Patents by Inventor John P. Brizek
John P. Brizek has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9141810Abstract: A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands issued by clients. An entity selection signal is generated by the mapping system to signal the processor to process an algorithm and provide services for a specific client using the commands identified for that client and data permitted by a client tracking system for that client. Other data accesses and commands identified for other clients are restricted when processing the algorithm.Type: GrantFiled: July 1, 2013Date of Patent: September 22, 2015Assignee: Micron Technology, Inc.Inventors: Dennis M. O'Connor, John P Brizek
-
Patent number: 8751818Abstract: In an embodiment, an apparatus includes a cryptographic processor within a wireless device. The cryptographic processor includes at least one cryptographic unit. The cryptographic processor also includes a nonvolatile memory to store one or more microcode instructions, wherein at least one of the one or more microcode instructions is related to a sensitive operation. The cryptographic processor also includes a controller to control execution of the one or more microcode instructions by the at least one cryptographic unit, wherein the controller is to preclude execution of the sensitive operation if the apparatus is within an untrusted state.Type: GrantFiled: January 21, 2009Date of Patent: June 10, 2014Assignee: Intel CorporationInventors: Moinul H Khan, David Wheeler, John P Brizek, Anitha Kona, Mark N. Fullerton
-
Publication number: 20130298205Abstract: A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands issued by clients. An entity selection signal is generated by the mapping system to signal the processor to process an algorithm and provide services for a specific client using the commands identified for that client and data permitted by a client tracking system for that client. Other data accesses and commands identified for other clients are restricted when processing the algorithm.Type: ApplicationFiled: July 1, 2013Publication date: November 7, 2013Inventors: Dennis M. O'Connor, John P. Brizek
-
Patent number: 8479264Abstract: A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands issued by clients. An entity selection signal is generated by the mapping system to signal the processor to process an algorithm and provide services for a specific client using the commands identified for that client and data permitted by a client tracking system for that client. Other data accesses and commands identified for other clients are restricted when processing the algorithm.Type: GrantFiled: September 29, 2006Date of Patent: July 2, 2013Assignee: Micron Technology, Inc.Inventors: Dennis M. O'Connor, John P. Brizek
-
Publication number: 20130080791Abstract: A processor-based system such as a wireless communication module may implement security functions in a cost effective fashion by providing a virtual memory space whose addresses may be recognized. The memory is integrated with an application processor. When those addresses are recognized, access to special security protocols may be allowed. In another embodiment, a variety of dedicated hardware cryptographic accelerators may be provided to implement security protocols in accordance with a variety of different standards. By optimizing the hardware for specific standards, greater performance may be achieved.Type: ApplicationFiled: October 29, 2012Publication date: March 28, 2013Inventor: John P. Brizek
-
Patent number: 8352748Abstract: A processor-based system such as a wireless communication module may implement security functions in a cost effective fashion by providing a virtual memory space whose addresses may be recognized. The memory is integrated with an application processor. When those addresses are recognized, access to special security protocols may be allowed. In another embodiment, a variety of dedicated hardware cryptographic accelerators may be provided to implement security protocols in accordance with a variety of different standards. By optimizing the hardware for specific standards, greater performance may be achieved.Type: GrantFiled: February 7, 2011Date of Patent: January 8, 2013Assignee: Intel CorporationInventor: John P. Brizek
-
Publication number: 20110191596Abstract: A processor-based system such as a wireless communication module may implement security functions in a cost effective fashion by providing a virtual memory space whose addresses may be recognized. The memory is integrated with an application processor. When those addresses are recognized, access to special security protocols may be allowed. In another embodiment, a variety of dedicated hardware cryptographic accelerators may be provided to implement security protocols in accordance with a variety of different standards. By optimizing the hardware for specific standards, greater performance may be achieved.Type: ApplicationFiled: February 7, 2011Publication date: August 4, 2011Inventor: John P. Brizek
-
Patent number: 7900054Abstract: A processor-based system such as a wireless communication module may implement security functions in a cost effective fashion by providing a virtual memory space whose addresses may be recognized. The memory is integrated with an application processor. When those addresses are recognized, access to special security protocols may be allowed. In another embodiment, a variety of dedicated hardware cryptographic accelerators may be provided to implement security protocols in accordance with a variety of different standards. By optimizing the hardware for specific standards, greater performance may be achieved.Type: GrantFiled: March 25, 2002Date of Patent: March 1, 2011Assignee: Intel CorporationInventor: John P. Brizek
-
Publication number: 20090282254Abstract: In an embodiment, an apparatus includes one or more cryptographic units. The apparatus also includes a memory to store one or more data encryption keys and an associated header for the one or more data encryption keys. The associated header defines which of the one or more cryptographic units are to use the data encryption key.Type: ApplicationFiled: January 26, 2009Publication date: November 12, 2009Inventors: David Wheller, John P. Brizek, Moinul H Khan, Anitha Kona
-
Publication number: 20090282263Abstract: In an embodiment, an apparatus includes a cryptographic processor within a wireless device. The cryptographic processor includes at least one cryptographic unit. The cryptographic processor also includes a nonvolatile memory to store one or more microcode instructions, wherein at least one of the one or more microcode instructions is related to a sensitive operation. The cryptographic processor also includes a controller to control execution of the one or more microcode instructions by the at least one cryptographic unit, wherein the controller is to preclude execution of the sensitive operation if the apparatus is within an untrusted state.Type: ApplicationFiled: January 21, 2009Publication date: November 12, 2009Inventors: Moinul H. Khan, David Wheeler, John P. Brizek, Anitha Kona, Mark N. Fullerton
