Patents by Inventor Jerrold R. Randell

Jerrold R. Randell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9552498
    Abstract: A system and method for encrypting data provides for retrievial of an encryption key; identification of the address in memory of a first portion of the data to be encrypted; derivation of a first unique key from the encryption key and the address of the first portion of data; encryption of the first portion of data using the first unique key; identification of the address in memory of a second portion of data to be encrypted; derivation of a second unique key from the encryption key and the address of the second portion of data; and encryption of the second portion of data using the second unique key.
    Type: Grant
    Filed: September 13, 2013
    Date of Patent: January 24, 2017
    Assignee: BlackBerry Limited
    Inventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey, Andrew A. Fergusson
  • Patent number: 8660269
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: February 25, 2014
    Assignee: BlackBerry Limited
    Inventor: Jerrold R. Randell
  • Publication number: 20140013124
    Abstract: A system and method for encrypting data provides for retrievial of an encryption key; identification of the address in memory of a first portion of the data to be encrypted; derivation of a first unique key from the encryption key and the address of the first portion of data; encryption of the first portion of data using the first unique key; identification of the address in memory of a second portion of data to be encrypted; derivation of a second unique key from the encryption key and the address of the second portion of data; and encryption of the second portion of data using the second unique key.
    Type: Application
    Filed: September 13, 2013
    Publication date: January 9, 2014
    Inventors: Herbert A. LITTLE, Jerrold R. RANDELL, Richard C. MADTER, Ryan J. HICKEY, Andrew A. FERGUSON
  • Patent number: 8601279
    Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.
    Type: Grant
    Filed: July 6, 2012
    Date of Patent: December 3, 2013
    Assignee: BlackBerry Limited
    Inventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey
  • Patent number: 8571221
    Abstract: A system and method of creating and managing encryption keys in a data processing device generates subsequent encryption keys by combining the existing encryption key with an existing password and seed value. In the preferred embodiment, the initial encryption key is embedded during manufacture and is unknown to the user and manufacturer, thus ensuring that all subsequent encryption keys are derived from an unknown value. When a subsequent encryption key is generated, all data encrypted using the existing encryption key is decrypted using the existing encryption key and re-encrypted using the subsequent encryption key before the existing encryption key is overwritten. In a further aspect, during encryption/decryption the encryption key is combined with the sector address of the data to be encrypted/decrypted in order to generate a unique key for each sector of data to be encrypted/decrypted.
    Type: Grant
    Filed: February 4, 2005
    Date of Patent: October 29, 2013
    Assignee: BlackBerry Limited
    Inventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey, Andrew A. Fergusson
  • Publication number: 20130028414
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Application
    Filed: September 13, 2012
    Publication date: January 31, 2013
    Applicant: RESEARCH IN MOTION LIMITED
    Inventor: Jerrold R. RANDELL
  • Publication number: 20120278630
    Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.
    Type: Application
    Filed: July 6, 2012
    Publication date: November 1, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Herbert A. LITTLE, Jerrold R. RANDELL, Richard C. MADTER, Ryan J. HICKEY
  • Patent number: 8280047
    Abstract: A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least a further encryption key associated with a further password is generated. Generation of the encryption key may use the associated password, a key seed, and a current key. The first encryption key and further encryption key or keys are stored in memory, and are used to encrypt and decrypt separate sets of data. Different keys and potentially different levels of encryption are thus used to protect different sets of data at the device.
    Type: Grant
    Filed: January 25, 2010
    Date of Patent: October 2, 2012
    Assignee: Research In Motion Limited
    Inventor: Jerrold R. Randell
  • Patent number: 8219825
    Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.
