Patents by Inventor Timothy J. Courtney
Timothy J. Courtney has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11381401Abstract: The technology disclosed herein provides a blockchain transactions forwarding mechanism that allows for tracking and notification from the originating blockchain through to a last blockchain and back again. An implementation of the system disclosed herein also provides a whitelist mechanism to provide a list of acceptable blockchains or nodes that may receive transactions. Yet another implementation provides a predetermined hop count that may be used as the maximum allowable hop counts that provides the number of times a transaction is allowed to be forwarded.Type: GrantFiled: January 7, 2020Date of Patent: July 5, 2022Assignee: SEAGATE TECHNOLOGY LLCInventors: Timothy J. Courtney, Meherzad F. Aga, Syed Y. Abbas
-
Patent number: 11308194Abstract: The technology disclosed herein provides a method to control the resources used in a device. An implementation of such a method includes generating a device configuration ledger block based on initial assembly of components of a storage device, storing the device configuration ledger block on a node of a distributed ledger, detecting an activation of the device; in response to detecting the activation of the device, generating a current distributed ledger block based on current assembly of components of the storage device, comparing the current distributed ledger block with the device configuration ledger block, and in response to determining that the current distributed ledger block does not match with the device configuration ledger block disabling the operation of the device.Type: GrantFiled: October 31, 2018Date of Patent: April 19, 2022Assignee: SEAGATE TECHNOLOGY LLCInventors: Timothy J. Courtney, David R. Kaiser, Anthony R. Duran
-
Patent number: 11146594Abstract: The technology disclosed herein provides a method to use a private distributed blockchain to generate a secure encrypted record of authentication attempts for a set of distributed network attached user devices or nodes. In at least one implementation, the method includes initiating a security incident blockchain for a network comprising a plurality nodes, provisioning each the plurality of nodes in the network with a synchronous key wherein a master node has a copy of all of the synchronous keys, adding a configuration transaction to the security incident blockchain, the configuration transaction including security policies for the plurality of nodes in the network, detecting a security incident at one of the plurality of nodes in the network, and in response to the detection of the security incident, performing a security incident response in compliance with the security policies as provided in the configuration transaction.Type: GrantFiled: May 31, 2019Date of Patent: October 12, 2021Assignee: SEAGATE TECHNOLOGY LLCInventor: Timothy J Courtney
-
Publication number: 20210211298Abstract: The technology disclosed herein provides a blockchain transactions forwarding mechanism that allows for tracking and notification from the originating blockchain through to a last blockchain and back again. An implementation of the system disclosed herein also provides a whitelist mechanism to provide a list of acceptable blockchains or nodes that may receive transactions. Yet another implementation provides a predetermined hop count that may be used as the maximum allowable hop counts that provides the number of times a transaction is allowed to be forwarded.Type: ApplicationFiled: January 7, 2020Publication date: July 8, 2021Inventors: Timothy J. COURTNEY, Meherzad F. AGA, Syed Y. ABBAS
-
Patent number: 11017128Abstract: Apparatus and method for transferring data between a processing circuit and a memory. In some embodiments, a data storage device has a main non-volatile memory (NVM) configured to store user data from a host device. A controller circuit is configured to direct transfers of the user data between the NVM and the host device. The controller circuit has a programmable processor and a secure data transfer circuit. The secure data transfer circuit executes memory access operations to transfer user data and control values between the processor and a local memory. A memory access operation includes receiving bits of a multi-bit control value on a multi-line bus from the processor, and activating a programmable switching circuit to randomly interconnect different ones of the multi-line bus to transpose the bits in the control value.Type: GrantFiled: May 22, 2018Date of Patent: May 25, 2021Assignee: Seagate Technology LLCInventor: Timothy J. Courtney
-
Publication number: 20200382555Abstract: The technology disclosed herein provides a method to use a private distributed blockchain to generate a secure encrypted record of authentication attempts for a set of distributed network attached user devices or nodes. In at least one implementation, the method includes initiating a security incident blockchain for a network comprising a plurality nodes, provisioning each the plurality of nodes in the network with a synchronous key wherein a master node has a copy of all of the synchronous keys, adding a configuration transaction to the security incident blockchain, the configuration transaction including security policies for the plurality of nodes in the network, detecting a security incident at one of the plurality of nodes in the network, and in response to the detection of the security incident, performing a security incident response in compliance with the security policies as provided in the configuration transaction.Type: ApplicationFiled: May 31, 2019Publication date: December 3, 2020Inventor: Timothy J. Courtney
