Patents by Inventor John P. Taylor
John P. Taylor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
System and method for generating secured authentication image files for use in device authentication
Patent number: 8301888Abstract: A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device is authenticated. The secure authentication image file is pre-generated in a secure environment. A plurality of key address locations are reserved in a raw memory image file. A key merger application merges the secure key data into the raw memory image file to generate a secure authentication image file. A test set of plaintext/cyphertext pairs are generated using the newly created secure authentication image file. To maintain security of the secure authentication image file, the secure key data and the raw memory image file are erased from a working memory.Type: GrantFiled: March 6, 2007Date of Patent: October 30, 2012Assignee: KYOCERA CorporationInventor: John P. Taylor -
Patent number: 8296565Abstract: A communication protocol between a master device, such as a mobile phone, and a peripheral device facilitates authentication of the peripheral device. When a peripheral device is detected, the master device initiates a wake-up command to the peripheral device, transmits an authentication request command followed by challenge data to the peripheral device, and awaits responses from the peripheral device. The accessory receives the challenge data, performs a hash function on the challenge data, and generates response data. An authentication response type byte is sent to the handset followed by the response data. The handset compares the response data to pre-stored data that is associated with the challenge data. A match indicates that the accessory is authentic. The challenge/response data, also referred to as a plaintext/cyphertext pair, is pre-generated external to the handset using the hash function, then pre-stored in the handset.Type: GrantFiled: March 6, 2007Date of Patent: October 23, 2012Assignee: KYOCERA CorporationInventor: John P. Taylor
-
Publication number: 20120044101Abstract: A pseudo-absolute position of a rotating axis is sensed at a desired resolution by employing a single absolute encoders of a resolution that is lower than the desired resolution in combination with a home position sensor that is activated by a home position actuator attached to the axis. The home position sensor and actuator provide an initial count and context of absolute encoder rotations about the axis. Whereas the absolute encoder data is utilized directly for the lower bits of the enhanced position data, overflows and underflows of the absolute encoder data are utilized for the purpose of counting the absolute encoder rotations wherein the rotation count forms the upper bits of the enhanced position data. Additionally, the data from the absolute encoder can be manipulated so as to make a mechanical misalignment between the encoder, the home position sensor and actuator essentially inconsequential to the operation and accuracy of the enhanced incremental-absolute position sensor system.Type: ApplicationFiled: August 23, 2010Publication date: February 23, 2012Inventors: John P. Taylor, Nicholas L. Taylor
-
Patent number: 8072356Abstract: Methods and apparatus for determining the operating states of a plurality of capacitive sensing buttons in a capacitive sensing user interface are disclosed. The capacitive sensing buttons are sampled in a round-robin fashion such that the decay time samples for the buttons are acquired in an interleaved manner during each sampling cycle. Provisions are made to reduce the initialization delay, to reduce transient-induced errors, and to obtain the operating states based on updated decay data samples for the buttons.Type: GrantFiled: December 13, 2007Date of Patent: December 6, 2011Assignee: Kyocera CorporationInventors: John P. Taylor, Jeffrey M. Thoma
-
Patent number: 8029187Abstract: A temperature measuring and identification (TMID) device obtains identification information and temperature information of a connected device having a temperature sensing circuit (TSC). The TSC includes a temperature sensing element (TSE) connected in parallel with a voltage clamping network (VCN) that limits the voltage across the TSE to an identification voltage within an identification voltage range when the voltage is greater than or equal to a lower voltage of the identification voltage range. When a voltage below the lower range is applied to the TSC, the VCN appears as an open circuit and the resistance of the TSC corresponds to temperature. A translation circuit within the TMID shifts TSC voltages within the identification voltage range to a normalization voltage range. Accordingly, voltages corresponding to temperature as well as voltages corresponding to identification are within the normalization voltage range.Type: GrantFiled: February 21, 2007Date of Patent: October 4, 2011Assignee: Kyocera CorporationInventors: John P. Taylor, Jeffrey M. Thoma
-
Patent number: 7971058Abstract: Plaintext/cyphertext pairs are generated for use in authenticating a device. The device performs a secure authentication algorithm on a secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device is authenticated. A master processor manages the generation of the plaintext/cyphertext pairs. Plaintext challenges are generated in the master processor using a binary counter and an n-bit key. Each plaintext challenge is transmitted to a first processor and a second processor. The first processor executes the secure authentication algorithm on each plaintext challenge and outputs a cyphertext response associated with each plaintext challenge. The second processor executes the secure authentication algorithm on each plaintext challenge and outputs a second cyphertext response associated with each plaintext challenge.Type: GrantFiled: March 6, 2007Date of Patent: June 28, 2011Assignee: Kyocera CorporationInventor: John P. Taylor
