Patents by Inventor Saurabh Dadu

Saurabh Dadu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8874898
    Abstract: Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key.
    Type: Grant
    Filed: December 14, 2012
    Date of Patent: October 28, 2014
    Assignee: Intel Corporation
    Inventors: Saurabh Dadu, Gyan Prakash
  • Publication number: 20140308924
    Abstract: In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using near field communication, Bluetooth, direct connect to a PC, or by other secure, local wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic. Other embodiments are described and claimed.
    Type: Application
    Filed: June 27, 2014
    Publication date: October 16, 2014
    Inventors: Gyan Prakash, Selim Aissi, Saurabh Dadu, Rajesh Poornachandran
  • Publication number: 20140289789
    Abstract: A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device.
    Type: Application
    Filed: December 30, 2011
    Publication date: September 25, 2014
    Inventors: Rajesh Poornachandran, Selim Aissi, Gyan Prakash, Saurabh Dadu, Ravikiran Chukka
  • Publication number: 20140283018
    Abstract: Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Saurabh Dadu, Gyan Prakash, Rajesh Poornachandran, Jiphun Satapathy, Farid Adrangi
  • Patent number: 8798610
    Abstract: In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using SMS messaging, near field communication, Bluetooth, direct connect to a PC, or by other secure wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic Other embodiments are described and claimed.
    Type: Grant
    Filed: March 26, 2010
    Date of Patent: August 5, 2014
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Selim Aissi, Saurabh Dadu, Rajesh Poornachandran
  • Publication number: 20140212051
    Abstract: Embodiments of methods, apparatuses, and storage mediums associated with controlling content capture of prohibited content on remote devices, are disclosed. In embodiments, components of a remote device may receive image data of an image captured by the remote device and analyze the image data to determine whether the image includes prohibited content. In embodiments, the remote device may conditionally display or persistently store the image data, based at least in part on a result of the analysis.
    Type: Application
    Filed: March 12, 2012
    Publication date: July 31, 2014
    Inventors: Ravikiran Chukka, Gyan Prakash, Rajesh Poornachandran, Saurabh Dadu
  • Publication number: 20140208340
    Abstract: Generally, this disclosure describes a system and method for dynamic content management across a variety of television input sources. The system may include an audience detection module configured to identify a viewer in a viewing area of a display configured to display received media content; a media scanning module configured to determine a media content rating associated with a portion of a media content received from at least one of a local content source and a remote content source; and a media player configured to adapt display of the portion of the received media content based on a policy when the associated media content rating corresponds to inappropriate content for the identified viewer.
    Type: Application
    Filed: April 18, 2012
    Publication date: July 24, 2014
    Inventors: Rajesh Poornachandran, Gyan Prakash, Ravikiran Chukka, Saurabh Dadu, Kaitlin A. Murphy
  • Publication number: 20140189392
    Abstract: Methods and apparatus relating to communication link and network connectivity management in low power mode are described. In one embodiment, logic manages one or more external communication network links (also referred as “links”) in response to a determination that a processor has entered a low power consumption state and based on policy information. The logic also blocks/intercepts one or more signals, corresponding to management of the one or more links, that are directed to the processor to allow the processor to stay in the low power consumption. Other embodiments are also claimed and disclosed.
    Type: Application
    Filed: December 29, 2012
    Publication date: July 3, 2014
    Inventors: James F. Bodio, Gyan Prakash, Rajesh Poornachandran, Saurabh Dadu
  • Publication number: 20140189017
    Abstract: Technologies for generating tasks from communication messages includes a mobile computing device for monitoring communication messages, parsing the communication messages to detect content indicative of upcoming tasks, generating a task for each of the upcoming tasks detected, generating a task list from the generated tasks, and generating an alarm for each task. Additionally, the mobile computing device receives tasks generated by a cloud server.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Gyan Prakash, Nagasubramanian Gurumoorthly, Saurabh Dadu, Venkatesh Ramamurthy, Rama Sawhney
  • Publication number: 20140181691
    Abstract: Private information can be collected from a receiving computing device user via a requesting computing device sharing selected content presented on a requesting device display with the receiving device. Communication between the devices can be secure, peer-to-peer and can be established using Near Field Communication technologies. The selected content comprises data fields for which a receiving device user supplies data values. The requesting computing device can update the presented selected content based on the received receiving user input and send updated display information to the receiving device. Alternatively, the receiving device can send data fields to the requesting device as data fields are fully entered. The selected content shared with and the data values received from the mobile device can be translated into other languages. Cloud resources can be involved in the pairing and authentication of devices, the translation of data sent between devices and the communication of data between devices.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: RAJESH POORNACHANDRAN, GYAN PRAKASH, SAURABH DADU
  • Patent number: 8763112
    Abstract: Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security controller of a computing device prior to supplying power to a primary processor of the computing device, comparing the authentication input to an authentication code using the security controller, and supplying power to the primary processor in response to the authentication input matching the authentication code.
