Patents by Inventor Michael Grell
Michael Grell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230221295Abstract: There is provided a perishable goods monitoring system for monitoring the freshness or condition of a perishable product encapsulated within a package, the system comprising a sensor device, a wireless communication reader device and a processing module, said sensor device comprising a fibrous hydrophilic material based electrical sensor and a wireless communication tag chip coupled thereto and being configured to be incorporated in or on a said package, said wireless communication reader device being configured for wireless communication with said wireless communication tag by means of wireless communication technology when said reader device is within a predetermined distance of said tag, and said processing module being configured to receive sensor data from said sensor, via said reader device, correlate said sensor data against a stored calibration data set associated with said perishable product and determine thereby data representative of freshness of said perishable product.Type: ApplicationFiled: May 6, 2021Publication date: July 13, 2023Applicant: BLAKBEAR LTDInventors: Maximilian Michael GRELL, Michail KASIMATIS, Giandrin BARANDUN
-
Patent number: 8656146Abstract: A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed into the non-volatile memory. During a reset event or a power-on event, execution may be started from the internal non-volatile memory, which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories, thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips.Type: GrantFiled: August 6, 2008Date of Patent: February 18, 2014Assignee: GLOBALFOUNDRIES Inc.Inventors: Ralf Findeisen, Michael Grell, Tim Edward Perley, Marc Edwin Jones, Frank Schuecke
-
Patent number: 8464037Abstract: A CPU, a computer system and a secure boot mechanism are provided in which a symmetric encryption key may be incorporated into a non-volatile memory area of the CPU core, thereby substantially avoiding any tampering of the encryption key by external sources. Moreover, pre-boot information may be internally stored in the CPU and may be retrieved upon a reset or power-on event in order to verify a signed boot information on the basis of the internal symmetric encryption key. Furthermore, the BIOS information may be efficiently updated by generating a signature using the internal encryption key.Type: GrantFiled: January 19, 2009Date of Patent: June 11, 2013Assignee: GLOBALFOUNDRIES Inc.Inventors: Michael Grell, Ralf Findeisen, Frank Schuecke
-
Patent number: 7672828Abstract: A software development technique is provided using target system virtualization software simulating behaviour of a target system. A target device driver running on a host system issues memory access commands to the target system virtualization software rather than to a memory interface unit of the host system. The memory interface unit may be an SRAM (Static Random Access Memory) interface. The target system may be an EGPRS (Enhanced General Packet Radio Service) modem.Type: GrantFiled: December 21, 2005Date of Patent: March 2, 2010Assignee: Advanced Micro Devices, Inc.Inventors: Michael Fiedler, Ralf Findeisen, Michael Grell, Matthias Lenk
-
Publication number: 20090276617Abstract: A CPU, a computer system and a secure boot mechanism are provided in which a symmetric encryption key may be incorporated into a non-volatile memory area of the CPU core, thereby substantially avoiding any tampering of the encryption key by external sources. Moreover, pre-boot information may be internally stored in the CPU and may be retrieved upon a reset or power-on event in order to verify a signed boot information on the basis of the internal symmetric encryption key. Furthermore, the BIOS information may be efficiently updated by generating a signature using the internal encryption key.Type: ApplicationFiled: January 19, 2009Publication date: November 5, 2009Inventors: Michael Grell, Ralf Findeisen, Frank Schuecke
-
Publication number: 20090222653Abstract: A secure boot processing may be accomplished on the basis of a non-volatile memory that is an integral part of the CPU and which may not be modified once a pre-boot information may be programmed into the non-volatile memory. During a reset event or a power-on event, execution may be started from the internal non-volatile memory, which may also include public decryption keys for verifying a signature of a portion of a boot routine. The verification of the respective portion of the boot routine may be accomplished by using internal random access memories, thereby avoiding external access during verification of the boot routine. Hence, a high degree of tamper resistance may be obtained, for instance, with respect to BIOS modification by exchanging BIOS chips.Type: ApplicationFiled: August 6, 2008Publication date: September 3, 2009Inventors: Ralf Findeisen, Michael Grell, Tim Edward Perley, Marc Edwin Jones, Frank Schuecke
