Patents by Inventor Ed. Frank

Ed. Frank has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220107160
    Abstract: A computer implemented method is provided for in-flight trajectory steering a vehicle by an optimal path to either a preplanned or in-flight commanded destination. The method includes incorporating realistic environmental physical constants; setting initial angle of attack (AoA) and initial AoA rate; incrementing flight AoA; measuring operation parameters; establishing a flight trajectory; calculating an optimal trajectory; comparing flight trajectories; and commanding flight control. The plurality of physical constants include for gravity and atmospheric conditions, the latter typically provided in tabular form, the flight AoA increments from the initial AoA and any prior increments. The plurality of operation parameters of the vehicle includes pressure, velocity and flight path angle. The flight trajectory denotes the path of the vehicle to its destination based on the operation parameters using the physical constants.
    Type: Application
    Filed: October 2, 2020
    Publication date: April 7, 2022
    Applicant: United States of America, as represented by the Secretary of the Navy
    Inventor: Ed Frank Cerasuolo
  • Publication number: 20160248595
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Application
    Filed: March 10, 2016
    Publication date: August 25, 2016
    Applicant: Broadcom Corporation
    Inventors: Mark BUER, Ed FRANK, Nambi SESHADRI
  • Patent number: 9294279
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Grant
    Filed: May 5, 2014
    Date of Patent: March 22, 2016
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Patent number: 9288192
    Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: March 15, 2016
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank
  • Patent number: 9264426
    Abstract: Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: February 16, 2016
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank
  • Publication number: 20150058620
    Abstract: An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.
    Type: Application
    Filed: July 30, 2014
    Publication date: February 26, 2015
    Applicant: BROADCOM CORPORATION
    Inventors: Mark BUER, Ed FRANK, Nambi SESHADRI
  • Publication number: 20140245007
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Application
    Filed: May 5, 2014
    Publication date: August 28, 2014
    Applicant: Broadcom Corporation
    Inventors: Mark BUER, Ed FRANK, Nambi SESHADRI
  • Patent number: 8806616
    Abstract: An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: August 12, 2014
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Patent number: 8719569
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Grant
    Filed: April 23, 2012
    Date of Patent: May 6, 2014
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshardi
  • Publication number: 20130254542
    Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
    Type: Application
    Filed: September 14, 2012
    Publication date: September 26, 2013
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank
  • Publication number: 20130010962
    Abstract: An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device, Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component, Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Publication number: 20130013925
    Abstract: Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank
  • Patent number: 8333317
    Abstract: Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip.
    Type: Grant
    Filed: September 30, 2004
    Date of Patent: December 18, 2012
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Patent number: 8295484
    Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
    Type: Grant
    Filed: December 9, 2005
    Date of Patent: October 23, 2012
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank
  • Publication number: 20120210130
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Application
    Filed: April 23, 2012
    Publication date: August 16, 2012
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Patent number: 8166296
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Grant
    Filed: August 5, 2005
    Date of Patent: April 24, 2012
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Publication number: 20060133604
    Abstract: An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
    Type: Application
    Filed: December 9, 2005
    Publication date: June 22, 2006
    Inventors: Mark Buer, Ed Frank
  • Publication number: 20060136717
    Abstract: Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.
    Type: Application
    Filed: August 15, 2005
    Publication date: June 22, 2006
    Inventors: Mark Buer, Ed Frank
  • Publication number: 20060085844
    Abstract: Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
    Type: Application
    Filed: August 5, 2005
    Publication date: April 20, 2006
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri
  • Publication number: 20050105734
    Abstract: Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip.
    Type: Application
    Filed: September 30, 2004
    Publication date: May 19, 2005
    Inventors: Mark Buer, Ed Frank, Nambi Seshadri