Patents by Inventor Scott H. Robinson

Scott H. Robinson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11070684
    Abstract: Described herein is a multi-user retail photo kiosk system that includes multiple touch screen and Graphic User Interface (GUI) controlled consumer photo editing, photo print and product selection, and photo order placement terminals and multiple photo printers. The user photo kiosk terminals can receive images. Billing and payment is accomplished using barcoded receipts provided at the user terminal for payments for purchased photo products. A printer array incorporating various printers capable of producing prints or various sizes and formats can be configured as a horizontal counter or as a vertical tower and includes means to alert the user that their photo print order is complete. In addition, the system automatically notifies operators if equipment service, maintenance, media refilling, and/or post printing finishing procedures are required.
    Type: Grant
    Filed: October 10, 2018
    Date of Patent: July 20, 2021
    Assignee: KODAK ALARIS INC.
    Inventors: Richard H. Repka, Stephen J. Pasquarette, Scott C. Robinson, Michael S. Graham, Nicole Petra Ellsaesser, Lydia C. Powers
  • Patent number: 10749683
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: August 18, 2020
    Assignee: Intel Corporation
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Publication number: 20200225969
    Abstract: A method for unifying VMs comprises presenting, in a display device, a unified view that includes GUI elements for multiple applications that execute in respective VMs in a computing device. The operation of presenting the unified view may be performed by a unification console that executes in a dedicated VM. The method also comprises (a) after presenting the unified view, receiving, by the unification console, user input pertaining to a selected application; (b) redirecting the user input from the unification console in the dedicated VM to the selected application in its respective VM; (c) receiving, by the unification console outside of the VM for the selected application, application output from the selected application; and (d) rendering output for a user, based on the application output received by the unification console. Other embodiments are described and claimed.
    Type: Application
    Filed: March 26, 2020
    Publication date: July 16, 2020
    Inventors: Scott H. Robinson, Vijay Tewari, Robin C. Knauerhase
  • Patent number: 10642634
    Abstract: A computing device comprises instructions that, when executed, enable the computing device to present a logical representation of a unified view of virtual machines (VMs), each of which executes a respective application in the computing device. The logical representation of the unified view includes a plurality of graphical user interface (GUI) elements for the applications. The operation of presenting the logical representation of the unified view is performed, at least in part, by a unification console that executes in a dedicated VM. The unification console also facilitates operations such as receiving user input pertaining to a selected application among the applications and receiving application output from the selected application. The user input from the unification console is redirected to the selected application in its respective VM. Output is rendered for the user, based on the application output received by the unification console. Other embodiments are described and claimed.
    Type: Grant
    Filed: May 4, 2018
    Date of Patent: May 5, 2020
    Assignee: Intel Corporation
    Inventors: Scott H. Robinson, Vijay Tewari, Robin C. Knauerhase
  • Patent number: 10453114
    Abstract: Selective/controlled disclosure of user information to private workspaces of other users/invitees based on context/contextual relations, and a shared workspace or market to collaborate amongst the other users (e.g., to crowd-source gifts of interest to the recipient). Contextual disclosure may be based on common context or commonality under a set of conditions, such as a topic, which may include known topics of relationships amongst the users and/or undiscovered contexts. As an example, items of interest to each user are identified and clustered, keywords are assigned to the clusters indicative of topics/subjects of interests to the respective users, recipient keywords are compared to keywords of an invitee to identify common keywords as shared interests, and items of interest to the recipient that relate to the common keywords are disclosed to the invitee as a personalized wish-list. Keyword weighting and/or keyword/item level privacy designations may be provided to further control disclosure.
    Type: Grant
    Filed: June 23, 2014
    Date of Patent: October 22, 2019
    Assignee: Intel Corporation
    Inventors: Rita H Wouhaybi, Timothy G Coppernoll, Jose K Sia, Jr., Richard T Beckwith, Maria Bezaitis, Scott H Robinson, Vinay Phegade, Michael Lemay
  • Patent number: 10353831
    Abstract: Systems, apparatuses and methods may provide for verifying, from outside a trusted computing base of a computing system, an identity an enclave instance prior to the enclave instance being launched in the trusted computing base, determining a memory location of the enclave instance and confirming that the memory location is local to the computing system. In one example, the enclave instance is a proxy enclave instance, wherein communications are conducted with one or more additional enclave instances in the trusted computing base via the proxy enclave instance and an unencrypted channel.
