Patents by Inventor Andrew Dellow

Andrew Dellow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8223967
    Abstract: A semiconductor integrated circuit for the processing of conditional access television signals that includes an input interface for receiving encrypted television signals and an output interface for output of decrypted television signals. The semiconductor integrated circuit is provided with some functionality restricted in some way by preventing one or more hardware circuit elements from operating, such as an MPEG decoder, display engine, IO ports or main CPU. To enable the functionality, a subscriber must pay for a service and then receives an encrypted message broadcast to the semiconductor integrated circuit that is decrypted and instructs functionality to be turned on or off.
    Type: Grant
    Filed: October 16, 2003
    Date of Patent: July 17, 2012
    Assignee: STMicroelectronics Limited
    Inventors: Peter Bennett, Paul Elliott, Andrew Dellow
  • Patent number: 8200985
    Abstract: Methods and systems for protecting data may include controlling encryption and/or decryption and identifying a destination of corresponding encrypted and/or decrypted data, utilizing rules based on a source location of the data prior to the encryption or decryption and an algorithm that may have been previously utilized for encrypting and/or decrypting the data prior to the data being stored in the source location. The source location and/or destination of the data may comprise protected or unprotected memory. One or more of a plurality of algorithms may be utilized for the encryption and/or decryption. The rules may be stored in a key table, which may be stored on-chip, and may be reprogrammable. One or more keys for the encryption and/or decryption may be generated within the chip.
    Type: Grant
    Filed: September 20, 2007
    Date of Patent: June 12, 2012
    Assignee: Broadcom Corporation
    Inventor: Andrew Dellow
  • Patent number: 8191125
    Abstract: An embodiment comprises a semiconductor integrated circuit for restricting the rate at which data may be accessed from an external memory by a device coupled to the circuit. The rate of data access is restricted if the data access satisfies one or more conditions. For example, one of the conditions is that the device which is requesting the data is insecure. Another condition is that the requested data is privileged. A data access monitor is provided to monitor data accesses and to is arranged to generate an access signal to indicate whether the conditions are satisfied or not. A bandwidth comparator determines whether data access exceeds a threshold and, if so, the semiconductor integrated circuit is impaired to prevent further data access.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: May 29, 2012
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Rodrigo Cordero
  • Patent number: 8160248
    Abstract: Methods and systems for authenticated mode control in controlled devices are disclosed. A method for changing a mode in a controlled device from a current mode includes selecting one of several available key derivation functions based on a target mode, generating a target mode specific root key using a global root key and the selected key derivation function, and the use of that root key to affect a change of the controlled device to a target mode. Corresponding devices and systems are also disclosed. In one embodiment, the methods are applicable to a cable television distribution system and the changing of the operating mode of a set top box from one conditional access provider to another.
    Type: Grant
    Filed: April 2, 2009
    Date of Patent: April 17, 2012
    Assignee: Broadcom Corporation
    Inventor: Andrew Dellow
  • Patent number: 8042157
    Abstract: A filter is arranged to selectively block or allow a data access command from an initiator according to whether the initiator is secure or insecure and whether a data source or destination being accessed is privileged or unprivileged. The data access command contains an identification of the initiator from which the data access command originated and an identification of the data source or destination being accessed. The security filter compares the initiator identification and data source or destination identification contained within the data access command with a list of those initiators defined as secure and a list of those data sources or destinations which are defined as unprivileged. The filter then blocks or allows the data access command signal according to a set of rules.
    Type: Grant
    Filed: August 18, 2006
    Date of Patent: October 18, 2011
    Assignee: STMicroelectronics Limited
    Inventors: Peter Bennett, Andrew Dellow
  • Publication number: 20110197054
    Abstract: A boot code may be segmented to allow separate and independent storage of the code segments in a manner that may enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading remaining segment separately and independently. Each of the code segments may be validated, wherein validation of the code segments may comprise use of hardware-based signatures.
    Type: Application
    Filed: February 24, 2011
    Publication date: August 11, 2011
    Inventors: Stephane Rodgers, Andrew Dellow, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
  • Publication number: 20110197069
    Abstract: Methods and systems for preventing revocation denial of service attacks are disclosed and may include receiving and decrypting a command for revoking a secure key utilizing a hidden key, and revoking the secure key upon successful verification of a signature. The command may comprise a key ID that is unique to a specific set-top box. A key corresponding to the command for revoking the secure key may be stored in a one-time programmable memory, compared to a reference, and the security key may be revoked based on the comparison. The command for revoking the secure key may be parsed from a transport stream utilizing a hardware parser. The method and system may also comprise generating a command for revoking a secure key. The command may be encrypted and signed utilizing a hidden key and may comprise a key ID that is unique to a specific set-top box.
