Patents by Inventor Willard M. Wiseman
Willard M. Wiseman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240421981Abstract: In embodiments, a method is provided for duplicating a user private key to multiple user devices so that websites and services don't need a separate public key for each user device. A Duplication Service is authorized by the user to cause the creation of the initial user private key in a user device. The Duplication Service associates the key's properties with a set of policies (e.g., using a TPM key template) that allow and restrict duplication. The process protects the user's private key from exposure to the Duplication Service with a user secret entered at a second user device to decrypt the duplicated key.Type: ApplicationFiled: June 17, 2023Publication date: December 19, 2024Inventor: Willard M. Wiseman
-
Patent number: 10693851Abstract: One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure hash digest with at least a portion of a data stream or a hash of the at least a portion of the data stream. Another embodiment provides a server system. The server system includes verifier logic. The verifier logic is to verify that an attestation identity key (AIK) public key associated with a received Trusted Platform Module (TPM) quote corresponds to an authenticated client device.Type: GrantFiled: July 16, 2018Date of Patent: June 23, 2020Assignee: Intel CorporationInventors: Willard M. Wiseman, Philip B. Tricca
-
Patent number: 10218711Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: GrantFiled: May 12, 2016Date of Patent: February 26, 2019Assignee: Intel CorporationInventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
-
Publication number: 20180343237Abstract: One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure hash digest with at least a portion of a data stream or a hash of the at least a portion of the data stream. Another embodiment provides a server system. The server system includes verifier logic. The verifier logic is to verify that an attestation identity key (AIK) public key associated with a received Trusted Platform Module (TPM) quote corresponds to an authenticated client device.Type: ApplicationFiled: July 16, 2018Publication date: November 29, 2018Applicant: Intel CorporationInventors: Willard M. Wiseman, Philip B. Tricca
-
Patent number: 10057223Abstract: One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure hash digest with at least a portion of a data stream or a hash of the at least a portion of the data stream. Another embodiment provides a server system. The server system includes verifier logic. The verifier logic is to verify that an attestation identity key (AIK) public key associated with a received Trusted Platform Module (TPM) quote corresponds to an authenticated client device.Type: GrantFiled: September 26, 2015Date of Patent: August 21, 2018Assignee: Intel CorporationInventors: Willard M. Wiseman, Philip B. Tricca
-
Patent number: 9846787Abstract: An apparatus and method are described for implementing a trusted dynamic launch and trusted platform module (TPM) using a secure enclave. For example, a computer-implemented method according to one embodiment of the invention comprises: initializing a secure enclave in response to a first command, the secure enclave comprising a trusted software execution environment which prevents software executing outside the enclave from having access to software and data inside the enclave; and executing a trusted platform module (TPM) from within the secure enclave, the trusted platform module securely reading data from a set of platform control registers (PCR) in a processor or chipset component into a memory region allocated to the secure enclave.Type: GrantFiled: February 27, 2015Date of Patent: December 19, 2017Assignee: Intel CorporationInventors: Simon P. Johnson, Vincent R. Scarlata, Willard M. Wiseman
-
Patent number: 9779249Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.Type: GrantFiled: October 13, 2016Date of Patent: October 3, 2017Assignee: Intel CorporationInventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
-
Publication number: 20170098085Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.Type: ApplicationFiled: October 13, 2016Publication date: April 6, 2017Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
-
Patent number: 9612930Abstract: In an embodiment, a processor includes at least one core, a power management unit having a first test register including a first field to store a test patch identifier associated with a test patch and a second field to store a test mode indicator to request a core functionality test, and a microcode storage to store microcode to be executed by the at least one core. Responsive to the test patch identifier, the microcode may access a firmware interface table and obtain the test patch from a non-volatile storage according to an address obtained from the firmware interface table. Other embodiments are described and claimed.Type: GrantFiled: June 12, 2015Date of Patent: April 4, 2017Assignee: Intel CorporationInventors: Vedvyas Shanbhogue, Eric Rasmussen, Deep K. Buch, Gordon McFadden, Kameswar Subramaniam, Amy L. Santoni, Willard M. Wiseman, Bret L. Toll
-
Publication number: 20170093800Abstract: One embodiment provides a client device. The client device includes a Trusted Platform Module (TPM). The TPM includes a secure controller to extend a secure hash digest with at least a portion of a data stream or a hash of the at least a portion of the data stream. Another embodiment provides a server system. The server system includes verifier logic. The verifier logic is to verify that an attestation identity key (AIK) public key associated with a received Trusted Platform Module (TPM) quote corresponds to an authenticated client device.Type: ApplicationFiled: September 26, 2015Publication date: March 30, 2017Applicant: INTEL CORPORATIONInventors: WILLARD M. WISEMAN, PHILIP B. TRICCA
