Patents by Inventor Andrew Alexander Elias

Andrew Alexander Elias has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10133611
    Abstract: A system and method for communicating data between a first software and a second software located on first and second devices, respectively, has a hardware driver and memory associated with each device. Each communication of data from the first software to the second software allocates memory to manage data to be communicated from the first software to the second software, provides memory allocation information to the hardware driver associated with the first software, and transmits the data from the first hardware driver to the second hardware driver for delivery to the second software via the memory associated with the second software.
    Type: Grant
    Filed: October 7, 2014
    Date of Patent: November 20, 2018
    Assignee: Synopsys, Inc.
    Inventors: Andrew Alexander Elias, Jean-Pierre Thibault, Nick Bowler, Steven Lougheed, Michael James Lewis
  • Patent number: 10019603
    Abstract: There is disclosed a cache memory controller for storing cache data within a cache, the cache data comprising an unsecured version data to corresponding secured first data.
    Type: Grant
    Filed: April 16, 2014
    Date of Patent: July 10, 2018
    Assignee: Synopsys, Inc.
    Inventors: Andrew Alexander Elias, Neil Farquhar Hamilton, Neil Leckett, Michael James Lewis
  • Patent number: 10019384
    Abstract: A method and system for detecting tampering of authenticated memory blocks that are accessible by an untrusted host processor, by (1) periodically re-authenticating the memory blocks from a trusted computing environment, and (2) disabling accessing of the memory blocks by the untrusted host processor when the re-authenticating fails. In one implementation, each of the memory blocks has an authentication code, and the accessing of the memory blocks is disabled by disabling the untrusted host processor. The memory blocks may be re-authenticated sequentially, or randomly, e.g., based on a random block selection based on the block location, or based on temporal randomness. The re-authenticating is preferably effected by an authentication module in the trusted computing environment.
    Type: Grant
    Filed: January 23, 2017
    Date of Patent: July 10, 2018
    Assignee: Synopsys, Inc.
    Inventors: Michael Kenneth Bowler, Andrew Alexander Elias
  • Patent number: 9794623
    Abstract: A method for determining the color depths of the video data for a selected frame in High-bandwidth Digital Content Protection (HDCP) video data transmitted over a High Definition Multimedia Interface (HDMI), in which (a) the beginning of the selected frame is marked with a vertical synchronization (VSYNC) signal and (b) a mark in a window of opportunity (WOO) for the selected frame indicates whether or not that frame is encrypted. The method detects, for the selected frame, the length of the interval between a VSYNC signal and the location of at least one of (i) the start of the corresponding WOO and (ii) the mark indicating whether or not the selected frame is encrypted, and then determines the color depth of the video data for the selected frame based on the detected length.
    Type: Grant
    Filed: April 14, 2014
    Date of Patent: October 17, 2017
    Assignee: Synopsys, Inc.
    Inventors: A. A. Jithra Adikari, Andrew Alexander Elias, Neil Leckett
  • Publication number: 20170132160
    Abstract: A method and system for detecting tampering of authenticated memory blocks that are accessible by an untrusted host processor, by (1) periodically re-authenticating the memory blocks from a trusted computing environment, and (2) disabling accessing of the memory blocks by the untrusted host processor when the re-authenticating fails. In one implementation, each of the memory blocks has an authentication code, and the accessing of the memory blocks is disabled by disabling the untrusted host processor. The memory blocks may be re-authenticated sequentially, or randomly, e.g., based on a random block selection based on the block location, or based on temporal randomness. The re-authenticating is preferably effected by an authentication module in the trusted computing environment.
    Type: Application
    Filed: January 23, 2017
    Publication date: May 11, 2017
    Inventors: Michael Kenneth Bowler, Andrew Alexander Elias
  • Patent number: 9563577
    Abstract: A method and system for detecting tampering of authenticated memory blocks that are accessible by an untrusted host processor. by (1) periodically re-authenticating the memory blocks from a trusted computing environment, and (2) disabling accessing of the memory blocks by the untrusted host processor when the re-authenticating fails. In one implementation, each of the memory blocks has an authentication code, and the accessing of the memory blocks is disabled by disabling the untrusted host processor. The memory blocks may be re-authenticated sequentially or randomly, e.g., based on a random block selection based on the block location, or based on temporal randomness. The re-authenticating is preferably effected by an authentication module in the trusted computing environment.
    Type: Grant
    Filed: February 18, 2015
    Date of Patent: February 7, 2017
    Assignee: Synopsys, Inc.
    Inventors: Michael Kenneth Bowler, Andrew Alexander Elias
  • Publication number: 20160239435
    Abstract: A method and system for detecting tampering of authenticated memory blocks that are accessible by an untrusted host processor. by (1) periodically re-authenticating the memory blocks from a trusted computing environment, and (2) disabling accessing of the memory blocks by the untrusted host processor when the re-authenticating fails. In one implementation, each of the memory blocks has an authentication code, and the accessing of the memory blocks is disabled by disabling the untrusted host processor. The memory blocks may be re-authenticated sequentially.or randomly, e.g., based on a random block selection based on the block location, or based on temporal randomness. The re-authenticating is preferably effected by an authentication module in the trusted computing environment.
    Type: Application
    Filed: February 18, 2015
    Publication date: August 18, 2016
    Inventors: Michael Kenneth Bowler, Andrew Alexander Elias
  • Publication number: 20160098376
    Abstract: A system and method for communicating data between a first software and a second software located on first and second devices, respectively, has a hardware driver and memory associated with each device. Each communication of data from the first software to the second software allocates memory to manage data to be communicated from the first software to the second software, provides memory allocation information to the hardware driver associated with the first software, and transmits the data from the first hardware driver to the second hardware driver for delivery to the second software via the memory associated with the second software.
    Type: Application
    Filed: October 7, 2014
    Publication date: April 7, 2016
    Inventors: Andrew Alexander Elias, Jean-Pierre Thibault, Nick Bowler, Steven Lougheed, Michael James Lewis
  • Publication number: 20150301957
    Abstract: There is disclosed a cache memory controller for storing cache data within a cache, the cache data comprising an unsecured version data to corresponding secured first data.
    Type: Application
    Filed: April 16, 2014
    Publication date: October 22, 2015
    Applicant: ELLIPTIC TECHNOLOGIES INC.
    Inventors: Andrew Alexander ELIAS, Neil Farquhar HAMILTON, Neil LECKETT, Michael James LEWIS
  • Publication number: 20150296253
    Abstract: A method for determining the color depths of the video data for a selected frame in High-bandwidth Digital Content Protection (HDCP) video data transmitted over a High Definition Multimedia Interface (HDMI), in which (a) the beginning of the selected frame is marked with a vertical synchronization (VSYNC) signal and (b) a mark in a window of opportunity (WOO) for the selected frame indicates whether or not that frame is encrypted. The method detects, for the selected frame, the length of the interval between a VSYNC signal and the location of at least one of (i) the start of the corresponding WOO and (ii) the mark indicating whether or not the selected frame is encrypted, and then determines the color depth of the video data for the selected frame based on the detected length.
    Type: Application
    Filed: April 14, 2014
    Publication date: October 15, 2015
    Applicant: Elliptic Technologies Inc.
    Inventors: A.A. Jithra Adikari, Andrew Alexander Elias, Neil Leckett