Patents by Inventor Thomas Tkacik

Thomas Tkacik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150366474
    Abstract: A system and method for measuring a subject's blood pressure is provided. The system includes a sphygmomanometer cuff configured to apply a pressure to a blood vessel region so as to restrict the flow of blood through a blood vessel of the region; at least one transducer configured to transmit a signal toward the region and to detect a return signal indicative of a velocity of blood flow through the blood vessel; and an apparatus having a processor configured to determine a systolic blood pressure of the subject. The processor is configured to determine whether the return signal corresponds to a first Korotkoff sound of the blood flow through the blood vessel, reduce pressure applied via the sphygmomanometer cuff if the return signal does not correspond to the first Korotkoff sound, and determine pressure applied via the sphygmomanometer cuff when the return signal corresponds to the first Korotkoff sound.
    Type: Application
    Filed: January 22, 2014
    Publication date: December 24, 2015
    Inventors: David A. PEARSON, Peter Thomas TKACIK, Jeffrey Allen KLINE
  • Patent number: 9111122
    Abstract: An asymmetric cryptographic integrated circuit 20 and a data processing device 10 in which the integrated circuit 20 is used are disclosed. A security boundary 44 is confined to the interior of integrated circuit 20. A random number generator 50 with a hardware entropy source 54 and an arithmetic unit 62 programmed through microcode 38? to perform a variety of cryptographically useful functions are included within security boundary 44. One of these functions is a primality tester 72. A controller 36 for integrated circuit 20 may cause cryptographically sensitive data, such as large random prime numbers and a clear private key to be generated within the confines of security boundary 44. A symmetric key encryption engine 56 is included within security boundary 44 and used to encrypt the clear private key so that a resulting encrypted private key may be stored outside security boundary 44 in a non-volatile memory 12.
    Type: Grant
    Filed: July 2, 2007
    Date of Patent: August 18, 2015
    Assignee: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Thomas Tkacik, Amir K. Daneshbeh
  • Patent number: 8464069
    Abstract: Embodiments include systems and methods for securely accessing data in the context of a data transaction. A system may include a memory block, within which a memory partition may be allocated to the data transaction. The memory partition includes a data storage block and at least one binding register. The system also includes platform entities and an access control block, which determines whether a particular platform entity may access data within the data storage block, and whether a particular platform entity may write binding information into a binding register. Access also may be granted or denied based on the current state of a state machine associated with the data transaction. The system also includes a cipher/binding function adapted to encrypt the data, using the binding information, for storage on an unsecured memory device, and to decrypting encrypted data, using the binding information, which is retrieved from the unsecured memory device.
    Type: Grant
    Filed: February 5, 2007
    Date of Patent: June 11, 2013
    Assignee: Freescale Semiconductors, Inc.
    Inventors: Lawrence L. Case, Thomas Tkacik
  • Patent number: 8068644
    Abstract: The invention is a system whereby a video image can be converted into an audio signal. A portable apparatus is described which allows a visually blind person to hear the images and thus ‘see’. This does not require expensive equipment nor does it require surgery. It has applications for non-blind people such as with a pilot seeing radar information. It can be performed with an inexpensive video camera, a portable computer, and earphones. It is also readily adapted to a customized and compact system involving a micro camera, specialized computer, and ear buds.
    Type: Grant
    Filed: March 7, 2006
    Date of Patent: November 29, 2011
    Inventor: Peter Thomas Tkacik
  • Patent number: 7975307
    Abstract: An electronic device as described herein implements a scheme to secure a data mapping function from scan access. The protection scheme can be used as a security measure for proprietary lookup tables, secret constants, digitally implemented algorithms, and the like. The electronic device employs a reconfigurable data mapping arrangement that can be reconfigured for a normal operating mode and a scan testing mode. While in the normal operating mode, a normal data mapping arrangement generates valid output data in accordance with the data mapping function. While in the scanning mode, however, a scanning data mapping arrangement generates invalid but testable output data in accordance with a data masking function that conceals, hides, masks, or obfuscates the data mapping function. Using the data masking function in this manner protects the data mapping function against reverse engineering attacks that attempt to derive the data mapping function from scan testing results.