    Type: Application
    Filed: May 2, 2007
    Publication date: August 11, 2011
    Inventors: Stephane Rodgers, Andrew Dellow
  • Patent number: 7987351
    Abstract: A secondary boot code may be copied to memory during execution of a primary boot code, and executing the copied secondary boot code after completion of execution of said primary boot code. Access to the primary and said secondary boot code may be restricted during execution of the primary boot code and the copied secondary boot code. The copied secondary boot code may be verified after the secondary boot code is copied to the memory. Access to the primary boot code may be blocked or barred during execution of the copied secondary boot code. Access to the secondary boot code may also be blocked or barred after completion of execution of the copied secondary boot code. The memory may comprise double-data-rate synchronous dynamic random access memory (DDR). The primary and/or the secondary boot code may reside or be stored in FLASH memory.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: July 26, 2011
    Assignee: Broadcom Corporation
    Inventor: Andrew Dellow
  • Patent number: 7969972
    Abstract: A system including input circuitry for receiving from one of a plurality of sources at least one packet stream including a plurality of packets for providing audio, video, private data and/or associated information; at least one output for outputting at least one packet of the at least one packet stream to circuitry arranged to provide an output stream; wherein the system is arranged to provide a tag indicative of the source, the tag being associated with the at least one packet.
    Type: Grant
    Filed: June 3, 2005
    Date of Patent: June 28, 2011
    Assignee: STMicroelectronics (R&D) Ltd.
    Inventors: Rodrigo Cordero, Paul Cox, Andrew Dellow
  • Patent number: 7900032
    Abstract: Segmenting a boot code to allow separate and independent storage and validation of the segments in a manner that enable secure system boot by autonomous fetching and assembling of the boot code by a security sub-system. The code fetching may need to be done without the main CPU running on the chip for security reasons. Because the boot code may be stored in memory devices that require special software application to account for non-contiguous storage of data and/or code, for example a NAND flash memory which would require such an application as Bad Block Management, code segments stored in areas guaranteed to be usable may enable loading and validating remaining segment separately and independently.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: March 1, 2011
    Assignee: Broadcom Corporation
    Inventors: Stephane Rodgers, Andrew Dellow, Xuemin Chen, Iue-Shuenn Chen, Qiang Ye
  • Patent number: 7895447
    Abstract: A system and method for verifying the authenticity of instructions retrieved from a memory for execution by a processor. In one embodiment, an instruction monitor monitors execution parameters associated with the retrieved instruction and resets the system in response to an indication that an instruction is not authentic.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: February 22, 2011
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Mark Owen Homewood
  • Patent number: 7889862
    Abstract: A memory stores data in an encrypted form. A modifiable register stores a memory address, a0, defining a boundary separating the memory into two regions. The lower region stores data encrypted using a key B, and the upper region stores data encrypted using a different key A. Data stored on the boundary address is encrypted using key A. Accordingly, when data is read from a memory address a, key A is used to decrypt the data if a?a0, and key B is used if a<a0. However, when data is written to a memory address a, then key A is used to encrypt the data if a?a0+1, key B is used if a<a0+1. When data is written to the boundary address, a0, the position of the boundary is caused to increase by one unit.
    Type: Grant
    Filed: September 18, 2006
    Date of Patent: February 15, 2011
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Peter Bennett, Rodrigo Cordero
  • Patent number: 7836300
    Abstract: A semiconductor integrated circuit for the processing of conditional access television signals, the circuit including an input interface for receiving encrypted television signals and an output interface for output of decrypted television signals. Control signals broadcast with the television signals include control words and common keys. The common keys are received in encrypted form, encrypted according to a secret key unique to each semiconductor integrated circuit. The input interface is connected to a decryption circuit whereby the only manner of providing the common keys to the circuit are in encrypted form encrypted according to the secret key. Due to the monolithic nature of the circuit, no secrets are exposed and the system is secure.
    Type: Grant
    Filed: November 10, 2003
    Date of Patent: November 16, 2010
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Rodrigo Cordero
  • Publication number: 20100254536
    Abstract: Methods and systems for authenticated mode control in controlled devices are disclosed. A method for changing a mode in a controlled device from a current mode includes selecting one of several available key derivation functions based on a target mode, generating a target mode specific root key using a global root key and the selected key derivation function, and the use of that root key to affect a change of the controlled device to a target mode. Corresponding devices and systems are also disclosed. In one embodiment, the methods are applicable to a cable television distribution system and the changing of the operating mode of a set top box from one conditional access provider to another.
