Patents by Inventor Zheng Qi
Zheng Qi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160135465Abstract: Building material products, particularly wallboard, are disclosed that are mold resistant. A mold inhibitory composition is contained in one component of the building material product. The mold inhibitory composition comprises a pyrithione in combination with at least one potentiator. The potentiator can comprise a metal chelate, a membrane permeabilizer, or another microorganism weakening agent.Type: ApplicationFiled: June 19, 2014Publication date: May 19, 2016Applicant: Arch Chemicals, Inc.Inventors: George Polson, Craog Waldron, Jody Jourden, Zheng Qi, Xiao Jiang, Brittany Lizon, Leon Estell, Patrick Flaherty
-
Publication number: 20150256518Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and cryptographic processing of data, comprising receiving a request from an entity to cryptographically process a block of data, the request including a key handle, wherein the key handle includes an authentication tag and an index; authenticating the requesting entity using the authentication tag; and referencing a plaintext key from a plurality of plaintext keys using the index if the requesting entity is authenticated successfully.Type: ApplicationFiled: January 5, 2015Publication date: September 10, 2015Applicant: Broadcom CorporationInventors: Mark Buer, Zheng Qi
-
Patent number: 8953790Abstract: Methods and systems for secure key generation are provided. In embodiments, during the manufacturing process, a device generates a primary seed for the device and stores the seed within the device. The device exports the device primary key to a secure manufacturer server. The secure manufacturer server generates a public/private root key for the device and requests a certificate for the public root key of the device from a certificate authority. The device, having the stored primary seed, is integrated into an end-user system. Upon occurrence of a condition, the device after integration into the end-user system generates the public/private root key in the field. The system also receives and installs the certificate for the public root key.Type: GrantFiled: June 14, 2012Date of Patent: February 10, 2015Assignee: Broadcom CorporationInventors: Zheng Qi, Mark Buer
-
Patent number: 8929544Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.Type: GrantFiled: March 29, 2013Date of Patent: January 6, 2015Assignee: Broadcom CorporationInventors: Mark Buer, Zheng Qi
-
Patent number: 8781111Abstract: A side channel attack utilizes information gained from the physical implementation of a cryptosystem. Software and hardware-based systems and methods for preventing side channel attacks are presented. Cryptographic hardware may introduce dummy operations to compensate for conditional math operations in certain functions such as modular exponentiation. Cryptographic hardware may also introduce random stalls of the data path to introduce alterations in the power profile for the operation. A cryptographic function may be mapped to a micro code sequence having a plurality of instructions. Firmware in the cryptosystem may alter the micro code sequence by altering the order of instructions, add dummy operations in the micro code sequence, break the micro code sequence into multiple sub micro code sequences and/or change the register location for source and destination operands used in the sequence. These alterations are designed to randomly change the timing and power profile of the requested function.Type: GrantFiled: March 31, 2008Date of Patent: July 15, 2014Assignee: Broadcom CorporationInventors: Zheng Qi, Tao Long
-
Patent number: 8717932Abstract: Aspects of a method and system for determining and securing proximity information over a network are provided. In this regard, data transmitted over a network may be time-stamped upon entering and/or exiting a network node. By taking the total time to travel between two network nodes and subtracting out any latency internal to one or more intermediate nodes, the time to traverse the physical links (the propagation time) between the two network nodes may be determined. Accordingly, if the speed at which data propagates over each link of the network is known, then a distance from the source node to the destination node may be determined. Additionally, aspects of the invention may enable one or more of authentication, validation, and encryption of timing and/or proximity information transmitted over a network.Type: GrantFiled: May 31, 2007Date of Patent: May 6, 2014Assignee: Broadcom CorporationInventors: Zheng Qi, Yongbum Kim
-
