Patents by Inventor Richard L. Maliszewski
Richard L. Maliszewski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9747118Abstract: Embodiments of apparatuses, methods, and systems for modifying the behavior of a guest installed to run within a VM are disclosed. In one embodiment, an apparatus includes virtualization logic, first storage, second storage, decode logic, and multiplexing logic. The virtualization logic is to provide a mode in which to operate a virtual machine. The first storage is to store a first plurality of micro-instructions to control the apparatus. The second storage is to store a second plurality of micro-instructions to control the apparatus. The decode logic is to decode a macro-instruction into one of a first plurality and a second plurality of micro-instructions. The multiplexing logic is to cause the macro-instruction to be decoded into the second plurality of micro-instructions instead of the first plurality of micro-instructions only when issued from the virtual machine.Type: GrantFiled: January 6, 2009Date of Patent: August 29, 2017Assignee: Intel CorporationInventors: Richard L. Maliszewski, James P. Held, Daniel Baumberger
-
Publication number: 20100174889Abstract: Embodiments of apparatuses, methods, and systems for modifying the behavior of a guest installed to run within a VM are disclosed. In one embodiment, an apparatus includes virtualization logic, first storage, second storage, decode logic, and multiplexing logic. The virtualization logic is to provide a mode in which to operate a virtual machine. The first storage is to store a first plurality of micro-instructions to control the apparatus. The second storage is to store a second plurality of micro-instructions to control the apparatus. The decode logic is to decode a macro-instruction into one of a first plurality and a second plurality of micro-instructions. The multiplexing logic is to cause the macro-instruction to be decoded into the second plurality of micro-instructions instead of the first plurality of micro-instructions only when issued from the virtual machine.Type: ApplicationFiled: January 6, 2009Publication date: July 8, 2010Inventors: Richard L. Maliszewski, James P. Held, Daniel Baumberger
-
Publication number: 20080147439Abstract: Speaker recognition/identification technology may be used to recognize/identify a patient who intends to use a personal health system (“PHS”) and to match collected data to the profile of a right patient. The PHS may be used by multiple patients simultaneously at different locations via a center console or a remote peripheral.Type: ApplicationFiled: December 14, 2006Publication date: June 19, 2008Inventor: Richard L. Maliszewski
-
Patent number: 7181603Abstract: Redirecting function calls through a protected environment to effect secure linkage of program modules. In one embodiment, a program module, such as a player application for example, may make function calls to secure functions instead of to insecure operating system (OS) services, thereby deterring attacks on the player's calls to OS services. In one embodiment, the new secure functions provide similar functionality to the replaced OS services. Providing a securely loaded function for calling by a program module in place of calling an insecure OS function includes obtaining object code for the securely loaded function from a signed binary description file, performing signature and integrity verification of the program module using the signed binary description file, loading the object code for the securely loaded function into memory, and updating an address for calling the securely loaded function by the program module.Type: GrantFiled: March 12, 2002Date of Patent: February 20, 2007Assignee: Intel CorporationInventors: Lewis V. Rothrock, Richard L. Maliszewski
-
Patent number: 7140005Abstract: A data processing device associates a test module with a sequence of instructions, the test module producing a test result by performing a test on a sequence of instructions. In the sequence of instructions, a first instruction comprising a target address is replaced with a second instruction having an instruction address in the sequence, the second instruction to transfer control to the test module. The target address is stored within an encrypted table, and the test module locates the target address in the table and transfers control to the target address when the test result indicates the sequence of instructions may proceed.Type: GrantFiled: January 17, 2001Date of Patent: November 21, 2006Assignee: Intel CorporationInventor: Richard L. Maliszewski
-
Patent number: 7073200Abstract: Providing secure content-based user experience enhancement in a player device for rendering digital content includes accepting encrypted digital content, decrypting the encrypted digital content into decrypted digital content, downsampling the decrypted digital content into downsampled digital content; and processing the downsampled digital content by an enhancement module to provide the user experience enhancement. The system protects content being rendered by a player application even when the content is also sent to an enhancement module such as a plug-in. The original content is protected by only transferring a version of the content to the enhancement module that is downsampled. That is, the original high fidelity, high value content is never transferred to the untrusted enhancement module.Type: GrantFiled: January 24, 2001Date of Patent: July 4, 2006Assignee: Intel CorporationInventor: Richard L. Maliszewski
-
