Patents by Inventor John Markey

John Markey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9826403
    Abstract: A device receives a request from a user to manage a Mobile Network Operator (MNO) profile stored in a smart card within the device, wherein the MNO profile includes one or more network access credentials for accessing a wireless network. The device performs a Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA), wherein the CAPTCHA includes receiving input from the user, and authenticates the user as a human, and not a bot or other automated activity, based on the CAPTCHA and the input from the user. The device receives, from a network node external to the device responsive to the authenticating, a MNO profile management code, and manages the MNO profile based on the received MNO profile management code.
    Type: Grant
    Filed: April 18, 2016
    Date of Patent: November 21, 2017
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: Manuel Enrique Caceres, Warren Hojilla Uy, Nanjun Qian, Axel Hallo De Wolf, Ruben Cuadrat, John Markey, Taussif Khan
  • Publication number: 20170280321
    Abstract: A device receives a request from a user to manage a Mobile Network Operator (MNO) profile stored in a smart card within the device, wherein the MNO profile includes one or more network access credentials for accessing a wireless network. The device performs a Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA), wherein the CAPTCHA includes receiving input from the user, and authenticates the user as a human, and not a bot or other automated activity, based on the CAPTCHA and the input from the user. The device receives, from a network node external to the device responsive to the authenticating, a MNO profile management code, and manages the MNO profile based on the received MNO profile management code.
    Type: Application
    Filed: April 18, 2016
    Publication date: September 28, 2017
    Inventors: Manuel Enrique Caceres, Warren Hojilla Uy, Nanjun Qian, Axel Hallo De Wolf, Ruben Cuadrat, John Markey, Taussif Khan
  • Patent number: 8918575
    Abstract: A semiconductor chip may be operable to receive and copy an OTP programming vector presented by the semiconductor chip programming device into its memory after it boots up from the boot read-only memory (ROM). The OTP programming vector which is a computer program may comprise an encrypted data to be programmed into the one-time programmable (OTP) memory in the semiconductor chip and may be signed with an electronic signature. The semiconductor chip may be operable to authenticate the OTP programming vector in the memory. The authenticated OTP programming vector in the memory may be executed to decrypt the data and program the data in a random data format into the OTP memory and then report the status via one or more general purpose input/output (GPIO) pins on the semiconductor chip.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: December 23, 2014
    Assignee: Broadcom Corporation
    Inventors: John Markey, Love Kothari, Paul Chou
  • Patent number: 8732806
    Abstract: Aspects of a method and system for hardware enforced virtualization in an integrated circuit are provided. In this regard, a mode of operation of an integrated circuit may be controlled such that the integrated circuit alternates between a secure mode of operation and an open mode of operation. Various resources of the integrated circuit may be designated as open or secure, and secure resources may be made inaccessible while the integrated circuit operates in the open mode. Access to the secure resources may be controlled based on a configuration of one or more registers and/or switching elements. Resources designated as secure may comprise, for example, a one-time-programmable memory. The integrated circuit may comprise ROM and/or one-time-programmable memory that stores one or more instructions, wherein execution of the one or more instructions may control transitions between the secure mode and the open mode.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: May 20, 2014
    Assignee: Broadcom Corporation
    Inventors: John Markey, Love Kothari, Paul Chou
  • Patent number: 8644499
    Abstract: A semiconductor chip may be operable to block the debug interfaces when the semiconductor chip boots up from the boot read-only memory (ROM). The semiconductor chip may be operable to authenticate a debug certificate received by the semiconductor chip and enable one or more debug interfaces in the semiconductor chip based on the information resulting from the authentication of the debug certificate. The debug certificate may be in a form of a cryptographic public key certificate. A unique device ID which may be generated at boot and stored in the memory may be used by the semiconductor chip to authenticate the debug certificate. The device ID may be generated using the cryptographic public key that is stored in the one-time programmable (OTP) memory in the semiconductor chip and a cryptographic hash algorithm.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: February 4, 2014
    Assignee: Broadcom Corporation
    Inventors: Love Kothari, Paul Chou, John Markey
  • Publication number: 20110067110
    Abstract: Aspects of a method and system for hardware enforced virtualization in an integrated circuit are provided. In this regard, a mode of operation of an integrated circuit may be controlled such that the integrated circuit alternates between a secure mode of operation and an open mode of operation. Various resources of the integrated circuit may be designated as open or secure, and secure resources may be made inaccessible while the integrated circuit operates in the open mode. Access to the secure resources may be controlled based on a configuration of one or more registers and/or switching elements. Resources designated as secure may comprise, for example, a one-time-programmable memory. The integrated circuit may comprise ROM and/or one-time-programmable memory that stores one or more instructions, wherein execution of the one or more instructions may control transitions between the secure mode and the open mode.
    Type: Application
    Filed: September 14, 2009
    Publication date: March 17, 2011
    Inventors: John Markey, Love Kothari, Paul Chou
  • Publication number: 20110066835
    Abstract: A semiconductor chip may be operable to block the debug interfaces when the semiconductor chip boots up from the boot read-only memory (ROM). The semiconductor chip may be operable to authenticate a debug certificate received by the semiconductor chip and enable one or more debug interfaces in the semiconductor chip based on the information resulting from the authentication of the debug certificate. The debug certificate may be in a form of a cryptographic public key certificate. A unique device ID which may be generated at boot and stored in the memory may be used by the semiconductor chip to authenticate the debug certificate. The device ID may be generated using the cryptographic public key that is stored in the one-time programmable (OTP) memory in the semiconductor chip and a cryptographic hash algorithm.
    Type: Application
    Filed: September 14, 2009
    Publication date: March 17, 2011
    Inventors: Love Kothari, Paul Chou, John Markey
  • Publication number: 20110066787
    Abstract: A semiconductor chip may be operable to receive and copy an OTP programming vector presented by the semiconductor chip programming device into its memory after it boots up from the boot read-only memory (ROM). The OTP programming vector which is a computer program may comprise an encrypted data to be programmed into the one-time programmable (OTP) memory in the semiconductor chip and may be signed with an electronic signature. The semiconductor chip may be operable to authenticate the OTP programming vector in the memory. The authenticated OTP programming vector in the memory may be executed to decrypt the data and program the data in a random data format into the OTP memory and then report the status via one or more general purpose input/output (GPIO) pins on the semiconductor chip.
    Type: Application
    Filed: September 14, 2009
    Publication date: March 17, 2011
    Inventors: John Markey, Love Kothari, Paul Chou
  • Publication number: 20060098822
    Abstract: A method and device for forcing the coexistence of different conditional access systems in an existing conditional access system. In one embodiment, the keys used to encrypt the pay television programming are extracted from an incumbent conditional access system and sent in messages to the set top boxes of the competitor manufacturer. In a second embodiment, the key generator in the incumbent system that produces the keys used to encrypt the pay television programming is controlled to produce known keys so that these known keys, or information necessary to predict these known keys, can be distributed to the set top boxes of the competitor manufacturer. In a third embodiment, the keys used to encrypt the pay television programming by the incumbent system are injected into the incumbent system and also distributed to the set top boxes of the competitor manufacturer.
    Type: Application
    Filed: November 4, 2005
    Publication date: May 11, 2006
    Inventor: John Markey