Patents by Inventor Rajesh P. Banginwar
Rajesh P. Banginwar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230030961Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: ApplicationFiled: September 30, 2022Publication date: February 2, 2023Applicant: Intel CorporationInventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Patent number: 11467982Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: GrantFiled: August 5, 2020Date of Patent: October 11, 2022Assignee: INTEL CORPORATIONInventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Publication number: 20200364158Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: ApplicationFiled: August 5, 2020Publication date: November 19, 2020Inventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalpati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Patent number: 10754794Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: GrantFiled: December 12, 2017Date of Patent: August 25, 2020Assignee: Intel CorporationInventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Publication number: 20180113817Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: ApplicationFiled: December 12, 2017Publication date: April 26, 2018Inventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Patent number: 9842065Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: GrantFiled: June 15, 2015Date of Patent: December 12, 2017Assignee: Intel CorporationInventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Patent number: 9673985Abstract: In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be stored into a corresponding page of a memory. The processor also includes protection logic to receive a write instruction having a destination address within the memory, and if the destination address is associated with a memory location stores a portion of the digital content, erase the page associated with the memory location. If the destination address is associated with another memory location that does not store any of the digital content, the protection logic is to permit execution of the write instruction. Other embodiments are described and claimed.Type: GrantFiled: June 10, 2016Date of Patent: June 6, 2017Assignee: Intel CorporationInventors: Jayant Mangalampalli, Rajesh P. Banginwar
-
Publication number: 20160364341Abstract: A data processing system (DPS) uses platform protection technology (PPT) to protect some or all of the code and data belonging to certain software modules. The PPT may include a virtual machine monitor (VMM) to enable an untrusted application and a trusted application to run on top of a single operating system (OS), while preventing the untrusted application from accessing memory used by the trusted application. The VMM may use a first extended page table (EPT) to translate a guest physical address (GPA) into a first host physical address (HPA) for the untrusted application. The VMM may use a second EPT to translate the GPA into a second HPA for the trusted application. The first and second EPTs may map the same GPA to different HPAs. Other embodiments are described and claimed.Type: ApplicationFiled: June 15, 2015Publication date: December 15, 2016Applicant: INTEL CORPORATIONInventors: Rajesh P. Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan, Ravi L. Sahita, Rahil Malhotra, Aman Bakshi, Vasudevarao Kamma, Jyothi Nayak, Vivek Thakkar, Royston A. Pinto
-
Publication number: 20160285637Abstract: In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be stored into a corresponding page of a memory. The processor also includes protection logic to receive a write instruction having a destination address within the memory, and if the destination address is associated with a memory location stores a portion of the digital content, erase the page associated with the memory location. If the destination address is associated with another memory location that does not store any of the digital content, the protection logic is to permit execution of the write instruction. Other embodiments are described and claimed.Type: ApplicationFiled: June 10, 2016Publication date: September 29, 2016Inventors: Jayant Mangalampalli, Rajesh P. Banginwar
-
Patent number: 9411983Abstract: In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be stored into a corresponding page of a memory. The processor also includes protection logic to receive a write instruction having a destination address within the memory, and if the destination address is associated with a memory location stores a portion of the digital content, erase the page associated with the memory location. If the destination address is associated with another memory location that does not store any of the digital content, the protection logic is to permit execution of the write instruction. Other embodiments are described and claimed.Type: GrantFiled: March 15, 2013Date of Patent: August 9, 2016Assignee: Intel CorporationInventors: Jayant Mangalampalli, Rajesh P. Banginwar
-
Publication number: 20150030153Abstract: Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution hardware. The encryption engine is to perform an encryption operation using the root key, wherein the root key is accessible only to the encryption engine. The execution hardware is to execute instructions to deterministically generate an application-specific encryption key using the encryption algorithm.Type: ApplicationFiled: February 9, 2012Publication date: January 29, 2015Applicant: Intel CorporationInventors: Rajesh P. Banginwar, Taeho Kgil, Jesse Walker, Gary L. Graunke
-
Patent number: 8843732Abstract: Memory channel training parameters are function of electrical characteristics of memory devices, processor(s) and memory channel(s). Training steps can be skipped if the BIOS can determine that the memory devices, motherboard and processor have not changed since the last boot. Memory devices contain a serial number for tracking purposes and most motherboards contain a serial number. Many processors do not provide a mechanism by which the BIOS can track the processor. Described herein are techniques that allow the BIOS to track a processor and detect a swap without violating privacy/security requirements.Type: GrantFiled: December 21, 2009Date of Patent: September 23, 2014Assignee: Intel CorporationInventors: Mahesh S. Natu, John V. Lovelace, Rajesh P. Banginwar
-
