Patents by Inventor John Profumo

John Profumo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10102390
    Abstract: Contents of a memory may be authenticated using redundant encryption. In some examples, data to be stored by a memory is encrypted with two unique encryption keys—a first encryption key is used generate a cipher text and a second encryption key (different than the first encryption key) is used to generate an authentication tag. The cipher text and authentication tag are stored by the memory. At a later time, the cipher text and authentication tag may be retrieved from the memory and decrypted using the respective encryption keys. After decrypting the cipher text and the authentication tag, the data retrieved from the memory may be authenticated by comparing the plaintext generated by decrypting the cipher text and with the plaintext generated by decrypting the authentication tag. A match between the plaintext indicates the data was not corrupted or modified during storage in the memory.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: October 16, 2018
    Assignee: Honeywell International Inc.
    Inventors: Thomas Cordella, John Profumo
  • Patent number: 9128876
    Abstract: Contents of a memory are encrypted using an encryption key that is generated based on a random number and a memory location at which the contents are stored. Each of a plurality of locations of a memory can be associated with a respective unique pointer value, and an encryption key may be generated based on the unique pointer value and the random number. In some examples, the random number is unique to a power-up cycle of a system comprising the memory or is generated based on a time at which the data to be stored by the memory at the selected memory location is written to the memory.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: September 8, 2015
    Assignee: Honeywell International Inc.
    Inventors: Thomas Cordella, John Profumo, James L. Tucker
  • Publication number: 20140006797
    Abstract: Contents of a memory may be authenticated using redundant encryption. In some examples, data to be stored by a memory is encrypted with two unique encryption keys—a first encryption key is used generate a cipher text and a second encryption key (different than the first encryption key) is used to generate an authentication tag. The cipher text and authentication tag are stored by the memory. At a later time, the cipher text and authentication tag may be retrieved from the memory and decrypted using the respective encryption keys. After decrypting the cipher text and the authentication tag, the data retrieved from the memory may be authenticated by comparing the plaintext generated by decrypting the cipher text and with the plaintext generated by decrypting the authentication tag. A match between the plaintext indicates the data was not corrupted or modified during storage in the memory.
    Type: Application
    Filed: June 28, 2012
    Publication date: January 2, 2014
    Applicant: HONEYWELL INTERNATIONAL INC.
    Inventors: Thomas Cordella, John Profumo
  • Publication number: 20130145177
    Abstract: Contents of a memory are encrypted using an encryption key that is generated based on a random number and a memory location at which the contents are stored. Each of a plurality of locations of a memory can be associated with a respective unique pointer value, and an encryption key may be generated based on the unique pointer value and the random number. In some examples, the random number is unique to a power-up cycle of a system comprising the memory or is generated based on a time at which the data to be stored by the memory at the selected memory location is written to the memory.
    Type: Application
    Filed: December 6, 2011
    Publication date: June 6, 2013
    Applicant: HONEYWELL INTERNATIONAL INC.
    Inventors: Thomas Cordella, John Profumo, James L. Tucker
  • Patent number: 7979607
    Abstract: An apparatus and method of operating a cascadable, instant-fall-through First In, First Out (FIFO) buffer is provided. The method comprises receiving a first data element at an input of a FIFO buffer which includes a plurality of buffer slices including an output buffer slice wherein each of the plurality of buffer slices comprise a data register and a control bit register. A buffer slice is identified which is indicated for storing a data element based on a control bit register for the buffer slice and a control bit register of an adjacent buffer slice on an output side. When data is read from an output buffer slice the FIFO buffer, all data in other buffer slices are shifted down one slice closer to the output side of the FIFO buffer.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: July 12, 2011
    Assignee: Honeywell International Inc.
    Inventors: Joseph Caltagirone, Brett D. Oliver, John Profumo
  • Publication number: 20100223405
    Abstract: An apparatus and method of operating a cascadable, instant-fall-through First In, First Out (FIFO) buffer is provided. The method comprises receiving a first data element at an input of a FIFO buffer which includes a plurality of buffer slices including an output buffer slice wherein each of the plurality of buffer slices comprise a data register and a control bit register. A buffer slice is identified which is indicated for storing a data element based on a control bit register for the buffer slice and a control bit register of an adjacent buffer slice on an output side. When data is read from an output buffer slice the FIFO buffer, all data in other buffer slices are shifted down one slice closer to the output side of the FIFO buffer.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Applicant: Honeywell International Inc.
    Inventors: Joseph Caltagirone, Brett D. Oliver, John Profumo