-
Patent number: 7835126Abstract: A resettable short-circuit protection circuit can terminate excessive fault currents automatically and quickly. The short-circuit protection circuit is switchable and has a low input impedance during normal operation so that there is not a significant voltage drop across the switching elements of the protection circuit. The short-circuit protection circuit allows a power source internal to a portable device to be safely connected to an external accessory where there exists the possibility that the connection could be shorted at the time power is first supplied to the external accessory or a short develops afterwards. After terminating a short-circuit condition, the protection circuit may be reset by cycling an enable signal. The fault termination and reset timing may be configured by selection of internal resistance and capacitance values.Type: GrantFiled: July 3, 2007Date of Patent: November 16, 2010Assignee: Kyocera CorporationInventor: John P. Taylor
-
Publication number: 20100277351Abstract: Methods and apparatus for determining the operating states of a plurality of capacitive sensing buttons in a capacitive sensing user interface are disclosed. The capacitive sensing buttons are sampled in a round-robin fashion such that the decay time samples for the buttons are acquired in an interleaved manner during each sampling cycle. Provisions are made to reduce the initialization delay, to reduce transient-induced errors, and to obtain the operating states based on updated decay data samples for the buttons.Type: ApplicationFiled: December 13, 2007Publication date: November 4, 2010Inventors: John P. TAYLOR, Jeffrey M. THOMA
-
SYSTEM AND METHOD FOR GENERATING SECURED AUTHENTICATION IMAGE FILES FOR USE IN DEVICE AUTHENTICATION
Publication number: 20100268946Abstract: A secure authentication image file is generated for use in authenticating a device. The device performs a secure authentication algorithm on the secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device is authenticated. The secure authentication image file is pre-generated in a secure environment. A plurality of key address locations are reserved in a raw memory image file. A key merger application merges the secure key data into the raw memory image file to generate a secure authentication image file. A test set of plaintext/cyphertext pairs are generated using the newly created secure authentication image file. To maintain security of the secure authentication image file, the secure key data and the raw memory image file are erased from a working memory.Type: ApplicationFiled: March 6, 2007Publication date: October 21, 2010Inventor: John P. TAYLOR -
Publication number: 20100241853Abstract: Plaintext/cyphertext pairs are generated for use in authenticating a device. The device performs a secure authentication algorithm on a secure authentication image file and a received plaintext challenge, and outputs a cyphertext response. If the cyphertext response matches a pre-stored cyphertext string associated with the plaintext challenge, then the device is authenticated. A master processor manages the generation of the plaintext/cyphertext pairs. Plaintext challenges are generated in the master processor using a binary counter and an n-bit key. Each plaintext challenge is transmitted to a first processor and a second processor. The first processor executes the secure authentication algorithm on each plaintext challenge and outputs a cyphertext response associated with each plaintext challenge. The second processor executes the secure authentication algorithm on each plaintext challenge and outputs a second cyphertext response associated with each plaintext challenge.Type: ApplicationFiled: March 6, 2007Publication date: September 23, 2010Inventor: John P. TAYLOR
-
Patent number: 7752365Abstract: A bi-directional single conductor interrupt line is used in conjunction with a master only initiated data communication bus, to allow a slave device to submit a slave service request to a master device and to acknowledge master service requests from the master device. When not submitting a master service request, the master device maintains an interrupt line voltage at an idle state voltage by setting the interrupt line voltage through a pull resistor. The slave and master devices submit service requests by respectively driving or pulling the interrupt line voltage from the idle voltage to the service request voltage. The slave responds to a master service request or initiates the master servicing of a slave service request by subsequently driving the interrupt line back to the idle state voltage giving a slower slave ample time to prepare for a pending master initiated data transaction.Type: GrantFiled: April 1, 2008Date of Patent: July 6, 2010Assignee: Kyocera CorporationInventors: John P. Taylor, Jeffrey M. Thoma
-
Publication number: 20090248932Abstract: A bi-directional single conductor interrupt line is used in conjunction with a master only initiated data communication bus, to allow a slave device to submit a slave service request to a master device and to acknowledge master service requests from the master device. When not submitting a master service request, the master device maintains an interrupt line voltage at an idle state voltage by setting the interrupt line voltage through a pull resistor. The slave and master devices submit service requests by respectively driving or pulling the interrupt line voltage from the idle voltage to the service request voltage. The slave responds to a master service request or initiates the master servicing of a slave service request by subsequently driving the interrupt line back to the idle state voltage giving a slower slave ample time to prepare for a pending master initiated data transaction.Type: ApplicationFiled: April 1, 2008Publication date: October 1, 2009Inventors: John P. Taylor, Jeffrey M. Thoma
