Patents by Inventor Xiaozhu Kang
Xiaozhu Kang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10395028Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.Type: GrantFiled: July 21, 2017Date of Patent: August 27, 2019Assignee: Intel CorporationInventors: Prashant Dewan, Uttam Sengupta, Siddhartha Chhabra, David Durham, Xiaozhu Kang, Uday Savagaonkar, Alpa Narendra Trivedi
-
Patent number: 10181027Abstract: Embodiments of an invention for an interface between a device and a secure processing environment are disclosed. In one embodiment, a system includes a processor, a device, and an interface plug-in. The processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to create a secure processing environment. The execution unit is to execute an application in the secure processing environment. The device is to execute a workload for the application. The interface plug-in is to provide an interface for the device to enter the secure processing environment to execute the workload.Type: GrantFiled: October 17, 2014Date of Patent: January 15, 2019Assignee: Intel CorporationInventors: Alpa Narendra Trivedi, Siddhartha Chhabra, Xiaozhu Kang, Prashant Dewan, Uday Savagaonkar, David Durham
-
Publication number: 20180047307Abstract: Various embodiments are generally directed an apparatus and method for processing an encrypted graphic with a decryption key associated with a depth order policy including a depth position of a display scene, generating a graphic from the encrypted graphic when the encrypted graphic is successfully decrypted using the decryption key and assigning the graphic to a plane at the depth position of the display scene when the encrypted graphic is successfully decrypted.Type: ApplicationFiled: October 9, 2017Publication date: February 15, 2018Applicant: INTEL CORPORATIONInventors: Prashant Dewan, Uttam Sengupta, Uday R. Savagaonkar, Siddhartha Chhabra, David Durham, Xiaozhu Kang
-
Publication number: 20170372063Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.Type: ApplicationFiled: July 21, 2017Publication date: December 28, 2017Applicant: Intel CorporationInventors: PRASHANT DEWAN, UTTAM SENGUPTA, SIDDHARTHA CHHABRA, DAVID DURHAM, XIAOZHU KANG, UDAY SAVAGAONKAR, ALPA NARENDRA TRIVEDI
-
Patent number: 9786205Abstract: Various embodiments are generally directed an apparatus and method for processing an encrypted graphic with a decryption key associated with a depth order policy including a depth position of a display scene, generating a graphic from the encrypted graphic when the encrypted graphic is successfully decrypted using the decryption key and assigning the graphic to a plane at the depth position of the display scene when the encrypted graphic is successfully decrypted.Type: GrantFiled: December 23, 2013Date of Patent: October 10, 2017Assignee: INTEL CORPORATIONInventors: Prashant Dewan, Uttam Sengupta, Uday R. Savagaonkar, Siddhartha Chhabra, David Durham, Xiaozhu Kang
-
Patent number: 9652609Abstract: The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment.Type: GrantFiled: June 15, 2015Date of Patent: May 16, 2017Assignee: Intel CorporationInventors: Xiaozhu Kang, Alpa T. Narendra Trivedi, Siddhartha Chhabra, Prashant Dewan, Uday R. Savagaonkar, David M. Durham
-
Patent number: 9519803Abstract: In accordance with some embodiments, a protected execution environment may be defined for a graphics processing unit. This framework not only protects the workloads from malware running on the graphics processing unit but also protects those workloads from malware running on the central processing unit. In addition, the trust framework may facilitate proof of secure execution by measuring the code and data structures used to execute the workload. If a part of the trusted computing base of this framework or protected execution environment is compromised, that part can be patched remotely and the patching can be proven remotely throughout attestation in some embodiments.Type: GrantFiled: November 30, 2012Date of Patent: December 13, 2016Assignee: Intel CorporationInventors: Prashant Dewan, Uday R. Savagaonkar, David M. Durham, Paul S. Schmitz, Jason Martin, Michael Goldsmith, Ravi L. Sahita, Francis X. McKeen, Carlos Rozas, Balaji Vembu, Scott Janus, Geoffrey S. Strongin, Xiaozhu Kang, Karanvir S. Grewal, Siddhartha Chhabra, Alpha T. Narendra Trivedi
-
Patent number: 9507951Abstract: Technologies for secure input and display of a virtual touch user interface include a computing device having a security monitor that may protect memory regions from being accessed by untrusted code. The security monitor may use hardware virtualization features such as extended page tables or directed I/O to protect the memory regions. A protected touch filter driver intercepts requests for touch input and allocates a transfer buffer. The transfer buffer is protected by the security monitor. A touch screen controller may write touch input data into the protected transfer buffer. The touch input data may be shared by the touch filter driver with authorized applications through a protected communication channel. A graphical virtual user interface may be generated by trusted code and rendered into a hardware overlay surface. The user interface may include a virtual keyboard. The security monitor may protect the overlay surface. Other embodiments are described and claimed.Type: GrantFiled: December 4, 2014Date of Patent: November 29, 2016Assignee: Intel CorporationInventors: Xiaozhu Kang, Ghayathri V. Garudapuram, Karanvir S. Grewal
-