-
Publication number: 20160364308Abstract: In an embodiment, a processor includes at least one core, a power management unit having a first test register including a first field to store a test patch identifier associated with a test patch and a second field to store a test mode indicator to request a core functionality test, and a microcode storage to store microcode to be executed by the at least one core. Responsive to the test patch identifier, the microcode may access a firmware interface table and obtain the test patch from a non-volatile storage according to an address obtained from the firmware interface table. Other embodiments are described and claimed.Type: ApplicationFiled: June 12, 2015Publication date: December 15, 2016Inventors: Vedvyas Shanbhogue, Eric Rasmussen, Deep K. Buch, Gordon McFadden, Kameswar Subramaniam, Amy L. Santoni, Willard M. Wiseman, Bret L. Toll
-
Patent number: 9507952Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.Type: GrantFiled: November 11, 2015Date of Patent: November 29, 2016Assignee: Intel CorporationInventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
-
Patent number: 9461994Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.Type: GrantFiled: November 26, 2014Date of Patent: October 4, 2016Assignee: Intel CorporationInventors: Mark E. Scott-Nash, Annapurna Dasari, Willard M. Wiseman
-
Publication number: 20160255097Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: ApplicationFiled: May 12, 2016Publication date: September 1, 2016Inventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
-
Patent number: 9384352Abstract: An embodiment includes an apparatus comprising: an out-of-band cryptoprocessor including secure non-volatile storage that couples to a root index, having a fixed address, and comprises first and second variables referenced by the root index; and semiconductor integrated code (SIC) including embedded processor logic to initialize a processor and embedded memory logic to initialize a memory coupled to the processor; wherein (a) the SIC is to be executed responsive to resetting the processor and prior to providing control to boot code, and (b) the SIC is to perform pre-boot operations in response to accessing at least one of the first and second variables. Other embodiments are described herein.Type: GrantFiled: October 2, 2013Date of Patent: July 5, 2016Assignee: Intel CorporationInventors: Jiewen Yao, Vincent J. Zimmer, Nicholas J. Adams, Willard M. Wiseman, Qin Long, Shihui Li
-
Patent number: 9367688Abstract: In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.Type: GrantFiled: June 22, 2012Date of Patent: June 14, 2016Assignee: Intel CorporationInventors: Ned M. Smith, Simon P. Johnson, Steve Orrin, Willard M. Wiseman
-
Publication number: 20160149912Abstract: In an embodiment, at least one computer readable medium has instructions stored thereon for causing a system to cryptographically sign, at a secure platform services enclave (PSE) of a computing system and using a secure attestation key (SGX AK), a public portion of a trusted platform module attestation key (TPM AK) associated with a trusted computing base of a physical platform, to form a certified TPM AK public portion. Also included are instructions to store the certified TPM AK public portion in the PSE, and instructions to, responsive to an attestation request received from a requester at a virtual trusted platform module (vTPM) associated with a virtual machine (VM) that has migrated onto the physical platform, provide to the requester the certified TPM AK public portion stored in the PSE. Other embodiments are described and claimed.Type: ApplicationFiled: November 26, 2014Publication date: May 26, 2016Inventors: Mark E. Scott-Nash, Annapurna Dasari, Willard M. Wiseman
-
Publication number: 20160085969Abstract: Embodiments of apparatuses and methods for using a trusted platform module for boot policy and secure firmware are disclosed. In one embodiment, a trusted platform module includes a non-volatile memory, a port, and a mapping structure. The port is to receive an input/output transaction from a serial bus. The transaction includes a system memory address in the address space of a processor. The mapping structure is to map the system memory address to a first location in non-volatile memory.Type: ApplicationFiled: December 2, 2015Publication date: March 24, 2016Applicant: Intel CorporationInventor: Willard M. Wiseman
-
Publication number: 20160063261Abstract: In one embodiment of the present invention, a method includes verifying a master processor of a system; validating a trusted agent with the master processor if the master processor is verified; and launching the trusted agent on a plurality of processors of the system if the trusted agent is validated. After execution of such a trusted agent, a secure kernel may then be launched, in certain embodiments. The system may be a multiprocessor server system having a partially or fully connected topology with arbitrary point-to-point interconnects, for example.Type: ApplicationFiled: November 11, 2015Publication date: March 3, 2016Inventors: John H. Wilson, Ioannis T. Schoinas, Mazin S. Yousif, Linda J. Rankin, David W. Grawrock, Robert J. Greiner, James A. Sutton, Kushagra Vaid, Willard M. Wiseman
-
Patent number: 9245106Abstract: In one embodiment, a processor can enforce a blacklist and validate, according to a multi-phase lockstep integrity protocol, a device coupled to the processor. Such enforcement may prevent the device from accessing one or more resources of a system prior to the validation. The blacklist may include a list of devices that have not been validated according to the multi-phase lockstep integrity protocol. Other embodiments are described and claimed.Type: GrantFiled: August 21, 2014Date of Patent: January 26, 2016Assignee: Intel CorporationInventors: Ned M. Smith, Vedvyas Shanbhogue, Geoffrey S. Strongin, Willard M. Wiseman, David W. Grawrock