-
公开(公告)号:US11089060B2
公开(公告)日:2021-08-10
申请号:US16464444
申请日:2016-12-29
Applicant: Intel Corporation
Abstract: A method for establishing network connections includes connecting a device to a first network, retrieving voice input of a user, sending a message including data related to the voice input to at least one gateway device on the first network, receiving configuration data for a second network via the first network in response to the message, and establishing a connection of the device to the second network using the configuration data received via the first network. Furthermore, an electronic device, a network gateway device and a system are defined.
-
公开(公告)号:US20210109824A1
公开(公告)日:2021-04-15
申请号:US17132227
申请日:2020-12-23
Applicant: Intel Corporation
Inventor: Karunakara Kotary , Prashant Dewan , Vincent Zimmer , Rajesh Poornachandran
IPC: G06F11/14 , G06F9/4401 , G06F11/20
Abstract: An apparatus to facilitate data resiliency in a computer system platform is disclosed. The apparatus comprises a non-volatile memory to store data resiliency logic and one or more processors to execute the data resiliency logic to collect boot critical data from a plurality of platform components and store the data within the non-volatile memory
-
103.
公开(公告)号:US10904257B2
公开(公告)日:2021-01-26
申请号:US16551221
申请日:2019-08-26
Applicant: Intel Corporation
Inventor: Hong C. Li , John B. Vicente , Prashant Dewan
Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.
-
公开(公告)号:US20190325139A1
公开(公告)日:2019-10-24
申请号:US16457324
申请日:2019-06-28
Applicant: Intel Corporation
Inventor: Prashant Dewan , Karunakara Kotary
Abstract: A system comprising a controller to operate in an out of band fashion with respect to a central processing unit, the controller comprising a memory, and a processing element to request a firmware module from a computing system over a network, and cause the firmware module to be communicated to a storage controller for installation on a storage device.
-
公开(公告)号:US20190103074A1
公开(公告)日:2019-04-04
申请号:US15720090
申请日:2017-09-29
Applicant: Intel Corporation
Inventor: Siddhartha Chhabra , Prashant Dewan
Abstract: Technologies for secure z-order enforcement include a computing device having a processor with secure enclave support. A secure enclave invokes an EBIND instruction with display programming information that includes a z-order enforcement policy indicating whether the secure enclave requests z-order enforcement for an overlay surface associated with the secure enclave. The processor generates wrapped programming information in response to invoking the EBIND instruction. An untrusted supervisor component such as a device driver invokes an UNWRAP instruction with the wrapped programming information. The processor unwraps the wrapped programming information and programs a display controller with the z-enforcement policy. The processor may read a z-order enforcement status register of the display controller to determine if an overlay surface is available. For z-order enforcement, the display controller composes the overlay surface associated with the secure enclave in front of all other overlay surfaces of the display controller. Other embodiments are described and claimed.
-
公开(公告)号:US10102380B2
公开(公告)日:2018-10-16
申请号:US13802272
申请日:2013-03-13
Applicant: INTEL CORPORATION
Inventor: Francis X. McKeen , Carlos V. Rozas , Uday R. Savagaonkar , Simon P. Johnson , Vincent Scarlata , Michael A. Goldsmith , Ernie Brickell , Jiang Tao Li , Howard C. Herbert , Prashant Dewan , Stephen J. Tolopka , Gilbert Neiger , David Durham , Gary Graunke , Bernard Lint , Don A. Van Dyke , Joseph Cihula , Stalinselvaraj Jeyasingh , Stephen R. Van Doren , Dion Rodgers , John Garney , Asher Altman
Abstract: A technique to enable secure application and data integrity within a computer system. In one embodiment, one or more secure enclaves are established in which an application and data may be stored and executed.
-
公开(公告)号:US10079813B2
公开(公告)日:2018-09-18
申请号:US15085114
申请日:2016-03-30
Applicant: Intel Corporation
Inventor: Karanvir Grewal , Men Long , Prashant Dewan
CPC classification number: H04L9/083 , H04L9/321 , H04L9/3247 , H04L63/061
Abstract: Methods and apparatus are disclosed to provide for security within a network enclave. In one embodiment authentication logic initiates authentication with a central network authority. Packet processing logic receives a key and an identifier from the central network authority. Security protocol logic then establishes a client-server security association through a communication that includes a client identifier and an encrypted portion and/or an authorization signature, wherein a client authorization key allocated by the central network authority can be reproduced by a server, other than said central network authority, from the client identifier and a derivation key provided to the server by the central network authority to decrypt the encrypted portion and/or to validate the communication using the authorization signature. The server may also provide the client with new session keys and/or new client session identifiers using server-generated derivation keys if desired, protecting these with the client authorization key.
-
公开(公告)号:US10055580B2
公开(公告)日:2018-08-21
申请号:US15166952
申请日:2016-05-27
Applicant: Intel Corporation
Inventor: Hong Li , Prashant Dewan
CPC classification number: G06F21/54 , G06F21/50 , G06F21/53 , H04L12/4625 , H04L63/1416 , H04L63/1433 , H04L63/145 , H04L63/20 , H04L65/105 , H04L67/02 , H04L67/1097
Abstract: Technologies for client-level web application runtime control and multi-factor security analysis by a computing device include receiving application code associated with a browser-based application from a web server. The computing device collects real-time data generated by at least one sensor of the computing device and performs a multi-factor security assessment of the browser-based application as a function of the collected real-time data and the application code. Further, the computing device establishes a client-level web application runtime security policy associated with the browser-based application in response to performing the multi-factor security assessment and enforces the client-level web application runtime security policy.
-
109.
公开(公告)号:US20180227309A1
公开(公告)日:2018-08-09
申请号:US15941560
申请日:2018-03-30
Applicant: Intel Corporation
Inventor: Hong C. Li , John B. Vicente , Prashant Dewan
CPC classification number: H04L63/101 , G06F21/51 , G06F21/53 , G06F2221/2119 , H04L67/02
Abstract: Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.
-
公开(公告)号:US09971705B2
公开(公告)日:2018-05-15
申请号:US15048400
申请日:2016-02-19
Applicant: Intel Corporation
Inventor: Gur Hildesheim , Shlomo Raikin , Ittai Anati , Gideon Gerzon , Uday Savagaonkar , Francis Mckeen , Carlos Rozas , Michael Goldsmith , Prashant Dewan
IPC: G06F12/10 , G06F12/109 , G06F12/1036 , G06F12/02
CPC classification number: G06F12/109 , G06F12/0284 , G06F12/1036 , G06F2212/656 , G06F2212/657
Abstract: Embodiments of apparatuses and methods including virtual address memory range registers are disclosed. In one embodiment, a processor includes a memory interface, address translation hardware, and virtual memory address comparison hardware. The memory interface is to access a system memory using a physical memory address. The address translation hardware is to support translation of a virtual memory address to the physical memory address. The virtual memory address is used by software to access a virtual memory location in the virtual memory address space of the processor. The virtual memory address comparison hardware is to determine whether the virtual memory address is within a virtual memory address range.
-
-
-
-
-
-
-
-
-