    Type: Grant
    Filed: July 2, 2011
    Date of Patent: June 24, 2014
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Saurabh Dadu, Selim Aissi
  • Publication number: 20140169634
    Abstract: A method, system, and device for analyzing images captured by a vehicle-based camera includes establishing a communication connection between a mobile communication device and an in-vehicle computing system. Scanning data may be retrieved from a scanning data server by the mobile communication device and, in some embodiments, forwarded to the in-vehicle computing system. A vehicle-base camera may be used to capture one or more images. An image analysis module of the in-vehicle computing system or mobile communication device may be used to analyze the captured image(s) for a match between the image(s) and the scanning data. In response to identifying a match, the mobile communication device may notify the scanning data server of the identified match.
    Type: Application
    Filed: December 14, 2012
    Publication date: June 19, 2014
    Inventors: Gyan Prakash, Rajesh Poornachandran, Saurabh Dadu, Ashok K. Mishra, Ravikiran Chukka
  • Publication number: 20140173271
    Abstract: Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key.
    Type: Application
    Filed: December 14, 2012
    Publication date: June 19, 2014
    Inventors: Saurabh Dadu, Gyan Prakash
  • Patent number: 8743224
    Abstract: An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: June 3, 2014
    Assignee: Intel Corporation
    Inventors: Todd Harple, Gyan Prakash, Saurabh Dadu, Sigal Louchheim
  • Publication number: 20140093083
    Abstract: A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Saurabh Dadu, Karthik K. Rishi, Gyan Prakash, Rajesh Poornachandran
  • Publication number: 20140094989
    Abstract: A mechanism is described for facilitating real-time context-aware messages at computing devices according to one embodiment. A method of embodiments, as described herein, includes evaluating real-time context-aware data relating to a vehicle, recommending a real-time message based the evaluation of the context-aware data. The recommended message may include one or more of a warning message, an alert message, a reminder message, and an information message. The method may further include facilitating displaying the recommended real-time message at a first display screen at the vehicle or a second display screen of a mobile computing device within a proximity of the vehicle. Other embodiments are described and claimed.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: SAURABH DADU, Gyan Prakash, Rajesh Poornachandran, Ravikiran Chukka
  • Patent number: 8688104
    Abstract: Illustrative embodiments of systems and methods providing remote management over a wireless wide-area network (WWAN) using short messages are disclosed. In one embodiment, a computing device may include an in-band processor, a wireless transceiver configured for communications over a WWAN, and an out-of-band (OOB) processor capable of communicating over the WWAN using the wireless transceiver irrespective of an operational state of the in-band processor. The OOB processor may be configured to receive a short message via the wireless transceiver, determine whether the short message originated from a trusted remote computing device, and execute at least one operation indicated by the short message in response to determining that the short message originated from a trusted remote computing device.
    Type: Grant
    Filed: March 22, 2012
    Date of Patent: April 1, 2014
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Farid Adrangi, Selim Aissi, Hormuzd Khosravi, Saurabh Dadu
  • Publication number: 20140089507
    Abstract: Systems and techniques for application independent content control are described herein. It may be determined that a content filter is enabled for a computing device. The content filter may include a restricted term. A content container may be identified in a device buffer of the computing device. The content container may also include the restricted term. A portion of the content container corresponding to the restricted term may be modified in the device buffer to block the restricted term.
    Type: Application
    Filed: September 26, 2012
    Publication date: March 27, 2014
    Inventors: Gyan Prakash, Jiphun Satapathy, Saurabh Dadu, Rajesh Poornachandran
  • Publication number: 20140075550
    Abstract: The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Inventors: MOJTABA MIRASHRAFI, GYAN PRAKASH, JIPHUN C. SATAPATHY, SAURABH DADU
  • Publication number: 20140075496
    Abstract: Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data.
    Type: Application
    Filed: September 12, 2012
    Publication date: March 13, 2014
    Inventors: GYAN PRAKASH, JESSE WALKER, SAURABH DADU