Patents by Inventor Steve Rodgers

Steve Rodgers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230409758
    Abstract: A method which comprises storing a readable identifier, which identifies a semiconductor product, and a unique key, being unique for said semiconductor product or for a group of semiconductor products, in a memory of said semiconductor product, generating an initial security data structure, said initial security data structure depending on a root key and on said unique key, wherein both said root key and said unique key are assigned to said semiconductor product, and wherein said initial security data structure is assigned to said readable identifier, and supplying said initial security data structure to said semiconductor product for further processing.
    Type: Application
    Filed: May 17, 2022
    Publication date: December 21, 2023
    Inventors: Steve Rodgers, Rui Pedro de Moura Alves Pimenta
  • Patent number: 9652637
    Abstract: Aspects of a method and system for allowing no code download in a code download scheme are provided. A system-on-a-chip (SoC) may comprise a security processor, a ROM, and a one-time-programmable (OTP) memory. The security processor may enable fetching code from a restricted function portion of the ROM. The restricted functions may comprise code for booting up the SoC and code that prevents enabling security algorithms within the SoC. The security processor may then enable booting up of at least a portion of the SoC based on the fetched code. The remaining portion of the ROM may comprise code for downloading security code from an external memory, such as a FLASH memory, to an internal memory, such as a RAM, to boot up the SoC. Access to the restricted function portion or the remaining portion of the ROM is based on at least one bit from the OTP memory.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: May 16, 2017
    Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.
    Inventors: Andrew Dellow, Iue-Shuenn Chen, Stephane (Steve) Rodgers, Xuemin (Sherman) Chen
  • Patent number: 9608804
    Abstract: Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and/or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and/or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: March 28, 2017
    Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.
    Inventors: Sherman (Xuemin) Chen, Steve Rodgers
  • Publication number: 20150338318
    Abstract: An assembly for monitoring a liquid potentially containing contaminant particles flowing through a conduit that may include a swirl inducer for inducing swirl flow within the conduit to cause contaminant particles to migrate toward the periphery of the conduit. A removable plug defines a passage for coupling into the path of the peripheral fluid flow within the conduit. A device associated with the removable plug senses sensing or captures in situ the contaminant particles such that the captured contaminant particles can be accessed by removing the plug.
    Type: Application
    Filed: January 15, 2014
    Publication date: November 26, 2015
    Applicant: GasTOPS Ltd.
    Inventors: Kevin GODDARD, Steve RODGER
  • Publication number: 20130279691
    Abstract: Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and/or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and/or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.
    Type: Application
    Filed: June 14, 2013
    Publication date: October 24, 2013
    Inventors: Sherman (Xuemin) CHEN, Steve RODGERS
  • Patent number: 7797551
    Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.
    Type: Grant
    Filed: October 6, 2008
    Date of Patent: September 14, 2010
    Assignee: Broadcom Corporation
    Inventors: Steve Rodgers, Shermin (Xuemin) Chen
  • Publication number: 20090037726
    Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.
    Type: Application
    Filed: October 6, 2008
    Publication date: February 5, 2009
    Inventors: Steve Rodgers, Shermin Xuemin Chen
  • Publication number: 20080271164
    Abstract: Aspects of a method and system for allowing no code download in a code download scheme are provided. A system-on-a-chip (SoC) may comprise a security processor, a ROM, and a one-time-programmable (OTP) memory. The security processor may enable fetching code from a restricted function portion of the ROM. The restricted functions may comprise code for booting up the SoC and code that prevents enabling security algorithms within the SoC. The security processor may then enable booting up of at least a portion of the SoC based on the fetched code. The remaining portion of the ROM may comprise code for downloading security code from an external memory, such as a FLASH memory, to an internal memory, such as a RAM, to boot up the SoC. Access to the restricted function portion or the remaining portion of the ROM is based on at least one bit from the OTP memory.
    Type: Application
    Filed: April 26, 2007
    Publication date: October 30, 2008
    Inventors: Andrew Dellow, Iue-Shuenn Chen, Stephane (Steve) Rodgers, Xuemin (Sherman) Chen
  • Patent number: 7434065
    Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.
    Type: Grant
    Filed: November 6, 2003
    Date of Patent: October 7, 2008
    Assignee: Broadcom Corporation
    Inventors: Steve Rodgers, Sherman (Xuemin) Chen
  • Publication number: 20070177581
    Abstract: Herein described are at least a system and a method for regulating data flow in a data pipeline that may be used in a video processing system. The system comprises a processor, one or more data buffers, and one or more processing stations. The one or more data buffers may be used to buffer corresponding processing stations. Each of the one or more processing stations may comprise a switching circuitry that is used to inhibit data transmission when a hold signal is received from the processor. The processor may send the signal in response to a feedback control signal generated by the one or more processing stations. The method may comprise determining if the processing time of a processing station exceeds a specified time. The method further comprises generating a feedback control signal to a processor if the specified time is exceeded.
