Patents by Inventor Uri Blumenthal

Uri Blumenthal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090038017
    Abstract: Embodiments of apparatuses, articles, methods, and systems for secure vault service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise compromised operating system environment. The underlying platform to lock and unlock secrets on behalf of the authenticated/authorized/verified software component provided in protected memory regions only accessible to the authenticated/authorized/verified software component. Other embodiments may be described and claimed.
    Type: Application
    Filed: August 2, 2007
    Publication date: February 5, 2009
    Inventors: David Durham, Hormuzd Khosravi, Uri Blumenthal, Men Long
  • Publication number: 20080163354
    Abstract: A method and apparatus for network security elements using endpoint resources. An embodiment of a method includes receiving a request for access to a network at an endpoint server. The method further includes detecting that the request for access to the network includes a request that is unauthorized. The request for access to the network is directed to a network security element.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Inventors: Omer Ben-Shalom, Uri Blumenthal
  • Publication number: 20080134321
    Abstract: A platform for verifying the validity of changes to dynamic data modifiable during the runtime execution of an agent. In one embodiment, a management mode of a processor uses key information to generate a signature for a set of dynamic data, the signature to verify the validity of the state of the dynamic data to an integrity measurement agent.
    Type: Application
    Filed: December 29, 2006
    Publication date: June 5, 2008
    Inventors: Priya Rajagopal, Travis Schluessler, Uday R. Savagaonkar, David Durham, Ravi Sahita, Uri Blumenthal
  • Publication number: 20080022129
    Abstract: Embodiments of apparatus, articles, methods, and systems for secure platform voucher service for software components within an execution environment are generally described herein. An embodiment includes the ability for a Virtual Machine Monitor, Operating System Monitor, or other underlying platform capability to restrict memory regions for access only by specifically authenticated, authorized and verified software components, even when part of an otherwise comprised operating system environment. A provisioning remote entity or gateway only needs to know a platform's public key or certificate hierarchy in order to receive verification proof for any component in the platform. The verification proof or voucher helps to assure to the remote entity that no man-in-the-middle, rootkit, spyware or other malware running in the platform or on the network will have access to the provisioned material.
    Type: Application
    Filed: September 28, 2007
    Publication date: January 24, 2008
    Inventors: David Durham, Hormuzd Khosravi, Uri Blumenthal, Men Long
  • Publication number: 20080005359
    Abstract: Secure enterprise network communication technology provides improved authentication prior to granting network access of enterprise host platforms with the network devices via a backend infrastructure.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Inventors: Hormuzd M. Khosravi, Dylan Larson, Alan D. Ross, Uri Blumenthal, Ahuva Kroizer, Avigdor Eldar, Karanvir Grewal
  • Publication number: 20070271360
    Abstract: According to embodiments of the present invention, host platform device includes an embedded firmware agent that may detect an attempt by the host platform device to fully connect to a network. The firmware agent may restrict traffic between the host platform device and the network to bootstrap traffic, test the device to determine device vulnerability, may temporarily stop access to other peripheral devices, and transmit a report of the device vulnerability to a remote policy server. After the test(s) are performed, the firmware agent may receive an indication from the remote policy server as to whether the device is permitted to fully connect to the network and, if so, whether there are any further restrictions on traffic flow, for example, and if the peripheral device access may be allowed.
    Type: Application
    Filed: May 16, 2006
    Publication date: November 22, 2007
    Inventors: Ravi Sahita, Uday Savagaonkar, Hormuzd Khosravi, Uri Blumenthal
  • Publication number: 20070240197
    Abstract: Transport agnostic, secure communication protocol for transmitting host platform posture information to the Network Access Control Server or PDP (Policy Decision Point) and for receiving policy information to be enforced on the trusted host platform and respective applications for data processing and communication are described herein.
    Type: Application
    Filed: March 30, 2006
    Publication date: October 11, 2007
    Inventors: Uri Blumenthal, Hormuzd Khosravi, Karanvir Grewal
  • Publication number: 20070011676
    Abstract: According to some embodiments, a resource data record associated with diagnostic code to manage a manageable resource is exposed, and the resource data record is discovered. The diagnostic code is loaded into a management platform based on the resource data record. The diagnostic code may be loaded from a location in host memory indicated by the resource data record. An the integrity check value may be received from the location in host memory, and an integrity check may be performed on the loaded diagnostic code based on the integrity check value.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 11, 2007
    Inventors: Ravi Sahita, Uri Blumenthal
  • Publication number: 20070005963
    Abstract: Techniques are described that may provide secure access to a computing device. In one embodiment, a nonce and a device identifier are utilized to generate a secured one time access code.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 4, 2007
    Inventors: Avigdor Eldar, Yossi Yaffe, Uri Blumenthal
  • Publication number: 20070005985
    Abstract: Apparatus, system, and method having a first counter to record a number of invalid authentication requests, a first timer to set a first time period based on a value of the first counter, and an authentication module associated with the first counter and the first timer to receive an initial authentication request that includes a username and when said username is invalid, the module is to invalidate any subsequent authentication requests under the username during the first time period regardless of whether the subsequent requests includes a valid username. The system further includes a communication medium. The method includes receiving an authentication request with new information in a first session, validating the new information, and caching the validated new information in the first session.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Inventors: Avigdor Eldar, Itamar Sharoni, Tsippy Mendelson, Uri Blumenthal
  • Publication number: 20050113067
    Abstract: A method is provided for determining a private key for a first network based on at least one security value associated with a second network. The method further includes establishing a plurality of sessions between a mobile terminal and the first network based on the private key.
    Type: Application
    Filed: September 12, 2003
    Publication date: May 26, 2005
    Inventors: Michael Marcovici, Semyon Mizikovsky, Sarvar Patel, Uri Blumenthal
  • Patent number: 6847970
    Abstract: Techniques for managing information in a computing environment. Information associated with components of the computing environment is obtained. Then, from at least a portion of the obtained information, a determination is made as to the existence of one or more relationships associated with at least a portion of the components of the computing environment. The determination of the existence of one or more relationships is capable of accounting for a full lifecycle (e.g., including deployment, installation and runtime) associated with at least one component of the computing environment.
    Type: Grant
    Filed: September 11, 2002
    Date of Patent: January 25, 2005
    Assignee: International Business Machines Corporation
    Inventors: Alexander Keller, Uri Blumenthal, Lorraine Jackson, Gautam Kar, Rory D. Jackson
  • Publication number: 20040049509
    Abstract: Techniques for managing information in a computing environment. Information associated with components of the computing environment is obtained. Then, from at least a portion of the obtained information, a determination is made as to the existence of one or more relationships associated with at least a portion of the components of the computing environment. The determination of the existence of one or more relationships is capable of accounting for a full lifecycle (e.g., including deployment, installation and runtime) associated with at least one component of the computing environment.
    Type: Application
    Filed: September 11, 2002
    Publication date: March 11, 2004
    Applicant: International Business Machines Corporation
    Inventors: Alexander Keller, Uri Blumenthal, Rory D. Jackson, Lorraine Jackson, Gautam Kar