Patents by Inventor James Howard Ellis

James Howard Ellis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143725
    Abstract: A method of determining trust in a supply item in an imaging device for verifying other supply items installed in the imaging device via an algorithm, wherein the imaging device has a plurality of installed supply items. The method comprises: sending challenge data and an indication of the algorithm to a candidate supply item, receiving a challenge response from the candidate supply item, and determining, by the controller, a status of the challenge response, the status being verified or unverified. When the controller determines that the received challenge response is a correct output of the algorithm when the challenge data is input to the algorithm, the status is determined as verified. Further, an imaging device configured to determine trust in a supply item installed in the imaging device for verifying other supply items installed in the imaging device via an algorithm.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240143726
    Abstract: An imaging device comprising a controller, a prover supply item and a verifier supply item, where the imaging device is configured to authenticate the prover supply item by: sending a challenge response from the prover supply item to the verifier supply item, and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. A supply item configured to be operable as a prover supply item when installed in an imaging device. The prover supply item is configured to receive an indication of an algorithm to be performed and receive challenge data, perform the algorithm using the challenge data as input to determine a challenge response, and send the challenge response to a verifier supply item.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240143844
    Abstract: A method of authenticating a supply item in an imaging device, wherein the supply item is designated as a prover supply item, and a second supply item installed in the imaging device is designated as a verifier supply item. The method comprises: receiving a challenge response from the prover supply item and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. The verifier supply item is disclosed, configured to receive a challenge response from a prover supply item installed in the imaging device, and determine a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm, the status is determined as verified.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20230409695
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 11, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409696
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 13, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409690
    Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: June 22, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409697
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 18, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230367863
    Abstract: A method of determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The method further includes generating, by the component, a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 23, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367865
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 29, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367864
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 27, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367866
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: July 18, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230252167
    Abstract: A method for determining authenticity of a component in an imaging device is disclosed. Embodiments of the present disclosure provide for a method for a device to use an electronic authentication scheme to authenticate a second device while overcoming vulnerabilities associated with sending data over a communication bus when performing authentication, by using information other than that transmitted over the shared bus as authentication parameters. Embodiments utilize the current drawn by a chip from a power source when the chip performs an operation in response to a command as an authentication parameter.
    Type: Application
    Filed: April 18, 2023
    Publication date: August 10, 2023
    Inventors: James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Patent number: 11686754
    Abstract: Described is an invention that adds capacitive sensing ability with a single magnetic field sensor location or distributed within an array of surfaces of the sensor. The capacitive sensing can be achieved by modifying a classic Hall effect sensor or putting separate capacitive sensor plates in close proximity to the hall effect sensor.
    Type: Grant
    Filed: September 2, 2021
    Date of Patent: June 27, 2023
    Assignee: Lexmark International, Inc.
    Inventors: James Howard Ellis, Jr., Keith Bryan Hardin
  • Patent number: 11543472
    Abstract: A magnetic sensor array device is comprised of an array of magnetic sensors arranged on a common semiconductor substrate to measure the multi-axis magnetic field of an arbitrary sized region at high speed with high spatial resolution and high magnetic resolution. This invention further improves a multi-axis magnetic sensor array device fabricated on a common semiconductor substrate with additional optimizations to provide for variable spatial resolution, variable magnetic resolution, and a novel secret key derivation.
    Type: Grant
    Filed: September 2, 2021
    Date of Patent: January 3, 2023
    Assignee: LEXMARK INTERNATIONAL, INC.
    Inventors: James Howard Ellis, Jr., Keith Bryan Hardin
  • Publication number: 20220414203
    Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: June 15, 2022
    Publication date: December 29, 2022
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20220382850
    Abstract: A method of determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The method further includes generating, by the component, a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: May 10, 2022
    Publication date: December 1, 2022
    Inventors: JAMES HOWARD ELLIS, Jr., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Patent number: 11442122
    Abstract: A magnetic sensor array device is described that is constructed with multiple single sensor die, diced out of a wafer individually and packaged in a multi-chip module (MCM). The device comprises an array of multi-axis magnetic sensors that can measure the multi-dimensional magnetic field of an arbitrary sized two-dimensional region with high spatial resolution, reduced sensing distance, higher measurement throughput, tolerance to motion, improved temperature measurement, and improved yield when placed on a circuit card comprises part of an authentication system including a physical unclonable function (“PUF”), a substrate, a plurality of magnetized particles randomly dispersed in the substrate, and a PUF reader constructed using one or more of the magnetic sensor array devices wherein the PUF reader measures the magnetic field at multiple locations in close proximity to the magnetized particles. The measured magnetic field data may be compared to previously enrolled data to assess authenticity.
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: September 13, 2022
    Assignee: Lexmark International, Inc.
    Inventors: James Howard Ellis, Jr., Keith Bryan Hardin
  • Publication number: 20220244323
    Abstract: A magnetic sensor device with an array of magnetic sensors arranged on a common semiconductor substrate to measure the multi-axis magnetic field of an arbitrary region with high spatial resolution, reduced sensing distance, higher measurement throughput, motion tolerance, temperature tolerance, and improved manufacturing yield. A multi-axis magnetic sensor array device fabricated on a common semiconductor substrate is optimized offering additional improvements to reduce measurement time, increase spatial resolution uniformity, and lower thermal compensation cost. Further, the central area of a surface is utilized to measure the normal magnetic field. A perimeter of Hall effect plates measuring the components of the magnetic field in the plane of the measuring surface, which allows for a very high density of normal field measurements allows calculation of the in-plane field components. Error along the edges can be mitigated with the in-plane measured components.
    Type: Application
    Filed: March 5, 2021
    Publication date: August 4, 2022
    Inventors: JAMES HOWARD ELLIS, JR., KEITH BRYAN HARDIN
  • Publication number: 20220176727
    Abstract: In the invention described, a method of creating a unique tag or labeling system for electronic printed circuit board assemblies (PCBA) that is unique, virtually un-duplicatable, and may be altered when the electronics are tampered with.
    Type: Application
    Filed: December 4, 2021
    Publication date: June 9, 2022
    Inventors: JAMES HOWARD ELLIS, KEITH BRYAN HARDIN, ROBERT HENRY MUYSKENS, MITCHELL RAY ROWLETTE, CARL EDMOND SULLIVAN
  • Patent number: 11346903
    Abstract: A magnetic sensor array device is described that is constructed with multiple single sensor die, diced out of a wafer as a group and packaged in a wafer level package (WLP). The device comprises an array of multi-axis magnetic sensors that can measure the multi-dimensional magnetic field of an arbitrary sized two-dimensional region with high spatial resolution, reduced sensing distance, higher measurement throughput, tolerance to motion, improved temperature measurement, and improved yield when placed on a circuit card comprises part of an authentication system including a physical unclonable function (“PUF”), a substrate, a plurality of magnetized particles randomly dispersed in the substrate, and a PUF reader constructed using one or more of the magnetic sensor array devices wherein the PUF reader measures the magnetic field at multiple locations in close proximity to the magnetized particles. The measured magnetic field data may be compared to previously enrolled data to assess authenticity.
    Type: Grant
    Filed: September 4, 2020
    Date of Patent: May 31, 2022
    Assignee: Lexmark International, Inc.
    Inventors: James Howard Ellis, Keith Bryan Hardin, William Pohl Corbett, Jr.