Patents by Inventor Shamanna Datta

Shamanna Datta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150154124
    Abstract: Apparatus, systems, and methods to implement a secure data partition in memory systems are described. In one example, a controller comprises logic to receive, in a system management mode mailbox, a memory partition creation request from a system management mode interface, wherein the memory partition creation request comprises at least one characteristic of a memory partition, authenticate the partition creation request and create a memory partition in a memory coupled to the controller in accordance with the at least one characteristic. Other examples are also disclosed and claimed.
    Type: Application
    Filed: December 2, 2013
    Publication date: June 4, 2015
    Applicant: Intel Corporation
    Inventors: Shamanna Datta, Mark A. Schmisseur, Murugasamy Nachimuthu, Richard P. Mangold, Mahesh S. Natu
  • Patent number: 8800052
    Abstract: An apparatus and method for hardware protection of a virtual machine monitor (VMM) runtime integrity watcher is described. A set of one or more hardware range registers that protect a contiguous memory space that is to store the VMM runtime integrity watcher. The set of hardware range registers are to protect the VMM runtime integrity watcher from being modified when loaded into the contiguous memory space. The VMM runtime integrity watcher, when executed, performs an integrity check on a VMM during runtime of the VMM. Execution of the VMM runtime integrity watcher is triggered by a timer event generated based on multiple frequency bands.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: August 5, 2014
    Assignee: Intel Corporation
    Inventors: Brent Thomas, Shamanna Datta, Scott Durrant, Alberto Munoz
  • Publication number: 20140007248
    Abstract: An apparatus and method for hardware protection of a virtual machine monitor (VMM) runtime integrity watcher is described. A set of one or more hardware range registers that protect a contiguous memory space that is to store the VMM runtime integrity watcher. The set of hardware range registers are to protect the VMM runtime integrity watcher from being modified when loaded into the contiguous memory space. The VMM runtime integrity watcher, when executed, performs an integrity check on a VMM during runtime of the VMM. Execution of the VMM runtime integrity watcher is triggered by a timer event generated based on multiple frequency bands.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: Brent Thomas, Shamanna Datta, Scott Durrant, Alberto Munoz
  • Patent number: 8392985
    Abstract: In some embodiments a Trusted Platform Module (TPM) manages a first flag that identifies whether a secure environment has ever been established. A chipset manages a second flag that identifies that there might have been secrets in memory and a reset or power failure occurred. At least one processor and/or the chipset lock, maintain a lock, and/or unlock a memory in response to the second flag. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 31, 2008
    Date of Patent: March 5, 2013
    Assignee: Intel Corporation
    Inventors: Mahesh Natu, Shamanna Datta
  • Publication number: 20100169599
    Abstract: In some embodiments a Trusted Platform Module (TPM) manages a first flag that identifies whether a secure environment has ever been established. A chipset manages a second flag that identifies that there might have been secrets in memory and a reset or power failure occurred. At least one processor and/or the chipset lock, maintain a lock, and/or unlock a memory in response to the second flag. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2008
    Publication date: July 1, 2010
    Inventors: Mahesh Natu, Shamanna Datta
  • Publication number: 20070192611
    Abstract: A technique to verify firmware. One embodiment of the invention uses a processor's micro-code to verify a system's firmware, such that the firmware can be included in a trusted chain of code along with the operating system.
    Type: Application
    Filed: February 15, 2006
    Publication date: August 16, 2007
    Inventors: Shamanna Datta, Mohan Kumar
  • Publication number: 20060224878
    Abstract: In some embodiments, the invention involves extending trusted computing environments to the boot firmware. In at least one embodiment, the present invention is intended to enable the trusted environment to be extended forward to the pre-boot environment in addition to post-OS load environment. Embodiments of the present invention enable the trusted environment to extend to the firmware at power-on. The firmware is integrated within the secure perimeter which was previously only available to the OS. In other words, the BIOS is made to be a trusted entity, as well as the OS. Extensible firmware interface (EFI) modules are signed with a public key. The processor has an embedded private key. EFI modules are verified using the keys to ensure a trusted environment from boot to OS launch. Other embodiments are described and claimed.
    Type: Application
    Filed: March 31, 2005
    Publication date: October 5, 2006
    Inventors: Shamanna Datta, Vincent Zimmer, Michael Rothman
  • Publication number: 20060075312
    Abstract: A method and apparatus for limiting the exposure of hardware failure information is described. In one embodiment, an error reporting system of a processor may log various status and error address data into registers that retain their contents through a warm reset event. But the error reporting system of the processor may then determine whether the processor is operating in a trusted or secure mode. If not, then the processor's architectural state variables may also be logged into registers. But if the processor is operating in a trusted or secure mode, then the logging of the architectural state variables may be inhibited, or flagged as invalid.
    Type: Application
    Filed: September 30, 2004
    Publication date: April 6, 2006
    Inventors: Stephen Fischer, Shamanna Datta