Patent number: 8700891Abstract: According to one general aspect, a method of using a network device may include receiving, via an ingress port, a data packet that includes a payload portion, a source network address and a destination network address. In various embodiments, the method may also include determining if the data packet includes a security tag that includes a role based authentication tag. In some embodiments, the method may include, if the data packet includes a security tag that includes a role based authentication tag, transmitting, via an egress port, at least the payload portion and the role based authentication tag towards, in a topological sense, the destination network address.Type: GrantFiled: May 8, 2009Date of Patent: April 15, 2014Assignee: Broadcom CorporationInventors: Zheng Qi, Meg Lin, Mark Buer, Nicholas Ilyadis
-
Publication number: 20130230165Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.Type: ApplicationFiled: March 29, 2013Publication date: September 5, 2013Applicant: Broadcom CorporationInventors: Mark BUER, Zheng QI
-
Publication number: 20130129087Abstract: Methods and systems for secure key generation are provided. In embodiments, during the manufacturing process, a device generates a primary seed for the device and stores the seed within the device. The device exports the device primary key to a secure manufacturer server. The secure manufacturer server generates a public/private root key for the device and requests a certificate for the public root key of the device from a certificate authority. The device, having the stored primary seed, is integrated into an end-user system. Upon occurrence of a condition, the device after integration into the end-user system generates the public/private root key in the field. The system also receives and installs the certificate for the public root key.Type: ApplicationFiled: June 14, 2012Publication date: May 23, 2013Inventors: Zheng Qi, Mark Buer
-
Patent number: 8411867Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.Type: GrantFiled: April 6, 2009Date of Patent: April 2, 2013Assignee: Broadcom CorporationInventors: Mark Buer, Zheng Qi
-
Patent number: 8315381Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.Type: GrantFiled: July 1, 2008Date of Patent: November 20, 2012Assignee: Broadcom CorporationInventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
-
Patent number: 8112622Abstract: A networking method, microchip, and device are described in which a first security engine may be associated with a chaining port and configured to perform an inner processing for an inner layer of encryption for a frame of data, while a second security engine may be associated with an external port and configured to perform an outer processing for an outer layer of encryption for the frame of data. Control logic may be configured to instruct the first security engine to execute both a transmit operation and a receive operation of the frame of data in association with the inner processing.Type: GrantFiled: December 8, 2006Date of Patent: February 7, 2012Assignee: Broadcom CorporationInventor: Zheng Qi
-
Patent number: 8010801Abstract: An architecture and associated methods and devices are described in which a first selectable data path may be associated with a first port operating at a first data rate, a second selectable data path may be associated with a second port operating at a second data rate, and a third selectable data path may be associated with a third port operating at a third data rate that is higher than the first data rate and the second data rate. A plurality of security engines may be included which may be configurable to provide cipher key-based security for data associated with the first port and the second port using the first selectable path and the second selectable path, respectively, and configurable to provide cipher key-based security of data associated with the third port using the third selectable data path.Type: GrantFiled: November 30, 2006Date of Patent: August 30, 2011Assignee: Broadcom CorporationInventors: Zheng Qi, Meg Lin
-
Patent number: 8000469Abstract: Provided is an architecture (hardware implementation) for an authentication engine to increase the speed at which multi-loop and/or multi-round authentication algorithms may be performed on data packets transmitted over a computer network. Authentication engines in accordance with the present invention apply a variety of techniques that may include, in various applications, collapsing two multi-round authentication algorithm (e.g., SHA1 or MD5 or variants) processing rounds into one; reducing operational overhead by scheduling the additions required by a multi-round authentication algorithm in such a matter as to reduce the overall critical timing path (“hiding the ads”); and, for a multi-loop (e.g., HMAC) variant of a multi-round authentication algorithm, pipelining the inner and outer loops.Type: GrantFiled: January 8, 2007Date of Patent: August 16, 2011Assignee: Broadcom CorporationInventors: Mark Buer, Patrick Y. Law, Zheng Qi
-