-
Patent number: 10785193Abstract: A network resource and a user device include secure connection applications that share one or more keys and a key selection criterion. A communication is received from the user utilizing a key selected from the one or more keys. The network resource selects a key based on the key selection criterion. If the keys match, then the user device is authorized and the user is allowed to access data of the network resource. The keys may further be selected and used to encrypt and decrypt data. Different key selections provide security to communications.Type: GrantFiled: March 30, 2017Date of Patent: September 22, 2020Assignee: SEAGATE TECHNOLOGY LLCInventors: Michael E. Peper, Ajaz M. Siraj, Timothy J. Courtney
-
Patent number: 10771236Abstract: Apparatus and method for enacting data security in a data storage device, such as by protecting against a differential power analysis (DPA) attack. In some embodiments, a programmable processor executes programming in a memory to perform a cryptographic function upon user data associated with a host command received from a host device. The cryptographic function involves multiple logical computations to arrive at an output value responsive to an input value over a time interval. During the time interval, the programmable processor is repetitively interrupted by a plurality of interrupt calls respectively selected responsive to a first series of random numbers and resumes operation by a corresponding plurality of function return calls respectively selected responsive to a second series of random numbers. Each of the interrupt calls causes the programmable processor to temporarily suspend the multiple logical computations and perform at least one non-cryptographic function.Type: GrantFiled: May 3, 2017Date of Patent: September 8, 2020Assignee: Seagate Technology LLCInventor: Timothy J. Courtney
-
Publication number: 20200134163Abstract: The technology disclosed herein provides a method to control the resources used in a device. An implementation of such a method includes generating a device configuration ledger block based on initial assembly of components of a storage device, storing the device configuration ledger block on a node of a distributed ledger, detecting an activation of the device; in response to detecting the activation of the device, generating a current distributed ledger block based on current assembly of components of the storage device, comparing the current distributed ledger block with the device configuration ledger block, and in response to determining that the current distributed ledger block does not match with the device configuration ledger block disabling the operation of the device.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: Timothy J. Courtney, David R. Kaiser, Anthony R. Duran
-
Patent number: 10536266Abstract: Apparatus and method for managing entropy in a cryptographic processing system. In some embodiments, a first block of conditioned entropy is generated from at least one entropy source. The first block of conditioned entropy is subjected to a first cryptographic process to generate cryptographically secured entropy which is stored in a memory. The cryptographically secured entropy is subsequently retrieved from the memory and subjected to a second cryptographic process to generate a second block of conditioned entropy, which is thereafter used as an input in a third cryptographic process such as to encrypt or decrypt user data in a data storage device. The first cryptographic process may include an encryption algorithm to generate ciphertext and a hash function to generate a keyed digest value, such as an HMAC value, to detect tampering with the ciphertext by an attacker. The second cryptographic process may decrypt or further encrypt the ciphertext.Type: GrantFiled: May 2, 2017Date of Patent: January 14, 2020Assignee: Seagate Technology LLCInventor: Timothy J. Courtney
-
Patent number: 10511433Abstract: Apparatus and method for enacting data security in a cryptographic processing system, such as a data storage device. In some embodiments, a timer circuit is initiated to denote an elapsed time interval of predetermined duration responsive to a function call by an initiator circuit to perform a selected cryptographic function upon input data. The selected cryptographic function is executed to generate output data which are temporarily stored in a memory location during a waiting period prior to a conclusion of the elapsed time interval. Additional functions may be performed during the waiting period. A notification from the timer circuit is received at the conclusion of the elapsed time interval, and the output data are transferred from the memory to the initiator circuit. In this way, a timing attack may be defended against by configuring the selected cryptographic function to have the same overall execution time for different input data sets.Type: GrantFiled: May 3, 2017Date of Patent: December 17, 2019Assignee: Seagate Technology LLCInventor: Timothy J. Courtney
-
