Patents by Inventor Stephen H. Dohrmann

Stephen H. Dohrmann has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9529645
    Abstract: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes intercepting a processor request to apply the lock on the object, identifying a performance history of the object based on a number of instances of contention, reducing computing resources of the processor by, when the number of instances is below a threshold value, generating a lock bypass for the object to cause speculative execution of target code within the object, and preventing speculative execution by applying the lock on the object when the number of instances is above the threshold value.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: December 27, 2016
    Assignee: Intel Corporation
    Inventors: Suresh Srinivas, Stephen H. Dohrmann, Mingqiu Sun, Uma Srinivasan, Ravi Rajwar, Konrad K. Lai
  • Publication number: 20150169384
    Abstract: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes intercepting a processor request to apply the lock on the object, identifying a performance history of the object based on a number of instances of contention, reducing computing resources of the processor by, when the number of instances is below a threshold value, generating a lock bypass for the object to cause speculative execution of target code within the object, and preventing speculative execution by applying the lock on the object when the number of instances is above the threshold value.
    Type: Application
    Filed: March 2, 2015
    Publication date: June 18, 2015
    Inventors: Suresh Srinivas, Stephen H. Dohrmann, Mingqiu Sun, Uma Srinivasan, Ravi Rajwar, Konrad K. Lai
  • Patent number: 8972994
    Abstract: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes receiving an object lock request from a processor, the lock request associated with object lock code to lock an object, and generating object lock-bypass code based on a type of the processor, the object lock-bypass code to execute in a managed runtime in response to receiving the object lock request. The example method also includes identifying a type of instruction set architecture (ISA) associated with the processor, invoking a checkpoint instruction for the processor based on the identified ISA, suspending the object lock code from executing and executing target code when the object is uncontended, and allowing the object lock code to execute when the object is contended.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: March 3, 2015
    Assignee: Intel Corporation
    Inventors: Suresh Srinivas, Stephen H. Dohrmann, Mingqiu Sun, Uma Srinivasan, Ravi Rajwar, Konrad K. Lai
  • Publication number: 20110153992
    Abstract: Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes receiving an object lock request from a processor, the lock request associated with object lock code to lock an object, and generating object lock-bypass code based on a type of the processor, the object lock-bypass code to execute in a managed runtime in response to receiving the object lock request. The example method also includes identifying a type of instruction set architecture (ISA) associated with the processor, invoking a checkpoint instruction for the processor based on the identified ISA, suspending the object lock code from executing and executing target code when the object is uncontended, and allowing the object lock code to execute when the object is contended.
    Type: Application
    Filed: December 23, 2009
    Publication date: June 23, 2011
    Inventors: Suresh Srinivas, Stephen H. Dohrmann, Mingqiu Sun, Uma Srinivasan, Ravi Rajwar, Konrad K. Lai
  • Patent number: 7246235
    Abstract: A method for key verification through time varying item presentation based on a key hash result comprises generating a key hash result partially based on both a global identifier provided from a source and an estimated current time at that source. After generating the key hash result, a first time-varying item is produced using the key hash result as an index for a table lookup or generated based on Certain bit patterns forming the key hash result. Thereafter, the first time-varying item is presented for comparison with a second time-varying item being contemporaneously presented at the source. These computations are repeated, giving the impression of two views or instances of the same time-varying item. An attacker might be able to match one small portion of such a time sequence of presentations, by luck, but not any large portion of the sequence.
    Type: Grant
    Filed: June 28, 2001
    Date of Patent: July 17, 2007
    Assignee: Intel Corporation
    Inventors: Carl M. Ellison, Stephen H. Dohrmann
  • Patent number: 7243231
    Abstract: In one embodiment, a method for sensory verification comprises exchanging at least one data item with a computing unit and selecting a sequence number. Such selection may be accomplished by generation of the sequence number or manual entry by the user. Thereafter, a transformation is periodically performed on the data item, the sequence number and optionally a random value to produce a sequence of values, each value being used to produce a perceivable sensory element for comparison with another sensory element produced by another computing unit.
    Type: Grant
    Filed: July 31, 2002
    Date of Patent: July 10, 2007
    Assignee: Intel Corporation
    Inventors: Carl M. Ellison, Stephen H. Dohrmann, Edward C. Epp
  • Patent number: 6931454
    Abstract: A method and apparatus for synchronizing data on a network is disclosed. In one embodiment, the invention comprises a method including establishing a wireless communications channel between a first mobile computer device belonging to a workgroup and a second device and determining if the second device belongs to the workgroup of the first device. If the second device belongs to the workgroup of the first device, then the method further includes receiving data at the first device from the second device through the wireless communications channel and resolving conflicts between the received data and data of the first device.
    Type: Grant
    Filed: December 29, 2000
    Date of Patent: August 16, 2005
    Assignee: Intel Corporation
    Inventors: Nikhil Deshpande, Ben H. Lee, III, Greg F. Eastman, Stephen H. Dohrmann
  • Publication number: 20040025017
    Abstract: In one embodiment, a method for sensory verification comprises exchanging at least one data item with a computing unit and selecting a sequence number. Such selection may be accomplished by generation of the sequence number or manual entry by the user. Thereafter, a transformation is periodically performed on the data item, the sequence number and optionally a random value to produce a sequence of values, each value being used to produce a perceivable sensory element for comparison with another sensory element produced by another computing unit.
    Type: Application
    Filed: July 31, 2002
    Publication date: February 5, 2004
    Inventors: Carl M. Ellison, Stephen H. Dohrmann, Edward C. Epp
  • Publication number: 20030014637
    Abstract: In one embodiment, a method for key verification through time varying item presentation based on a key hash result is described. The method comprises generating a key hash result partially based on both a global identifier provided from a source and an estimated current time at that source. After generating the key hash result, a first time-varying item is produced using the key hash result as an index for a table lookup or generated based on certain bit patterns forming the key hash result. Thereafter, the first time-varying item is presented for comparison with a second time-varying item being contemporaneously presented at the source. These computations are repeated, giving the impression of two views or instances of the same time-varying item. An attacker might be able to match one small portion of such a time sequence of presentations, by luck, but not any large portion of the sequence.
    Type: Application
    Filed: June 28, 2001
    Publication date: January 16, 2003
    Inventors: Carl M. Ellison, Stephen H. Dohrmann
  • Publication number: 20020099772
    Abstract: A method and apparatus for synchronizing data on a network is disclosed. In one embodiment, the invention comprises a method including establishing a wireless communications channel between a first mobile computer device belonging to a workgroup and a second device and determining if the second device belongs to the workgroup of the first device. If the second device belongs to the workgroup of the first device, then the method further includes receiving data at the first device from the second device through the wireless communications channel and resolving conflicts between the received data and data of The first device.
    Type: Application
    Filed: December 29, 2000
    Publication date: July 25, 2002
    Inventors: Nikhil Deshpande, Ben H. Lee, Greg F. Eastman, Stephen H. Dohrmann