Patents by Inventor Williams A. Stevens, Jr.

Williams A. Stevens, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9405707
    Abstract: Embodiments of the invention create an underlying infrastructure in a flash memory device (e.g., a serial peripheral interface (SPI) flash memory device) such that it may be protected against user attacks—e.g., replacing the SPI flash memory device or a man-in-the-middle (MITM) attack to modify the SPI flash memory contents on the fly. In the prior art, monotonic counters cannot be stored in SPI flash memory devices because said devices do not provide replay protection for the counters. A user may also remove the flash memory device and reprogram it. Host platforms alone cannot protect against such hardware attacks. Embodiments of the invention enable secure standard storage flash memory devices such as SPI flash memory devices to achieve replay protection for securely stored data. Embodiments of the invention utilize flash memory controllers, flash memory devices, unique device keys and HMAC key logic to create secure execution environments for various components.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: August 2, 2016
    Assignee: Intel Corporation
    Inventors: Nitin V. Sarangdhar, William A. Stevens, Jr., John J. Vranich
  • Publication number: 20160182238
    Abstract: In one embodiment, a processor has at least one core to execute instructions, a security engine coupled to the at least one core, a first storage to store a first immutable key associated with a vendor of the processor, and a second storage to store a second immutable key associated with an original equipment manufacturer (OEM) of the system. A first portion of firmware is to be verified based at least in part on the first immutable key and a second portion of firmware is to be verified based at least in part on the second immutable key, the first portion of firmware associated with the vendor and the second portion of firmware associated with the OEM. Other embodiments are described and claimed.
    Type: Application
    Filed: December 18, 2014
    Publication date: June 23, 2016
    Inventors: Prashant Dewan, Kapil Sood, Kumar N. Dwarakanath, Ioannis T. Schoinas, William A. Stevens, JR., Ned M. Smith
  • Publication number: 20160139808
    Abstract: Provided are a system, memory controller, and method for using counters and a table to protect data in a storage device. Upon initiating operations to modify a file in the storage device, a storage write counter is incremented in response to initiating the operations to modify the file. In response to incrementing the storage write counter, write table operations are initiated including setting a table write counter to a storage write counter and setting a table commit counter to the storage commit counter plus a value. The operation to modify the file in response to completing the write table operations. The system commit counter is incremented by the value in response to completing the operation to modify the file.
    Type: Application
    Filed: November 14, 2014
    Publication date: May 19, 2016
    Inventors: William A. STEVENS, JR., Nitin V. SARANGDHAR
  • Patent number: 9319224
    Abstract: The present disclosure is generally related to embedding public key infrastructure information to a system-on-chip (SOC). The method includes generating a key pair including a public key and a private key. The method includes creating a digital certificate corresponding to the public key. The method includes signing the digital certificate with a unique signature. The method includes extracting the public key and the unique signature into a key file, wherein the key file is to be stored in a plurality of silicon fuses on the SOC.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: April 19, 2016
    Assignee: Intel Corporation
    Inventors: Daniel Nemiroff, William Stevens, Jr.
  • Publication number: 20150381368
    Abstract: Technologies for secure offline activation of hardware features include a target computing device having a platform controller hub (PCH) including a converged security and manageability engine (CSME) and a number of in-field programmable fuses (IFPs). During assembly of the target computing device by an original equipment manufacturer (OEM), the CSME is provided a list of hardware features to be activated. The CSME configures the IFPs to enable the requested features, generates a digital receipt including the activated features and a unique device ID, and signs the receipt using a unique device key. Signed receipts may be periodically submitted to a vendor computing device, which verifies the signed receipts, extracts the active feature list, and bills the OEM for activated features of the PCHs. The vendor computing device may bill the OEM a maximum price for PCHs for which there is no associated signed receipt. Other embodiments are described and claimed.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventors: William A. Stevens, JR., Alberto J. Martinez, Mukesh Kataria, Purushottam Goel, Tim Abels, Mahesh S. Natu
  • Publication number: 20150095650
    Abstract: The present disclosure is generally related to embedding public key infrastructure information to a system-on-chip (SOC). The method includes generating a key pair including a public key and a private key. The method includes creating a digital certificate corresponding to the public key. The method includes signing the digital certificate with a unique signature. The method includes extracting the public key and the unique signature into a key file, wherein the key file is to be stored in a plurality of silicon fuses on the SOC.
