Patents by Inventor Alexander Potievsky

Alexander Potievsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9674196
    Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.
    Type: Grant
    Filed: June 5, 2015
    Date of Patent: June 6, 2017
    Assignee: NXP B.V.
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Patent number: 9276830
    Abstract: A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element.
    Type: Grant
    Filed: May 23, 2012
    Date of Patent: March 1, 2016
    Assignee: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky
  • Publication number: 20150271181
    Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.
    Type: Application
    Filed: June 5, 2015
    Publication date: September 24, 2015
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Patent number: 9059994
    Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.
    Type: Grant
    Filed: August 20, 2013
    Date of Patent: June 16, 2015
    Assignee: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Patent number: 9027124
    Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.
    Type: Grant
    Filed: May 14, 2012
    Date of Patent: May 5, 2015
    Assignee: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky
  • Publication number: 20130340090
    Abstract: A device includes a receiver configured to receive a request to perform a function. A secure element connected with the receiver, the secure element to verify the request to perform the function, where the secure element is configured to operate in either a report mode or a silent mode. Details about a status of the performance of the function are displayed when the device operates in the report mode, and no details about the status of the performance of the function are displayed when the device operates in the silent mode.
    Type: Application
    Filed: August 20, 2013
    Publication date: December 19, 2013
    Applicant: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Patent number: 8549586
    Abstract: An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: October 1, 2013
    Assignee: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Publication number: 20130145429
    Abstract: An electronic device includes a receiver configured to receive, from an entity, a request to perform a function. The electronic device also includes a secure element to verify the request to perform the function. The secure element includes hardware programmed with instructions to verify that a security of the secure element has not been breached. The secure element also includes software including instructions to determine an access right for the entity requesting performance of the function, and to perform the function when the hardware verifies that the security of the secure element has not been breached and the access right indicates that the entity is authorized to request performance of the secure function.
    Type: Application
    Filed: December 6, 2011
    Publication date: June 6, 2013
    Applicant: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Publication number: 20130061290
    Abstract: A system and method for performing a transaction are described. A transaction request to perform a transaction is received. Authorization information necessary to perform the transaction is gathered and stored in a secure memory. The gathered authorization information is verified. A final command to perform the transaction is received. When the final command is received, the transaction is performed and the stored authorization information in the secure memory is erased.
    Type: Application
    Filed: May 14, 2012
    Publication date: March 7, 2013
    Inventors: Jacob Mendel, Alexander Potievsky
  • Publication number: 20130061328
    Abstract: An integrity checking system provides improved monitoring of an electronic device for unauthorized access and modification. The integrity checking system includes a controller with a secure memory. The secure memory stores test profile information, such as test type, test subject, test action, expected test response, test frequency, and result action. The controller reads the test profile information and executes the defined tests to monitor the integrity of the device, and either permit normal operation, or execute the result action (e.g., terminate program execution) depending on the test results.
    Type: Application
    Filed: May 24, 2012
    Publication date: March 7, 2013
    Applicant: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky, Eyal Webber-Zvik
  • Publication number: 20130060934
    Abstract: A secure network of electronic elements (“network”) ensures the electronic elements that implement an electronic device are functioning properly. The network selects at least one master electronic element to consistently check that each of the electronic elements are functioning properly. When the master electronic element identifies that an electronic element is not functioning properly, the network executes a predefined response, such as a counter measure that limits the functional capability of the improperly functioning electronic element or other electronic elements. Electronic elements can identify when a master electronic element is improperly functioning by observing that the master electronic element has ceased checking on the electronic elements. The secure network can then execute a response that includes the counter measure of limiting the functional capability of the improperly functioning master electronic element and assigning a new master electronic element.
    Type: Application
    Filed: May 23, 2012
    Publication date: March 7, 2013
    Applicant: Broadcom Corporation
    Inventors: Jacob Mendel, Alexander Potievsky
  • Publication number: 20130061097
    Abstract: A system monitors an application. The system includes a state table with state table nodes corresponding to application checkpoints. The state table nodes include an authorized time interval and application path. The system also includes a time counter that tracks an operation time between successive application checkpoints, and a program counter that tracks and stores an operation path for the application. A checkpoint module verifies an operation of the application at a checkpoint by comparing the authorized time interval for the checkpoint state table node and the operation time tracked by the time counter, as well as the authorized application path for the checkpoint state table node and the operation path tracked by the program counter. A security action is performed when the tracked operation time is not within the authorized time interval, or when the tracked operation path does not match the authorized application path.
    Type: Application
    Filed: May 14, 2012
    Publication date: March 7, 2013
    Inventors: Jacob Mendel, Alexander Potievsky