Patents by Inventor Ronald A. Perez

Ronald A. Perez has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150248357
    Abstract: A processor employs a hardware encryption module in the processor's memory access path to cryptographically isolate secure information. In some embodiments, the encryption module is located at a memory controller (e.g. northbridge) of the processor, and each memory access provided to the memory controller indicates whether the access is a secure memory access, indicating the data associated with the memory access is designated for cryptographic protection, or a non-secure memory access. For secure memory accesses, the encryption module performs encryption (for write accesses) or decryption (for read accesses) of the data associated with the memory access.
    Type: Application
    Filed: September 24, 2014
    Publication date: September 3, 2015
    Inventors: David A. Kaplan, Thomas Roy Woller, Ronald Perez
  • Publication number: 20150081704
    Abstract: Example audience measurement methods disclosed herein include accessing demographic information and identification information for subscribers of a service provider based on first data received from an audience measurement entity. Such disclosed example methods also include accessing network log data stored by the service provider for the subscribers using the identification information. Such disclosed example methods further include determining audience measurement data for the subscribers based on the network log data, the demographic information and the identification information, and removing the identification information from the audience measurement data to determine anonymous audience measurement data to send to the audience measurement entity.
    Type: Application
    Filed: November 25, 2014
    Publication date: March 19, 2015
    Inventors: Kevin Michael Hannan, Achilleas Papakostas, Albert Ronald Perez, Michael Andrew Yonker, Austin William Albino
  • Publication number: 20150046579
    Abstract: Example methods and apparatus to de-duplicate impression information. An example method includes accessing a first set of cookies and a set of user identifiers, the cookies and user identifiers corresponding to devices accessing media via the Internet, identifying a pattern in the first set of cookies, obtaining impression information from a database proprietor, the impression information comprising a second set of cookies, identifying a subset of the second set of cookies that are associated with a same person based on the pattern, and associating impressions corresponding to the identified subset with the same person.
    Type: Application
    Filed: December 30, 2013
    Publication date: February 12, 2015
    Inventors: Albert Ronald Perez, Mimi Zhang
  • Patent number: 8903864
    Abstract: Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles are disclosed.
    Type: Grant
    Filed: October 11, 2012
    Date of Patent: December 2, 2014
    Assignee: The Nielsen Company (US), LLC
    Inventors: Kevin Michael Hannan, Achilleas Papakostas, Albert Ronald Perez, Michael Andrew Yonker, Austin William Albino
  • Patent number: 8839345
    Abstract: Techniques for mapping at least one physical system and at least one virtual system into at least two separate execution environments are provided. The techniques include discovering an implicitly enforced security policy in an environment comprising at least one physical system and at least one virtual system, using the discovered policy to create an enforceable isolation policy, and using the isolation policy to map the at least one physical system and at least one virtual system into at least two separate execution environments. Techniques are also provided for generating a database of one or more isolation policies.
    Type: Grant
    Filed: March 17, 2008
    Date of Patent: September 16, 2014
    Assignee: International Business Machines Corporation
    Inventors: John L. Griffin, Dimitrios Pendarakis, Ronald Perez, Reiner Sailer, Enriquillo Valdez
  • Patent number: 8707383
    Abstract: A computer implemented method, data processing system, and computer program product for managing computer workloads with security policy enforcement. When a determination is made that a component in a data processing system has failed to meet processing requirements, a candidate host to where the component may be migrated based on performance considerations is identified. A first security policy associated with the component is compared to a second security policy associated with the candidate host to determine if the first security policy is equivalent to or stronger than the second security policy. Responsive to a determination that the first security policy is equivalent to or stronger than the second security policy, the component is migrated to the candidate host.
    Type: Grant
    Filed: August 16, 2006
    Date of Patent: April 22, 2014
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Andrew Gregory Kegel, Ronald Perez, Brian D. You
  • Patent number: 8631212
    Abstract: A memory management unit is configured to receive requests for memory access from a plurality of I/O devices. The memory management unit implements a protection mode wherein the unit prevents memory accesses by the plurality of I/O devices by mapping memory access requests (from the I/O devices) to the same set of memory address translation data. When the memory management unit is not in the protected mode, the unit maps memory access requests from the plurality of I/O devices to different respective sets of memory address translation data. Thus, the memory management unit may protect memory from access by I/O devices using fewer address translation tables than are typically required (e.g., none).
