Patents by Inventor Steve Orrin

Steve Orrin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10218711
    Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.
    Type: Grant
    Filed: May 12, 2016
    Date of Patent: February 26, 2019
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
  • Publication number: 20160359921
    Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.
    Type: Application
    Filed: August 19, 2016
    Publication date: December 8, 2016
    Inventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, JR.
  • Publication number: 20160259818
    Abstract: An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application.
    Type: Application
    Filed: May 19, 2016
    Publication date: September 8, 2016
    Applicant: Quixey, Inc.
    Inventors: Jason Prosnitz, Steve Orrin
  • Patent number: 9436838
    Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: September 6, 2016
    Assignee: Intel Corporation
    Inventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, Jr.
  • Publication number: 20160255097
    Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.
    Type: Application
    Filed: May 12, 2016
    Publication date: September 1, 2016
    Inventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
  • Patent number: 9372901
    Abstract: An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application.
    Type: Grant
    Filed: April 29, 2013
    Date of Patent: June 21, 2016
    Assignee: Quixey, Inc.
    Inventors: Jason Prosnitz, Steve Orrin
  • Patent number: 9367688
    Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 22, 2012
    Date of Patent: June 14, 2016
    Assignee: Intel Corporation
    Inventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
  • Patent number: 9252946
    Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: February 2, 2016
    Assignee: Intel Corporation
    Inventors: Yeluri Ranghuram, Steve Orrin, Alberto J. Munoz
  • Publication number: 20150082031
    Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.
    Type: Application
    Filed: November 21, 2014
    Publication date: March 19, 2015
    Inventors: Yeluri Ranghuram, Steve Orrin, Alberto J. Munoz
  • Patent number: 8924720
    Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: December 30, 2014
    Assignee: Intel Corporation
    Inventors: Yeluri Raghuram, Steve Orrin, Alberto J. Munoz
  • Publication number: 20140181888
    Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.
    Type: Application
    Filed: December 20, 2012
    Publication date: June 26, 2014
    Inventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, JR.
  • Publication number: 20140115662
    Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.
    Type: Application
    Filed: December 31, 2013
    Publication date: April 24, 2014
    Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
  • Publication number: 20140089658
    Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.
    Type: Application
    Filed: September 27, 2012
    Publication date: March 27, 2014
    Inventors: Yeluri Raghuram, Steve Orrin, Alberto J. Munoz
  • Patent number: 8635705
    Abstract: In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service.
    Type: Grant
    Filed: February 17, 2010
    Date of Patent: January 21, 2014
    Assignee: Intel Corporation
    Inventors: Ravi L. Sahita, David M. Durham, Steve Orrin, Yasser Rasheed, Prasanna G. Mulgaonkar, Paul S. Schmitz, Hormuzd M. Khosravi
  • Publication number: 20130347058
    Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.
    Type: Application
    Filed: June 22, 2012
    Publication date: December 26, 2013
    Inventors: NED M. SMITH, SIMON P. JOHNSON, STEVE ORRIN, WILLARD M. WISEMAN
  • Publication number: 20130290322
    Abstract: An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application.
    Type: Application
    Filed: April 29, 2013
    Publication date: October 31, 2013
    Inventors: Jason Prosnitz, Steve Orrin
  • Publication number: 20110078799
    Abstract: In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service.
    Type: Application
    Filed: February 17, 2010
    Publication date: March 31, 2011
    Inventors: Ravi L. Sahita, David M. Durham, Steve Orrin, Yasser Rasheed, Prasanna G. Mulgaonkar, Paul S. Schmitz, Hormuzd M. Khosravi
  • Publication number: 20090292924
    Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.
    Type: Application
    Filed: September 12, 2008
    Publication date: November 26, 2009
    Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
  • Patent number: 7113303
    Abstract: A system and method for ordering a queue of print jobs in a high volume printing operation employing movable print heads. A plurality of print jobs are sorted and executed according to print head position specifications for one or more movable print heads such that the total number of print head adjustments is minimized.
    Type: Grant
    Filed: October 30, 2002
    Date of Patent: September 26, 2006
    Assignee: Hewlett-Packard Development Company, LP.
    Inventors: Robert Sesek, Steve Orrin Rasmussen
  • Publication number: 20040085568
    Abstract: A system and method for ordering a queue of print jobs in a high volume printing operation employing movable print heads. A plurality of print jobs are sorted and executed according to print head position specifications for one or more movable print heads such that the total number of print head adjustments is minimized.
    Type: Application
    Filed: October 30, 2002
    Publication date: May 6, 2004
    Inventors: Robert Sesek, Steve Orrin Rasmussen