Patents by Inventor Joseph Tardo

Joseph Tardo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8724496
    Abstract: A system and method for integrating line-rate application recognition in a switch ASIC. Switching platforms can be built using this feature with a conventional control plane processor rather than a more expensive specialized processor. A deep packet inspection system can be embodied in a switch ASIC using a flow tracker and a signature matching engine. The flow tracker can be positioned in an ingress portion of the switch ASIC at a location where packets in a bi-direction flow can be observed and recorded. The flow tracker generates a signature match request that is forwarded to a signature matching engine in an auxiliary pipeline. The signature matching engine analyzes packets using signature matching state machine and reports the signature matching results to the flow tracker using a response packet that is sent to the ingress pipeline.
    Type: Grant
    Filed: December 20, 2011
    Date of Patent: May 13, 2014
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Duc Hua, Nate Hill, Stanislas Wolski
  • Patent number: 8681794
    Abstract: A system and method for efficient matching regular expression patterns across multiple packets. A deep packet inspection system can be embodied in a switch ASIC using a flow tracker and a signature matching engine. The flow tracker can be positioned in an ingress portion of the switch ASIC at a location where packets in a bi-direction flow can be observed and recorded. The flow tracker generates a signature match request that is forwarded to a signature matching engine in an auxiliary pipeline. The signature matching engine is enabled to perform cross-packet signature matching using signature matching state machines and reports the signature matching results to the flow tracker using a response packet that is sent to the ingress pipeline.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: March 25, 2014
    Assignee: Broadcom Corporation
    Inventors: Nate Hill, Stanislas Wolski, Joseph Tardo
  • Patent number: 8458461
    Abstract: Methods and apparatus are provided for performing authentication and decryption operations. A record including multiple encrypted blocks is received. An encrypted block in the record is extracted and decrypted first in order to obtain context information for performing authentication operations. Each remaining block is then decrypted and authenticated by using the available context information. Authentication operations can be performed without having to wait for the decryption of all of the blocks in the record.
    Type: Grant
    Filed: July 26, 2010
    Date of Patent: June 4, 2013
    Assignee: Broadcom Corporation
    Inventor: Joseph Tardo
  • Publication number: 20130136127
    Abstract: A system and method for efficient matching regular expression patterns across multiple packets. A deep packet inspection system can be embodied in a switch ASIC using a flow tracker and a signature matching engine. The flow tracker can be positioned in an ingress portion of the switch ASIC at a location where packets in a bi-direction flow can be observed and recorded. The flow tracker generates a signature match request that is forwarded to a signature matching engine in an auxiliary pipeline. The signature matching engine is enabled to perform cross-packet signature matching using signature matching state machines and reports the signature matching results to the flow tracker using a response packet that is sent to the ingress pipeline.
    Type: Application
    Filed: December 19, 2011
    Publication date: May 30, 2013
    Applicant: Broadcom Corporation
    Inventors: Nate Hill, Stanislas Wolski, Joseph Tardo
  • Publication number: 20130136011
    Abstract: A system and method for integrating line-rate application recognition in a switch ASIC. Switching platforms can be built using this feature with a conventional control plane processor rather than a more expensive specialized processor. A deep packet inspection system can be embodied in a switch ASIC using a flow tracker and a signature matching engine. The flow tracker can be positioned in an ingress portion of the switch ASIC at a location where packets in a bi-direction flow can be observed and recorded. The flow tracker generates a signature match request that is forwarded to a signature matching engine in an auxiliary pipeline. The signature matching engine analyzes packets using signature matching state machine and reports the signature matching results to the flow tracker using a response packet that is sent to the ingress pipeline.
    Type: Application
    Filed: December 20, 2011
    Publication date: May 30, 2013
    Applicant: Broadcom Corporation
    Inventors: Joseph Tardo, Duc Hua, Nate Hill, Stanislas Wolski
  • Patent number: 7941662
    Abstract: Methods and apparatus are provided for performing authentication and decryption operations in a cryptography accelerator system. Input data passed to a cryptography accelerator from a host such a CPU includes information for a cryptography accelerator to determine where to write the processed data. In one example, processed data is formatted as packet payloads in a network buffer. Checksum information is precalculated and an offset for a header is maintained.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: May 10, 2011
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer
  • Publication number: 20100293377
    Abstract: Methods and apparatus are provided for performing authentication and decryption operations. A record including multiple encrypted blocks is received. An encrypted block in the record is extracted and decrypted first in order to obtain context information for performing authentication operations. Each remaining block is then decrypted and authenticated by using the available context information. Authentication operations can be performed without having to wait for the decryption of all of the blocks in the record.
    Type: Application
    Filed: July 26, 2010
    Publication date: November 18, 2010
    Applicant: Broadcom Corporation
    Inventor: Joseph Tardo
  • Patent number: 7764788
    Abstract: Methods and apparatus are provided for performing authentication and decryption operations. A record including multiple encrypted blocks is received. An encrypted block in the record is extracted and decrypted first in order to obtain context information for performing authentication operations. Each remaining block is then decrypted and authenticated by using the available context information. Authentication operations can be performed without having to wait for the decryption of all of the blocks in the record.
