Patents by Inventor Shahrokh Shahidzadeh

Shahrokh Shahidzadeh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9292683
    Abstract: Techniques for providing security for a computing device are described herein. In one example, a maintenance issue for the computing device is detected. Additionally, a maintenance credential proximate the computing device can be detected. Furthermore, an alarm system within the computing device can be disabled in response to detecting an authorized maintenance credential.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: March 22, 2016
    Assignee: Intel Corporation
    Inventors: Gyan Prakash, Shahrokh Shahidzadeh, Venkatesh Ramamurthy, Hong Li, Mohan J. Kumar
  • Patent number: 9235719
    Abstract: Described herein are apparatus, system, and method for providing memory access control to protect software (e.g., firmware backup) and other data. The method comprises providing, by a processor, a protected storage area in a memory for storing backup image of software; detecting corruption in the software; accessing the backup image of the software from the protected storage area; and updating the corrupted software using the backup image, wherein the protected storage area is a reserved storage area of the memory.
    Type: Grant
    Filed: September 29, 2011
    Date of Patent: January 12, 2016
    Assignee: Intel Corporation
    Inventors: Michael Neve De Mevergnies, Knut S. Grimsrud, Sergiu D. Ghetie, Prasun Ratn, Shahrokh Shahidzadeh
  • Publication number: 20150381610
    Abstract: In an example, a system and method are disclosed for location-based security for devices such as portable devices. A portable device may be provided with a short-range transceiver (such as RIFD) that is detectable when a user enters or exits an area. The device may also include an encrypted storage divided into a plurality of discrete units. Upon entering an area, the devices identity and location are provided to a policy server. In response, the policy server may wirelessly provide security tokens to the portable device that enable decryption of specific storage units authorized for access in that area. When a user passes back through a portal to the area, the security tokens are revoked, so that access to secured units of the storage is restricted.
    Type: Application
    Filed: June 30, 2014
    Publication date: December 31, 2015
    Inventors: Rajesh Poornachandran, Vincent J. Zimmer, Shahrokh Shahidzadeh, Georgios Vassilakes, Gopinatth Selvaraje, Sudeep Das, Roy Hopkins, Christopher S. Gough
  • Publication number: 20150381658
    Abstract: A tracking station detects a mobile data processing system (DPS) within communication range of a short range wireless module of the tracking station. In response to detecting the mobile DPS, the tracking station obtains identification data for the mobile DPS from a security module of the mobile DPS. The tracking station uses the identification data to obtain credentials to access secure storage on the mobile DPS. The tracking station automatically generates security configuration data for the mobile DPS, based on multiple factors pertaining to the mobile DPS, such as identity of the mobile DPS, a location of the mobile DPS, capabilities of the mobile DPS, etc. The tracking station uses the credentials to write the security configuration data to the secure storage of the mobile DPS. The security configuration data calls for the mobile DPS to automatically disable or enable at least one component. Other embodiments are described and claimed.
    Type: Application
    Filed: December 4, 2014
    Publication date: December 31, 2015
    Applicant: McAfee, Inc.
    Inventors: Rajesh Poornachandran, Shahrokh Shahidzadeh, Sudeep Das, Vincent J. Zimmer, Sumant Vashisth, Pramod Sharma
  • Publication number: 20140325638
    Abstract: Techniques for providing security for a computing device are described herein. In one example, a maintenance issue for the computing device is detected. Additionally: a maintenance credential proximate the computing: device can be detected. Furthermore, an alarm system within the computing device can be disabled in response to detecting an authorized maintenance credential.
    Type: Application
    Filed: March 15, 2013
    Publication date: October 30, 2014
    Inventors: Gyan Prakash, Shahrokh Shahidzadeh, Venkatesh Ramamurthy, Hong Li, Mohan J. Kumar
  • Publication number: 20140188719
    Abstract: Systems and methods for sharing an e-wallet are disclosed. In some embodiments, the systems and methods may share an e-wallet among multiple users on a single device. In other embodiments, the systems and method may share an e-wallet among multiple devices and/or multiple users on multiple devices. In some instances, an remotely stored e-wallet may be used or leveraged by an e-wallet uncertified device.