    Type: Grant
    Filed: December 24, 2015
    Date of Patent: July 16, 2019
    Assignee: Intel Corporation
    Inventors: Scott H. Robinson, Ravi L. Sahita, Mark W. Shanahan, Karanvir S. Grewal, Nitin V. Sarangdhar, Carlos V. Rozas, Bo Zhang, Shanwei Cen
  • Publication number: 20190036699
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Application
    Filed: September 18, 2018
    Publication date: January 31, 2019
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Patent number: 10104122
    Abstract: Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.
    Type: Grant
    Filed: August 13, 2015
    Date of Patent: October 16, 2018
    Assignee: Intel Corporation
    Inventors: Scott H. Robinson, Jason Martin, Howard C. Herbert, Michael LeMay, Karanvir Ken S. Grewal, Keith L. Shippy, Geoffrey Strongin
  • Patent number: 10079684
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: September 18, 2018
    Assignee: Intel Corporation
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Publication number: 20180253327
    Abstract: A computing device comprises instructions that, when executed, enable the computing device to present a logical representation of a unified view of virtual machines (VMs), each of which executes a respective application in the computing device. The logical representation of the unified view includes a plurality of graphical user interface (GUI) elements for the applications. The operation of presenting the logical representation of the unified view is performed, at least in part, by a unification console that executes in a dedicated VM. The unification console also facilitates operations such as receiving user input pertaining to a selected application among the applications and receiving application output from the selected application. The user input from the unification console is redirected to the selected application in its respective VM. Output is rendered for the user, based on the application output received by the unification console. Other embodiments are described and claimed.
    Type: Application
    Filed: May 4, 2018
    Publication date: September 6, 2018
    Inventors: Scott H. Robinson, Vijay Tewari, Robin C. Knauerhase
  • Patent number: 10019273
    Abstract: A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer.
    Type: Grant
    Filed: November 11, 2014
    Date of Patent: July 10, 2018
    Assignee: Intel Corporation
    Inventors: Scott H. Robinson, Vijay Tewari, Robin C. Knauerhase
  • Patent number: 9740882
    Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.
    Type: Grant
    Filed: September 10, 2014
    Date of Patent: August 22, 2017
    Assignee: Intel Corporation
    Inventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta
  • Publication number: 20170185776
    Abstract: Systems, apparatuses and methods may provide for verifying, from outside a trusted computing base of a computing system, an identity an enclave instance prior to the enclave instance being launched in the trusted computing base, determining a memory location of the enclave instance and confirming that the memory location is local to the computing system. In one example, the enclave instance is a proxy enclave instance, wherein communications are conducted with one or more additional enclave instances in the trusted computing base via the proxy enclave instance and an unencrypted channel.
    Type: Application
    Filed: December 24, 2015
    Publication date: June 29, 2017
    Inventors: Scott H. Robinson, Ravi L. Sahita, Mark W. Shanahan, Karanvir S. Grewal, Nitin V. Sarangdhar, Carlos V. Rozas, Bo Zhang, Shanwei Cen
  • Publication number: 20170104597
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Application
    Filed: December 18, 2015
    Publication date: April 13, 2017
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Patent number: 9606821
    Abstract: A virtual environment manager (“VEM”) simplifies the usability of virtual machines and provides users with an enhanced design for creating and/or for managing virtual machines (“VMs”). For example, a user can select description information and management information to be included in descriptors and according to which a VEM will create and manage various VM environments for various host environments. The VEM automatically creates the VM environments and host environments by sending descriptor description information and data files associated with the description information to virtual machine monitors (VMMs), which create the VM environments according to the description information. A VEM at each host may manage VM environments executed by the VMM, according to the descriptor management information. Thus, a set of descriptors to create and manage a set of VMs for a home computer may be easily modified by a user to create and manage a set of VMs for a work or laptop computer.
