1
Gary L Graunke, John Carbajal, Richard L Maliszewski, Carlos V Rozas: Method for securely distributing a conditional use private key to a trusted entity on a remote system. Intel Corporation, Steven P Skabrat, November 23, 1999: US05991399 (516 worldwide citation)

Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided. Once validated, the trusted player uses the privat ...


2
Gary L Graunke: Using predictive traffic modeling. Intel Corporation, Trop Pruner & Hu PC, July 3, 2001: US06256577 (158 worldwide citation)

A system may receive requests for traffic routing information from a plurality of vehicles and may provide a suggested route, not only based on actual current conditions and historical information, but based on the application of a predictive model. The predictive model may use information about cur ...


3
Joseph M Nardone, Richard P Mangold, Jody L Pfotenhauer, Keith L Shippy, David W Aucsmith, Richard L Maliszewski, Gary L Graunke: Tamper resistant methods and apparatus. Intel Corporation, Blakely Sokoloff Taylor & Zafman, March 20, 2001: US06205550 (140 worldwide citation)

In one apparatus, a number of obfuscated programming instructions are equipped to self-verify whether execution of the obfuscated programming instructions is being observed. In another apparatus, a number of obfuscated programming instruction are equipped to determine whether the apparatus is being ...


4
Joseph M Nardone, Richard T Mangold, Jody L Pfotenhauer, Keith L Shippy, David W Aucsmith, Richard L Maliszewski, Gary L Graunke: Tamper resistant methods and apparatus. Intel Corporation, Blakely Sokoloff Taylor & Zafman, January 23, 2001: US06178509 (138 worldwide citation)

In one apparatus, a number of obfuscated programming instructions is provided to perform integrity verification on a number of other plain text programming instructions. In another apparatus, a number of obfuscated programming instructions is provided to self-verify an invocation of the obfuscated p ...


5
Joseph M Nardone, Richard P Mangold, Jody L Pfotenhauer, Keith L Shippy, David W Aucsmith, Richard L Maliszewski, Gary L Graunke: Tamper resistant player for scrambled contents. Intel Corporation, Blakely Sokoloff Taylor & Zafman, January 16, 2001: US06175925 (121 worldwide citation)

In one apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a descrambler that descrambles scrambled content to generate descrambled content. In another apparatus, a group of plain text and obfuscated cells of programming instructions is provided ...


6
Robert W Faber, David A Lee, Brendan S Traw, Gary L Graunke: Digital video content transmission ciphering and deciphering method and apparatus. Intel Corporation, Blakely Sokoloff Taylor & Zafman, November 5, 2002: US06477252 (90 worldwide citation)

A video source device provides a basis value to a symmetric ciphering/deciphering process to a video sink device, to which the video source device is to provide a video content. The video source device ciphers the video content for transmission to the video sink device, including generation of a fir ...


7
Gary L Graunke, Carlos V Rozas: Method and apparatus for integrity verification, authentication, and secure linkage of software modules. Intel Corporation, Mark Seeley, August 15, 2000: US06105137 (87 worldwide citation)

A method and apparatus of authenticating and verifying the integrity of software modules is disclosed. In one embodiment, said software modules initially establish their corresponding credentials. Then said local software module ensures its integrity by validating its own digital signature. Said loc ...


8
Carl M Ellison, Brendan Traw, Michael S Ripley, Gary L Graunke: Public key media key block. Intel Corporation, Michael R Barre, December 4, 2007: US07305711 (36 worldwide citation)

Protected content distribution is accomplished by a first entity generating a set of asymmetric key pairs, creating a plurality of sets of private keys by selecting a combination of private keys from the set of asymmetric key pairs for each created set, and distributing the sets of private keys to p ...


9
Gary L Graunke, David W Aucsmith: Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation. Intel Corporation, Blakely Sokoloff Taylor & Zafman, March 21, 2000: US06041122 (34 worldwide citation)

A method and apparatus for hiding cryptographic keys based on autocorrelation timing attacks is provided. The method and apparatus of the present invention utilize a autocorrelation timing attack to allow independent software entities to authenticate themselves without storing a private cryptographi ...


10
Gary L Graunke: Method and apparatus for simultaneous decryption and re-encryption of publicly distributed content via stream ciphers. Intel Corporation, Steven P Skabrat, February 27, 2007: US07184550 (28 worldwide citation)

Secure communication from one encryption domain to another using a trusted module. In one embodiment, the invention includes receiving encrypted streamed content encrypted with a first key, generating a substitution key stream based on the first key and a second key, generating a transposition key s ...



Click the thumbnails below to visualize the patent trend.