Patents by Inventor Steve Rodgers
Steve Rodgers has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230409758Abstract: A method which comprises storing a readable identifier, which identifies a semiconductor product, and a unique key, being unique for said semiconductor product or for a group of semiconductor products, in a memory of said semiconductor product, generating an initial security data structure, said initial security data structure depending on a root key and on said unique key, wherein both said root key and said unique key are assigned to said semiconductor product, and wherein said initial security data structure is assigned to said readable identifier, and supplying said initial security data structure to said semiconductor product for further processing.Type: ApplicationFiled: May 17, 2022Publication date: December 21, 2023Inventors: Steve Rodgers, Rui Pedro de Moura Alves Pimenta
-
Patent number: 9652637Abstract: Aspects of a method and system for allowing no code download in a code download scheme are provided. A system-on-a-chip (SoC) may comprise a security processor, a ROM, and a one-time-programmable (OTP) memory. The security processor may enable fetching code from a restricted function portion of the ROM. The restricted functions may comprise code for booting up the SoC and code that prevents enabling security algorithms within the SoC. The security processor may then enable booting up of at least a portion of the SoC based on the fetched code. The remaining portion of the ROM may comprise code for downloading security code from an external memory, such as a FLASH memory, to an internal memory, such as a RAM, to boot up the SoC. Access to the restricted function portion or the remaining portion of the ROM is based on at least one bit from the OTP memory.Type: GrantFiled: April 26, 2007Date of Patent: May 16, 2017Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.Inventors: Andrew Dellow, Iue-Shuenn Chen, Stephane (Steve) Rodgers, Xuemin (Sherman) Chen
-
Patent number: 9608804Abstract: Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and/or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and/or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.Type: GrantFiled: June 14, 2013Date of Patent: March 28, 2017Assignee: Avago Technologies General IP (Singapore) Pte. Ltd.Inventors: Sherman (Xuemin) Chen, Steve Rodgers
-
Publication number: 20150338318Abstract: An assembly for monitoring a liquid potentially containing contaminant particles flowing through a conduit that may include a swirl inducer for inducing swirl flow within the conduit to cause contaminant particles to migrate toward the periphery of the conduit. A removable plug defines a passage for coupling into the path of the peripheral fluid flow within the conduit. A device associated with the removable plug senses sensing or captures in situ the contaminant particles such that the captured contaminant particles can be accessed by removing the plug.Type: ApplicationFiled: January 15, 2014Publication date: November 26, 2015Applicant: GasTOPS Ltd.Inventors: Kevin GODDARD, Steve RODGER
-
Publication number: 20130279691Abstract: Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and/or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and/or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.Type: ApplicationFiled: June 14, 2013Publication date: October 24, 2013Inventors: Sherman (Xuemin) CHEN, Steve RODGERS
-
Patent number: 7797551Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.Type: GrantFiled: October 6, 2008Date of Patent: September 14, 2010Assignee: Broadcom CorporationInventors: Steve Rodgers, Shermin (Xuemin) Chen
-
Publication number: 20090037726Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.Type: ApplicationFiled: October 6, 2008Publication date: February 5, 2009Inventors: Steve Rodgers, Shermin Xuemin Chen
-
Publication number: 20080271164Abstract: Aspects of a method and system for allowing no code download in a code download scheme are provided. A system-on-a-chip (SoC) may comprise a security processor, a ROM, and a one-time-programmable (OTP) memory. The security processor may enable fetching code from a restricted function portion of the ROM. The restricted functions may comprise code for booting up the SoC and code that prevents enabling security algorithms within the SoC. The security processor may then enable booting up of at least a portion of the SoC based on the fetched code. The remaining portion of the ROM may comprise code for downloading security code from an external memory, such as a FLASH memory, to an internal memory, such as a RAM, to boot up the SoC. Access to the restricted function portion or the remaining portion of the ROM is based on at least one bit from the OTP memory.Type: ApplicationFiled: April 26, 2007Publication date: October 30, 2008Inventors: Andrew Dellow, Iue-Shuenn Chen, Stephane (Steve) Rodgers, Xuemin (Sherman) Chen
-
Patent number: 7434065Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.Type: GrantFiled: November 6, 2003Date of Patent: October 7, 2008Assignee: Broadcom CorporationInventors: Steve Rodgers, Sherman (Xuemin) Chen
-
Publication number: 20070177581Abstract: Herein described are at least a system and a method for regulating data flow in a data pipeline that may be used in a video processing system. The system comprises a processor, one or more data buffers, and one or more processing stations. The one or more data buffers may be used to buffer corresponding processing stations. Each of the one or more processing stations may comprise a switching circuitry that is used to inhibit data transmission when a hold signal is received from the processor. The processor may send the signal in response to a feedback control signal generated by the one or more processing stations. The method may comprise determining if the processing time of a processing station exceeds a specified time. The method further comprises generating a feedback control signal to a processor if the specified time is exceeded.Type: ApplicationFiled: January 31, 2006Publication date: August 2, 2007Inventors: Steve Rodgers, Rajesh Mamidwar
-