Patent number: 9501668Abstract: Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a processing core communicatively coupled to the architecturally protected memory, the processing core comprising a processing logic configured to implement an architecturally-protected execution environment by performing at least one of: executing instructions residing in the architecturally protected memory and preventing an unauthorized access to the architecturally protected memory; wherein the processing logic is further configured to provide a secure video output path by generating an output surface bitmap encrypted with a first encryption key and storing an encrypted first encryption key in an external memory, wherein the encrypted first encryption key is produced by encrypting the first encryption key with a second encryption key.Type: GrantFiled: September 25, 2013Date of Patent: November 22, 2016Assignee: Intel CorporationInventors: Siddhartha Chhabra, Uday R. Savagaonkar, Prashant Dewan, David M. Durham, Balaji Vembu, Xiaozhu Kang, Scott Janus, Jason Martin, Vincent R. Scarlata
-
Publication number: 20160110554Abstract: Technologies for secure input and display of a virtual touch user interface include a computing device having a security monitor that may protect memory regions from being accessed by untrusted code. The security monitor may use hardware virtualization features such as extended page tables or directed I/O to protect the memory regions. A protected touch filter driver intercepts requests for touch input and allocates a transfer buffer. The transfer buffer is protected by the security monitor. A touch screen controller may write touch input data into the protected transfer buffer. The touch input data may be shared by the touch filter driver with authorized applications through a protected communication channel. A graphical virtual user interface may be generated by trusted code and rendered into a hardware overlay surface. The user interface may include a virtual keyboard. The security monitor may protect the overlay surface. Other embodiments are described and claimed.Type: ApplicationFiled: December 4, 2014Publication date: April 21, 2016Inventors: Xiaozhu Kang, Ghayathri V. Garudapuram, Karanvir S. Grewal
-
Publication number: 20160110540Abstract: Embodiments of an invention for an interface between a device and a secure processing environment are disclosed. In one embodiment, a system includes a processor, a device, and an interface plug-in. The processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to create a secure processing environment. The execution unit is to execute an application in the secure processing environment. The device is to execute a workload for the application. The interface plug-in is to provide an interface for the device to enter the secure processing environment to execute the workload.Type: ApplicationFiled: October 17, 2014Publication date: April 21, 2016Applicant: Intel CorporationInventors: ALPA NARENDRA TRIVEDI, Siddhartha Chhabra, Xiaozhu Kang, Prashant Dewan, Uday Savagaonkar, David Durham
-
Publication number: 20160085958Abstract: A data processing system (DPS) includes a user authentication module that uses a hand recognition module and a gesture recognition module to authenticate users, based on video data from a two-dimensional (2D) camera. When executed, the hand recognition module performs operations comprising (a) obtaining 2D video data of a hand of the current user; and (b) automatically determining whether the hand of the current user matches the hand of an authorized user, based on the 2D video data. When executed, the gesture recognition module performs operations comprising (a) presenting a gesture challenge to the current user, wherein the gesture challenge asks the current user to perform a predetermined hand gesture; (b) obtaining 2D video response data; and (c) automatically determining whether the current user has performed the predetermined hand gesture, based on the 2D video response data. Other embodiments are described and claimed.Type: ApplicationFiled: September 22, 2014Publication date: March 24, 2016Inventor: Xiaozhu Kang
-
Patent number: 9276745Abstract: An apparatus and method for preserving image privacy when manipulated by cloud services includes middleware for receiving an original image, splitting the original image into two sub-images, where the RGB pixel values of the sub-images have a bit value that is less than RGB pixel values of the original image. The sub-images are encrypted by adding a keystream to the RGB pixel values of the sub-images. The sub-image data is transmitted to a cloud service such as a social network or photo-sharing site, which manipulate the images by resizing, cropping, filtering, or the like. The sub-image data is received by the middleware and is successfully decrypted irrespective of the manipulations performed by the cloud services. In an alternative embodiment, the blocks of the original image are permutated when encrypted, and then reverse-permutated when decrypted.Type: GrantFiled: December 15, 2011Date of Patent: March 1, 2016Assignee: Intel CorporationInventors: David M. Durham, Men Long, Karanvir S. Grewal, Prashant Dewan, Xiaozhu Kang
-