    Type: Grant
    Filed: September 7, 2007
    Date of Patent: July 5, 2011
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Thomas Tkacik, Amir Daneshbeh
  • Patent number: 7725788
    Abstract: A processor, scan controller, and method for protecting sensitive information from electronic hacking is disclosed. To maintain the security of the sensitive data present in a processor, the scan controller denies access to the scan chain until data is cleared from scan-observable portions of the processor, then clears the scan chain again prior to exiting test mode and resuming normal operation. Clearing or otherwise modifying data stored in the scan-observable portions of a processor when transitioning to and/or from a test mode will prevent unauthorized personnel from simply shifting secure data out of the scan chain, and from pre-loading data into the scan chain prior to normal operation in an attempt to set sensitive state information.
    Type: Grant
    Filed: January 25, 2007
    Date of Patent: May 25, 2010
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Thomas Tkacik, John E. Spittal, Jr., Jonathan Lutz, Lawrence Case, Douglas Hardy, Mark Redman, Gregory Schmidt, Steven Tugenberg, Michael D. Fitzsimmons, Darrell L. Carder
  • Publication number: 20100027788
    Abstract: An asymmetric cryptographic integrated circuit 20 and a data processing device 10 in which the integrated circuit 20 is used are disclosed. A security boundary 44 is confined to the interior of integrated circuit 20. A random number generator 50 with a hardware entropy source 54 and an arithmetic unit 62 programmed through microcode 38? to perform a variety of cryptographically useful functions are included within security boundary 44. One of these functions is a primality tester 72. A controller 36 for integrated circuit 20 may cause cryptographically sensitive data, such as large random prime numbers and a clear private key to be generated within the confines of security boundary 44. A symmetric key encryption engine 56 is included within security boundary 44 and used to encrypt the clear private key so that a resulting encrypted private key may be stored outside security boundary 44 in a non-volatile memory 12.
    Type: Application
    Filed: July 2, 2007
    Publication date: February 4, 2010
    Applicant: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Thomas Tkacik, Amir K. Daneshbeh
  • Publication number: 20090070577
    Abstract: An electronic device as described herein implements a scheme to secure a data mapping function from scan access. The protection scheme can be used as a security measure for proprietary lookup tables, secret constants, digitally implemented algorithms, and the like. The electronic device employs a reconfigurable data mapping arrangement that can be reconfigured for a normal operating mode and a scan testing mode. While in the normal operating mode, a normal data mapping arrangement generates valid output data in accordance with the data mapping function. While in the scanning mode, however, a scanning data mapping arrangement generates invalid but testable output data in accordance with a data masking function that conceals, hides, masks, or obfuscates the data mapping function. Using the data masking function in this manner protects the data mapping function against reverse engineering attacks that attempt to derive the data mapping function from scan testing results.
    Type: Application
    Filed: September 7, 2007
    Publication date: March 12, 2009
    Applicant: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Thomas Tkacik, Amir K. Daneshbeh
  • Publication number: 20080189560
    Abstract: Embodiments include systems and methods for securely accessing data in the context of a data transaction. A system may include a memory block, within which a memory partition may be allocated to the data transaction. The memory partition includes a data storage block and at least one binding register. The system also includes platform entities and an access control block, which determines whether a particular platform entity may access data within the data storage block, and whether a particular platform entity may write binding information into a binding register. Access also may be granted or denied based on the current state of a state machine associated with the data transaction. The system also includes a cipher/binding function adapted to encrypt the data, using the binding information, for storage on an unsecured memory device, and to decrypting encrypted data, using the binding information, which is retrieved from the unsecured memory device.
    Type: Application
    Filed: February 5, 2007
    Publication date: August 7, 2008
    Applicant: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Lawrence L. Case, Thomas Tkacik
  • Publication number: 20070226562
    Abstract: A processor, scan controller, and method for protecting sensitive information from electronic hacking is disclosed. To maintain the security of the sensitive data present in a processor, the scan controller denies access to the scan chain until data is cleared from scan-observable portions of the processor, then clears the scan chain again prior to exiting test mode and resuming normal operation. Clearing or otherwise modifying data stored in the scan-observable portions of a processor when transitioning to and/or from a test mode will prevent unauthorized personnel from simply shifting secure data out of the scan chain, and from pre-loading data into the scan chain prior to normal operation in an attempt to set sensitive state information.