-
Patent number: 7590864Abstract: Trusted code may be patched in a manner that resists tampering from non-trusted sources. In some embodiments, the patches may be moved into a patch cache in a trusted processing module for execution.Type: GrantFiled: May 21, 2004Date of Patent: September 15, 2009Assignee: Intel CorporationInventors: Moinul H. Khan, Anitha Kona, Mark N. Fullerton, David M. Wheeler, John P. Brizek
-
Patent number: 7389425Abstract: A biometric-based security circuit in which the user database, processor, and biometric map generation functions are all located on the same integrated circuit whose secure contents are inaccessible from external to the integrated circuit. Biometric data, such as a fingerprint, retina scan, or voiceprint, is taken from a user requesting access to restricted resources. The biometric data is transferred into the integrated circuit, where it is converted to a biometric map and compared with a database of biometric maps stored in a non-volatile memory in the integrated circuit. The stored maps represent pre-authorized users, and a match triggers the security circuit to send a signal to a host processor authorizing the host processor to permit the requesting user access to the restricted resources.Type: GrantFiled: June 14, 2004Date of Patent: June 17, 2008Assignee: Intel CorporationInventors: Robert N. Hasbun, John P. Brizek, James R. Vogt
-
Publication number: 20080104673Abstract: A device supports the processing of multiple active applications in a processor through a mapping system that securely identifies and differentiates commands issued by clients. An entity selection signal is generated by the mapping system to signal the processor to process an algorithm and provide services for a specific client using the commands identified for that client and data permitted by a client tracking system for that client. Other data accesses and commands identified for other clients are restricted when processing the algorithm.Type: ApplicationFiled: September 29, 2006Publication date: May 1, 2008Inventors: Dennis M. O'Connor, John P. Brizek
-
Patent number: 7290104Abstract: A single wireless system that implements both baseband and non-baseband applications can be provided in a way that securely prevents inadvertent or deliberate alteration of protected code. For example, the possibility exists that with a common system and common storage that baseband processing code may be overwritten by non-baseband applications. By providing an address comparison register that recognizes particular addresses and ensures that those code accesses are routed only to the specific dedicated areas of storage appropriate to either base or non-baseband applications, inadvertent or deliverable overwriting can be reduced or eliminated.Type: GrantFiled: September 19, 2001Date of Patent: October 30, 2007Assignee: Intel CorporationInventor: John P. Brizek
-
Patent number: 7062623Abstract: A method and device for providing hidden storage in non-volatile memory. A memory device is disclosed comprising a main flash array. A hidden storage area is connected to the main flash array. The hidden storage area can not be accessed without a valid password according to the present memory device.Type: GrantFiled: September 26, 2003Date of Patent: June 13, 2006Assignee: Intel CorporationInventors: James R. Vogt, Robert N. Hasbun, John P. Brizek
-
Publication number: 20040236954Abstract: A biometric-based security circuit in which the user database, processor, and biometric map generation functions are all located on the same integrated circuit whose secure contents are inaccessible from external to the integrated circuit. Biometric data, such as a fingerprint, retina scan, or voiceprint, is taken from a user requesting access to restricted resources. The biometric data is transferred into the integrated circuit, where it is converted to a biometric map and compared with a database of biometric maps stored in a non-volatile memory in the integrated circuit. The stored maps represent pre-authorized users, and a match triggers the security circuit to send a signal to a host processor authorizing the host processor to permit the requesting user access to the restricted resources.Type: ApplicationFiled: June 14, 2004Publication date: November 25, 2004Inventors: James R. Vogt, Robert N. Hasbun, John P. Brizek
-
Patent number: 6775776Abstract: A biometric-based security circuit in which the user database, processor, and biometric map generation functions are all located on the same integrated circuit whose secure contents are inaccessible from external to the integrated circuit. Biometric data, such as a fingerprint, retina scan, or voiceprint, is taken from a user requesting access to restricted resources. The biometric data is transferred into the integrated circuit, where it is converted to a biometric map and compared with a database of biometric maps stored in a non-volatile memory in the integrated circuit. The stored maps represent pre-authorized users, and a match triggers the security circuit to send a signal to a host processor authorizing the host processor to permit the requesting user access to the restricted resources.Type: GrantFiled: June 27, 2000Date of Patent: August 10, 2004Assignee: Intel CorporationInventors: James R. Vogt, Robert N. Hasbun, John P. Brizek
-
Publication number: 20040078511Abstract: A method and device for providing hidden storage in non-volatile memory. A memory device is disclosed comprising a main flash array. A hidden storage area is connected to the main flash array. The hidden storage area can not be accessed without a valid password according to the present memory device.Type: ApplicationFiled: September 26, 2003Publication date: April 22, 2004Inventors: James R. Vogt, Robert N. Hasbun, John P. Brizek
-
Patent number: 6681304Abstract: A method and device for providing hidden storage in non-volatile memory. A memory device is disclosed comprising a main flash array. A hidden storage area is connected to the main flash array. The hidden storage area can not be accessed without a valid password according to the present memory device.Type: GrantFiled: June 30, 2000Date of Patent: January 20, 2004Assignee: Intel CorporationInventors: James R. Vogt, Robert N. Hasbun, John P. Brizek
-
Publication number: 20030182560Abstract: A processor-based system such as a wireless communication module may implement security functions in a cost effective fashion by providing a virtual memory space whose addresses may be recognized. The memory is integrated with an application processor. When those addresses are recognized, access to special security protocols may be allowed. In another embodiment, a variety of dedicated hardware cryptographic accelerators may be provided to implement security protocols in accordance with a variety of different standards. By optimizing the hardware for specific standards, greater performance may be achieved.Type: ApplicationFiled: March 25, 2002Publication date: September 25, 2003Inventor: John P. Brizek