Patents by Inventor Thomas Cordella

Thomas Cordella has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10102390
    Abstract: Contents of a memory may be authenticated using redundant encryption. In some examples, data to be stored by a memory is encrypted with two unique encryption keys—a first encryption key is used generate a cipher text and a second encryption key (different than the first encryption key) is used to generate an authentication tag. The cipher text and authentication tag are stored by the memory. At a later time, the cipher text and authentication tag may be retrieved from the memory and decrypted using the respective encryption keys. After decrypting the cipher text and the authentication tag, the data retrieved from the memory may be authenticated by comparing the plaintext generated by decrypting the cipher text and with the plaintext generated by decrypting the authentication tag. A match between the plaintext indicates the data was not corrupted or modified during storage in the memory.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: October 16, 2018
    Assignee: Honeywell International Inc.
    Inventors: Thomas Cordella, John Profumo
  • Patent number: 10013363
    Abstract: A system may encrypt the contents of a memory using an encryption key that is generated based on an entropy-based key derivation function. The system may generate a random value as a key split associated with an instance of writing data to memory. The system may generate an encryption key for encrypting the data using an entropy-based key derivation function based at least in part on the key split. The system may encrypt the data using the encryption key. The system may store the encrypted data and the key split to the memory.
    Type: Grant
    Filed: February 9, 2015
    Date of Patent: July 3, 2018
    Assignee: Honeywell International Inc.
    Inventors: James L. Tucker, Thomas Cordella, John D. Profumo
  • Publication number: 20180131528
    Abstract: In some examples, a programmable device may load configuration data into a configuration storage to configure programmable logic of the programmable device. The programmable device may include a key generation logic that may read at least a portion of the configuration data from the configuration storage. The key generation logic may generate a cryptographic key based at least in part on the at least a portion of the configuration data read from the configuration storage.
    Type: Application
    Filed: November 8, 2016
    Publication date: May 10, 2018
    Inventors: John D. Profumo, Thomas Cordella, James L. Tucker
  • Publication number: 20170005699
    Abstract: Spread spectrum clocking circuitry may be configured to produce a spread spectrum clock signal that coordinates the actions of functional circuitry. Spread spectrum clocking circuitry may be configured to include delay circuitry configured to generate a random delay signal based on a random input value and generate the spread spectrum clock signal based on the random delay signal. By introducing true randomness into the delay signal, spread spectrum clocking signal may be able to generate a truly random, as opposed to a merely pseudo random, clock signal.
    Type: Application
    Filed: July 1, 2015
    Publication date: January 5, 2017
    Inventors: James L. Tucker, Thomas Cordella
  • Patent number: 9525457
    Abstract: Spread spectrum clocking circuitry may be configured to produce a spread spectrum clock signal that coordinates the actions of functional circuitry. Spread spectrum clocking circuitry may be configured to include delay circuitry configured to generate a random delay signal based on a random input value and generate the spread spectrum clock signal based on the random delay signal. By introducing true randomness into the delay signal, spread spectrum clocking signal may be able to generate a truly random, as opposed to a merely pseudo random, clock signal.
    Type: Grant
    Filed: July 1, 2015
    Date of Patent: December 20, 2016
    Assignee: Honeywell International Inc.
    Inventors: James L. Tucker, Thomas Cordella
  • Publication number: 20160306750
    Abstract: A system may encrypt the contents of a memory using an encryption key that is generated based on an entropy-based key derivation function. The system may generate a random value as a key split associated with an instance of writing data to memory. The system may generate an encryption key for encrypting the data using an entropy-based key derivation function based at least in part on the key split. The system may encrypt the data using the encryption key. The system may store the encrypted data and the key split to the memory.
    Type: Application
    Filed: February 9, 2015
    Publication date: October 20, 2016
    Inventors: James L. Tucker, Thomas Cordella, John D. Profumo
  • Patent number: 9128876
    Abstract: Contents of a memory are encrypted using an encryption key that is generated based on a random number and a memory location at which the contents are stored. Each of a plurality of locations of a memory can be associated with a respective unique pointer value, and an encryption key may be generated based on the unique pointer value and the random number. In some examples, the random number is unique to a power-up cycle of a system comprising the memory or is generated based on a time at which the data to be stored by the memory at the selected memory location is written to the memory.
    Type: Grant
    Filed: December 6, 2011
    Date of Patent: September 8, 2015
    Assignee: Honeywell International Inc.
    Inventors: Thomas Cordella, John Profumo, James L. Tucker
  • Publication number: 20140006797
    Abstract: Contents of a memory may be authenticated using redundant encryption. In some examples, data to be stored by a memory is encrypted with two unique encryption keys—a first encryption key is used generate a cipher text and a second encryption key (different than the first encryption key) is used to generate an authentication tag. The cipher text and authentication tag are stored by the memory. At a later time, the cipher text and authentication tag may be retrieved from the memory and decrypted using the respective encryption keys. After decrypting the cipher text and the authentication tag, the data retrieved from the memory may be authenticated by comparing the plaintext generated by decrypting the cipher text and with the plaintext generated by decrypting the authentication tag. A match between the plaintext indicates the data was not corrupted or modified during storage in the memory.
    Type: Application
    Filed: June 28, 2012
    Publication date: January 2, 2014
    Applicant: HONEYWELL INTERNATIONAL INC.
    Inventors: Thomas Cordella, John Profumo
  • Publication number: 20130145177
    Abstract: Contents of a memory are encrypted using an encryption key that is generated based on a random number and a memory location at which the contents are stored. Each of a plurality of locations of a memory can be associated with a respective unique pointer value, and an encryption key may be generated based on the unique pointer value and the random number. In some examples, the random number is unique to a power-up cycle of a system comprising the memory or is generated based on a time at which the data to be stored by the memory at the selected memory location is written to the memory.
    Type: Application
    Filed: December 6, 2011
    Publication date: June 6, 2013
    Applicant: HONEYWELL INTERNATIONAL INC.
    Inventors: Thomas Cordella, John Profumo, James L. Tucker