    Type: Application
    Filed: January 25, 2007
    Publication date: September 27, 2007
    Applicant: FREESCALE SEMICONDUCTOR, INC.
    Inventors: Thomas Tkacik, John Spittal, Jonathan Lutz, Lawrence Case, Douglas Hardy, Mark Redman, Gregory Schmidt, Steven Tugeberg, Michael Fitzsimmons, Darrell Carder
  • Publication number: 20070211947
    Abstract: The invention is a system whereby a video image can be converted into an audio signal. A portable apparatus is described which allows a visually blind person to hear the images and thus ‘see’. This does not require expensive equipment nor does it require surgery. It has applications for non-blind people such as with a pilot seeing radar information. It can be performed with an inexpensive video camera, a portable computer, and earphones. It is also readily adapted to a customized and compact system involving a micro camera, specialized computer, and ear buds.
    Type: Application
    Filed: March 7, 2006
    Publication date: September 13, 2007
    Inventor: Peter Thomas Tkacik
  • Patent number: 7185249
    Abstract: A processor, scan controller, and method for protecting sensitive information from electronic hacking is disclosed. To maintain the security of the sensitive data present in a processor, the scan controller denies access to the scan chain until data is cleared from scan-observable portions of the processor, then clears the scan chain again prior to exiting test mode and resuming normal operation. Clearing or otherwise modifying data stored in the scan-observable portions of a processor when transitioning to and/or from a test mode will prevent unauthorized personnel from simply shifting secure data out of the scan chain, and from pre-loading data into the scan chain prior to normal operation in an attempt to set sensitive state information.
    Type: Grant
    Filed: April 30, 2002
    Date of Patent: February 27, 2007
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Thomas Tkacik, John E. Spittal, Jr., Jonathan Lutz, Lawrence Case, Douglas Hardy, Mark Redman, Gregory Schmidt, Steven Tugeberg, Michael D. Fitzsimmons, Darrell L. Carder
  • Publication number: 20050278549
    Abstract: One embodiment relates to a data processing system having a cryptographic unit. The cryptographic unit includes cryptographic circuitry which performs a first cryptographic function to provide security for a portion of the cryptographic unit, and which performs a second cryptographic function to provide security for a portion of the data processing system external to the cryptographic unit. The cryptographic unit may therefore operate in a normal operating mode and in a secure operating mode. During a first secure operating mode a first key is used to decrypt first security configuration information which includes a second key. During a second secure operating mode, the second key is used to decrypt second security configuration information. The cryptographic unit may include a secure internal memory such that during the secure operating modes, the cryptographic unit may only process descriptors provided from this secure internal memory.
    Type: Application
    Filed: June 10, 2004
    Publication date: December 15, 2005
    Inventors: Michael Torla, Thomas Tkacik
  • Publication number: 20050193217
    Abstract: Methods and apparatus are provided for an electronic device having an autonomous memory checker for runtime security assurance. The autonomous memory checker comprises a controller, a memory reference file coupled to the controller, and an authentication engine coupled to the controller. A check is performed during runtime operation of the electronic device. The autonomous memory checker generates runtime reference values corresponding to trusted information stored in memory. The runtime reference values are compared against memory reference values stored in the memory reference file. The memory reference values are generated from the trusted information stored in memory. An error signal is generated when the runtime reference values are not identical to the memory reference values thereby indicating that the trusted information has been modified.
    Type: Application
    Filed: March 1, 2004
    Publication date: September 1, 2005
    Inventors: Lawrence Case, Mark Redman, Thomas Tkacik, Joel Feldman
  • Publication number: 20050039039
    Abstract: The invention relates to debug circuitry (20) and more particularly to a method and apparatus for providing security for debug circuitry (20). In one embodiment, a plurality of non-volatile elements (38) are used in providing selective disabling and re-enabling of at least a portion of the debug circuitry (20). Authentication may also be used. The present invention may use any debug interface, including standard debug interfaces such as the JTAG debug interface defined by the IEEE.