Publication number: 20040064712Abstract: An electronic system, such as a multimedia player, renders encrypted multimedia content from a local memory device or a remote multimedia server. In one embodiment, the multimedia player is implemented with a general-purpose computer executing tamper-resistant software (TRS). To prevent debugging of the TRS while it is executing, exception handlers that could be used by software debuggers or hackers are replaced by substitute exception handlers. Instrumented exceptions are occasionally caused by the TRS, and if these exceptions are not correctly handled by the substitute exception handlers, execution of the TRS may be terminated. To verify that the substitute (and non-substitute) exception handlers have not been tampered with by rogue software, the instructions of the exception handlers may be occasionally read and checked, and if any instruction has been changed, the TRS may be terminated. Various methods of protecting multimedia content are also described, in addition to a machine-accessible medium.Type: ApplicationFiled: September 27, 2002Publication date: April 1, 2004Applicant: Intel CorporationInventors: William C. Arthur, Richard L. Maliszewski, Keith L. Shippy
-
Patent number: 6662060Abstract: Playback of digital multimedia content by a player application may be modified according to title specific parameters. The method includes accessing the digital multimedia content, accessing title specific parameters associated with the digital multimedia content, and processing the digital multimedia content to render the content to a user according to the title specific parameters. The title specific parameters may be stored with the digital multimedia content on a removable storage medium such as a digital versatile disk (DVD) or received from a source over a computer network, satellite, or cable. The title specific parameters may be used to modify at least one of the decoding, decompressing, and downsampling of at least one track or title of the content. In one embodiment, the content is digital audio data in the DVD-Audio format.Type: GrantFiled: October 18, 1999Date of Patent: December 9, 2003Assignee: Intel CorporationInventors: Richard L. Maliszewski, Brendan S. Traw, James A. Moorer, Alan J. McPherson, George H. Lydecker
-
Publication number: 20030177371Abstract: Redirecting function calls through a protected environment to effect secure linkage of program modules. In one embodiment, a program module, such as a player application for example, may make function calls to secure functions instead of to insecure operating system (OS) services, thereby deterring attacks on the player's calls to OS services. In one embodiment, the new secure functions provide similar functionality to the replaced OS services. Providing a securely loaded function for calling by a program module in place of calling an insecure OS function includes obtaining object code for the securely loaded function from a signed binary description file, performing signature and integrity verification of the program module using the signed binary description file, loading the object code for the securely loaded function into memory, and updating an address for calling the securely loaded function by the program module.Type: ApplicationFiled: March 12, 2002Publication date: September 18, 2003Inventors: Lewis V. Rothrock, Richard L. Maliszewski
-
Publication number: 20020144138Abstract: According to one embodiment, a computer system is disclosed. The computer system includes a compressor/decompressor (codec), and an integrity agent. The integrity agent verifies the authenticity of one or more functions utilized by the codec to assist in the decompression of received content.Type: ApplicationFiled: March 29, 2001Publication date: October 3, 2002Inventor: Richard L. Maliszewski
-
Publication number: 20020097872Abstract: Providing secure content-based user experience enhancement in a player device for rendering digital content includes accepting encrypted digital content, decrypting the encrypted digital content into decrypted digital content, downsampling the decrypted digital content into downsampled digital content; and processing the downsampled digital content by an enhancement module to provide the user experience enhancement. The system protects content being rendered by a player application even when the content is also sent to an enhancement module such as a plug-in. The original content is protected by only transferring a version of the content to the enhancement module that is downsampled. That is, the original high fidelity, high value content is never transferred to the untrusted enhancement module.Type: ApplicationFiled: January 24, 2001Publication date: July 25, 2002Inventor: Richard L. Maliszewski
-
Publication number: 20010027383Abstract: A data processing device associates a test module with a sequence of instructions, the test module producing a test result by performing a test on a sequence of instructions. In the sequence of instructions, a first instruction comprising a target address is replaced with a second instruction having an instruction address in the sequence, the second instruction to transfer control to the test module. The target address is stored within an encrypted table, and the test module locates the target address in the table and transfers control to the target address when the test result indicates the sequence of instructions may proceed.Type: ApplicationFiled: January 17, 2001Publication date: October 4, 2001Inventor: Richard L. Maliszewski
-
