Patents by Inventor Timothy John Rademacher

Timothy John Rademacher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240143725
    Abstract: A method of determining trust in a supply item in an imaging device for verifying other supply items installed in the imaging device via an algorithm, wherein the imaging device has a plurality of installed supply items. The method comprises: sending challenge data and an indication of the algorithm to a candidate supply item, receiving a challenge response from the candidate supply item, and determining, by the controller, a status of the challenge response, the status being verified or unverified. When the controller determines that the received challenge response is a correct output of the algorithm when the challenge data is input to the algorithm, the status is determined as verified. Further, an imaging device configured to determine trust in a supply item installed in the imaging device for verifying other supply items installed in the imaging device via an algorithm.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240143726
    Abstract: An imaging device comprising a controller, a prover supply item and a verifier supply item, where the imaging device is configured to authenticate the prover supply item by: sending a challenge response from the prover supply item to the verifier supply item, and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. A supply item configured to be operable as a prover supply item when installed in an imaging device. The prover supply item is configured to receive an indication of an algorithm to be performed and receive challenge data, perform the algorithm using the challenge data as input to determine a challenge response, and send the challenge response to a verifier supply item.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20240143844
    Abstract: A method of authenticating a supply item in an imaging device, wherein the supply item is designated as a prover supply item, and a second supply item installed in the imaging device is designated as a verifier supply item. The method comprises: receiving a challenge response from the prover supply item and determining a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm when challenge data is input to the algorithm, the status is determined as verified. The verifier supply item is disclosed, configured to receive a challenge response from a prover supply item installed in the imaging device, and determine a status of the challenge response. When the verifier supply item determines that the received challenge response is a correct output of an algorithm, the status is determined as verified.
    Type: Application
    Filed: January 27, 2023
    Publication date: May 2, 2024
    Inventors: Samuel Davidson, James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20230409695
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 11, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409697
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 18, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409690
    Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: June 22, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230409696
    Abstract: Systems and methods for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: July 13, 2022
    Publication date: December 21, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20230367863
    Abstract: A method of determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The method further includes generating, by the component, a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 23, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367864
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 27, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367865
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: June 29, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230367866
    Abstract: Determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The component then generates a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: July 18, 2022
    Publication date: November 16, 2023
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20230252167
    Abstract: A method for determining authenticity of a component in an imaging device is disclosed. Embodiments of the present disclosure provide for a method for a device to use an electronic authentication scheme to authenticate a second device while overcoming vulnerabilities associated with sending data over a communication bus when performing authentication, by using information other than that transmitted over the shared bus as authentication parameters. Embodiments utilize the current drawn by a chip from a power source when the chip performs an operation in response to a command as an authentication parameter.
    Type: Application
    Filed: April 18, 2023
    Publication date: August 10, 2023
    Inventors: James Howard Ellis, Zachary Nathan Fister, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20230153104
    Abstract: A method for updating an imaging device is described comprising, receiving update information comprising a compatibility update filter indicating which generations of supply item are compatible with the imaging device, and updating a compatibility filter of the imaging device based on the update information, the compatibility filter configured to control which generations of supply item are classified as compatible with the imaging device. An imaging device is also described that comprises firmware and a memory, the memory storing a compatibility filter configured to control which generations of supply item are classified as compatible, wherein the firmware is configured to read the compatibility filter, and the imaging device is configured to update the compatibility filter. Finally, an imaging device supply item is also described.
    Type: Application
    Filed: June 1, 2022
    Publication date: May 18, 2023
    Inventors: Stephen Porter Bush, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20230120750
    Abstract: A method for updating an imaging device is described. The method comprises: receiving update information from a memory of a supply item, the update information comprising an update value, and updating a firmware variable of the imaging device based on the update information. An imaging device is also described that comprises firmware and memory, the memory storing a firmware variable, wherein the firmware is configured to read the firmware variable, and the imaging device is configured to update the firmware variable, by: receiving update information from a memory of a supply item, the update information comprising an update value, and updating the firmware variable of the imaging device based on the update information. An imaging device supply item is also described. The supply item comprises a memory, the memory storing update information, the update information comprising an update value, and the supply item being configured to send the update information.
