Patents by Inventor Jerrold R. Randell
Jerrold R. Randell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9552498Abstract: A system and method for encrypting data provides for retrievial of an encryption key; identification of the address in memory of a first portion of the data to be encrypted; derivation of a first unique key from the encryption key and the address of the first portion of data; encryption of the first portion of data using the first unique key; identification of the address in memory of a second portion of data to be encrypted; derivation of a second unique key from the encryption key and the address of the second portion of data; and encryption of the second portion of data using the second unique key.Type: GrantFiled: September 13, 2013Date of Patent: January 24, 2017Assignee: BlackBerry LimitedInventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey, Andrew A. Fergusson
-
Patent number: 8660269Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: GrantFiled: September 13, 2012Date of Patent: February 25, 2014Assignee: BlackBerry LimitedInventor: Jerrold R. Randell
-
Publication number: 20140013124Abstract: A system and method for encrypting data provides for retrievial of an encryption key; identification of the address in memory of a first portion of the data to be encrypted; derivation of a first unique key from the encryption key and the address of the first portion of data; encryption of the first portion of data using the first unique key; identification of the address in memory of a second portion of data to be encrypted; derivation of a second unique key from the encryption key and the address of the second portion of data; and encryption of the second portion of data using the second unique key.Type: ApplicationFiled: September 13, 2013Publication date: January 9, 2014Inventors: Herbert A. LITTLE, Jerrold R. RANDELL, Richard C. MADTER, Ryan J. HICKEY, Andrew A. FERGUSON
-
Patent number: 8601279Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.Type: GrantFiled: July 6, 2012Date of Patent: December 3, 2013Assignee: BlackBerry LimitedInventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey
-
Patent number: 8571221Abstract: A system and method of creating and managing encryption keys in a data processing device generates subsequent encryption keys by combining the existing encryption key with an existing password and seed value. In the preferred embodiment, the initial encryption key is embedded during manufacture and is unknown to the user and manufacturer, thus ensuring that all subsequent encryption keys are derived from an unknown value. When a subsequent encryption key is generated, all data encrypted using the existing encryption key is decrypted using the existing encryption key and re-encrypted using the subsequent encryption key before the existing encryption key is overwritten. In a further aspect, during encryption/decryption the encryption key is combined with the sector address of the data to be encrypted/decrypted in order to generate a unique key for each sector of data to be encrypted/decrypted.Type: GrantFiled: February 4, 2005Date of Patent: October 29, 2013Assignee: BlackBerry LimitedInventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey, Andrew A. Fergusson
-
Publication number: 20130028414Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: ApplicationFiled: September 13, 2012Publication date: January 31, 2013Applicant: RESEARCH IN MOTION LIMITEDInventor: Jerrold R. RANDELL
-
Publication number: 20120278630Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.Type: ApplicationFiled: July 6, 2012Publication date: November 1, 2012Applicant: RESEARCH IN MOTION LIMITEDInventors: Herbert A. LITTLE, Jerrold R. RANDELL, Richard C. MADTER, Ryan J. HICKEY
-
Patent number: 8280047Abstract: A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least a further encryption key associated with a further password is generated. Generation of the encryption key may use the associated password, a key seed, and a current key. The first encryption key and further encryption key or keys are stored in memory, and are used to encrypt and decrypt separate sets of data. Different keys and potentially different levels of encryption are thus used to protect different sets of data at the device.Type: GrantFiled: January 25, 2010Date of Patent: October 2, 2012Assignee: Research In Motion LimitedInventor: Jerrold R. Randell
-
Patent number: 8219825Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.Type: GrantFiled: December 1, 2008Date of Patent: July 10, 2012Assignee: Research In Motion LimitedInventors: Herbert A. Little, Jerrold R. Randell, Richard C. Madter, Ryan J. Hickey
-
Patent number: 8144866Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: GrantFiled: January 25, 2010Date of Patent: March 27, 2012Assignee: Research In Motion LimitedInventor: Jerrold R. Randell
