1
Yeluri Raghuram, Steve Orrin, Alberto J Munoz: Method and system to securely migrate and provision virtual machine images and content. Intel Corporation, Barnes & Thornburg, December 30, 2014: US08924720 (12 worldwide citation)

A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted ...


2
Ravi L Sahita, David M Durham, Steve Orrin, Yasser Rasheed, Prasanna G Mulgaonkar, Paul S Schmitz, Hormuzd M Khosravi: Computer system and method with anti-malware. Intel Corporation, Erik R Nordstrom, January 21, 2014: US08635705 (4 worldwide citation)

In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of- ...


3
Robert Sesek, Steve Orrin Rasmussen: Job queuing based on print head position. Hewlett Packard Development Company, September 26, 2006: US07113303 (2 worldwide citation)

A system and method for ordering a queue of print jobs in a high volume printing operation employing movable print heads. A plurality of print jobs are sorted and executed according to print head position specifications for one or more movable print heads such that the total number of print head adj ...


4
Yeluri Ranghuram, Steve Orrin, Alberto J Munoz: Method and system to securely migrate and provision virtual machine images and content. Intel Corporation, Barnes & Thornburg, February 2, 2016: US09252946 (1 worldwide citation)

A method, device, and system for securely migrating and provisioning a virtual machine image to a host device of a cloud service provider environment (CSPE) is disclosed. A customer device encrypts a virtual machine image (VMI) and stores the VMI in the CSPE. The host device retrieves the encrypted ...


5
Hong C Li, Mark D Boucher, Conor P Cahill, Manohar R Castelino, Steve Orrin, Vinay Phegade, John E Simpson Jr: Secure local web application data manager. Intel Corporation, Jordan IP Law, September 6, 2016: US09436838

Apparatus, systems and methods may provide a browser interface to detect an attempt by web content to manipulate data in a local data store. In addition, the data may be classified into a category if the data is remotely accessible. Additionally, a security policy may be applied to the data based on ...


6
Ned M Smith, Simon P Johnson, Steve Orrin, Willard M Wiseman: Providing geographic protection to a system. Intel Corporation, Trop Pruner & Hu P C, June 14, 2016: US09367688

In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the syste ...


7
Jason Prosnitz, Steve Orrin: Searching for software applications based on application attributes. Quixey, Honigman Miller Schwartz and Cohn, June 21, 2016: US09372901

An application search system provides search results for applications based on one or more attributes of the applications. A search query is received by the application search system from a partner. The application search system retrieves a set of applications in response to the search query. In add ...


8
Robert Sesek, Steve Orrin Rasmussen: Job queuing based on print head position. Hewlett Packard Company, May 6, 2004: US20040085568-A1

A system and method for ordering a queue of print jobs in a high volume printing operation employing movable print heads. A plurality of print jobs are sorted and executed according to print head position specifications for one or more movable print heads such that the total number of print head adj ...


9
Erik J Johnson, Jasmeet Chhabra, Steve Orrin, Travis T Schluessler, Stephen D Goglin: Mechanism for detecting human presence using authenticated input activity. Intel Bstz, Blakely Sokoloff Taylor & Zafman, November 26, 2009: US20090292924-A1

When a service request associated with an initiated online service transaction is received, an attestation identifying a human-input activity is requested. Upon receiving a signature attesting the human-input activity, the previously initiated service transaction is authenticated based at least in p ...


10
Ravi L Sahita, David M Durham, Steve Orrin, Yasser Rasheed, Prasanna G Mulgaonkar, Paul S Schmitz, Hormuzd M Khosravi: Computer system and method with anti-malware. March 31, 2011: US20110078799-A1

In some embodiments, approaches may provide an out-of-band (OOB) agent to protect a platform. The OOB agent may be able to use non-TRS methods to measure and protect an in-band security agent. In some embodiments, a manageability engine can provide out of band connectivity to the in-band and out-of- ...