Patent number: 9262166Abstract: Various embodiments are directed to a heterogeneous processor architecture comprised of a CPU and a GPU on the same processor die. The heterogeneous processor architecture may optimize source code in a GPU compiler using vector strip mining to reduce instructions of arbitrary vector lengths into GPU supported vector lengths and loop peeling. It may be first determined that the source code is eligible for optimization if more than one machine code instruction of compiled source code under-utilizes GPU instruction bandwidth limitations. The initial vector strip mining results may be discarded and the first iteration of the inner loop body may be peeled out of the loop. The type of operands in the source code may be lowered and the peeled out inner loop body of source code may be vector strip mined again to obtain optimized source code.Type: GrantFiled: November 30, 2011Date of Patent: February 16, 2016Assignee: INTEL CORPORATIONInventors: Xiaozhu Kang, Biju George, Ken Lueh
-
Patent number: 9215069Abstract: An automated method for authenticating a proving device to a verifying device involves an elliptic curve formula (ECF) for a predetermined elliptic curve associated with a proving device. According to one example method, the prover sends the verifier a message containing a first proof value (P2). The verifier determines whether P2 is a point on the elliptic curve associated with the proving device. If P2 is not on the elliptic curve, the verifier may determine that the proving device should not be trusted. The message may further comprise a second proof value (K1), and the verifier may automatically determine whether K1 corresponds to P1, based on a previous point (P0) on the elliptic curve. If K1 does not correspond to P1, the verifier may determine that the proving device should not be trusted. Other embodiments are described and claimed.Type: GrantFiled: December 10, 2012Date of Patent: December 15, 2015Assignee: Intel CorporationInventors: Xiaoyu Ruan, Xiaozhu Kang
-
Publication number: 20150278512Abstract: Generally, this disclosure provides systems, devices, methods and computer readable media for virtualization-based intra-block workload isolation. The system may include a virtual machine manager (VMM) module to create a secure virtualization environment or sandbox. The system may also include a processor block to load data into a first region of the sandbox and to generate a workload package based on the data. The workload package is stored in a second region of the sandbox. The system may further include an operational block to fetch and execute instructions from the workload package.Type: ApplicationFiled: March 28, 2014Publication date: October 1, 2015Applicant: Intel CorporationInventors: PRASHANT DEWAN, UTTAM K. SENGUPTA, SIDDHARTHA CHHABRA, DAVID M. DURHAM, XIAOZHU KANG, UDAY R. SAVAGAONKAR, ALPA T. NARENDRA TRIVEDI
-
Publication number: 20150278514Abstract: The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment.Type: ApplicationFiled: June 15, 2015Publication date: October 1, 2015Inventors: Xiaozhu Kang, Alpa T. Narendra Trivedi, Siddhartha Chhabra, Prashant Dewan, Uday R. Savagaonkar, David M. Durham
-
Patent number: 9134878Abstract: A device and method for securely rendering content on a gesture-enabled computing device includes initializing a secure execution environment on a processor graphics of the computing device. The computing device transfers view rendering code and associated state data to the secure execution environment. An initial view of the content is rendered by executing the view rendering code in the secure execution environment. A gesture is recognized, and an updated view of the content is rendered in the secure execution environment in response to the gesture. The gesture may include a touch gesture recognized on a touch screen, or a physical gesture of the user recognized by a camera. After the updated view of the content is rendered, the main processor of the computing device may receive updated view data from the secure execution environment.Type: GrantFiled: September 28, 2012Date of Patent: September 15, 2015Assignee: Intel CorporationInventors: Prashant Dewan, Siddhartha Chhabra, Xiaozhu Kang, Xiaoning Li, Uday R. Savagaonkar, David M. Durham, Paul S. Schmitz, Michael A. Goldsmith, Jason Martin
-
Patent number: 9094733Abstract: Cryptographic access control of multimedia video is presented. A method includes generating as metadata an access control policy (ACP) associated with video, the ACP including authorization rules and cryptographic information associated with an encryption policy; encrypting the video according to the encryption policy; and encoding the encrypted video with the authorization rules and the cryptographic information, which may be used to decrypt and render the encoded video. As an example, an authorized receiver device having credentials and/or capabilities matched to the authorization rules may extract the ACP information from the encrypted video and use it to decrypt and properly render the video.Type: GrantFiled: March 31, 2012Date of Patent: July 28, 2015Assignee: Intel CorporationInventors: Karanvir S. Grewal, David Durham, Xiaozhu Kang, Men Long, Prashant Dewan
-
Patent number: 9087202Abstract: The entry/exit architecture may be a critical component of a protection framework using a secure enclaves-like trust framework for coprocessors. The entry/exit architecture describes steps that may be used to switch securely into a trusted execution environment (entry architecture) and out of the trusted execution environment (exit architecture), at the same time preventing any secure information from leaking to an untrusted environment.Type: GrantFiled: May 10, 2013Date of Patent: July 21, 2015Assignee: Intel CorporationInventors: Xiaozhu Kang, Alpa T. Narendra Trivedi, Siddhartha Chhabra, Prashant Dewan, Uday R. Savagaonkar, David M. Durham