    Type: Grant
    Filed: December 1, 2008
    Date of Patent: July 10, 2012
    Assignee: Research In Motion Limited
    Inventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey
  • Patent number: 8144866
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Grant
    Filed: January 25, 2010
    Date of Patent: March 27, 2012
    Assignee: Research In Motion Limited
    Inventor: Jerrold R. Randell
  • Publication number: 20120072651
    Abstract: A memory controller interface, mobile device and method are provided. The memory controller interface can allow a processor designed and configured to operate with NOR flash and static random access memory SRAM devices to instead operate using NAND flash and synchronous dynamic random access memory SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor. Boot code is stored in memory accessible to the processor and is read out of the memory for execution. The boot code is scanned for a predetermined signature, and if the predetermined signature is found, a portion of the memory is write-protected.
    Type: Application
    Filed: November 22, 2011
    Publication date: March 22, 2012
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Jerrold R. Randell, Richard C. Madter, Karin Alicia Werder
  • Patent number: 8086788
    Abstract: A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and static random access memory SRAM devices to instead operate using NAND flash and synchronous dynamic random access memory SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: December 27, 2011
    Assignee: Research In Motion Limited
    Inventors: Jerrold R. Randell, Richard C. Madter, Karen Alicia Werder
  • Publication number: 20100119066
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Application
    Filed: January 25, 2010
    Publication date: May 13, 2010
    Applicant: RESEARCH IN MOTION LIMITED
    Inventor: Jerrold R. RANDELL
  • Publication number: 20100119065
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Application
    Filed: January 25, 2010
    Publication date: May 13, 2010
    Applicant: RESEARCH IN MOTION LIMITED
    Inventor: Jerrold R. RANDELL
  • Patent number: 7653202
    Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
    Type: Grant
    Filed: April 5, 2005
    Date of Patent: January 26, 2010
    Assignee: Research In Motion Limited
    Inventor: Jerrold R. Randell
  • Publication number: 20100005232
    Abstract: A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and SRAM memory devices to instead operate using NAND flash and SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.
    Type: Application
    Filed: September 14, 2009
    Publication date: January 7, 2010
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Jerrold R. RANDELL, Richard C. MADTER, Karin Alicia WERDER
  • Patent number: 7634699
    Abstract: A system and method for testing a data storage device without revealing memory content. To control the individual bits of the memory during testing each value is written into the memory according to the equation NEW_DATA=CURRENT_DATA XOR DATA_SEED such that individual bits of NEW_DATA are equal to CURRENT_DATA with selected bits inverted when the corresponding positions in DATA_SEED are high. NEW_DATA is written into the memory, read out and verified, so that all bit positions can be controlled and tested in both logic states, while NEW_DATA and CURRENT_DATA are not ascertainable by the testing software.
    Type: Grant
    Filed: January 20, 2009
    Date of Patent: December 15, 2009
    Assignee: Research In Motion Limited
    Inventor: Jerrold R. Randell
  • Patent number: 7610433
    Abstract: A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and static random access memory (SRAM) memory devices to instead operate using NAND flash and synchronous dynamic random access memory (SDRAM). The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.
    Type: Grant
    Filed: February 4, 2005
    Date of Patent: October 27, 2009
    Assignee: Research In Motion Limited
    Inventors: Jerrold R. Randell, Richard C. Madter, Karin Alicia Werder
  • Patent number: 7552267
    Abstract: A device employs a method for determining the data bus width of a non-volatile memory, such as NAND flash memory. The method performs at least two read operations on the non-volatile memory so as to test the changing of selected data bits. The method may be performed such that weak pull down and pull up operations are performed to test the data outputs of the non-volatile memory.
    Type: Grant
    Filed: October 5, 2007
    Date of Patent: June 23, 2009
    Assignee: Research In Motion Limited
    Inventors: Jerrold R. Randell, Richard C. Madter, Wei Yao Huang
  • Publication number: 20090132827
    Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.
    Type: Application
    Filed: December 1, 2008
    Publication date: May 21, 2009
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Herbert A. LITTLE, Jerrold R. RANDELL, Richard C. MADTER, Ryan J. HICKEY