-
公开(公告)号:US09912645B2
公开(公告)日:2018-03-06
申请号:US15198508
申请日:2016-06-30
Applicant: Intel Corporation
Inventor: Ned M. Smith , Omer Ben-Shalom , Alex Nayshtut
CPC classification number: H04L63/0428 , G06F21/6218 , H04L9/30 , H04L63/083 , H04L63/10 , H04L67/10 , H04L67/12 , H04L69/22
Abstract: Methods and apparatus to securely share data are disclosed. An example includes retrieving, by executing an instruction with a processor at a first computing device associated with a first user of a cloud service, an encrypted archive file and a wrapped encryption key from a second computing device associated with a second user of the cloud service, the wrapped encryption key wrapped with key data associated with the first user of the cloud service at the second computing device, unwrapping the wrapped encryption key with the key data to obtain an unwrapped encryption key, and decrypting the encrypted archive file with the unwrapped encryption key to obtain a decrypted archive file.
-
公开(公告)号:US20160323264A1
公开(公告)日:2016-11-03
申请号:US14367434
申请日:2013-12-20
Applicant: INTEL CORPORATION
Inventor: Alex Nayshtut , Hormuzd M. Khosravi , Omer Ben-Shalom , Barry R. Pivitt , Ned M. Smith
IPC: H04L29/06
CPC classification number: H04L63/0823 , H04L9/3268 , H04L63/0428 , H04L63/06 , H04L63/061
Abstract: An embodiment includes a method executed by at least one processor of a first computing node comprising: generating a key pair including a first public key and a corresponding first private key; receiving an instance of a certificate, including a second public key, from a second computing node located remotely from the first computing node; associating the instance of the certificate with the key pair; receiving an additional instance of the certificate; verifying the additional instance of the certificate is associated with the key pair; and encrypting and exporting the first private key in response to verifying the additional instance of the certificate is associated with the key pair. Other embodiments are described herein.
Abstract translation: 实施例包括由第一计算节点的至少一个处理器执行的方法,包括:生成包括第一公钥和对应的第一私钥的密钥对; 从位于远离所述第一计算节点的第二计算节点接收包括第二公钥的证书的实例; 将证书的实例与密钥对相关联; 接收证书的附加实例; 验证证书的附加实例与密钥对相关联; 并且响应于验证证书的附加实例而加密和导出第一私钥与密钥对相关联。 本文描述了其它实施例。
-
公开(公告)号:US20160044001A1
公开(公告)日:2016-02-11
申请号:US14456509
申请日:2014-08-11
Applicant: Intel Corporation
Inventor: Oleg Pogorelik , Efrat Levy , Alex Nayshtut
CPC classification number: H04L63/0428 , H04L9/085 , H04L9/0894 , H04L63/061 , H04L67/104 , H04L2209/80 , H04W4/70 , H04W12/04
Abstract: Systems, devices, and techniques for network-enabled device provisioning are disclosed herein. In some embodiments, a network-enabled device may include: a storage device; listening logic to wirelessly receive a plurality of key fragments from a corresponding plurality of peer devices, to cause storage of the plurality of key fragments in the storage device, and to receive an encrypted provisioning message from a management device; key generation logic to generate a decryption key based on the plurality of key fragments stored in the storage device to decrypt the encrypted provisioning message, and to decrypt the encrypted provisioning message using the decryption key; and control logic to provision the network-enabled device in accordance with instructions included in the decrypted provisioning message. Other embodiments may be disclosed and/or claimed.
Abstract translation: 本文公开了用于启用网络的设备供应的系统,设备和技术。 在一些实施例中,启用网络的设备可以包括:存储设备; 侦听逻辑,以从相应的多个对等设备无线地接收多个密钥片段,以使所述多个密钥片段存储在所述存储设备中,以及从管理设备接收加密的供应消息; 密钥生成逻辑,用于基于存储在所述存储装置中的所述多个密钥片段来生成解密密钥,以解密所述加密的配置消息,以及使用所述解密密钥解密所述加密的配置消息; 以及控制逻辑,以根据包括在解密的供应消息中的指令来设置启用网络的设备。 可以公开和/或要求保护其他实施例。
-
公开(公告)号:US11574175B2
公开(公告)日:2023-02-07
申请号:US16912152
申请日:2020-06-25
Applicant: Intel Corporation
Inventor: Oleg Pogorelik , Alex Nayshtut , Michael E. Kounavis , Raizy Kellermann , David M. Durham
Abstract: Embodiments are directed to security optimizing compute distribution in a hybrid deep learning environment. An embodiment of an apparatus includes one or more processors to determine security capabilities and compute capabilities of a client machine requesting to use a machine learning (ML) model hosted by the apparatus; determine, based on the security capabilities and based on exposure criteria of the ML model, that one or more layers of the ML model can be offloaded to the client machine for processing; define, based on the compute capabilities of the client machine, a split level of the one or more layers of the ML model for partition of the ML model, the partition comprising offload layers of the one or more layers of the ML model to be processed at the client machine; and cause the offload layers of the ML model to be downloaded to the client machine.