    Type: Grant
    Filed: September 25, 2011
    Date of Patent: January 14, 2014
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Andrew G. Kegel, Ronald Perez, Wei Huang
  • Patent number: 8615788
    Abstract: A computer implemented method for logging extensions to platform configuration registers inside a trusted platform module instance is provided. A request to extend the current state of at least one of a plurality of platform configuration register is received. At least one platform configuration register within the trusted platform module instance is extended. The extension of the at least one platform configuration register is logged inside the trusted platform module instance as a logged entry by storing at least a tuple of platform configuration register indexes and hash values used for extending the platform configuration register. Information about new entries in the consolidated logs can be retrieved by polling or by subscribing to events that are automatically generated. A report of an extend operation and its logged hash value is sent to subscribers interested in receiving notifications of extend operations on a set of PCR registers.
    Type: Grant
    Filed: August 12, 2009
    Date of Patent: December 24, 2013
    Assignee: International Business Machines Corporation
    Inventors: Stefan Berger, Ramon Caceres, Kenneth Alan Goldman, Ronald Perez, Reiner Sailer, Deepa Srinivasan
  • Publication number: 20130326206
    Abstract: Boot configuration information is stored to a volatile memory of a processing system during a low-power state. When resuming from the low-power state, a processor device accesses configuration information for a memory controller from a non-volatile memory and restores the memory controller using the configuration information so as to permit access to the volatile memory. The processor device then configures the initial contexts one or more processor cores using the core state information maintained by the volatile memory during the low-power state and accessed via the configured memory controller, and the one or more processor cores completes the boot process by executing resume boot code maintained by the volatile memory during the low-power state and accessed via the configured memory controller, rather than accessing boot code from a non-volatile memory.
    Type: Application
    Filed: July 12, 2012
    Publication date: December 5, 2013
    Applicant: ADVANCED MICRO DEVICES, INC.
    Inventors: Andrew William Lueck, Krishna Sai Bernucho, Alexander J. Branover, Paul Edward Kitchin, Ronald Perez, Sonu Arora
  • Publication number: 20130290094
    Abstract: Example methods, apparatus, systems, and articles of manufacture to explicitly and implicitly measure media impact are disclosed. An example method includes analyzing first survey response data obtained from a control group panelist responding to a first survey instrument after exposure to first media. An example first survey instrument includes an implicit measure. The example first survey response data includes first implicit response data. The example method further includes analyzing second survey response data obtained from a test group panelist responding to the first survey instrument after exposure to second media. The example second survey response data includes second implicit response data. The example second media includes elements of the first media and target advertising or entertainment material not included in the first media. The example method also includes assessing an effectiveness of the target advertising or entertainment material based on the first and second implicit response data.
    Type: Application
    Filed: December 21, 2012
    Publication date: October 31, 2013
    Inventors: Seema Varma Srivastava, Albert Ronald Perez, Antonia Toupet, Robert T. Knight, Ramachandran Gurumoorthy, Avgusta Shestyuk
  • Patent number: 8549288
    Abstract: A trusted platform module is presented that is capable of creating, dynamically, multiple virtual trusted platform modules in a hierarchical organization. A trusted platform module domain is created. The trusted platform module creates virtual trusted platform modules, as needed, in the trusted platform module domain. The virtual trusted platform modules can inherit the permissions of a parent trusted platform module to have the ability to create virtual trusted platform modules themselves. Each virtual trusted platform module is associated with a specific partition. Each partition is associated with an individual operating system. The hierarchy of created operating systems and their privilege of spawning new operating systems is reflected in the hierarchy of trusted platform modules and the privileges each of the trusted platform modules has.