    Type: Application
    Filed: September 27, 2013
    Publication date: April 2, 2015
    Inventors: Daniel Nemiroff, William Stevens, JR.
  • Patent number: 8966657
    Abstract: In some embodiments a secure permit request to change a hardware configuration is created. The secure permit request is sent to a remote location, and a permit sent from the remote location in response to the permit request is received. The hardware configuration is changed in response to the received permit. Other embodiments are described and claimed.
    Type: Grant
    Filed: December 31, 2009
    Date of Patent: February 24, 2015
    Assignee: Intel Corporation
    Inventors: Alberto J. Martinez, William A. Stevens, Jr., Purushottam Goel, Ernie Brickell
  • Publication number: 20140223198
    Abstract: Embodiments of the invention create an underlying infrastructure in a flash memory device (e.g., a serial peripheral interface (SPI) flash memory device) such that it may be protected against user attacks—e.g., replacing the SPI flash memory device or a man-in-the-middle (MITM) attack to modify the SPI flash memory contents on the fly. In the prior art, monotonic counters cannot be stored in SPI flash memory devices because said devices do not provide replay protection for the counters. A user may also remove the flash memory device and reprogram it. Host platforms alone cannot protect against such hardware attacks. Embodiments of the invention enable secure standard storage flash memory devices such as SPI flash memory devices to achieve replay protection for securely stored data. Embodiments of the invention utilize flash memory controllers, flash memory devices, unique device keys and HMAC key logic to create secure execution environments for various components.
    Type: Application
    Filed: December 20, 2011
    Publication date: August 7, 2014
    Inventors: Nitin V. Saranghar, William A. Stevens, JR., John J. Vranich
  • Publication number: 20130159727
    Abstract: Embodiments of the invention create an underlying infrastructure in a flash memory device (e.g., a serial peripheral interface (SPI) flash memory device) such that it may be protected against user attacks—e.g., replacing the SPI flash memory device or a man-in-the-middle (MITM) attack to modify the SPI flash memory contents on the fly. In the prior art, monotonic counters cannot be stored in SPI flash memory devices because said devices do not provide replay protection for the counters. A user may also remove the flash memory device and reprogram it. Host platforms alone cannot protect against such hardware attacks. Embodiments of the invention enable secure standard storage flash memory devices such as SPI flash memory devices to achieve replay protection for securely stored data. Embodiments of the invention utilize flash memory controllers, flash memory devices, unique device keys and HMAC key logic to create secure execution environments for various components.
    Type: Application
    Filed: September 28, 2012
    Publication date: June 20, 2013
    Inventors: Nitin V. Sarangdhar, William A. Stevens, JR., John J. Vranich
  • Patent number: 8364915
    Abstract: Techniques for generating access information indicating a least recently used (LRU) memory region in a set of memory regions. In an embodiment, data is stored in an entry of an LRU tracking list (LTL) based on a touch message indicating when a memory group has been touched—e.g. read from, written to and/or associated with a memory region. The data stored in an LTL entry may include an identifier of a memory group and/or validity data specifying whether that LTL entry stores a set of default data. In another embodiment, access information may be generated based on the memory group identifier and the validity data.
    Type: Grant
    Filed: June 23, 2010
    Date of Patent: January 29, 2013
    Assignee: Intel Corporation
    Inventors: Kie Woon Lim, Khee Wooi Lee, William A. Stevens, Jr.
  • Publication number: 20110320742
    Abstract: Techniques for generating access information indicating a least recently used (LRU) memory region in a set of memory regions. In an embodiment, data is stored in an entry of an LRU tracking list (LTL) based on a touch message indicating when a memory group has been touched—e.g. read from, written to and/or associated with a memory region. The data stored in an LTL entry may include an identifier of a memory group and/or validity data specifying whether that LTL entry stores a set of default data. In another embodiment, access information may be generated based on the memory group identifier and the validity data.
    Type: Application
    Filed: June 23, 2010
    Publication date: December 29, 2011
    Inventors: Kie Woon Lim, Khee Wooi Lee, William A. Stevens, JR.
  • Patent number: 8086833
    Abstract: A BIOS includes a core and multiple modules. The modules include both those that are platform specific and those that are not platform specific. Each module has a standard interface that allows the core (or other module) to call the module. A platform vendor constructs a BIOS by selecting modules from one or more vendors, which when executed can select modules that are suitable for the platform the BIOS resides in.