    Type: Application
    Filed: August 11, 2003
    Publication date: February 17, 2005
    Inventors: William Moyer, Thomas Tkacik
  • Publication number: 20040047466
    Abstract: A method of performing encryption and decryption includes implementing a block cipher algorithm, generating encryption and decryption round keys for an accelerator module, and implementing the accelerator module using shared logic for one or more round key sizes, wherein the decryption uses a stored expanded key word to initialize subsequent block decryptions. The block cipher algorithm can be the Rijndael algorithm. Only a first block decryption requires expansion overhead. All subsequent block decryptions utilize a prior key to initialize a key expansion engine for a plurality of subsequent blocks. The subsequent block decryptions are performed at a same rate as block encryptions. An apparatus includes a plurality of logic gates configured to reuse expanded round keys from a prior decryption round, the logic gates complete one round of data decryption per clock cycle after an initial round of data decryption, and a plurality of decoders configured to convert the decrypted data to usable data.
    Type: Application
    Filed: September 6, 2002
    Publication date: March 11, 2004
    Inventors: Joel Feldman, Thomas Tkacik
  • Publication number: 20030204801
    Abstract: A processor, scan controller, and method for protecting sensitive information from electronic hacking is disclosed. To maintain the security of the sensitive data present in a processor, the scan controller denies access to the scan chain until data is cleared from scan-observable portions of the processor, then clears the scan chain again prior to exiting test mode and resuming normal operation. Clearing or otherwise modifying data stored in the scan-observable portions of a processor when transitioning to and/or from a test mode will prevent unauthorized personnel from simply shifting secure data out of the scan chain, and from pre-loading data into the scan chain prior to normal operation in an attempt to set sensitive state information.
    Type: Application
    Filed: April 30, 2002
    Publication date: October 30, 2003
    Applicant: Motorola, Inc.
    Inventors: Thomas Tkacik, John E. Spittal, Jonathan Lutz, Lawrence Case, Douglas Hardy, Mark Redman, Gregory Schmidt, Steven Tugeberg, Michael D. Fitzsimmons, Darrell L. Carder
  • Patent number: 5600567
    Abstract: A scheduling editor graphically displays an algorithmic description and associated scheduling data (14) on a computer terminal (20) to provide a visual representation of the present clock-based timing and scheduling criteria assigned to the algorithmic description. The graphical display and update of scheduling data is performed by software on a computer system. The software allows the algorithmic description to be modified in a user friendly graphical format to edit the timing and scheduling data before the actual circuit schematic is generated. The design database includes control parameters such as selection of clock signal, execution phase of the selected clock, scheduling type, synchronization type, and concurrent operation that dictate how the scheduling is implemented. The software receives new control parameters selected by the designer via the graphic interface and updates the design database accordingly (16).
    Type: Grant
    Filed: November 3, 1994
    Date of Patent: February 4, 1997
    Assignee: Motorola, Inc.
    Inventors: Kayhan Kucukcakar, Rajesh Gupta, Thomas Tkacik
  • Patent number: 5533179
    Abstract: An Hardware Description Language (HDL) description file (12) is updated without requiring complete re-assignment of all tokens associated with the HDL statements. The design information is maintained as attributes assigned to the tokens (14). The tokens map onto a block diagram (16). As part of an update to the HDL text file (34), the tokens are compared to see which ones if any have changed. The text lines are compared from left-to-right and right-to-left searching for changes in the text file and associated changes in token mapping (36, 38). All tokens inclusive between the left-most change and right-most change is considered to be different. New tokens are assigned and mapped into the block diagram for the HDL elements that change (40). The mapping of old tokens are removed from the block diagram (42). The mappings from token that did not change are maintained (44).
    Type: Grant
    Filed: December 1, 1994
    Date of Patent: July 2, 1996
    Assignee: Motorola, Inc.
    Inventors: Kayhan Kucukcakar, Rajesh Gupta, Thomas Tkacik