Patents by Inventor Carolyn Walker

Carolyn Walker has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9026800
    Abstract: Methods and systems for allowing customer or third party testing of secure programmable code are disclosed and may include verifying code loaded in a set-top box utilizing a test hash or a production hash prior to execution of the code, where the test hash and production hash may be stored in a memory, such as an OTP, within the set-top box, and may allow migration from corresponding test code to production code, which may be verified utilizing the test hash and production hash, respectively. The test and production hashes may be customer specific. The migration from test code to production code may be authenticated using at least a set-top box specific password. The test hash may be stored in a first portion of a one-time programmable memory and the production hash in a remaining portion, with the first portion being less than or equal to the remaining portion.
    Type: Grant
    Filed: May 2, 2007
    Date of Patent: May 5, 2015
    Assignee: Broadcom Corporation
    Inventors: Stephane Rodgers, Andrew Dellow, Iue-Shuenn Chen, Xuemin Chen, Carolyn Walker
  • Patent number: 7523516
    Abstract: An extended ramp device for helping animals to escape from a body of water includes: (a) a substantially planar upper, support portion including a central, climbing member and two bendable wing members connected to opposite sides of the central climbing member, each of the wing members including a substantially straight upper edge, an arched lower edge, a substantially straight, angled side edge at a front of the wing member, and at least two substantially keyhole-shaped slots; (b) a substantially planar lower, extension portion, the upper, support portion and the lower, extension portion including toehold perforations; (c) at least two brace members, each including a male end connecting projection on each opposite end, each of the brace male end connecting projections being insertable in the two substantially keyhole-shaped slots; and (d) a mechanism for removably attaching the extended ramp device to a structure adjacent or in the body of water; wherein the extended ramp device includes a disassembled posit
    Type: Grant
    Filed: February 29, 2008
    Date of Patent: April 28, 2009
    Assignee: Skamper Industries LLC
    Inventors: James Madison Waddell, V, Thomas Moore Davis, Carolyn Walker Agnew, Virginia Camp Wier Waddell
  • Publication number: 20080086647
    Abstract: Methods and systems for allowing customer or third party testing of secure programmable code are disclosed and may include verifying code loaded in a set-top box utilizing a test hash or a production hash prior to execution of the code, where the test hash and production hash may be stored in a memory, such as an OTP, within the set-top box, and may allow migration from corresponding test code to production code, which may be verified utilizing the test hash and production hash, respectively. The test and production hashes may be customer specific. The migration from test code to production code may be authenticated using at least a set-top box specific password. The test hash may be stored in a first portion of a one-time programmable memory and the production hash in a remaining portion, with the first portion being less than or equal to the remaining portion.
    Type: Application
    Filed: May 2, 2007
    Publication date: April 10, 2008
    Inventors: Stephane Rodgers, Andrew Dellow, Iue-Shuenn Chen, Xuemin Chen, Carolyn Walker
  • Publication number: 20060265733
    Abstract: In multimedia systems that implement secure access techniques, a method and apparatus for a security policy and enforcing mechanism for a set-top box security processor are provided. A security policy may be determined for a multimedia terminal based on high-level requirements by various system users. A default mode of operation may be generated based on the security policy and may be stored in a security policy memory. An access control matrix that indicates the operation of security components in a security processor for various user modes may be stored in the security policy memory. Control and/or access operations not supported by the access control matrix may be supported by the default mode of operation. The user modes in the access control matrix may include composition user modes. Accessing the information in the security policy memory may be utilized to enforce the security policy in the multimedia terminal.
    Type: Application
    Filed: May 23, 2005
    Publication date: November 23, 2006
    Inventors: Xuemin Chen, Iue-Shuenn Chen, Carolyn Walker