Patents by Inventor Jeremy Isaac Nathaniel Werner

Jeremy Isaac Nathaniel Werner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8117445
    Abstract: An architecture is presented that facilitates integrating memory, security functionalities and near field communication (NFC) capabilities in a mobile device. A memory module is provided that comprises non-volatile memory that stores security software, sensitive data, and keys and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. A NFC radio frequency transmitter and receiver (RF) is directly integrated into the security processor to facilitate NFC capabilities within the secure environment of the memory module. Further, the non-volatile memory directly interfaces to an NFC antenna positioned outside of the memory module via the integrated NFC RF. The integration of the security processor, memory, and NFC RF into the memory module provides a trusted environment for the manipulation and decryption of data received through the NFC antenna.
    Type: Grant
    Filed: December 20, 2006
    Date of Patent: February 14, 2012
    Assignee: Spansion LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Russell Barck, George Minassian
  • Patent number: 7836269
    Abstract: Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.
    Type: Grant
    Filed: December 29, 2006
    Date of Patent: November 16, 2010
    Assignee: Spansion LLC
    Inventors: Willy Obereiner, Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Joe Yuen Tom, Hyun Soo Lee
  • Publication number: 20080162353
    Abstract: Systems and methods that facilitate the management of digital content in a local environment between a limited number of parties. A digital rights management (DRM) agent-server can be created in hardware in which both the agent-server and agent are trusted. A content owner can send digital content along with a rights attachment indicating a scope of the use rights associated with the content. The content can be accessed by the agent and perceived in a presentation component that will only permit the agent to use the content in accordance with the rights granted as to the content. The DRM agent-server can be implemented by an application-specific integrated circuit (ASIC). Further, the DRM agent-server can be implemented on a portable electronic device such as a cellular phone, a personal digital assistant (PDA), or a laptop computer, for example.
    Type: Application
    Filed: December 27, 2006
    Publication date: July 3, 2008
    Applicant: SPANSION LLC
    Inventors: Joe Yuen Tom, Jeremy Isaac Nathaniel Werner, Russell Barck
  • Publication number: 20080162784
    Abstract: Systems and methods that facilitate processing data and securing data written to or read from memory. A processor can include a host memory interface that monitors all bus traffic between a host processor and memory. The host memory interface can analyze commands generated by the host processor and determine the validity of the commands. Valid commands can proceed for further analysis; invalid commands can be aborted, for example, with the host memory interface and memory each set to an idle state. The host memory interface can analyze authentication information obtained via an authentication component, and information regarding memory partition rights, to determine whether a command partition violation exists as to the command. If a violation exists, the host memory interface can prevent the improper command from executing in the memory, and can cause a different operation to occur thereby allowing the memory to be placed in a known state.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Applicant: SPANSION LLC
    Inventors: Willy Obereiner, Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Joe Yuen Tom, Hyun Soo Lee
  • Publication number: 20080155258
    Abstract: An architecture is presented that facilitates maintaining a log of near field transactions in a memory module that includes security functionalities and near field communication (NFC) capabilities. The memory module comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. The non-volatile memory is divided into partitions by the security processor. NFC radio frequency (RF) communication capabilities are integrated into the memory module such that the memory module directly interfaces to an external NFC antenna. This facilitates NFC communications within the secure environment of the memory module. Further, the memory module stores data related to near field transactions so that this data can be subsequently reviewed and exported in an appropriate format.
    Type: Application
    Filed: December 21, 2006
    Publication date: June 26, 2008
    Applicant: Spansion LLC
    Inventors: Willy Obereiner, Jeremy Isaac Nathaniel Werner
  • Publication number: 20080155257
    Abstract: An architecture is presented that facilitates integrating memory, security functionalities and near field communication (NFC) capabilities in a mobile device. A memory module is provided that comprises non-volatile memory that stores security software, sensitive data, and keys and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. A NFC radio frequency transmitter and receiver (RF) is directly integrated into the security processor to facilitate NFC capabilities within the secure environment of the memory module. Further, the non-volatile memory directly interfaces to an NFC antenna positioned outside of the memory module via the integrated NFC RF. The integration of the security processor, memory, and NFC RF into the memory module provides a trusted environment for the manipulation and decryption of data received through the NFC antenna.
    Type: Application
    Filed: December 20, 2006
    Publication date: June 26, 2008
    Applicant: SPANSION LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Russell Barck, George Minassian
  • Publication number: 20080155268
    Abstract: An architecture is presented that controls access to secure data via biometric verification. The system comprises a memory module that communicates with biometric data to establish a heightened level of security for controlling access to data stored in the non-volatile memory. The memory module includes a security processor, non-volatile memory, and volatile memory. The security processor provides for concurrent processing of security protocols, provides a secure execution environment within the memory module to evaluate and store biometric data, communicates with the biometric data sensors to fetch the biometric data, and analyzes the biometric data to control access to data stored in the non-volatile memory. Specifically, biometric data is input and communicated to the security processor, then compared against the existing biometric templates stored in the non-volatile memory. If the data matches, verification is sent to the external processor and the user is granted access to the secure assets.
    Type: Application
    Filed: December 20, 2006
    Publication date: June 26, 2008
    Applicant: SPANSION LLC
    Inventors: Mehdi Jazayeri, Jeremy Isaac Nathaniel Werner, Kiran Madhav
  • Publication number: 20080109903
    Abstract: An architecture is presented that facilitates integrated security capabilities. A memory module is provided that comprises non-volatile memory that stores security software and a security processor that accesses the security software from the nonvolatile memory and performs security functions based on the security software stored. Further, a host processor located outside of the memory module arbitrates with the security processor for access to the non-volatile memory. The memory module in communication with the host processor establishes a heightened level of security that can be utilized in authentication services and secure channel communications.
    Type: Application
    Filed: December 21, 2006
    Publication date: May 8, 2008
    Applicant: SPANSION LLC
    Inventors: Jeremy Isaac Nathaniel Werner, Venkat Natarajan, Willy Obereiner, Joe Yuen Tom, George Minassian, Russell Barck
  • Publication number: 20080109662
    Abstract: A machine implemented system and method that effectuates secure access to a flash memory associated with a mobile device. The system includes a security component that intercepts transactions between an external processor and the flash memory and implements authentication and access control to the flash memory. The system further includes components that can partition the flash memory and can associate authentication and access control information with the partitioned flash memory.
    Type: Application
    Filed: December 20, 2006
    Publication date: May 8, 2008
    Applicant: SPANSION LLC
    Inventors: Venkat Natarajan, Jeremy Isaac Nathaniel Werner, Willy Obereiner, Joe Yuen Tom, Russell Barck