Patents by Inventor Ronald Squires

Ronald Squires has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8315381
    Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: November 20, 2012
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
  • Patent number: 7600122
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: November 6, 2006
    Date of Patent: October 6, 2009
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20090028326
    Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.
    Type: Application
    Filed: July 1, 2008
    Publication date: January 29, 2009
    Applicant: Broadcom Corporation
    Inventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
  • Patent number: 7400722
    Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.
    Type: Grant
    Filed: December 24, 2002
    Date of Patent: July 15, 2008
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
  • Publication number: 20070055875
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Application
    Filed: November 6, 2006
    Publication date: March 8, 2007
    Applicant: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Patent number: 7134014
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: November 23, 2005
    Date of Patent: November 7, 2006
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20060085640
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Application
    Filed: November 23, 2005
    Publication date: April 20, 2006
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Patent number: 7007163
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: February 28, 2006
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20030233539
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Application
    Filed: May 31, 2002
    Publication date: December 18, 2003
    Applicant: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20030185391
    Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.
    Type: Application
    Filed: December 24, 2002
    Publication date: October 2, 2003
    Applicant: Broadcom Corporation
    Inventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
  • Patent number: 4751885
    Abstract: The present invention discloses both a security safe able to be mounted in the corner of a room and a method of securing such a safe. The safe is formed from three planar panels which are substantially mutually orthogonal and from two walls and a base. A front extends between the walls and base and faces the corner formed by the intersection of the walls and base. The front includes an opening with a lockable door. The safe is installed with its corner nestled into the corner of a room and a corresponding fastener is passed from the interior of the safe through each of the three safe panels into the walls and floor of the room.
    Type: Grant
    Filed: September 12, 1986
    Date of Patent: June 21, 1988
    Inventor: Ronald A. Squire