Patents by Inventor Billy Brumley

Billy Brumley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9729325
    Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: August 8, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: David Jacobson, Billy Brumley
  • Patent number: 9660811
    Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.
    Type: Grant
    Filed: March 16, 2015
    Date of Patent: May 23, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: David Jacobson, Billy Brumley
  • Publication number: 20160313938
    Abstract: A way is provided to protect memory blocks from unauthorized access from executable instructions by defining various sets of instructions that are specifically bound to operate on defined memory blocks and inhibited from operating in other memory blocks. For instance, executable code may include a plurality of distinct read and write instructions where each read and/or write instruction is specific to one memory access tag from a plurality of different memory access tags. Memory blocks are also established and each memory block is associated with one of the plurality of different memory access tags. Consequently, if a first read and/or write instruction, associated with a first memory access tag, attempts to access a memory block associated with a different memory access tag, then execution of the first read and/or write instruction is inhibited or aborted.
    Type: Application
    Filed: April 24, 2015
    Publication date: October 27, 2016
    Inventors: Alexander Gantman, Can Acar, Billy Brumley, Brian Rosenberg
  • Publication number: 20160105276
    Abstract: A cipher employs rotation of a substitution box (S-Box) value to provide both confusion and diffusion. In some aspects, for each iteration of an iterative cipher, a subset of a state value is expanded to calculate a rotation distance for rotating an S-Box value, whereby the rotated S-Box value is combined with the state value and the new state value is rotated for the next iteration. Advantageously, the cipher may be implemented in software (or other code) using conventional instructions, and without the need for large S-Box lookup tables.
    Type: Application
    Filed: February 6, 2015
    Publication date: April 14, 2016
    Inventors: Billy Brumley, Roberto Avanzi
  • Publication number: 20150188709
    Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.
    Type: Application
    Filed: March 16, 2015
    Publication date: July 2, 2015
    Inventors: David Jacobson, Billy Brumley
  • Publication number: 20150188708
    Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.
    Type: Application
    Filed: March 16, 2015
    Publication date: July 2, 2015
    Inventors: David Jacobson, Billy Brumley