-
Publication number: 20090196563Abstract: A fiber cable adapter comprises adjacent rows of fibers, each beginning with a set of fibers comprising a fiber pair, which comprises a transmitting fiber adjacent a receiving fiber, and a spare fiber adjacent the fiber pair. The spare fiber immediately precedes the fiber pair in one of the rows and immediately proceeds the fiber pair in the other row. A fiber cable cassette comprises an adapter panel supporting the fiber cable adapter. An integrated fiber cable management system comprises a fitting having a body with a collet through which a cable passes. A lock nut is threaded on a first end of the body to hold the body in relation to a chassis. A sealing nut is threaded on a second end of the body to tighten the collet on the cable to hold the cable in place in relation to the chassis. A flexible protector extends from the sealing nut to control the bend of the cable between the chassis and a fiber cable cassette.Type: ApplicationFiled: January 28, 2009Publication date: August 6, 2009Inventors: David M. Mullsteff, John P. Taylor, Mark A. Gervasoni
-
Publication number: 20090009919Abstract: A resettable short-circuit protection circuit can terminate excessive fault currents automatically and quickly. The short-circuit protection circuit is switchable and has a low input impedance during normal operation so that there is not a significant voltage drop across the switching elements of the protection circuit. The short-circuit protection circuit allows a power source internal to a portable device to be safely connected to an external accessory where there exists the possibility that the connection could be shorted at the time power is first supplied to the external accessory or a short develops afterwards. After terminating a short-circuit condition, the protection circuit may be reset by cycling an enable signal. The fault termination and reset timing may be configured by selection of internal resistance and capacitance values.Type: ApplicationFiled: July 3, 2007Publication date: January 8, 2009Inventor: John P. Taylor
-
Patent number: 7420477Abstract: An absolute position of a rotating axis is sensed at a desired resolution by employing two or more absolute encoders of a resolution that is lower than the desired resolution. A first absolute encoder that rotates in concert with the axis being sensed and a second absolute encoder that rotates a number of times for each rotation of the first encoder are employed. While the second absolute encoder data is utilized directly, the first absolute encoder data, through an interpretation of the context of the second absolute encoder data, is translated to a quantity equivalent to the rotational count of the second absolute encoder. Additionally, the data from the first and second absolute encoders can be manipulated so as to make a mechanical misalignment between the encoders or a temporal misalignment between their readings to be essentially inconsequential to the operation and accuracy of the enhanced absolute position sensor system.Type: GrantFiled: August 2, 2006Date of Patent: September 2, 2008Inventors: John P Taylor, Nicholas L Taylor
-
Publication number: 20080198898Abstract: A temperature measuring and identification (TMID) device obtains identification information and temperature information of a connected device having a temperature sensing circuit (TSC). The TSC includes a temperature sensing element (TSE) connected in parallel with a voltage clamping network (VCN) that limits the voltage across the TSE to an identification voltage within an identification voltage range when the voltage is greater than or equal to a lower voltage of the identification voltage range. When a voltage below the lower range is applied to the TSC, the VCN appears as an open circuit and the resistance of the TSC corresponds to temperature. A translation circuit within the TMID shifts TSC voltages within the identification voltage range to a normalization voltage range. Accordingly, voltages corresponding to temperature as well as voltages corresponding to identification are within the normalization voltage range.Type: ApplicationFiled: February 21, 2007Publication date: August 21, 2008Inventors: John P. Taylor, Jeffrey M. Thoma
-
Patent number: D1038780Type: GrantFiled: January 19, 2023Date of Patent: August 13, 2024Assignee: CUE HEALTH INC.Inventors: Clint Sever, Raphael Shapiro, Kevin Wu, Michael Credelle, Randall Hill, John P. Taylor, Jay Greenwood, Omar Fontes
-
Patent number: D1038781Type: GrantFiled: January 19, 2023Date of Patent: August 13, 2024Assignee: CUE HEALTH INC.Inventors: Clint Sever, Raphael Shapiro, Kevin Wu, Michael Credelle, Randall Hill, John P. Taylor, Jay Greenwood, Omar Fontes
-
Patent number: D1039395Type: GrantFiled: January 19, 2024Date of Patent: August 20, 2024Assignee: CUE HEALTH INC.Inventors: Clint Sever, Raphael Shapiro, Kevin Wu, Michael Credelle, Randall Hill, John P. Taylor, Jay Greenwood, Omar Fontes
-
Patent number: D1039990Type: GrantFiled: April 12, 2023Date of Patent: August 27, 2024Assignee: CUE HEALTH INC.Inventors: Clint Sever, Raphael Shapiro, Kevin Wu, Michael Credelle, Randall Hill, John P. Taylor, Jay Greenwood, Omar Fontes