    Type: Grant
    Filed: September 8, 2008
    Date of Patent: December 27, 2011
    Assignee: Intel Corporation
    Inventors: William A. Stevens, Jr., Andrew J. Fish, Kirk D. Brannock, Robert P. Hale, Ramamurthy Krithivas
  • Publication number: 20110161672
    Abstract: In some embodiments a secure permit request to change a hardware configuration is created. The secure permit request is sent to a remote location, and a permit sent from the remote location in response to the permit request is received. The hardware configuration is changed in response to the received permit. Other embodiments are described and claimed.
    Type: Application
    Filed: December 31, 2009
    Publication date: June 30, 2011
    Inventors: Alberto J. Martinez, William A. Stevens, JR., Purushottam Goel, Ernie Brickell
  • Patent number: 7454603
    Abstract: A BIOS includes a core and multiple modules. The modules include both those that are platform specific and those that are not platform specific. Each module has a standard interface that allows the core (or other module) to call the module. A platform vendor constructs a BIOS by selecting modules from one or more vendors, which when executed can select modules that are suitable for the platform the BIOS resides in.
    Type: Grant
    Filed: February 11, 2002
    Date of Patent: November 18, 2008
    Assignee: Intel Corporation
    Inventors: William A. Stevens, Jr., Andrew J. Fish, Kirk D. Brannock, Robert P. Hale, Ramamurthy Krithivas
  • Patent number: 6986035
    Abstract: A technique that is usable with a computer system includes, in response to a startup phase of the computer system in which a system memory of the computer system is not initialized for data storage, detecting a resource of the computer system. Information about the resource reported in response to a second phase of the computer system in which the system memory is initialized.
    Type: Grant
    Filed: July 31, 2002
    Date of Patent: January 10, 2006
    Assignee: Intel Corporation
    Inventors: Williams A. Stevens, Jr., Robert P. Hale, Emmett R. Uber
  • Patent number: 6981081
    Abstract: A Bus Driver implements an arbitration mechanism to allow both the system management interrupt (SMI) and the Bus Driver to cooperatively use a Bus host controller hardware. This mechanism employs a hardware-based semaphore (status bit) to allow either the SMI or the driver to claim ownership of the Bus host controller for an arbitrary period of time. While either the SMI or the driver may own the status bit, the other party must poll the bit until ownership is achieved. For the SMI, this involves scheduling a periodic SMI interrupt. The driver performs self arbitration of claiming the status bit to provide the periodic SMI interrupt the opportunity to claim the bit. The mechanism allows the SMI access to the Bus host controller in a “timely” manner, while minimizing impact to driver access to the Bus host controller, which could impact driver Bus transaction throughput.
    Type: Grant
    Filed: December 19, 2002
    Date of Patent: December 27, 2005
    Assignee: Intel Corporation
    Inventors: William A. Stevens, Jr., Alberto J. Martinez, Christopher J. Spiegel
  • Patent number: 6711675
    Abstract: A protected boot sequence in a computer system. A reset vector directs the system to a boot program including a protected program. This protected program verifies the integrity of the BIOS contents before branching to the BIOS for execution of normal bootstrap functions. The protected program can also lock down various blocks of bootstrap code to prevent them from being changed after a certain point in the boot sequence. The protected boot sequence can proceed in layers, with each layer providing some level of validation or security for succeeding layers.
    Type: Grant
    Filed: February 11, 2000
    Date of Patent: March 23, 2004
    Assignee: Intel Corporation
    Inventors: Christopher J. Spiegel, Andrew H. Gafken, Robert P. Hale, William A. Stevens, Jr.
  • Patent number: 6473853
    Abstract: A method of securing a boot process for a computer system enables a processor to boot from a location identified by a boot vector. The method includes the step of disabling masking of a maskable address line in response to a processor initialization event. In one embodiment, an apparatus includes a processor coupled to a memory by at least one maskable address line wherein the memory is storing a first initialization instruction. The apparatus includes a mask control wherein the mask control disables masking of the maskable address line before the processor attempts to access the first initialization instruction in response to an initialization event. In one embodiment a processor chipset gates a first address mask control with an inhibit bit to generate a second address mask control. The second address mask control is independent of the first address mask control when the inhibit bit is set to a first value.
    Type: Grant
    Filed: June 21, 1999
    Date of Patent: October 29, 2002
    Assignee: Intel Corporation
    Inventors: Christopher J. Spiegel, William A. Stevens, Jr.