Patents by Inventor Timothy Joseph Markey

Timothy Joseph Markey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9753869
    Abstract: Various embodiments of the present disclosure are directed to a storage device having a non-volatile memory, a Proof of Physical Access (PPA) mechanism and a controller circuit. The PPA mechanism generates a PPA value responsive to a direct physical user interaction with the storage device by a user. In response to receipt of a storage command from a host, the controller circuit executes the received storage command responsive to the storage command being determined to be a protected command and responsive to detection of the PPA value during a predetermined window of time. The controller circuit does not execute the received storage command responsive to the storage command being determined to be a protected command and responsive to an absence of the PPA value during the predetermined window of time. The protected command is a command that changes access to data stored in the non-volatile memory.
    Type: Grant
    Filed: July 20, 2015
    Date of Patent: September 5, 2017
    Assignee: Seagate Technology LLC
    Inventors: Leonid Baryudin, Timothy Joseph Markey, Dmitry Obukhov
  • Publication number: 20150324304
    Abstract: Various embodiments of the present disclosure are directed to a storage device having a non-volatile memory, a Proof of Physical Access (PPA) mechanism and a controller circuit. The PPA mechanism generates a PPA value responsive to a direct physical user interaction with the storage device by a user. In response to receipt of a storage command from a host, the controller circuit executes the received storage command responsive to the storage command being determined to be a protected command and responsive to detection of the PPA value during a predetermined window of time. The controller circuit does not execute the received storage command responsive to the storage command being determined to be a protected command and responsive to an absence of the PPA value during the predetermined window of time. The protected command is a command that changes access to data stored in the non-volatile memory.
    Type: Application
    Filed: July 20, 2015
    Publication date: November 12, 2015
    Inventors: Leonid Baryudin, Timothy Joseph Markey, Dmitry Obukhov
  • Patent number: 9087210
    Abstract: A hijack-protected, secure storage device requires proof that the user has actual physical access to the device before protected commands are executed. Examples of protected commands include attempts to change storage device security credentials of the device, erasure of protected portions of the device, and attempts to format, sanitize, and trim the device. Various techniques for proving the actual physical possession include manipulating a magnet to control a magnetic reed switch located within the device, operating a momentary switch located within the device, altering light reaching a light sensor located within the device (such as by opening or shutting a laptop cover to change ambient light reaching the sensor), and manipulating a radio-transmitting device (such as a cell phone) near the storage device for detection of the manipulation by a compatible radio receiver located within the device.
    Type: Grant
    Filed: July 26, 2012
    Date of Patent: July 21, 2015
    Assignee: Seagate Technology LLC
    Inventors: Leonid Baryudin, Timothy Joseph Markey, Dmitry Obukhov
  • Publication number: 20140130188
    Abstract: A hijack-protected, secure storage device requires proof that the user has actual physical access to the device before protected commands are executed. Examples of protected commands include attempts to change storage device security credentials of the device, erasure of protected portions of the device, and attempts to format, sanitize, and trim the device. Various techniques for proving the actual physical possession include manipulating a magnet to control a magnetic reed switch located within the device, operating a momentary switch located within the device, altering light reaching a light sensor located within the device (such as by opening or shutting a laptop cover to change ambient light reaching the sensor), and manipulating a radio-transmitting device (such as a cell phone) near the storage device for detection of the manipulation by a compatible radio receiver located within the device.
    Type: Application
    Filed: July 26, 2012
    Publication date: May 8, 2014
    Applicant: LSI CORPORATION
    Inventors: Leonid Baryudin, Timothy Joseph Markey, Dmitry Obukhov
  • Patent number: 7949874
    Abstract: A method for providing a secure firmware operating environment includes detecting the presence of a new component, for example, a peripheral device. Next, a determination is made as to whether the peripheral device includes an option read-only memory. Next, a determination is made as to whether the option read-only memory is authorized to be executed on the corresponding device. If the option read-only memory is authorized, the code contained within the option read-only memory is executed. By only allowing execution of peripheral devices or components including authorized option read-only memories, security related breaches are substantially reduced or eliminated; thereby, enhancing device integrity.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: May 24, 2011
    Assignee: Phoenix Technologies Ltd.
    Inventors: Timothy Andrew Lewis, Timothy Joseph Markey
  • Patent number: 7917762
    Abstract: A device and method for providing a secure execution environment includes retrieving a boot loader, for example, from the memory of an electronic device or from a peripheral component. Next, a determination is made as to whether the boot loader is authorized to be executed on the corresponding electronic device. If the boot loader is authorized, then the boot loader code is executed. By only allowing execution of authorized boot loaders, security related breaches are substantially reduced or eliminated; thereby, enhancing device integrity.
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: March 29, 2011
    Assignee: Phoenix Technologies Ltd.
    Inventors: Timothy Andrew Lewis, Timothy Joseph Markey
  • Publication number: 20080082833
    Abstract: A method for providing a secure firmware operating environment includes detecting the presence of a new component, for example, a peripheral device. Next, a determination is made as to whether the peripheral device includes an option read-only memory. Next, a determination is made as to whether the option read-only memory is authorized to be executed on the corresponding device. If the option read-only memory is authorized, the code contained within the option read-only memory is executed. By only allowing execution of peripheral devices or components including authorized option read-only memories, security related breaches are substantially reduced or eliminated; thereby, enhancing device integrity.
    Type: Application
    Filed: September 28, 2006
    Publication date: April 3, 2008
    Inventors: Timothy Andrew Lewis, Timothy Joseph Markey