Publication number: 20070113262Abstract: Herein described is a system and method for improving the performance in which data packets are processed in a set-top-box. The system determines and stores one or more values into a memory. The one or more values in memory are subsequently utilized when a firmware is executed. These values are used to efficiently index locations within one or more data packets, such that processing performance is improved. Based on the types of packets received by the set-top-box, the hardware assistance provided by the system may be gradually increased or attenuated to optimize the performance in which the data packets are processed. The method involves determining the one or more values, storing the one or more values in a memory, and using said one or more values to effectively index one or more data fields in the one or more data packets.Type: ApplicationFiled: November 14, 2005Publication date: May 17, 2007Inventor: Steve Rodgers
-
Patent number: 7003713Abstract: A one-time-programmable (OTP) module includes OTP memory and OTP input/output (I/O) that performs error correction operations. The OTP module may be used in a data communications system. The error correction operations operate according to one of a plurality of supported coding schemes. In one embodiment, the error correction operations are based upon Hamming code operations. The coding scheme employed by the error correction operations is set by a code control input. The code control input is chosen based upon the inherent quality of the OTP memory. The OTP module may thus be incorporated into any of a variety of processes, each of which has its own OTP memory quality.Type: GrantFiled: May 16, 2002Date of Patent: February 21, 2006Assignee: Broadcom CorporationInventor: Steve Rodgers
-
Publication number: 20060036853Abstract: Systems and methods that support storage device content authentication are provided. A system that verifies storage device content received from a storage device may comprise, for example, a security processor coupled to the storage device. The security processor may be adapted to receive a partitioned storage device region from the storage device. The partitioned storage device region may comprise, for example, regional content and first hashed regional content. The security processor may generate, for example, second hashed regional content by performing a hashing function on the regional content received by the security processor. The security processor may compare, for example, the first hashed regional content to the second hashed regional content. The security processor may verify the regional content received by the security processor if the first hashed regional content is the same as the second hashed regional content.Type: ApplicationFiled: August 6, 2004Publication date: February 16, 2006Inventors: Sherman Chen, Steve Rodgers, Iue-Shuenn Chen, Francis Chen
-
Publication number: 20060031685Abstract: Systems and methods that support secure code downloading are provided. In one embodiment, a method that securely downloads code may include, for example, one or more of the following: receiving a command in a security processor; loading an encryption or decryption key based on the received command; configuring the security processor with a selected scrambling type and a selected signature type based on the received command; and processing incoming code using the loaded encryption or decryption key and the configured security processor.Type: ApplicationFiled: August 4, 2004Publication date: February 9, 2006Inventors: Sherman Chen, Steve Rodgers
-
Publication number: 20050172132Abstract: Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key in order to obtain a digitally signed secure key and transmitting the digitally signed secure key from a first location to a second location. The digital signature may be generated by utilizing an asymmetric encryption algorithm and/or a symmetric encryption algorithm. The digitally signed secure key may be encrypted prior to transmission. The secure key may be a master key, a work key and/or a scrambling key. The digitally signed secure key may be received at the second location and the digitally signed secure key may be decrypted to obtain a decrypted digitally signed secure key.Type: ApplicationFiled: January 30, 2004Publication date: August 4, 2005Inventors: Sherman Chen, Steve Rodgers
-
Publication number: 20050071639Abstract: One or more methods and systems of authenticating or verifying a set-top-box chip in a set-top-box are presented. In one embodiment, a set-top-box incorporates a set-top-box chip used to decode or decrypt media content provided by a cable television operator or carrier. The set-top-box chip incorporates a decryption circuitry, a compare circuitry, a hash function circuitry, a key generation circuitry, a back channel return circuitry, a linear feedback shift register, a timer reset circuitry, a modify enable status circuitry, a one time programmable memory, and a non-volatile memory. The cable TV carrier validates a set-top-box chip used in a set-top-box by way of a verification sequence that requires a successful verification by the set-top-box chip.Type: ApplicationFiled: November 6, 2003Publication date: March 31, 2005Inventors: Steve Rodgers, Sherman (Xuemin) Chen
-
Publication number: 20050039030Abstract: Systems and systems that protect data are provided. In one embodiment, a system may include, for example, a memory and a processor. The memory may store, for example, encrypted data. The processor may be coupled to the memory and may include, for example, a decryptor that decrypts the encrypted data. The decryptor may be adapted, for example, to variably bit roll the encrypted data, to fixedly bit shuffle the bit-rolled data, to add a first key to the bit-shuffled data and to process the added data with a second key.Type: ApplicationFiled: October 28, 2003Publication date: February 17, 2005Inventors: Steve Rodgers, Sherman Chen, Iue-Shuenn Chen
-
Publication number: 20030217322Abstract: A one-time-programmable (OTP) module includes OTP memory and OTP input/output (I/O) that performs error correction operations. The OTP module may be used in a data communications system. The error correction operations operate according to one of a plurality of supported coding schemes. In one embodiment, the error correction operations are based upon Hamming code operations. The coding scheme employed by the error correction operations is set by a code control input. The code control input is chosen based upon the inherent quality of the OTP memory. The OTP module may thus be incorporated into any of a variety of processes, each of which has its own OTP memory quality.Type: ApplicationFiled: May 16, 2002Publication date: November 20, 2003Inventor: Steve Rodgers