Patents by Inventor Tarun Viswanathan

Tarun Viswanathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170171218
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Application
    Filed: February 17, 2017
    Publication date: June 15, 2017
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Patent number: 9578037
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Grant
    Filed: November 25, 2015
    Date of Patent: February 21, 2017
    Assignee: Intel Corporation
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Publication number: 20160315974
    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.
    Type: Application
    Filed: February 23, 2016
    Publication date: October 27, 2016
    Inventors: Tarun Viswanathan, Uri Kahana, Alan D. Ross, Eran Birk
  • Publication number: 20160080393
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Application
    Filed: November 25, 2015
    Publication date: March 17, 2016
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Patent number: 9276963
    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 28, 2012
    Date of Patent: March 1, 2016
    Assignee: Intel Corporation
    Inventors: Tarun Viswanathan, Uri Kahana, Alan Ross, Eran Birk
  • Patent number: 9223952
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: December 29, 2015
    Assignee: Intel Corporation
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Patent number: 9160815
    Abstract: This disclosure relates generally to a system and method for translating between virtual machines. A network adaptor can be configured to be communicatively coupled to a server, the server comprising a first virtual machine having a first format, the network adaptor to receive input from the server. A translator can be configured to identify, from the input from the server, the first format of the first virtual machine and generate an output, compatible with a second format of a second virtual machine, based on the input from the server, the second format being incompatible with the first format.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: October 13, 2015
    Assignee: Intel Corporation
    Inventors: Alan Ross, Dennis Morgan, Manish Dave, Timothy Verrall, Tarun Viswanathan
  • Publication number: 20140258231
    Abstract: Generally, this disclosure provides devices, methods and computer readable media for device synchronization policy management. The device may include a context determination module configured to determine a usage context associated with the device; a content determination module configured to determine a data content classification associated with data to be synchronized between the device and a cloud; a synchronization policy database configured to store synchronization policies, the policies based on the device usage context, the data content classification and a classification of the cloud type; and a synchronization policy management module configured to select a synchronization policy from the synchronization policy database and further configured to synchronize the data with the cloud based on the selected synchronization policy.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Inventors: Eran Birk, Tarun Viswanathan, Oded Bar El
  • Publication number: 20140189777
    Abstract: Technologies for providing policy-based secure containers for multiple enterprise applications include a client computing device and an enterprise policy server. The client computing device sends device attribute information and a request for access to an enterprise application to the enterprise policy server. The enterprise policy server determines a device trust level based on the device attribute information and a data sensitivity level based on the enterprise application, and sends a security policy to the client computing device based on the device trust level and the data sensitivity level. The client computing device references or creates a secure container for the security policy, adds the enterprise application to the secure container, and enforces the security policy while executing the enterprise application in the secure container. Multiple enterprise applications may be added to each secure container. Other embodiments are described and claimed.
    Type: Application
    Filed: December 28, 2012
    Publication date: July 3, 2014
    Inventors: Tarun Viswanathan, Uri Kahana, Alan Ross, Eran Birk
  • Publication number: 20140096178
    Abstract: Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Keith Shippy, Tobias Kohlenberg, Mubashir Mian, Ned Smith, Omer Ben-Shalom, Tarun Viswanathan, Dennis Morgan, Timothy Verrall, Manish Dave, Eran Birk
  • Publication number: 20140007086
    Abstract: This disclosure relates generally to a system and method for translating between virtual machines. A network adaptor can be configured to be communicatively coupled to a server, the server comprising a first virtual machine having a first format, the network adaptor to receive input from the server. A translator can be configured to identify, from the input from the server, the first format of the first virtual machine and generate an output, compatible with a second format of a second virtual machine, based on the input from the server, the second format being incompatible with the first format.
    Type: Application
    Filed: June 28, 2012
    Publication date: January 2, 2014
    Inventors: Alan Ross, Dennis Morgan, Manish Dave, Timothy Verrall, Tarun Viswanathan
  • Publication number: 20070238934
    Abstract: Physiological readings, such as heart rate, breathing rate, pulse, blood pressure, electrical conductivity across skin surface(s), electrical or magnetic activity of various regions of the brain, body temperature, voice patterns, voice stress, blood chemistry, locomotion (walking, running, etc.) characteristics, eating patterns, personal movement, etc. may be monitored for one or more users. It will be appreciated locomotion may be determined, for example, by way of sensors in shoes or walking surfaces, as well as by motion picture modeling analyzing one's motion as seen by one or more cameras placed in the environment. It will be appreciated these exemplary attributes may be used to infer or estimate one's current mood or interests directly or based on models. An adaptive environment may be used to refine models to improve mood determination accuracy, and to configure devices in the environment according to a determined mood.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 11, 2007
    Inventor: Tarun Viswanathan