    Type: Application
    Filed: April 23, 2022
    Publication date: April 20, 2023
    Inventors: Stephen Porter Bush, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20230112524
    Abstract: Method of determining authenticity of an item using an elliptic curve E defined over a finite field Fq, where q is an integer, the method comprising: generating a random integer j, where the random integer j is in the interval of one to the integer q; calculating a point T=j S, where point S is a point on elliptic curve E(Fq); calculating a binary value k which is equal to the binary random integer j with a bitmask m applied thereto; sending point T and binary value k to the item; and the item iteratively calculating point U=n·S for different values of integer n, where for each iterative calculation integer n takes different values, wherein for each iteration: the bits of binary integer n corresponding to the unmasked bits of bitmask m are the same as the corresponding bits of binary random integer j; and the bits of binary integer n corresponding to the masked bits of bitmask m are varied in each iteration.
    Type: Application
    Filed: October 11, 2021
    Publication date: April 13, 2023
    Inventor: Timothy John Rademacher
  • Publication number: 20230025884
    Abstract: A method for determining the authenticity of a component in an electronic device, the method comprising: receiving a seed by a component in the electronic device; storing the seed in a block of non-volatile memory in the component; calculating, by the component, the output of a cryptographic function with the input based on the seed and storing the output in the block of non-volatile memory; iteratively calculating, by the component, the outputs of the cryptographic function wherein for each iteration the input for the cryptographic function is based on the seed and all previous outputs, and for each iteration storing the output in the block of non-volatile memory; and determining the authenticity of the component based on a selected output of the cryptographic function F, the selected output being one of the outputs stored in the block of non-volatile memory.
    Type: Application
    Filed: July 28, 2022
    Publication date: January 26, 2023
    Inventors: Zachary Nathan Fister, Nathan Wayne FOLEY, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20230015106
    Abstract: A method for determining the authenticity of an item, the method comprising: receiving, by an item, a seed; storing the seed in a block of non-volatile memory in the supply item follower component; calculating, by the item follower component, an output of a cryptographic function with the input based on the seed and storing the output in the block of non-volatile memory; iteratively calculating, by the item, the outputs of the cryptographic function wherein for each iteration the input for the cryptographic function is based on the seed and all previous outputs, and for each iteration storing the output in the block of non-volatile memory; and determining the authenticity of the item based on a selected output of the cryptographic function of the item, the selected output being one of the outputs stored in the block of non-volatile memory.
    Type: Application
    Filed: July 9, 2021
    Publication date: January 19, 2023
    Inventors: Zachary Nathan Fister, Nathan Wayne FOLEY, Timothy John Rademacher, Jennifer Topmiller Williams
  • Publication number: 20220414203
    Abstract: A method for determining authenticity of a security device of a component in an imaging device includes receiving, by the security device, an authentication challenge including one or more commands and executing, by the security device, the one or more commands in response to receiving the authentication challenge. A magnetic field profile is generated based on current drawn by the security device from a power source while the security device is executing the one or more commands, the generated magnetic field profile indicating an authentication response of the security device to the authentication challenge for use in determining authenticity of the security device.
    Type: Application
    Filed: June 15, 2022
    Publication date: December 29, 2022
    Inventors: JAMES HOWARD ELLIS, JR., TIMOTHY JOHN RADEMACHER
  • Publication number: 20220382850
    Abstract: A method of determining authenticity of a component in an imaging device includes generating an analog signal as an authentication challenge to the component. The method further includes generating, by the component, a response to the authentication challenge by converting the analog signal into one or more digital values and capturing a derivative of the one or more digital values as the response. Authenticity of the component is determined by comparing the response with an expected response.
    Type: Application
    Filed: May 10, 2022
    Publication date: December 1, 2022
    Inventors: JAMES HOWARD ELLIS, Jr., TIMOTHY JOHN RADEMACHER, JENNIFER TOPMILLER WILLIAMS
  • Publication number: 20220337724
    Abstract: A supply item has toner for use in an imaging device. A chip has memory storing quanta indicating allowed usage of the supply item over its lifetime and a multiplier correlating the quanta to toner mass. The imaging device requires quanta to conduct imaging operations and loads the quanta and multiplier by way of a certificate stored in the memory. The imaging device retrieves quanta from the chip over time and both devices keep tally. Initialization between the supply item and imaging device includes providing encrypted and unencrypted instances of firmware versions and certificates from the supply item that the imaging device can compare for security. Alternatively, the supply item defines a fuser assembly, imaging unit, intermediate transfer member, or other component installed for use in the imaging device.
    Type: Application
    Filed: July 5, 2022
    Publication date: October 20, 2022
    Inventors: STEPHEN PORTER BUSH, TIMOTHY JOHN RADEMACHER, CHRISTOHPER ALAN ADKINS