Patent number: 7886143Abstract: An architecture and associated methods and devices are described that include a plurality of stages of cipher round logic, each stage configured to perform cryptographic processing of plaintext data in a counter mode and output ciphertext data, a plurality of multipliers, each multiplier configured to receive the ciphertext data output from at least one associated stage of the plurality of stages of cipher round logic and continue the cryptographic processing to output at least a portion of an integrity check value (ICV), and control logic configured to provide a selection between a first option of performing the cryptographic processing at a first data rate using a first number of the plurality of stages and a first number of the plurality of multipliers, and a second option of performing the cryptographic processing at a second data rate using a second number of the plurality of stages and a second number of the plurality of multipliers.Type: GrantFiled: November 30, 2006Date of Patent: February 8, 2011Assignee: Broadcom CorporationInventors: Zheng Qi, Meg Lin
-
Patent number: 7853691Abstract: Aspects of a method and system for securing a network utilizing IPsec and MACsec protocols are provided. In one or more network nodes, aspects of the invention may enable conversion between Ethernet packets comprising payloads secured utilizing IPsec protocols and Ethernet packets secured utilizing MACsec protocols. For example, IPsec connections may be terminated at an ingress network node and IPsec connections may be regenerated at an egress network node. Packets secured utilizing MACsec protocols may be detected based on an Ethertype. Packets comprising payloads secured utilizing IPsec protocols may be detected based on a protocol field or a next header field. The conversion may be based on a data structure stored by and/or accessible to the network nodes. Aspects of the invention may enable securing data utilizing MACsec protocols when tunneling IPsec secured data through non-IPsec enabled nodes.Type: GrantFiled: November 2, 2007Date of Patent: December 14, 2010Assignee: Broadcom CorporationInventors: Uri Elzur, Bora Akyol, Zheng Qi, Mark Buer, Ford Tamer, Yongbum Kim
-
Patent number: 7822797Abstract: Methods and systems are disclosed for generating random numbers and initial vectors. A random number generator generates one or more random numbers that are used to repetitively seed pseudo random number generators so that the pseudo random number generators generate random numbers. Thus, a single random number generator may be used to simultaneously generate several random numbers. The random numbers generated by the pseudo random number generators may be used as initial vectors in encryption engines.Type: GrantFiled: July 29, 2002Date of Patent: October 26, 2010Assignee: Broadcom CorporationInventors: Mark L. Buer, Zheng Qi
-
Publication number: 20100254537Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.Type: ApplicationFiled: April 6, 2009Publication date: October 7, 2010Applicant: Broadcom CorporationInventors: Mark BUER, Zheng QI
-
Patent number: 7708572Abstract: A burn-in socket includes a base, a number of contacts received in the base, and a protecting device. The base has a first projection and a second projection. The protecting device is assembled to the base and moves from a first position to a second position relative to the base. The protecting device includes a planar bottom plate and a pair of spring arms extending upwardly from opposite sides of the bottom plate. Each spring arm has a first stopper for engaging with the first projection at the first position, and a second stopper for engaging with the second projection at the second position.Type: GrantFiled: April 21, 2009Date of Patent: May 4, 2010Assignee: Hon Hai Precision Ind. Co. Ltd.Inventors: Zheng-Qi Yang, Quan Wang, Jia-Jia Cai, Fu-Jin Peng
-
Publication number: 20090319804Abstract: Systems and methods for providing asymmetrical cryptographic acceleration are provided. The scalable asymmetric cryptographic accelerator engine uses a layered approach based on the collaboration of firmware and hardware to perform a specific cryptographic operation. Upon receipt of a request for a cryptographic function, the system accesses a sequence of operations required to perform the requested function. A micro code sequence is prepared for each hardware operation and sent to the hardware module. The micro code sequence includes a set of load instructions, a set of data processing instructions, and a set of unload instructions. An instruction may include a register operand having a register type and a register index. Upon receipt of a load instruction, the hardware module updates size information in a content addressable memory for a register included in the instruction. The hardware module continuously monitors the content addressable memory to avoid buffer overflow or underflow conditions.Type: ApplicationFiled: May 15, 2008Publication date: December 24, 2009Applicant: Broadcom CorporationInventors: Zheng QI, Tao Long