Patents by Inventor Alexander Potievsky
Alexander Potievsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9674196Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.Type: GrantFiled: June 5, 2015Date of Patent: June 6, 2017Assignee: NXP B.V.Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Patent number: 9276830Abstract: A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element.Type: GrantFiled: May 23, 2012Date of Patent: March 1, 2016Assignee: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky
-
Publication number: 20150271181Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.Type: ApplicationFiled: June 5, 2015Publication date: September 24, 2015Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Patent number: 9059994Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.Type: GrantFiled: August 20, 2013Date of Patent: June 16, 2015Assignee: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Patent number: 9027124Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.Type: GrantFiled: May 14, 2012Date of Patent: May 5, 2015Assignee: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky
-
Publication number: 20130340090Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.Type: ApplicationFiled: August 20, 2013Publication date: December 19, 2013Applicant: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Patent number: 8549586Abstract: An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.Type: GrantFiled: December 6, 2011Date of Patent: October 1, 2013Assignee: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Publication number: 20130145429Abstract: An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.Type: ApplicationFiled: December 6, 2011Publication date: June 6, 2013Applicant: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Publication number: 20130061290Abstract: A system and method for performing a transaction are described. A transaction request to perform a transaction is received. Authorization information necessary to perform the transaction is gathered and stored in a secure memory. The gathered authorization information is verified. A final command to perform the transaction is received. When the final command is received, the transaction is performed and the stored authorization information in the secure memory is erased.Type: ApplicationFiled: May 14, 2012Publication date: March 7, 2013Inventors: Jacob Mendel, Alexander Potievsky
-
Publication number: 20130061328Abstract: An integrity checking system provides improved monitoring of an electronic device for unauthorized access and modification. The integrity checking system includes a controller with a secure memory. The secure memory stores test profile information, such as test type, test subject, test action, expected test response, test frequency, and result action. The controller reads the test profile information and executes the defined tests to monitor the integrity of the device, and either permit normal operation, or execute the result action (e.g., terminate program execution) depending on the test results.Type: ApplicationFiled: May 24, 2012Publication date: March 7, 2013Applicant: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
-
Publication number: 20130060934Abstract: A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element.Type: ApplicationFiled: May 23, 2012Publication date: March 7, 2013Applicant: Broadcom CorporationInventors: Jacob Mendel, Alexander Potievsky
-
Publication number: 20130061097Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.Type: ApplicationFiled: May 14, 2012Publication date: March 7, 2013Inventors: Jacob Mendel, Alexander Potievsky