-
71.
公开(公告)号:US12081538B2
公开(公告)日:2024-09-03
申请号:US17855648
申请日:2022-06-30
Applicant: Intel Corporation
Inventor: Omer Ben-Shalom , Oren Galler , Alex Nayshtut
IPC: H04L9/40
CPC classification number: H04L63/083 , H04L63/0428 , H04L63/18 , H04L2463/082
Abstract: The disclosure generally relates to method, system and apparatus for multifactor authentication exchange using out of band communication to authenticate a user while defending against the man in the middle attack. In an exemplary method, the disclosed principles provide a multifactor authentication (MFA) exchange, which includes: receiving an authentication request through in-band communication from a first device associated with a user to authenticate the user, the authentication request including a first authentication factor to identify the user; generating a second authentication factor, the second authentication factor further comprising an authorization token; generating an encryption key to encrypt the authorization token and a redirect Uniform Resource Locator (URL) address; and communicating the second authentication factor, the encryption key and the redirect URL address to a second device associated with the user.
-
72.
公开(公告)号:US20240007456A1
公开(公告)日:2024-01-04
申请号:US17855648
申请日:2022-06-30
Applicant: Intel Corporation
Inventor: Omer Ben-Shalom , Oren Galler , Alex Nayshtut
IPC: H04L9/40
CPC classification number: H04L63/083 , H04L63/0428 , H04L2463/082
Abstract: The disclosure generally relates to method, system and apparatus for multifactor authentication exchange using out of band communication to authenticate a user while defending against the man in the middle attack. In an exemplary method, the disclosed principles provide a multifactor authentication (MFA) exchange, which includes: receiving an authentication request through in-band communication from a first device associated with a user to authenticate the user, the authentication request including a first authentication factor to identify the user; generating a second authentication factor, the second authentication factor further comprising an authorization token; generating an encryption key to encrypt the authorization token and a redirect Uniform Resource Locator (URL) address; and communicating the second authentication factor, the encryption key and the redirect URL address to a second device associated with the user.
-
公开(公告)号:US11625731B2
公开(公告)日:2023-04-11
申请号:US16609405
申请日:2017-06-30
Applicant: Intel Corporation
Inventor: Ansuya Negi , Rita H. Wouhaybi , Igor Tatourian , Oleg Pogorelik , Ned M. Smith , Alex Nayshtut
IPC: G06Q30/00 , G06Q10/08 , H04L9/32 , H04L9/00 , G06F16/25 , G06Q30/018 , G06Q10/0832
Abstract: Methods, apparatus, systems and articles of manufacture are disclosed to track a provenance of goods. An example apparatus includes an unsigned block generator to generate a first unsigned block to store first processing data associated with the product by a first entity, a block signature engine to sign the first unsigned block with a first private key to generate a blockchain having a first signed block, the unsigned block generator to generate a second unsigned block in response to a second entity generating second processing data associated with the product by the second entity, the block signature engine to expand the blockchain by signing the second unsigned block with a second private key to generate a second signed block within the blockchain, and a blockchain validator to verify the product provenance by validating the first processing data and the second processing data using respective public keys associated with the first entity and the second entity.
-
公开(公告)号:US11611561B2
公开(公告)日:2023-03-21
申请号:US16913557
申请日:2020-06-26
Applicant: Intel Corporation
Inventor: Alex Nayshtut , Omer Ben-Shalom , Hong Li
Abstract: Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.
-
公开(公告)号:US20220114500A1
公开(公告)日:2022-04-14
申请号:US17558744
申请日:2021-12-22
Applicant: Intel Corporation
Inventor: Alex Nayshtut , Raizy Kellermann , Omer Ben-Shalom
Abstract: An apparatus is disclosed. The apparatus comprises one or more processors to receive trained model update data from each of a plurality of collaborators, execute an auxiliary machine learning model to the trained model update data to generate a risk score for trained model update data associated with each collaborator, apply one or more policies based on the risk scores to generate adjusted trained model update data associated with each collaborator.
