Patents by Inventor Steve Orrin
Steve Orrin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10218711Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: GrantFiled: May 12, 2016Date of Patent: February 26, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
-
Publication number: 20160359921Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.Type: ApplicationFiled: August 19, 2016Publication date: December 8, 2016Inventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, JR.
-
Publication number: 20160259818Abstract: An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application.Type: ApplicationFiled: May 19, 2016Publication date: September 8, 2016Applicant: Quixey, Inc.Inventors: Jason Prosnitz, Steve Orrin
-
Patent number: 9436838Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.Type: GrantFiled: December 20, 2012Date of Patent: September 6, 2016Assignee: Intel CorporationInventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, Jr.
-
Publication number: 20160255097Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: ApplicationFiled: May 12, 2016Publication date: September 1, 2016Inventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
-
Patent number: 9372901Abstract: An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application.Type: GrantFiled: April 29, 2013Date of Patent: June 21, 2016Assignee: Quixey, Inc.Inventors: Jason Prosnitz, Steve Orrin
-
Patent number: 9367688Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: GrantFiled: June 22, 2012Date of Patent: June 14, 2016Assignee: Intel CorporationInventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
-
Patent number: 9252946Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.Type: GrantFiled: November 21, 2014Date of Patent: February 2, 2016Assignee: Intel CorporationInventors: Yeluri Ranghuram, Steve Orrin, Alberto J. Munoz
-
Publication number: 20150082031Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.Type: ApplicationFiled: November 21, 2014Publication date: March 19, 2015Inventors: Yeluri Ranghuram, Steve Orrin, Alberto J. Munoz
-
Patent number: 8924720Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.Type: GrantFiled: September 27, 2012Date of Patent: December 30, 2014Assignee: Intel CorporationInventors: Yeluri Raghuram, Steve Orrin, Alberto J. Munoz
-
Publication number: 20140181888Abstract: Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on the category. In one example, a separator may separate the data from other data based on the category, the data may be encrypted/decrypted based on the category, and/or context information and user input may be determined to apply the security policy further based on the context information and the user input.Type: ApplicationFiled: December 20, 2012Publication date: June 26, 2014Inventors: Hong C. Li, Mark D. Boucher, Conor P. Cahill, Manohar R. Castelino, Steve Orrin, Vinay Phegade, John E. Simpson, JR.
-
Publication number: 20140115662Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.Type: ApplicationFiled: December 31, 2013Publication date: April 24, 2014Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
-
Publication number: 20140089658Abstract: A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted VMI from the object store and sends host trust data (including a symmetric key extracted from the encrypted VMI, the symmetric key being encrypted with the customer public key) to a key management server for trust attestation. If the key management server successfully attests the host device, the key management server decrypts the encrypted symmetric key using the customer private key and re-encrypts the symmetric key using the host public key. The host device receives the re-encrypted symmetric key from the key management server, decrypts it using the host private key, and decrypts the encrypted VMI using the symmetric key.Type: ApplicationFiled: September 27, 2012Publication date: March 27, 2014Inventors: Yeluri Raghuram, Steve Orrin, Alberto J. Munoz
-
Patent number: 8635705Abstract: In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service.Type: GrantFiled: February 17, 2010Date of Patent: January 21, 2014Assignee: Intel CorporationInventors: Ravi L. Sahita, David M. Durham, Steve Orrin, Yasser Rasheed, Prasanna G. Mulgaonkar, Paul S. Schmitz, Hormuzd M. Khosravi
-
Publication number: 20130347058Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: ApplicationFiled: June 22, 2012Publication date: December 26, 2013Inventors: NED M. SMITH, SIMON P. JOHNSON, STEVE ORRIN, WILLARD M. WISEMAN
-
Publication number: 20130290322Abstract: An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In addition, the application search system receives, from one or more sources, restrictive information regarding one or more security attributes for one or more applications in the set of applications. A security value is generated for each of the one or more applications in the set of applications. The security value includes a security attribute value for each of the one or more security attributes. The application search system provides the retrieved set of applications for display at a user interface to the partner. Furthermore, each generated security value is also displayed in conjunction with the corresponding application.Type: ApplicationFiled: April 29, 2013Publication date: October 31, 2013Inventors: Jason Prosnitz, Steve Orrin
-
Publication number: 20110078799Abstract: In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of-band security agents and provide access to the system memory resources without having to rely on OS services. This can be used for a trusted anti-malware and remediation service.Type: ApplicationFiled: February 17, 2010Publication date: March 31, 2011Inventors: Ravi L. Sahita, David M. Durham, Steve Orrin, Yasser Rasheed, Prasanna G. Mulgaonkar, Paul S. Schmitz, Hormuzd M. Khosravi
-
Publication number: 20090292924Abstract: When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in part on the signature.Type: ApplicationFiled: September 12, 2008Publication date: November 26, 2009Inventors: Erik J. Johnson, Jasmeet Chhabra, Steve Orrin, Travis T. Schluessler, Stephen D. Goglin
-
Patent number: 7113303Abstract: A system and method for ordering a queue of print jobs in a high volume printing operation employing movable print heads. A plurality of print jobs are sorted and executed according to print head position specifications for one or more movable print heads such that the total number of print head adjustments is minimized.Type: GrantFiled: October 30, 2002Date of Patent: September 26, 2006Assignee: Hewlett-Packard Development Company, LP.Inventors: Robert Sesek, Steve Orrin Rasmussen
-
Publication number: 20040085568Abstract: A system and method for ordering a queue of print jobs in a high volume printing operation employing movable print heads. A plurality of print jobs are sorted and executed according to print head position specifications for one or more movable print heads such that the total number of print head adjustments is minimized.Type: ApplicationFiled: October 30, 2002Publication date: May 6, 2004Inventors: Robert Sesek, Steve Orrin Rasmussen