Patents by Inventor Ed. Frank
Ed. Frank has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220107160Abstract: A computer implemented method is provided for in-flight trajectory steering a vehicle by an optimal path to either a preplanned or in-flight commanded destination. The method includes incorporating realistic environmental physical constants; setting initial angle of attack (AoA) and initial AoA rate; incrementing flight AoA; measuring operation parameters; establishing a flight trajectory; calculating an optimal trajectory; comparing flight trajectories; and commanding flight control. The plurality of physical constants include for gravity and atmospheric conditions, the latter typically provided in tabular form, the flight AoA increments from the initial AoA and any prior increments. The plurality of operation parameters of the vehicle includes pressure, velocity and flight path angle. The flight trajectory denotes the path of the vehicle to its destination based on the operation parameters using the physical constants.Type: ApplicationFiled: October 2, 2020Publication date: April 7, 2022Applicant: United States of America, as represented by the Secretary of the NavyInventor: Ed Frank Cerasuolo
-
Publication number: 20160248595Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: ApplicationFiled: March 10, 2016Publication date: August 25, 2016Applicant: Broadcom CorporationInventors: Mark BUER, Ed FRANK, Nambi SESHADRI
-
Patent number: 9294279Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: GrantFiled: May 5, 2014Date of Patent: March 22, 2016Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Patent number: 9288192Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.Type: GrantFiled: September 14, 2012Date of Patent: March 15, 2016Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank
-
Patent number: 9264426Abstract: Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.Type: GrantFiled: September 14, 2012Date of Patent: February 16, 2016Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank
-
Publication number: 20150058620Abstract: An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.Type: ApplicationFiled: July 30, 2014Publication date: February 26, 2015Applicant: BROADCOM CORPORATIONInventors: Mark BUER, Ed FRANK, Nambi SESHADRI
-
Publication number: 20140245007Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: ApplicationFiled: May 5, 2014Publication date: August 28, 2014Applicant: Broadcom CorporationInventors: Mark BUER, Ed FRANK, Nambi SESHADRI
-
Patent number: 8806616Abstract: An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.Type: GrantFiled: September 14, 2012Date of Patent: August 12, 2014Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Patent number: 8719569Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: GrantFiled: April 23, 2012Date of Patent: May 6, 2014Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshardi
-
Publication number: 20130254542Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.Type: ApplicationFiled: September 14, 2012Publication date: September 26, 2013Applicant: Broadcom CorporationInventors: Mark Buer, Ed Frank
-
Publication number: 20130010962Abstract: An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device, Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component, Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Applicant: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Publication number: 20130013925Abstract: Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Applicant: Broadcom CorporationInventors: Mark Buer, Ed Frank
-
Patent number: 8333317Abstract: Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip.Type: GrantFiled: September 30, 2004Date of Patent: December 18, 2012Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Patent number: 8295484Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.Type: GrantFiled: December 9, 2005Date of Patent: October 23, 2012Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank
-
Publication number: 20120210130Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: ApplicationFiled: April 23, 2012Publication date: August 16, 2012Applicant: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Patent number: 8166296Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: GrantFiled: August 5, 2005Date of Patent: April 24, 2012Assignee: Broadcom CorporationInventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Publication number: 20060133604Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.Type: ApplicationFiled: December 9, 2005Publication date: June 22, 2006Inventors: Mark Buer, Ed Frank
-
Publication number: 20060136717Abstract: Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.Type: ApplicationFiled: August 15, 2005Publication date: June 22, 2006Inventors: Mark Buer, Ed Frank
-
Publication number: 20060085844Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.Type: ApplicationFiled: August 5, 2005Publication date: April 20, 2006Inventors: Mark Buer, Ed Frank, Nambi Seshadri
-
Publication number: 20050105734Abstract: Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip.Type: ApplicationFiled: September 30, 2004Publication date: May 19, 2005Inventors: Mark Buer, Ed Frank, Nambi Seshadri