-
Patent number: 7492747Abstract: The present invention relates methods for patching WWAN (Wireless Wide Area Network) communication devices and corresponding WWAN communication devices, integrated circuit chips and computer-readable media. The WWAN communication device includes a first processor, a second processor and a memory. The first processor is arranged to process patches updating software running on the WWAN communication device. The second processor is arranged to provide a first set of the patches to the first processor. The memory stores a second set of the patches to be processed by the first processor. The second processor is further arranged to send a patch end signal to the first processor, the patch end signal causing the first processor to stop processing of patches provided by the second processor. The first processor is further arranged to process the patches stored in the memory independently of the patch end signal.Type: GrantFiled: December 21, 2005Date of Patent: February 17, 2009Assignee: Advanced Micro Devices, Inc.Inventors: Axel Wachtler, Richard Powell, Michael Grell, Ralf Findeisen
-
Patent number: 7418054Abstract: A WLAN (Wireless Local Area Network) transmitter or another data communications apparatus is provided that includes a transmission section that is configured to generate signals to be transmitted, and a control section that is connected to the transmission section to control the transmission section dependent on at least two transmission parameters. The control section comprises a state transition controller that is configured to step through a plurality of predefined control states. The control section is configured to apply different transmission parameter modification mechanisms in different control states. The state transition controller is configured to determine the respective next control states based on transmission success and failure statistics.Type: GrantFiled: June 19, 2003Date of Patent: August 26, 2008Assignee: Advanced Micro Devices, Inc.Inventors: Uwe Eckhardt, Matthias Lenk, Michael Grell
-
Publication number: 20070067151Abstract: A software development technique is provided using target system virtualization software simulating behaviour of a target system. A target device driver running on a host system issues memory access commands to the target system virtualization software rather than to a memory interface unit of the host system. The memory interface unit may be an SRAM (Static Random Access Memory) interface. The target system may be an EGPRS (Enhanced General Packet Radio Service) modem.Type: ApplicationFiled: December 21, 2005Publication date: March 22, 2007Inventors: Michael Fiedler, Ralf Findeisen, Michael Grell, Matthias Lenk
-
Publication number: 20070028296Abstract: The present invention relates methods for patching WWAN (Wireless Wide Area Network) communication devices and corresponding WWAN communication devices, integrated circuit chips and computer-readable media. The WWAN communication device includes a first processor, a second processor and a memory. The first processor is arranged to process patches updating software running on the WWAN communication device. The second processor is arranged to provide a first set of the patches to the first processor. The memory stores a second set of the patches to be processed by the first processor. The second processor is further arranged to send a patch end signal to the first processor, the patch end signal causing the first processor to stop processing of patches provided by the second processor. The first processor is further arranged to process the patches stored in the memory independently of the patch end signal.Type: ApplicationFiled: December 21, 2005Publication date: February 1, 2007Applicant: Advanced Micro Devices, Inc.Inventors: Axel Wachtler, Richard Powell, Michael Grell, Ralf Findeisen
-
Publication number: 20040086058Abstract: A WLAN (Wireless Local Area Network) transmitter or another data communications apparatus is provided that comprise a transmission section that is configured to generate signals to be transmitted, and a control section that is connected to the transmission section to control the transmission section dependent on at least two transmission parameters. The control section comprises a state transition controller that is configured to step through a plurality of predefined control states. The control section is configured to apply different transmission parameter modification mechanisms in different control states. The state transition controller is configured to determine the respective next control states based on transmission success and failure statistics.Type: ApplicationFiled: June 19, 2003Publication date: May 6, 2004Applicant: Advanced Micro Devices, Inc.Inventors: Uwe Eckhardt, Matthias Lenk, Michael Grell