    Type: Application
    Filed: April 2, 2009
    Publication date: October 7, 2010
    Applicant: Broadcom Corporation
    Inventor: Andrew Dellow
  • Patent number: 7783894
    Abstract: A monolithic semiconductor integrated circuit is provided for selectively encrypting or decrypting data transmitted between one of a plurality of devices on the circuit and an external memory. Two series of data pathways connect the devices and the external memory. The first series of data pathways passes through a cryptographic circuit causing data to be encrypted or decrypted, and the other series of data pathways provides an unhindered route. When a data access request is made by a device, the data is selectively routed along one of the two series of data pathways according to the identification of the device making the data access request. In one example, if data is transmitted from a device to the external memory, the data is selectively encrypted before being stored in the external memory if the device transmitting the data is identified as secure.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: August 24, 2010
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Howard Gurney
  • Patent number: 7707638
    Abstract: A semiconductor integrated circuit includes a processor for executing application code from a memory and a verifier processor arranged to receive the application code via the same internal bus as the processor. The verifier processor performs a verification function to check that the application code is authentic. The verifier processor runs autonomously and cannot be spoofed as it receives the application code via the same internal bus as the main processor.
    Type: Grant
    Filed: January 30, 2003
    Date of Patent: April 27, 2010
    Assignee: STMicroelectronics (Research & Development) Limited
    Inventor: Andrew Dellow
  • Patent number: 7698718
    Abstract: An integrated circuit restricts use of a data item and includes a data memory storing the data item; a value memory storing a value; a signature input that receives a signature derived from data in a data item field and a value in a value field, the signature being in a coded form; a decoding circuit that decodes the signature and outputs information representing the data in the data item field and the value in the value field; and a comparison circuit that receives the decoding circuit output, determines whether the information representing the data from the data item field corresponds to the stored data item and whether the information representing the value from the value field corresponds to the value stored in the value memory, and outputs a comparison signal according to the determinations. The circuit restricts the use of the data item according to the comparison signal.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: April 13, 2010
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Peter Bennett
  • Patent number: 7624442
    Abstract: A semiconductor integrated circuit includes a processor for executing application code from a memory and a verifier processor arranged to receive the application code via the same internal bus as the processor. The verifier processor performs a verification function to check that the application code is authentic. The verifier processor runs autonomously and cannot be spoofed as it receives the application code via the same internal bus as the main processor. An additional instruction monitor checks the code instructions from the CPU and also impairs the operation of the circuit unless the address of code requested is in a given range. The code is in the form of a linked list and the range is derived as a linked list table during a first check.
    Type: Grant
    Filed: April 2, 2004
    Date of Patent: November 24, 2009
    Assignee: STMicroelectronics Limited
    Inventors: Andrew Dellow, Peter Bennett
  • Publication number: 20090190762
    Abstract: Methods and systems for preventing generation of decryption keys via statistical sample gathering may include verifying a one-key message authentication code (OMAC) decryption key in received data and inserting a delay time before subsequent OMAC verifications upon a failure of the verifying. The delay time may be increased, doubled, for example, with each failure of the subsequent OMAC verifications. The cryptographic system may be disabled upon reaching a defined number of OMAC verification failures. The delay time may be reset upon an OMAC verification pass. A number of OMAC verification failures may be stored in non-volatile memory. The OMAC verification may be one of a plurality of key verifications in a key ladder system. A service provider may be required to reset the cryptographic system when the cryptographic system may be disabled due to multiple OMAC failures. The received data may be AES, DES or 3-DES encrypted.
    Type: Application
    Filed: January 30, 2008
    Publication date: July 30, 2009
    Inventor: Andrew Dellow
  • Publication number: 20090080649
    Abstract: Methods and systems for protecting data may include controlling encryption and/or decryption and identifying a destination of corresponding encrypted and/or decrypted data, utilizing rules based on a source location of the data prior to the encryption or decryption and an algorithm that may have been previously utilized for encrypting and/or decrypting the data prior to the data being stored in the source location. The source location and/or destination of the data may comprise protected or unprotected memory. One or more of a plurality of algorithms may be utilized for the encryption and/or decryption. The rules may be stored in a key table, which may be stored on-chip, and may be reprogrammable. One or more keys for the encryption and/or decryption may be generated within the chip.
    Type: Application
    Filed: September 20, 2007
    Publication date: March 26, 2009
    Inventor: Andrew Dellow