Patents by Inventor Ulhas S. Warrier

Ulhas S. Warrier has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10749683
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Grant
    Filed: September 18, 2018
    Date of Patent: August 18, 2020
    Assignee: Intel Corporation
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Publication number: 20190036699
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Application
    Filed: September 18, 2018
    Publication date: January 31, 2019
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Patent number: 10079684
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: September 18, 2018
    Assignee: Intel Corporation
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Patent number: 9838367
    Abstract: According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a processor to execute an enclave application in an architecturally protected memory. The system includes at least one logic unit forming a trusted entity to, responsive to a request to set up a trusted I/O session, generate a unique session identifier logically associated with the trusted I/O session and set a trusted I/O session indicator to a first state. The system includes at least one logic unit forming a cryptographic module to, responsive to the request to set up the trusted I/O session, receive an encrypted encryption key and the unique session identifier from the enclave application; verify the unique session identifier; and responsive a successful verification, decrypt and save the decrypted encryption key in an encryption key register.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: December 5, 2017
    Assignee: INTEL CORPORATION
    Inventors: Siddhartha Chhabra, Prashant Dewan, Reshma Lal, Ulhas S. Warrier
  • Publication number: 20170134396
    Abstract: In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison of streamed video data with previously recorded image data. Responsive to establishment of a match of the streamed video data to the previously recorded image data via the comparison, the TEE is to generate an identity attestation that indicates the match. Other embodiments are described and claimed.
    Type: Application
    Filed: November 21, 2016
    Publication date: May 11, 2017
    Inventors: Abhilasha Bhargav-Spantzel, Ned M. Smith, Hormuzd M. Khosravi, Ulhas S. Warrier
  • Publication number: 20170104597
    Abstract: Technologies for end-to-end biometric-based authentication and locality assertion include a computing device with one or more biometric devices. The computing device may securely exchange a key between a driver and a secure enclave. The driver may receive biometric data from the biometric sensor in a virtualization-protected memory buffer and encrypt the biometric data with the shared key. The secure enclave may decrypt the biometric data and perform a biometric authentication operation. The computing device may measure a virtual machine monitor (VMM) to generate attestation information for the VMM. A secure enclave may execute a virtualization report instruction to request the attestation information. The processor may copy the attestation information into the secure enclave memory. The secure enclave may verify the attestation information with a remote attestation server. If verified, the secure enclave may provide a shared secret to the VMM. Other embodiments are described and claimed.
    Type: Application
    Filed: December 18, 2015
    Publication date: April 13, 2017
    Inventors: Ansuya Negi, Nitin V. Sarangdhar, Ulhas S. Warrier, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson, Karanvir S. Grewal
  • Publication number: 20160380985
    Abstract: According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a processor to execute an enclave application in an architecturally protected memory. The system includes at least one logic unit forming a trusted entity to, responsive to a request to set up a trusted I/O session, generate a unique session identifier logically associated with the trusted I/O session and set a trusted I/O session indicator to a first state. The system includes at least one logic unit forming a cryptographic module to, responsive to the request to set up the trusted I/O session, receive an encrypted encryption key and the unique session identifier from the enclave application; verify the unique session identifier; and responsive a successful verification, decrypt and save the decrypted encryption key in an encryption key register.
    Type: Application
    Filed: June 26, 2015
    Publication date: December 29, 2016
    Applicant: Intel Corporation
    Inventors: Siddhartha Chhabra, Prashant Dewan, Reshma Lal, Ulhas S. Warrier
  • Patent number: 9525668
    Abstract: In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison of streamed video data with previously recorded image data. Responsive to establishment of a match of the streamed video data to the previously recorded image data via the comparison, the TEE is to generate an identity attestation that indicates the match. Other embodiments are described and claimed.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: December 20, 2016
    Assignee: Intel Corporation
    Inventors: Abhilasha Bhargav-Spantzel, Ned M. Smith, Hormuzd M. Khosravi, Ulhas S. Warrier
  • Publication number: 20150381575
    Abstract: In an embodiment, a system includes at least one core and a trusted execution environment (TEE) to conduct an identity authentication that includes a comparison of streamed video data with previously recorded image data. Responsive to establishment of a match of the streamed video data to the previously recorded image data via the comparison, the TEE is to generate an identity attestation that indicates the match. Other embodiments are described and claimed.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: Abhilasha Bhargav-Spantzel, Ned M. Smith, Hormuzd M. Khosravi, Ulhas S. Warrier
  • Patent number: 9092632
    Abstract: A method, apparatus, machine-readable medium, and system are disclosed. In one embodiment the method includes a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: July 28, 2015
    Assignee: Intel Corporation
    Inventors: Allen R. Wishman, Sergiu D. Ghetie, Michael Neve De Mevergnies, Ulhas S. Warrier, Adil Karrar, Douglas R. Moran, Kirk Brannock
  • Patent number: 8776245
    Abstract: A system for executing trusted applications with a reduced trusted computing base. In one embodiment, the system includes a processor to dynamically instantiate an application protection module in response to a request by a program to be executed under a trusted mode. The system further includes memory to store the program which is capable of interacting with a remote service for security verification. In one embodiment, the application protection module includes a processor-measured application protection service (P-MAPS) operable to measure and to provide protection to the application.