    Type: Application
    Filed: December 22, 2011
    Publication date: July 3, 2014
    Inventors: Rajesh Poornachandran, Gyan Prakash, Selim Aissi, Shahrokh Shahidzadeh, Ravikiran Chukka
  • Publication number: 20130339496
    Abstract: The present disclosure generally relates to a system and method for enterprise device customization. An example system may comprise an enterprise customization service and a device. The enterprise customization service may be configured to provide at least one of configuration or software to the device based on enterprise customization data. The device may include at least an enterprise customization application and the enterprise customization data. The enterprise customization application may be configured to cause the enterprise customization service to at least one of configure the device or to download software to the device based on the enterprise customization data.
    Type: Application
    Filed: December 6, 2012
    Publication date: December 19, 2013
    Inventors: GYAN PRAKASH, HORMUZD M. KHOSRAVI, RAJESH POORNACHANDRAN, ABDUL M. BAILEY, Shahrokh SHAHIDZADEH
  • Publication number: 20130339234
    Abstract: A method and system provides the user of a computing device with information, analysis, suggestions and/or recommendations relating to the user's financial information and/or purchasing history, in relation to an electronic commerce transaction initiated by the user at the computing device, prior to, during, or after completion of the electronic commerce transaction.
    Type: Application
    Filed: December 29, 2011
    Publication date: December 19, 2013
    Inventors: Gyan Prakash, Shahrokh Shahidzadeh
  • Patent number: 8590040
    Abstract: Embodiments of the invention are directed towards logic and/or modules stored in processor secure storage to determine whether a first platform firmware image (e.g., basic input/output system (BIOS), device read-only memory (ROM), manageability engine firmware) loaded onto a processor cache is valid. The processor executes the first platform firmware image if it is determined to be valid. If the first platform image is determined to be invalid, a second platform firmware image is located. If this platform firmware image is determined to be valid, the processor will execute said second platform image. In some embodiments of the invention, the determination of whether the first platform firmware image is valid is based, at least in part, on verification of a digital signature associated with the first platform firmware image. The digital signature may be created, for example, from a private key, wherein the digital signature is verified via a public key.
    Type: Grant
    Filed: December 22, 2010
    Date of Patent: November 19, 2013
    Assignee: Intel Corporation
    Inventors: Sergiu D. Ghetie, Shahrokh Shahidzadeh, Michael Neve de Mevergnies, Adil Karrar, Vincent J. Zimmer
  • Publication number: 20130262877
    Abstract: Described herein are apparatus, system, and method for providing memory access control to protect software (e.g., firmware backup) and other data. The method comprises providing, by a processor, a protected storage area in a memory for storing backup image of software; detecting corruption in the software; accessing the backup image of the software from the protected storage area; and updating the corrupted software using the backup image, wherein the protected storage area is a reserved storage area of the memory.
    Type: Application
    Filed: September 29, 2011
    Publication date: October 3, 2013
    Inventors: Michael Neve De Mevergnies, Knut S. Grimsrud, Sergiu D. Ghetie, Prasun Ratn, Shahrokh Shahidzadeh
  • Patent number: 8375380
    Abstract: In one embodiment, the present invention includes a method for determining if a system is compatible with an upgrade to a hardware resource of the system, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed via programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 10, 2009
    Date of Patent: February 12, 2013
    Assignee: Intel Corporation
    Inventors: Shahrokh Shahidzadeh, William J. Kirby, Jonathan P. Douglas
  • Patent number: 8365983
    Abstract: In one embodiment, the present invention includes a method for determining if a system is compatible with an up-binning or down-binning to a hardware resource of the system through RFID tag communication, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed by use of programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.