    Type: Application
    Filed: January 31, 2006
    Publication date: August 2, 2007
    Inventors: Steve Rodgers, Rajesh Mamidwar
  • Publication number: 20070113262
    Abstract: Herein described is a system and method for improving the performance in which data packets are processed in a set-top-box. The system determines and stores one or more values into a memory. The one or more values in memory are subsequently utilized when a firmware is executed. These values are used to efficiently index locations within one or more data packets, such that processing performance is improved. Based on the types of packets received by the set-top-box, the hardware assistance provided by the system may be gradually increased or attenuated to optimize the performance in which the data packets are processed. The method involves determining the one or more values, storing the one or more values in a memory, and using said one or more values to effectively index one or more data fields in the one or more data packets.
    Type: Application
    Filed: November 14, 2005
    Publication date: May 17, 2007
    Inventor: Steve Rodgers
  • Patent number: 7003713
    Abstract: A one-time-programmable (OTP) module includes OTP memory and OTP input/output (I/O) that performs error correction operations. The OTP module may be used in a data communications system. The error correction operations operate according to one of a plurality of supported coding schemes. In one embodiment, the error correction operations are based upon Hamming code operations. The coding scheme employed by the error correction operations is set by a code control input. The code control input is chosen based upon the inherent quality of the OTP memory. The OTP module may thus be incorporated into any of a variety of processes, each of which has its own OTP memory quality.
    Type: Grant
    Filed: May 16, 2002
    Date of Patent: February 21, 2006
    Assignee: Broadcom Corporation
    Inventor: Steve Rodgers
  • Publication number: 20060036853
    Abstract: Systems and methods that support storage device content authentication are provided. A system that verifies storage device content received from a storage device may comprise, for example, a security processor coupled to the storage device. The security processor may be adapted to receive a partitioned storage device region from the storage device. The partitioned storage device region may comprise, for example, regional content and first hashed regional content. The security processor may generate, for example, second hashed regional content by performing a hashing function on the regional content received by the security processor. The security processor may compare, for example, the first hashed regional content to the second hashed regional content. The security processor may verify the regional content received by the security processor if the first hashed regional content is the same as the second hashed regional content.
    Type: Application
    Filed: August 6, 2004
    Publication date: February 16, 2006
    Inventors: Sherman Chen, Steve Rodgers, Iue-Shuenn Chen, Francis Chen
  • Publication number: 20060031685
    Abstract: Systems and methods that support secure code downloading are provided. In one embodiment, a method that securely downloads code may include, for example, one or more of the following: receiving a command in a security processor; loading an encryption or decryption key based on the received command; configuring the security processor with a selected scrambling type and a selected signature type based on the received command; and processing incoming code using the loaded encryption or decryption key and the configured security processor.
    Type: Application
    Filed: August 4, 2004
    Publication date: February 9, 2006
    Inventors: Sherman Chen, Steve Rodgers
  • Publication number: 20050172132
    Abstract: Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and/or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and/or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.
    Type: Application
    Filed: January 30, 2004
    Publication date: August 4, 2005
    Inventors: Sherman Chen, Steve Rodgers
  • Publication number: 20050071639
    Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.
    Type: Application
    Filed: November 6, 2003
    Publication date: March 31, 2005
    Inventors: Steve Rodgers, Sherman (Xuemin) Chen
  • Publication number: 20050039030
    Abstract: Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for example, encrypted data. The processor may be coupled to the memory and may include, for example, a decryptor that decrypts the encrypted data. The decryptor may be adapted, for example, to variably bit roll the encrypted data, to fixedly bit shuffle the bit-rolled data, to add a first key to the bit-shuffled data and to process the added data with a second key.
    Type: Application
    Filed: October 28, 2003
    Publication date: February 17, 2005
    Inventors: Steve Rodgers, Sherman Chen, Iue-Shuenn Chen
  • Publication number: 20030217322
    Abstract: A one-time-programmable (OTP) module includes OTP memory and OTP input/output (I/O) that performs error correction operations. The OTP module may be used in a data communications system. The error correction operations operate according to one of a plurality of supported coding schemes. In one embodiment, the error correction operations are based upon Hamming code operations. The coding scheme employed by the error correction operations is set by a code control input. The code control input is chosen based upon the inherent quality of the OTP memory. The OTP module may thus be incorporated into any of a variety of processes, each of which has its own OTP memory quality.
    Type: Application
    Filed: May 16, 2002
    Publication date: November 20, 2003
    Inventor: Steve Rodgers