Publication number: 20190362105Abstract: Apparatus and method for transferring data between a processing circuit and a memory. In some embodiments, a data storage device has a main non-volatile memory (NVM) configured to store user data from a host device. A controller circuit is configured to direct transfers of the user data between the NVM and the host device. The controller circuit has a programmable processor and a secure data transfer circuit. The secure data transfer circuit executes memory access operations to transfer user data and control values between the processor and a local memory. A memory access operation includes receiving bits of a multi-bit control value on a multi-line bus from the processor, and activating a programmable switching circuit to randomly interconnect different ones of the multi-line bus to transpose the bits in the control value.Type: ApplicationFiled: May 22, 2018Publication date: November 28, 2019Inventor: Timothy J. Courtney
-
Publication number: 20180323960Abstract: Apparatus and method for enacting data security in a cryptographic processing system, such as a data storage device. In some embodiments, a timer circuit is initiated to denote an elapsed time interval of predetermined duration responsive to a function call by an initiator circuit to perform a selected cryptographic function upon input data. The selected cryptographic function is executed to generate output data which are temporarily stored in a memory location during a waiting period prior to a conclusion of the elapsed time interval. Additional functions may be performed during the waiting period. A notification from the timer circuit is received at the conclusion of the elapsed time interval, and the output data are transferred from the memory to the initiator circuit. In this way, a timing attack may be defended against by configuring the selected cryptographic function to have the same overall execution time for different input data sets.Type: ApplicationFiled: May 3, 2017Publication date: November 8, 2018Inventor: Timothy J. Courtney
-
Publication number: 20180323967Abstract: Apparatus and method for managing entropy in a cryptographic processing system. In some embodiments, a first block of conditioned entropy is generated from at least one entropy source. The first block of conditioned entropy is subjected to a first cryptographic process to generate cryptographically secured entropy which is stored in a memory. The cryptographically secured entropy is subsequently retrieved from the memory and subjected to a second cryptographic process to generate a second block of conditioned entropy, which is thereafter used as an input in a third cryptographic process such as to encrypt or decrypt user data in a data storage device. The first cryptographic process may include an encryption algorithm to generate ciphertext and a hash function to generate a keyed digest value, such as an HMAC value, to detect tampering with the ciphertext by an attacker. The second cryptographic process may decrypt or further encrypt the ciphertext.Type: ApplicationFiled: May 2, 2017Publication date: November 8, 2018Inventor: Timothy J. Courtney
-
Publication number: 20180323958Abstract: Apparatus and method for enacting data security in a data storage device, such as by protecting against a differential power analysis (DPA) attack. In some embodiments, a programmable processor executes programming in a memory to perform a cryptographic function upon user data associated with a host command received from a host device. The cryptographic function involves multiple logical computations to arrive at an output value responsive to an input value over a time interval. During the time interval, the programmable processor is repetitively interrupted by a plurality of interrupt calls respectively selected responsive to a first series of random numbers and resumes operation by a corresponding plurality of function return calls respectively selected responsive to a second series of random numbers. Each of the interrupt calls causes the programmable processor to temporarily suspend the multiple logical computations and perform at least one non-cryptographic function.Type: ApplicationFiled: May 3, 2017Publication date: November 8, 2018Inventor: Timothy J. Courtney
-
Publication number: 20180287796Abstract: A network resource and a user device include secure connection applications that share one or more keys and a key selection criterion. A communication is received from the user utilizing a key selected from the one or more keys. The network resource selects a key based on the key selection criterion. If the keys match, then the user device is authorized and the user is allowed to access data of the network resource. The keys may further be selected and used to encrypt and decrypt data. Different key selections provide security to communications.Type: ApplicationFiled: March 30, 2017Publication date: October 4, 2018Inventors: Michael E. Peper, Ajaz M. Siraj, Timothy J. Courtney
-
Patent number: 9779773Abstract: A data storage device may be destroyed by suspending a transducing head above a data storage medium prior to inducing contact of the transducing head with a first layer of the data storage medium in response to a signal from a controller. Deflection of the transducing head can then be increased to penetrate to a destroy depth in a second layer of the data storage medium that is maintained while the data storage medium spins. The controller may then issue at least one data read command to access data from the data storage medium and when a data read error is received, the data storage medium and transducing head can be verified as destroyed and incapable of accessing data previously written to the data storage medium.Type: GrantFiled: January 27, 2017Date of Patent: October 3, 2017Assignee: Seagate Technology LLCInventor: Timothy J. Courtney