    Type: Grant
    Filed: May 29, 2008
    Date of Patent: October 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Stefan Berger, Kenneth Alan Goldman, Ronald Perez, Reiner Sailer, Leendert Peter Van Doorn
  • Publication number: 20130124420
    Abstract: The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
    Type: Application
    Filed: May 10, 2012
    Publication date: May 16, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sastry S. Duri, Marco O. Gruteser, Xuan Liu, Paul A. Moskowitz, Ronald Perez, Edith G. Schonberg, Moninder Singh, Jung-Mu Tang, Charles P. Tresser
  • Publication number: 20130080726
    Abstract: A memory management unit is configured to receive requests for memory access from a plurality of I/O devices. The memory management unit implements a protection mode wherein the unit prevents memory accesses by the plurality of I/O devices by mapping memory access requests (from the I/O devices) to the same set of memory address translation data. When the memory management unit is not in the protected mode, the unit maps memory access requests from the plurality of I/O devices to different respective sets of memory address translation data. Thus, the memory management unit may protect memory from access by I/O devices using fewer address translation tables than are typically required (e.g., none).
    Type: Application
    Filed: September 25, 2011
    Publication date: March 28, 2013
    Inventors: Andrew G. Kegel, Ronald Perez, Wei Huang
  • Patent number: 8374343
    Abstract: A system for executing a symmetric key cryptographic method includes a processor selecting data paths, a key, an initialization vector, a memory storing batched operation parameters, a bus connected to the processor and the memory, a cryptographic processor connected to the bus and controlled by the processor for performing a plurality of operations according to the operations parameter, wherein data for each operation is received individually and separately from the batched operation parameters, wherein an output for each operation is transmitted separately, and a pair of first-in-first-out (FIFO) state machines controlled by the processor and selectably connected to one of the cryptographic processor and the bus, bypassing the cryptographic processor.
    Type: Grant
    Filed: April 18, 2008
    Date of Patent: February 12, 2013
    Assignee: International Business Machines Corporation
    Inventors: Mark Lindemann, Ronald Perez, Sean William Smith
  • Publication number: 20130036435
    Abstract: Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles are disclosed.
    Type: Application
    Filed: October 11, 2012
    Publication date: February 7, 2013
    Inventors: Kevin Michael Hannan, Achilleas Papakostas, Albert Ronald Perez, Michael Andrew Yonker, Austin William Albino
  • Patent number: 8327451
    Abstract: The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is included for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.
    Type: Grant
    Filed: June 10, 2008
    Date of Patent: December 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sastry S. Duri, Marco O. Gruteser, Xuan Liu, Paul A. Moskowitz, Ronald Perez, Edith G. Schonberg, Moninder Singh, Jung-Mu Tang, Charles P. Tresser
  • Patent number: 8307006
    Abstract: Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles are disclosed.
    Type: Grant
    Filed: June 30, 2010
    Date of Patent: November 6, 2012
    Assignee: The Nielsen Company (US), LLC
    Inventors: Kevin Michael Hannan, Achilleas Papakostas, Albert Ronald Perez, Michael Andrew Yonker, Austin William Albino
  • Publication number: 20120130779
    Abstract: A system and method are disclosed for managing the display of graphical content within a user interface window of a display. A first set of messaging content data is processed to render a first set of graphics data in a target area of the display. The presence of a second set of rendered graphics data is detected and defined as a target area of the display. The second set of rendered graphics data in the target area of the display is replaced by the first set of rendered graphics data.
    Type: Application
    Filed: November 19, 2010
    Publication date: May 24, 2012
    Inventors: Ronald Perez, Piranavan Selvanandan
  • Patent number: 8185750
    Abstract: A method, system and computer program product for enhancing the functionality of the existing core root of trust measurement (CRTM). The CRTM is extended to allow platform manufacturer controlled and certified code to be incorporated into the function of the CRTM, wherein the manufacturer may define the policy for accepting a new function into the CRTM. When a firmware or software module image is compiled, the build process generates a hash value of the compiled firmware or software image, wherein the hash value reflects a fingerprint (or short hand) representation of the compiled image. A determination is made as to whether the hash value of the firmware or software image is to be a CRTM extension. If so, a digital signature of the module is created using the CRTM extension private key. This signature value is added to the firmware or software module.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: May 22, 2012
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Ronald Perez, Leendert Peter Van Doorn, Helmut H. Weber
  • Patent number: 8099781
    Abstract: An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage process with security risks managed by the first security-related information and the second security-related information is performed to produce the requested product.
    Type: Grant
    Filed: July 23, 2009
    Date of Patent: January 17, 2012
    Assignee: International Business Machines Corporation
    Inventors: Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R. Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V. Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M. Wagner