    Type: Grant
    Filed: December 23, 2009
    Date of Patent: July 8, 2014
    Assignee: Intel Corporation
    Inventors: Ravi L. Sahita, Ulhas S. Warrier, Prashant Dewan, Ranjit S. Narjala
  • Patent number: 8522322
    Abstract: A method, apparatus, method, machine-readable medium, and system are disclosed. In one embodiment the method includes is a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure.
    Type: Grant
    Filed: September 22, 2010
    Date of Patent: August 27, 2013
    Assignee: Intel Corporation
    Inventors: Allen R. Wishman, Sergiu D. Ghetie, Michael Neve De Mevergnies, Ulhas S. Warrier, Adil Karrar, Douglas R. Moran, Kirk Brannock
  • Publication number: 20130219191
    Abstract: A method, apparatus, machine-readable medium, and system are disclosed. In one embodiment the method includes a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure.
    Type: Application
    Filed: March 15, 2013
    Publication date: August 22, 2013
    Inventors: Allen R. Wishman, Sergiu D. Ghetie, Michael Neve De Mevergnies, Ulhas S. Warrier, Adil Karrar, Douglas R. Moran, Kirk Brannock
  • Publication number: 20120072734
    Abstract: A method, apparatus, method, machine-readable medium, and system are disclosed. In one embodiment the method includes is a processor. The processor includes switching a platform firmware update mechanism located in a computer platform to a platform firmware armoring technology (PFAT) mode on a boot of the computer platform. The computer platform includes a platform firmware storage location that stores a platform firmware. The method then persistently locks the platform firmware storage location in response to the platform firmware update mechanism switching to the PFAT mode. When persistently locked, writes are only allowed to the platform firmware storage location by an Authenticated Code Module in the running platform and only after a platform firmware update mechanism unlocking procedure.
    Type: Application
    Filed: September 22, 2010
    Publication date: March 22, 2012
    Inventors: Allen R. Wishman, Sergiu D. Ghetie, Michael Neve De Mevergnies, Ulhas S. Warrier, Adil Karrar, Douglas R. Moran, Kirk Brannock
  • Publication number: 20110154500
    Abstract: A system for executing trusted applications with a reduced trusted computing base. In one embodiment, the system includes a processor to dynamically instantiate an application protection module in response to a request by a program to be executed under a trusted mode. The system further includes memory to store the program which is capable of interacting with a remote service for security verification. In one embodiment, the application protection module includes a processor-measured application protection service (P-MAPS) operable to measure and to provide protection to the application.
    Type: Application
    Filed: December 23, 2009
    Publication date: June 23, 2011
    Inventors: Ravi L. Sahita, Ulhas S. Warrier, Prashant Dewan, Ranjit S. Narjala
  • Patent number: 7437474
    Abstract: Routing packets of information without proxies over a network having both private and public networks includes reviewing the destination address of a packet received a private network interface and rerouting the packet to a private client connected to the private network interface when the destination address of the packet is the public address of the private network.
    Type: Grant
    Filed: February 22, 2001
    Date of Patent: October 14, 2008
    Assignee: Intel Corporation
    Inventors: Prakash N. Iyer, Ulhas S. Warrier
  • Patent number: 7293108
    Abstract: A first machine communicates with a second machine, using a protocol that sends the first machine's network configuration data in application data sent to the second machine, through a translating access point which translates network traffic from the first machine so as to originate from the access point. A network configuration server provides to the first machine network configuration data not subject to translation by the access point, which is sent to the second machine in the application data. The second machine communicates with the provided network configuration, and this communication is in turn made available to the first machine.
    Type: Grant
    Filed: March 15, 2001
    Date of Patent: November 6, 2007
    Assignee: Intel Corporation
    Inventors: Ulhas S. Warrier, Saul Lewites, Rameshkumar G. Illikkal, Ramanan Ganesan
  • Patent number: 7120701
    Abstract: A method and apparatus are provided for sending a data packet through a network. The network has public and private realms separated by an interface device. A client in the private realm performs the method. The method includes determining if a destination address of the data packet corresponds to the private realm or to the public realm and retrieving a source address for the client based on the destination address of the packet. The method also includes assigning a retrieved address to be the source address of the data packet.
    Type: Grant
    Filed: February 22, 2001
    Date of Patent: October 10, 2006
    Assignee: Intel Corporation
    Inventors: Ulhas S. Warrier, Saul Lewites, Prakash N. Iyer
  • Patent number: 7096495
    Abstract: This invention uses network stack information to enforce context-based policies. The combination of policies, user/application context information and packet filtering is used to enable fine-grained control of network resources.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: August 22, 2006
    Assignee: Intel Corporation
    Inventors: Ulhas S. Warrier, Prakash Iyer
  • Publication number: 20040032876
    Abstract: A method of transmitting data, includes providing selectable data channels through a data forwarding device, at least two of the selectable data channels having different transmission characteristics, reserving one of the selectable data channels based on a received channel request message, and transmitting a data packet through the reserved data channel.
    Type: Application
    Filed: August 19, 2002
    Publication date: February 19, 2004
    Inventors: Ajay Garg, Ulhas S. Warrier