Patents by Inventor Frank Schuecke

Frank Schuecke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8656146
    Abstract: A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed into the non-volatile memory. During a reset event or a power-on event, execution may be started from the internal non-volatile memory, which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories, thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: February 18, 2014
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Ralf Findeisen, Michael Grell, Tim Edward Perley, Marc Edwin Jones, Frank Schuecke
  • Patent number: 8464037
    Abstract: A CPU, a computer system and a secure boot mechanism are provided in which a symmetric encryption key may be incorporated into a non-volatile memory area of the CPU core, thereby substantially avoiding any tampering of the encryption key by external sources. Moreover, pre-boot information may be internally stored in the CPU and may be retrieved upon a reset or power-on event in order to verify a signed boot information on the basis of the internal symmetric encryption key. Furthermore, the BIOS information may be efficiently updated by generating a signature using the internal encryption key.
    Type: Grant
    Filed: January 19, 2009
    Date of Patent: June 11, 2013
    Assignee: GLOBALFOUNDRIES Inc.
    Inventors: Michael Grell, Ralf Findeisen, Frank Schuecke
  • Patent number: 8458367
    Abstract: An SMBus message handler, an integrated circuit and a method for controlling an SMBus are disclosed which identifies starting address of a program being stored in a memory. Instructions of the program are fetched one after another into a finite-state machine which controls the data transfer between an SMBus interface and a register set in compliance with the instruction present in the finite-state machine. Further, an SMBus test device and a method for controlling a testing system are described which check as to whether a key is input from a second interface. Upon inputting of a key it is mapped to a sequence of instructions for controlling devices connected to the SMBus or transferring data or receiving data from the devices connected to the SMBus.
    Type: Grant
    Filed: October 6, 2003
    Date of Patent: June 4, 2013
    Assignee: Advanced Micro Devices
    Inventors: René Röllig, Andreas Abt, Frank Schücke, Bernd Schönfelder, Daniel Schöne, Gert Springer
  • Publication number: 20090276617
    Abstract: A CPU, a computer system and a secure boot mechanism are provided in which a symmetric encryption key may be incorporated into a non-volatile memory area of the CPU core, thereby substantially avoiding any tampering of the encryption key by external sources. Moreover, pre-boot information may be internally stored in the CPU and may be retrieved upon a reset or power-on event in order to verify a signed boot information on the basis of the internal symmetric encryption key. Furthermore, the BIOS information may be efficiently updated by generating a signature using the internal encryption key.
    Type: Application
    Filed: January 19, 2009
    Publication date: November 5, 2009
    Inventors: Michael Grell, Ralf Findeisen, Frank Schuecke
  • Publication number: 20090222653
    Abstract: A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed into the non-volatile memory. During a reset event or a power-on event, execution may be started from the internal non-volatile memory, which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories, thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips.
    Type: Application
    Filed: August 6, 2008
    Publication date: September 3, 2009
    Inventors: Ralf Findeisen, Michael Grell, Tim Edward Perley, Marc Edwin Jones, Frank Schuecke
  • Patent number: 7532625
    Abstract: A block transfer technique is provided for controlling a data transfer to and/or from a WLAN (Wireless Local Area Network) device connected to a data processing system. The data processing system comprises an operating system independent access controller and a platform specific data block transfer engine. The operating system independent access controller is configured to prepare the platform specific data block transfer engine to perform the data transfer to and/or from the WLAN device.
    Type: Grant
    Filed: January 13, 2004
    Date of Patent: May 12, 2009
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Frank Schücke, Michael Fiedler, Attila Römer
  • Patent number: 7127067
    Abstract: Patch servers, patch clients and corresponding methods are provided that may increase secret protection and key loss tolerance. A patch server includes a first key generation platform and a second key generation platform different from the first one. A first and second private key group containing a plurality of first or second private keys, respectively, is generated using the first or second key generation platform, respectively. One of the first private keys is selected from the first private key group, and one of the second private keys is selected from the second private key group. A first digital signature is generated based on the patch and the first selected private key. A second digital signature is generated based on the patch and the second selected private key. The patch is transmitted to the patch client together with the first and second digital signatures.
    Type: Grant
    Filed: September 2, 2005
    Date of Patent: October 24, 2006
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Axel Wachtler, Ralf Findeisen, Frank Schuecke