Publication number: 20140281584Abstract: In an embodiment of the present invention, a processor includes content storage logic to parse digital content into portions and to cause each portion to be stored into a corresponding page of a memory. The processor also includes protection logic to receive a write instruction having a destination address within the memory, and if the destination address is associated with a memory location stores a portion of the digital content, erase the page associated with the memory location. If the destination address is associated with another memory location that does not store any of the digital content, the protection logic is to permit execution of the write instruction. Other embodiments are described and claimed.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Inventors: Jayant Mangalampalli, Rajesh P. Banginwar
-
Publication number: 20110154006Abstract: Memory channel training parameters are function of electrical characteristics of memory devices, processor(s) and memory channel(s). Training steps can be skipped if the BIOS can determine that the memory devices, motherboard and processor have not changed since the last boot. Memory devices contain a serial number for tracking purposes and most motherboards contain a serial number. Many processors do not provide a mechanism by which the BIOS can track the processor. Described herein are techniques that allow the BIOS to track a processor and detect a swap without violating privacy/security requirements.Type: ApplicationFiled: December 21, 2009Publication date: June 23, 2011Inventors: MAHESH S. NATU, John V. Lovelace, Rajesh P. Banginwar
-
Publication number: 20110154501Abstract: Hardware attestation techniques are described. An apparatus may comprise a platform comprising a processor capable of operating in an isolated execution mode and persistent storage having entity information associated with an entity having control of a software application. The platform may include a security controller communicatively coupled to the platform, the security controller having a signature generator operative to generate a platform signature for the software application executing on the platform, the platform signature comprising a cryptographic hash of entity information, and an attest module operative to provide the platform signature to the software application with the platform signature to attest that that the platform is associated with the software application. Other embodiments are described and claimed.Type: ApplicationFiled: December 23, 2009Publication date: June 23, 2011Inventors: Rajesh P. Banginwar, Taeho Kgil
-
Patent number: 7281144Abstract: Actual power savings achieved by using a power savings mode in a communications device may be increased by analyzing the effects of the power savings mode on delays and using the analysis on which to base a decision as to whether or not to enter the power savings mode.Type: GrantFiled: February 17, 2004Date of Patent: October 9, 2007Assignee: Intel CorporationInventors: Rajesh P. Banginwar, Eugene Gorbatov
-
Patent number: 7274929Abstract: Enhanced power management is achieved in a wireless communication system. In one aspect of the invention, power management profiles related to application type are used to achieve enhanced power management. In another aspect of the invention, the interval at which buffered broadcast and multicast traffic is transmitted to users in a network is adjusted during system operation based on a predetermined adjustment criterion to achieve enhanced power management.Type: GrantFiled: December 16, 2002Date of Patent: September 25, 2007Inventor: Rajesh P. Banginwar
-
Patent number: 7184960Abstract: According to an embodiment of the invention, a physical location of a mobile device is determined, and a determination is made that a subject device is available for command via the mobile device based at least in part on the physical location of the mobile device. Information regarding voice recognition capability of the subject device is transferred to the mobile device. A voice command is received by the mobile device, the voice command is interpreted, and an instruction is provided to the subject device based at least in part on the voice command.Type: GrantFiled: June 28, 2002Date of Patent: February 27, 2007Assignee: Intel CorporationInventors: Michael E. Deisher, Rajesh P. Banginwar, Robert C. Knauerhase
-
Patent number: 6859827Abstract: A technique for automatically identifying and assigning devices to device proxies in a policy based network management system is described. Each device proxy registers a filter with the device discovery. The filter may identify one or more characteristics of devices and may also include a communications protocol to be used by the device discovery to communicate with devices. The device discovery, preferably using the specified protocol, obtains device specific information and then identifies devices in the network that match the filters. The device discovery notifies each device proxy of which devices match the proxy's filter. Each device proxy updates its list of devices that it can policy manage based on the notification from the device discovery. Control policies are distributed from a policy server to each of the device proxies. Each device proxy then sends a policy to one or more devices to be policy managed.Type: GrantFiled: May 22, 2003Date of Patent: February 22, 2005Assignee: Intel CorporationInventor: Rajesh P. Banginwar
-
Publication number: 20040203617Abstract: Messages may be transmitted through a wireless network by forwarding the messages to intermediate, in-range recipients. Those intermediate, in-range recipients may then forward the message on to still other intermediate recipients, increasing the likelihood that one of the intermediate recipients may come in contact with the intended recipient. In some cases, the decision about whether to transfer the message to an intermediate recipient may depend on whether or not it is determined that it is sufficiently likely that that intermediate recipient will come in contact with the intended recipient. As a result, in some embodiments, both the likelihood that the message is delivered and the range of the network may be increased.Type: ApplicationFiled: September 11, 2002Publication date: October 14, 2004Inventors: Robert C. Knauerhase, Rajesh P. Banginwar, Ryan S. Russell