    Type: Grant
    Filed: November 20, 2009
    Date of Patent: February 5, 2013
    Assignee: Intel Corporation
    Inventors: Shahrokh Shahidzadeh, James Steven Fintel, Jonathan Douglas, William J. Kirby, Tim Gates, Tim Abels
  • Publication number: 20130002398
    Abstract: Described herein are an apparatus, system, and method for attribute identity control in a processor. The apparatus comprises a logic unit including a radio-frequency identification (RFID) tag comprising a non-volatile memory; and a processor operable to access the non-volatile memory, wherein the non-volatile memory for storing an attribute identity associated with a group of processors, the attribute identity being different from an identity of the processor.
    Type: Application
    Filed: July 1, 2011
    Publication date: January 3, 2013
    Inventors: David A. Brown, Adil Karrar, Michael Neve de Mevergnies, Sergiu D. Ghetie, Shahrokh Shahidzadeh
  • Publication number: 20120167205
    Abstract: Embodiments of the invention are directed towards logic and/or modules stored in processor secure storage to determine whether a first platform firmware image (e.g., basic input/output system (BIOS), device read-only memory (ROM), manageability engine firmware) loaded onto a processor cache is valid. The processor executes the first platform firmware image if it is determined to be valid. If the first platform image is determined to be invalid, a second platform firmware image is located. If this platform firmware image is determined to be valid, the processor will execute said second platform image. In some embodiments of the invention, the determination of whether the first platform firmware image is valid is based, at least in part, on verification of a digital signature associated with the first platform firmware image. The digital signature may be created, for example, from a private key, wherein the digital signature is verified via a public key.
    Type: Application
    Filed: December 22, 2010
    Publication date: June 28, 2012
    Inventors: Sergiu D. Ghetie, Shahrokh Shahidzadeh, Michael Neve de Mevergnies, Adil Karrar, Vincent J. Zimmer
  • Publication number: 20110121065
    Abstract: In one embodiment, the present invention includes a method for determining if a system is compatible with an up-binning or down-binning to a hardware resource of the system through RFID tag communication, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed by use of programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.
    Type: Application
    Filed: November 20, 2009
    Publication date: May 26, 2011
    Inventors: Shahrokh Shahidzadeh, James Steven Fintel, Jonathan Douglas, William J. Kirby, Tim Gates, Tim Abels
  • Publication number: 20100058323
    Abstract: In one embodiment, the present invention includes a method for determining if a system is compatible with an upgrade to a hardware resource of the system, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed via programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.
    Type: Application
    Filed: November 10, 2009
    Publication date: March 4, 2010
    Inventors: Shahrokh Shahidzadeh, William J. Kirby, Jonathan P. Douglas
  • Patent number: 7640541
    Abstract: In one embodiment, the present invention includes a method for determining if a system is compatible with an upgrade to a hardware resource of the system, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed via programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.
    Type: Grant
    Filed: May 23, 2005
    Date of Patent: December 29, 2009
    Assignee: Intel Corporation
    Inventors: Shahrokh Shahidzadeh, William J. Kirby, Jonathan P. Douglas
  • Patent number: 7557725
    Abstract: An apparatus and a system, as well as a method and article, may operate to compare a circuit operational condition with a specified condition, to record an out-of-specification condition, and to determine some specified number of recorded out-of-specification conditions.
    Type: Grant
    Filed: September 30, 2003
    Date of Patent: July 7, 2009
    Assignee: Intel Corporation
    Inventors: Shahrokh Shahidzadeh, Jonathan P. Douglas, Anil V. Kumar
  • Publication number: 20070006213
    Abstract: In one embodiment, the present invention includes a method for determining if a system is compatible with an upgrade to a hardware resource of the system, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed via programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.
    Type: Application
    Filed: May 23, 2005
    Publication date: January 4, 2007
    Inventors: Shahrokh Shahidzadeh, William Kirby, Jonathan Douglas
  • Publication number: 20050068187
    Abstract: An apparatus and a system, as well as a method and article, may operate to compare a circuit operational condition with a specified condition, to record an out-of-specification condition, and to determine some specified number of recorded out-of-specification conditions.
    Type: Application
    Filed: September 30, 2003
    Publication date: March 31, 2005
    Inventors: Shahrokh Shahidzadeh, Jonathan Douglas, Anil Kumar