    Type: Grant
    Filed: July 24, 2006
    Date of Patent: July 27, 2010
    Assignee: Broadcom Corporation
    Inventor: Joseph Tardo
  • Patent number: 7600122
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: November 6, 2006
    Date of Patent: October 6, 2009
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Patent number: 7376826
    Abstract: Methods and apparatus are provided for a cryptography accelerator to efficiently perform authentication and encryption operations. A data sequence is received at a cryptography accelerator. An encrypted authentication code and an encrypted data sequence is provided efficiently upon performing single pass authentication and encryption operations on the data sequence.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: May 20, 2008
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Donald P. Matthews
  • Publication number: 20080072280
    Abstract: A method and system for enabling a secure electronic network communications asset is provided. A computational engine networked with an electronic communications is configured to comprise a network endpoint. One, two or a group of particular applications or network services enabled by that endpoint are identified as an addressable secure asset. Policies are established and implemented to limit interactivity between the secure asset and any communications interface to which the asset is connected. The endpoint is configured to be accessible by one or more specific user groups under possibly unique sets policies assigned to each user group. Any network endpoint must be a member of one at least user group in order to access the secure asset and must abide by the policies imposed by the secure asset onto the including user group.
    Type: Application
    Filed: July 16, 2007
    Publication date: March 20, 2008
    Inventors: Joseph Tardo, Amol Mahajani, Michael Simonsen, Dominic Wilde, Sanjeev Dalal
  • Publication number: 20070101130
    Abstract: Methods and apparatus are provided for performing authentication and decryption operations. A record including multiple encrypted blocks is received. An encrypted block in the record is extracted and decrypted first in order to obtain context information for performing authentication operations. Each remaining block is then decrypted and authenticated by using the available context information. Authentication operations can be performed without having to wait for the decryption of all of the blocks in the record.
    Type: Application
    Filed: July 24, 2006
    Publication date: May 3, 2007
    Applicant: Broadcom Corporation
    Inventor: Joseph Tardo
  • Publication number: 20070055875
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Application
    Filed: November 6, 2006
    Publication date: March 8, 2007
    Applicant: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Patent number: 7134014
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: November 23, 2005
    Date of Patent: November 7, 2006
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20060190997
    Abstract: The invention provides a method and system for enabling in-line communications channels between a plurality of computational systems and a switch, and/or a plurality of switches and a router. In a first version of the invention an in-line system receives uplinks of aggregated data from a plurality of switches and applies policies to the each aggregated data stream prior to transmission of the aggregated data streams from the in-line system to the router. At least one computational system provides a user identification associated with a user profile to the in-line system. The user profile informs indicates to the in-line system of the constraints imposed upon and activities permitted to the computational system originating the user identification.
    Type: Application
    Filed: February 22, 2005
    Publication date: August 24, 2006
    Inventors: Amol Mahajani, Tanuj Mohan, Joseph Tardo, Dominic Wilde
  • Patent number: 7082534
    Abstract: Methods and apparatus are provided for performing authentication and decryption operations. A record including multiple encrypted blocks is received. An encrypted block in the record is extracted and decrypted first in order to obtain context information for performing authentication operations. Each remaining block is then decrypted and authenticated by using the available context information. Authentication operations can be performed without having to wait for the decryption of all of the blocks in the record.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: July 25, 2006
    Assignee: Broadcom Corporation
    Inventor: Joseph Tardo
  • Publication number: 20060107055
    Abstract: A method and system for detecting a pattern derived from or related to a data signature in data packets is provided. An intrusion detection module accepts a data packet and compares all or portions of the data packet with a set of data patterns. One or more data patterns may be related to, or indicate the existence of, or derived from a virus or other data structure, software code, software program, portions of content of a data packet, a universal resource locater, and/or a traffic classification indicator.
    Type: Application
    Filed: November 17, 2004
    Publication date: May 18, 2006
    Applicant: Nesvis, Networks
    Inventors: Ramesh Panwar, Joseph Tardo, Manish Kadam, Swati Deshpande, Sunil Aurora
  • Publication number: 20060085640
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Application
    Filed: November 23, 2005
    Publication date: April 20, 2006
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Patent number: 7007163
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: February 28, 2006
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20050063381
    Abstract: An apparatus provides an integrated single chip solution to solve a multitude of WLAN problems, and especially Switching/Bridging, and Security. In accordance with an aspect of the invention, the apparatus is able to terminate secured tunneled IPSec and L2TP with IPSec traffic. In accordance with a further aspect of the invention, the architecture can handle both tunneled and non-tunneled traffic at line rate, and manage both types of traffic in a unified fashion. The architecture is such that it not only resolves the problems pertinent to WLAN, it is also scalable and useful for building a number of useful networking products that fulfill enterprise security and all possible combinations of wired and wireless networking needs.
    Type: Application
    Filed: July 2, 2004
    Publication date: March 24, 2005
    Inventors: Mathew Kayalackakom, Abhijit Choudhury, Ken Chin, Shekhar Ambe, Joseph Tardo