20190138908
    Abstract: Various systems and methods of artificial intelligence (AI) processing using hardware acceleration within edge computing settings are described herein. In an example, processing performed at an edge computing device includes: obtaining a request for an AI operation using an AI model; identifying, based on the request, an AI hardware platform for execution of an instance of the AI model; and causing execution of the AI model instance using the AI hardware platform. Further operations to analyze input data, perform an inference operation with the AI model, and coordinate selection and operation of the hardware platform for execution of the AI model, is also described.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: Francesc Guim Bernat, Ned M. Smith
  • Publication number: 20190141610
    Abstract: Various systems and methods for enhancing a distributed computing environment with multiple edge hosts and user devices, including in multi-access edge computing (MEC) network platforms and settings, are described herein. A device of a lifecycle management (LCM) proxy apparatus obtains a request, from a device application, for an application multiple context of an application. The application multiple context for the application is determined. The request from the device application for the application multiple context for the application is authorized. A device application identifier based on the request is added to the application multiple context. A created response for the device application based on the authorization of the request is transmitted to the device application. The response includes an identifier of the application multiple context.
    Type: Application
    Filed: December 28, 2018
    Publication date: May 9, 2019
    Inventors: Dario Sabella, Ned M. Smith, Neal Oliver, Kshitij Arun Doshi, Suraj Prabhakaran, Francesc Guim Bernat, Miltiadis Filippou