    Type: Grant
    Filed: September 29, 2006
    Date of Patent: March 28, 2017
    Assignee: Intel Corporation
    Inventors: Scott H. Robinson, Vijay Tewari, Robert C. Knauerhase
  • Publication number: 20160350534
    Abstract: In an embodiment, a system is adapted to: record at least one measurement of a virtual trusted execution environment in a storage of the system and generate a secret sealed to a state of this measurement; create, using the virtual trusted execution environment, an isolated environment including a secure enclave and an application, the virtual trusted execution environment to protect the isolated environment; receive, in the application, a first measurement quote associated with the virtual trusted execution environment and a second measurement quote associated with the secure enclave; and communicate quote information regarding the first and second measurement quotes to a remote attestation service to enable the remote attestation service to verify the virtual trusted execution environment and the secure enclave, and responsive to the verification the secret is to be provided to the virtual trusted execution environment and the isolated environment. Other embodiments are described and claimed.
    Type: Application
    Filed: May 29, 2015
    Publication date: December 1, 2016
    Inventors: Rajesh Poornachandran, Ned M. Smith, Nitin V. Sarangdhar, Karanvir S. Grewal, Ravi L. Sahita, Scott H. Robinson
  • Patent number: 9348767
    Abstract: According to an embodiment of the invention, a method for operating a data processing machine is described in which data about a state of the machine is written to a location in storage. The location is one that is accessible to software that may be written for the machine. The state data as written is encoded. This state data may be recovered from the storage according to a decoding process. Other embodiments are also described and claimed.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: May 24, 2016
    Assignee: Intel Corporation
    Inventors: Scott H. Robinson, Gustavo P. Espinosa, Steven M. Bennett
  • Publication number: 20160055571
    Abstract: Selective/controlled disclosure of user information to private workspaces of other users/invitees based on context/contextual relations, and a shared workspace or market to collaborate amongst the other users (e.g., to crowd-source gifts of interest to the recipient). Contextual disclosure may be based on common context or commonality under a set of conditions, such as a topic, which may include known topics of relationships amongst the users and/or undiscovered contexts. As an example, items of interest to each user are identified and clustered, keywords are assigned to the clusters indicative of topics/subjects of interests to the respective users, recipient keywords are compared to keywords of an invitee to identify common keywords as shared interests, and items of interest to the recipient that relate to the common keywords are disclosed to the invitee as a personalized wish-list. Keyword weighting and/or keyword/item level privacy designations may be provided to further control disclosure.
    Type: Application
    Filed: June 23, 2014
    Publication date: February 25, 2016
    Inventors: Rita H WOUHAYBI, Timothy G COPPERNOLL, Jose K SIA Jr., Richard T BECKWITH, Maria BEZAITIS, Scott H ROBINSON, Vinay PHEGADE, Michael LEMAY
  • Publication number: 20150350255
    Abstract: Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.
    Type: Application
    Filed: August 13, 2015
    Publication date: December 3, 2015
    Inventors: Scott H. Robinson, Jason Martin, Howard C. Herbert, Michael LeMay, Karanvir Ken S. Grewal, Keith L. Shippy, Geoffrey Strongin
  • Publication number: 20150248566
    Abstract: Technologies for sensor privacy on a computing device include receiving, by a sensor controller of the computing device, sensor data from a sensor of the computing device; determining a sensor mode for the sensor; and sending privacy data in place of the sensor data in response to a determination that the sensor mode for the sensor is set to a private mode. The technologies may also include receiving, by a security engine of the computing device, a sensor mode change command from a user of the computing device via a trusted input/output path of the computing device; and sending a mode command to the sensor controller to set the sensor mode of the sensor based on the sensor mode change command, wherein the sending the mode command comprises sending the mode command over a private bus established between the security engine and the sensor controller. Other embodiments are described herein.
    Type: Application
    Filed: September 10, 2014
    Publication date: September 3, 2015
    Inventors: Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen, Tobias M. Kohlenberg, Uttam K. Sengupta