-
Publication number: 20120072651Abstract: A memory controller interface, mobile device and method are provided. The memory controller interface can allow a processor designed and configured to operate with NOR flash and static random access memory SRAM devices to instead operate using NAND flash and synchronous dynamic random access memory SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor. Boot code is stored in memory accessible to the processor and is read out of the memory for execution. The boot code is scanned for a predetermined signature, and if the predetermined signature is found, a portion of the memory is write-protected.Type: ApplicationFiled: November 22, 2011Publication date: March 22, 2012Applicant: RESEARCH IN MOTION LIMITEDInventors: Jerrold R. Randell, Richard C. Madter, Karin Alicia Werder
-
Patent number: 8086788Abstract: A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and static random access memory SRAM devices to instead operate using NAND flash and synchronous dynamic random access memory SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.Type: GrantFiled: September 14, 2009Date of Patent: December 27, 2011Assignee: Research In Motion LimitedInventors: Jerrold R. Randell, Richard C. Madter, Karen Alicia Werder
-
Publication number: 20100119066Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: ApplicationFiled: January 25, 2010Publication date: May 13, 2010Applicant: RESEARCH IN MOTION LIMITEDInventor: Jerrold R. RANDELL
-
Publication number: 20100119065Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: ApplicationFiled: January 25, 2010Publication date: May 13, 2010Applicant: RESEARCH IN MOTION LIMITEDInventor: Jerrold R. RANDELL
-
Patent number: 7653202Abstract: A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.Type: GrantFiled: April 5, 2005Date of Patent: January 26, 2010Assignee: Research In Motion LimitedInventor: Jerrold R. Randell
-
Publication number: 20100005232Abstract: A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and SRAM memory devices to instead operate using NAND flash and SDRAM. The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.Type: ApplicationFiled: September 14, 2009Publication date: January 7, 2010Applicant: RESEARCH IN MOTION LIMITEDInventors: Jerrold R. RANDELL, Richard C. MADTER, Karin Alicia WERDER
-
Patent number: 7634699Abstract: A system and method for testing a data storage device without revealing memory content. To control the individual bits of the memory during testing each value is written into the memory according to the equation NEW_DATA=CURRENT_DATA XOR DATA_SEED such that individual bits of NEW_DATA are equal to CURRENT_DATA with selected bits inverted when the corresponding positions in DATA_SEED are high. NEW_DATA is written into the memory, read out and verified, so that all bit positions can be controlled and tested in both logic states, while NEW_DATA and CURRENT_DATA are not ascertainable by the testing software.Type: GrantFiled: January 20, 2009Date of Patent: December 15, 2009Assignee: Research In Motion LimitedInventor: Jerrold R. Randell
-
Patent number: 7610433Abstract: A memory interface controller and method to allow a processor designed and configured to operate with NOR flash and static random access memory (SRAM) memory devices to instead operate using NAND flash and synchronous dynamic random access memory (SDRAM). The system accomplishes this by caching sectors out of NAND flash into SDRAM, where the data can be randomly accessed by the processor as though it were accessing data from NOR flash/SRAM. Sectors containing data required by the processor are read out of NAND flash and written into SDRAM, where the data can be randomly accessed by the processor.Type: GrantFiled: February 4, 2005Date of Patent: October 27, 2009Assignee: Research In Motion LimitedInventors: Jerrold R. Randell, Richard C. Madter, Karin Alicia Werder
-
Patent number: 7552267Abstract: A device employs a method for determining the data bus width of a non-volatile memory, such as NAND flash memory. The method performs at least two read operations on the non-volatile memory so as to test the changing of selected data bits. The method may be performed such that weak pull down and pull up operations are performed to test the data outputs of the non-volatile memory.Type: GrantFiled: October 5, 2007Date of Patent: June 23, 2009Assignee: Research In Motion LimitedInventors: Jerrold R. Randell, Richard C. Madter, Wei Yao Huang
-
Publication number: 20090132827Abstract: The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.Type: ApplicationFiled: December 1, 2008Publication date: May 21, 2009Applicant: RESEARCH IN MOTION LIMITEDInventors: Herbert A. LITTLE, Jerrold R. RANDELL, Richard C. MADTER, Ryan J. HICKEY