Patent number: 6205550Abstract: In one apparatus, a number of obfuscated programming instructions are equipped to self-verify whether execution of the obfuscated programming instructions is being observed. In another apparatus, a number of obfuscated programming instruction are equipped to determine whether the apparatus is being operated in a mode that supports single step execution of the obfuscated programming instructions. In yet another apparatus, a number of obfuscated programming instruction are equipped to verify whether an amount of elapsed execution time has exceeded a threshold. In yet another apparatus, a first and a second group of obfuscated programming instruction are provided to implement a first and a second tamper resistant technique respectively, with the first and the second group of programming instructions sharing a storage location for a first and a second key value corresponding to the first and the second tamper resistant technique.Type: GrantFiled: September 5, 1997Date of Patent: March 20, 2001Assignee: Intel CorporationInventors: Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
-
Patent number: 6178509Abstract: In one apparatus, a number of obfuscated programming instructions is provided to perform integrity verification on a number of other plain text programming instructions. In another apparatus, a number of obfuscated programming instructions is provided to self-verify an invocation of the obfuscated programming instructions is not originated from an intruder.Type: GrantFiled: September 5, 1997Date of Patent: January 23, 2001Assignee: Intel CorporationInventors: Joseph M. Nardone, Richard T. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
-
Patent number: 6175925Abstract: In one apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a descrambler that descrambles scrambled content to generate descrambled content. In another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an authenticator that provides appropriate authentication challenges to a scrambled content provider, and generates appropriate authentication responses to authentication challenges from the scrambled content provider. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an integrity verifier that performs integrity verification on a decoder. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a secrets holder that holds a number of secrets associated with playing scrambled contents.Type: GrantFiled: September 5, 1997Date of Patent: January 16, 2001Assignee: Intel CorporationInventors: Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
-
Patent number: 6049609Abstract: In one embodiment, the present invention includes a method of storing and retrieving data. The method includes performing mutations of a cell array in a mutation cycle until a storage phase is reached. The data is stored in storage regions of the cell array at the storage phase. The cell array is mutated through additional phases and the data stored in the cell array during the storage phase and is encrypted by the mutations through the additional phases. In response to a retrieval request, mutations continue until a retrieval phase is reached and the data is decrypted. In various embodiments, the invention includes a computer-readable medium, a binary structure, a system, and a method of creating a cell array.Type: GrantFiled: August 6, 1997Date of Patent: April 11, 2000Assignee: Intel CorporationInventor: Richard L. Maliszewski
-
Patent number: 6021487Abstract: A method and apparatus to divide a signed integer by a constant power of two using conditionally-executed instructions to choose between a first result in the event that the dividend is a negative signed integer and a second result in the event that the dividend is a positive signed integer, wherein values associated with the first result and the second result are generated simultaneously.Type: GrantFiled: December 16, 1996Date of Patent: February 1, 2000Assignee: Intel CorporationInventor: Richard L. Maliszewski
-
Patent number: 5991399Abstract: Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided. Once validated, the trusted player uses the private key to decrypt encrypted digital content. The private key is dynamically generated, associated with specific digital content, and communicated in real-time from a server to the trusted player in a secure manner, thereby controlling access to encrypted digital content. The key is wrapped into an executable tamper resistant key module in which the key can only be used by the right trusted player as determined by the server based on user requests and payment. The key module plugs in to the trusted player and executes to validate the player and decrypt the content.Type: GrantFiled: December 18, 1997Date of Patent: November 23, 1999Assignee: Intel CorporationInventors: Gary L. Graunke, John Carbajal, Richard L. Maliszewski, Carlos V. Rozas
-
Patent number: 5974550Abstract: Authenticating a remote process operating in an address space different than that of a local process includes the steps of creating, by the local process, a tamper resistant module containing a temporary secret, sending the tamper resistant module and a challenge from the local process to the remote process, executing the tamper resistant module by the remote process and recovering the secret when the integrity of the remote process is verified by the tamper resistant module, encoding the challenge using the secret to produce a response, sending the response to the local process, and decoding the response by the local process. Optionally, the tamper resistant module includes a request for information from the second process and the response includes the answer to the request for information.Type: GrantFiled: December 12, 1997Date of Patent: October 26, 1999Assignee: Intel CorporationInventor: Richard L. Maliszewski