-
公开(公告)号:US20220114255A1
公开(公告)日:2022-04-14
申请号:US17560943
申请日:2021-12-23
Applicant: Intel Corporation
Inventor: Raizy Kellermann , Omer Ben-Shalom , Alex Nayshtut
IPC: G06F21/55 , G06V10/82 , G06V10/774 , G06V20/56
Abstract: Machine learning fraud resiliency using perceptual descriptors is described. An example of a computer-readable storage medium includes instructions for accessing multiple examples in a training dataset for a classifier system; calculating one or more perceptual hashes for each of the examples; generating clusters of perceptual hashes for the multiple examples based on the calculation of the one or more perceptual hashes for each of the plurality of examples; obtaining an inference sample for classification by the classifier system; generating a first classification result for the inference sample utilizing a neural network classifier and generating a second classification result utilizing the generated clusters of perceptual hashes; comparing the first classification result with the second classification result; and, upon a determination that the first classification result does not match the second classification result, determining a suspicion of an adversarial attack.
-
公开(公告)号:US11170078B2
公开(公告)日:2021-11-09
申请号:US16361515
申请日:2019-03-22
Applicant: Intel Corporation
Inventor: Oleg Pogorelik , Shefy Gur-Ary , Adir Abraham , David Alhanati , Angelo Moscati , Alex Nayshtut , Denis Klimov
Abstract: In one example an apparatus comprises a memory and a processor to receive, in an edge node of a secure network, a first file, determine that the first file is addressed to a recipient outside the secure network, and in response to a determination that the first file is addressed to a destination outside the secure network, to generate a watermark that identifies a transmitter of the document, a recipient of the document, and comprises a digital signature of the first file, embed the watermark in the first file to generate a watermarked file, and pass the watermarked file to an input/output system for transmission out of the secure network. Other examples may be described.
-
公开(公告)号:US10984096B2
公开(公告)日:2021-04-20
申请号:US15938015
申请日:2018-03-28
Applicant: Intel Corporation
Inventor: Koichi Yamada , Sevin F. Varoglu , Ajay Harikumar , Alex Nayshtut
Abstract: After a heuristic event counter in a processor has triggered a performance monitoring interrupt (PMI) when the processor was executing a target program in user mode, and after the processor has switched to kernel mode in response to the PMI, a heuristic event handler automatically performs preliminary analysis in kernel mode, without switching back to user mode, to determine whether heavyweight code analysis is warranted. The preliminary analysis comprises (a) obtaining an instruction pointer (IP) for the target program from a last branch record (LBR) buffer in the processor, (b) using transaction hardware in the processor to determine whether the IP from LBR buffer points to a readable page in memory, and (c) determining that heavyweight code analysis is not warranted in response to a determination that the page pointed to by the IP from LBR buffer is not readable. Other embodiments are described and claimed.
-
公开(公告)号:US10790978B2
公开(公告)日:2020-09-29
申请号:US15271566
申请日:2016-09-21
Applicant: Intel Corporation
Inventor: Ned M. Smith , Omer Ben-Shalom , Alex Nayshtut
Abstract: Technologies for secure collective authorization include multiple computing devices in communication over a network. A computing device may perform a join protocol with a group leader to receive a group private key that is associated with an interface implemented by the computing device. The interface may be an instance of an object model implemented by the computing device or membership of the computing device in a subsystem. The computing device receives a request for attestation to the interface, selects the group private key for the interface, and sends an attestation in response to the request. Another computing device may receive the attestation and verify the attestation with a group public key corresponding to the group private key. The group private key may be an enhanced privacy identifier (EPID) private key, and the group public key may be an EPID public key. Other embodiments are described and claimed.
-
公开(公告)号:US10764635B2
公开(公告)日:2020-09-01
申请号:US16222622
申请日:2018-12-17
Applicant: Intel Corporation
Inventor: Lenitra M. Durham , Tamir Damian Munafo , Rita H. Wouhaybi , Adi Shaliv , Giuseppe Raffa , Oleg Pogorelik , Sangita Ravi Sharma , Alex Nayshtut
IPC: H04N21/442 , H04N21/258 , H04N21/45 , G06K9/00 , H04N21/2343 , H04N21/454 , H04N21/4223 , H04N21/234 , H04N21/4545
Abstract: A system and method for real-time alteration of media content based on stress monitoring is disclosed. A computer system present a single media content item in two distinct content streams to a first and second user. Using sensor generated data the computer system measures at least one user response indicator for the first and second user and estimates a stress level for the first and second users. The computer system determines whether the estimated stress level for the first user exceeds a first predetermined stress threshold. In accordance with a determination that the estimated stress level for the first user exceeds a first predetermined stress threshold the computer system alters the first stream of the presented media content item to modify the particular portion of the media content item associated with the estimated stress level for the first user.
-
-
-
-
-
-
-
-
-