-
公开(公告)号:US20220321771A1
公开(公告)日:2022-10-06
申请号:US17843894
申请日:2022-06-17
Applicant: Intel Corporation
Inventor: Alex Nayshtut , Dan Horovitz , Omer Ben-Shalom , Guy Ben-Artzi , Miriam Engel , Victoria Almog-Ayzenberg
Abstract: The disclosure generally relates to method, system and apparatus for privacy enhancement mode for integrated cameras. In an exemplary embodiment, the disclosure allows a user of a device equipped with an integrated device to engage the device in the so-called privacy mode whereby while the camera is engaged, the device does not broadcast the user's images; rather the device uses the camera to detect, discern and determine the user's attributes. Such attributes may include one or more of movement, motion, mood, gesture and temperature of the user. The attributes may include specificities of the user's environment.
-
公开(公告)号:US20220121944A1
公开(公告)日:2022-04-21
申请号:US17560976
申请日:2021-12-23
Applicant: Intel Corporation
Inventor: Alex Nayshtut , Raizy Kellermann , Omer Ben-Shalom , Dor Levy
IPC: G06N3/08
Abstract: Adversarial sample protection for machine learning is described. An example of a storage medium includes instructions for initiating processing of examples for training of an inference engine in a system; dynamically selecting a subset of defensive preprocessing methods from a repository of defensive preprocessing methods for a current iteration of processing, wherein a subset of defensive preprocessing methods is selected for each iteration of processing; performing training of the inference engine with a plurality of examples, wherein the training of the inference engine include operation of the selected subset of defensive preprocessing methods; and performing an inference operation with the inference engine, including utilizing the selected subset of preprocessing defenses for the current iteration of processing.
-
公开(公告)号:US20220116513A1
公开(公告)日:2022-04-14
申请号:US17560861
申请日:2021-12-23
Applicant: Intel Corporation
Inventor: Raizy Kellermann , Omer Ben-Shalom , Alex Nayshtut
Abstract: Privacy-preserving reconstruction for compressed sensing is described. An example of a method includes capturing raw image data for a scene with a compressed sensing image sensor; performing reconstruction of the raw image data, including performing an enhancement reconstruction of the raw image data; and generating a masked image from the reconstruction of the raw image data, wherein the enhancement reconstruction includes applying enhancement utilizing a neural network trained with examples including image data in which private content is masked.
-
公开(公告)号:US11074542B2
公开(公告)日:2021-07-27
申请号:US16143534
申请日:2018-09-27
Applicant: Intel Corporation
Inventor: Tamir Damian Munafo , Adoni Mohammed Ghouse , Ariel Malamud , Johannes Berg , Alex Nayshtut
Abstract: According to various examples, an automated delivery device is described including a transportation system configured to move a package to a package recipient location, a package drop-off mechanism configured to drop off the package at the package recipient location, a communication system configured to communicate with a recipient camera device at the package recipient location and a controller configured to instruct the recipient camera device via the transceiver to verify package delivery based on an image of the delivered package.
-
公开(公告)号:US20200184489A1
公开(公告)日:2020-06-11
申请号:US16609405
申请日:2017-06-30
Applicant: Intel Corporation
Inventor: Ansuya Negi , Rita H. Wouhaybi , Igor Tatourian , Oleg Pogorelik , Ned M. Smith , Alex Nayshtut
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to track a provenance of goods. An example apparatus includes an unsigned block generator to generate a first unsigned block to store first processing data associated with the product by a first entity, a block signature engine to sign the first unsigned block with a first private key to generate a blockchain having a first signed block, the unsigned block generator to generate a second unsigned block in response to a second entity generating second processing data associated with the product by the second entity, the block signature engine to expand the blockchain by signing the second unsigned block with a second private key to generate a second signed block within the blockchain, and a blockchain validator to verify the product provenance by validating the first processing data and the second processing data using respective public keys associated with the first entity and the second entity.
-
公开(公告)号:US10469524B2
公开(公告)日:2019-11-05
申请号:US14369587
申请日:2013-12-18
Applicant: INTEL CORPORATION
Inventor: Omer Ben-Shalom , Igor Muttik , Alex Nayshtut , Yaniv Avidan
Abstract: Various embodiments are generally directed to techniques to detect and eradicate malware attacks by employing information indicative of malware activity received from both endpoint devices and network devices proving network services to endpoint devices. An apparatus to detect malware includes a processor component, an analysis component for execution by the processor component to employ a trust level assigned to a device in a network as a factor in an analysis of an indication received from the device of a malware attack, and an eradication component for execution by the processor component to determine an action to take through the network to eradicate the malware attack based on the analysis. Other embodiments are described and claimed.
-
-
-
-
-
-
-
-
-