Patents by Inventor Zheng Qi

Zheng Qi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160135465
    Abstract: Building material products, particularly wallboard, are disclosed that are mold resistant. A mold inhibitory composition is contained in one component of the building material product. The mold inhibitory composition comprises a pyrithione in combination with at least one potentiator. The potentiator can comprise a metal chelate, a membrane permeabilizer, or another microorganism weakening agent.
    Type: Application
    Filed: June 19, 2014
    Publication date: May 19, 2016
    Applicant: Arch Chemicals, Inc.
    Inventors: George Polson, Craog Waldron, Jody Jourden, Zheng Qi, Xiao Jiang, Brittany Lizon, Leon Estell, Patrick Flaherty
  • Publication number: 20150256518
    Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. A method of secure key handling and cryptographic processing of data, comprising receiving a request from an entity to cryptographically process a block of data, the request including a key handle, wherein the key handle includes an authentication tag and an index; authenticating the requesting entity using the authentication tag; and referencing a plaintext key from a plurality of plaintext keys using the index if the requesting entity is authenticated successfully.
    Type: Application
    Filed: January 5, 2015
    Publication date: September 10, 2015
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Zheng Qi
  • Patent number: 8953790
    Abstract: Methods and systems for secure key generation are provided. In embodiments, during the manufacturing process, a device generates a primary seed for the device and stores the seed within the device. The device exports the device primary key to a secure manufacturer server. The secure manufacturer server generates a public/private root key for the device and requests a certificate for the public root key of the device from a certificate authority. The device, having the stored primary seed, is integrated into an end-user system. Upon occurrence of a condition, the device after integration into the end-user system generates the public/private root key in the field. The system also receives and installs the certificate for the public root key.
    Type: Grant
    Filed: June 14, 2012
    Date of Patent: February 10, 2015
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Mark Buer
  • Patent number: 8929544
    Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.
    Type: Grant
    Filed: March 29, 2013
    Date of Patent: January 6, 2015
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Zheng Qi
  • Patent number: 8781111
    Abstract: A side channel attack utilizes information gained from the physical implementation of a cryptosystem. Software and hardware-based systems and methods for preventing side channel attacks are presented. Cryptographic hardware may introduce dummy operations to compensate for conditional math operations in certain functions such as modular exponentiation. Cryptographic hardware may also introduce random stalls of the data path to introduce alterations in the power profile for the operation. A cryptographic function may be mapped to a micro code sequence having a plurality of instructions. Firmware in the cryptosystem may alter the micro code sequence by altering the order of instructions, add dummy operations in the micro code sequence, break the micro code sequence into multiple sub micro code sequences and/or change the register location for source and destination operands used in the sequence. These alterations are designed to randomly change the timing and power profile of the requested function.
    Type: Grant
    Filed: March 31, 2008
    Date of Patent: July 15, 2014
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Tao Long
  • Patent number: 8717932
    Abstract: Aspects of a method and system for determining and securing proximity information over a network are provided. In this regard, data transmitted over a network may be time-stamped upon entering and/or exiting a network node. By taking the total time to travel between two network nodes and subtracting out any latency internal to one or more intermediate nodes, the time to traverse the physical links (the propagation time) between the two network nodes may be determined. Accordingly, if the speed at which data propagates over each link of the network is known, then a distance from the source node to the destination node may be determined. Additionally, aspects of the invention may enable one or more of authentication, validation, and encryption of timing and/or proximity information transmitted over a network.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: May 6, 2014
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Yongbum Kim
  • Patent number: 8700891
    Abstract: According to one general aspect, a method of using a network device may include receiving, via an ingress port, a data packet that includes a payload portion, a source network address and a destination network address. In various embodiments, the method may also include determining if the data packet includes a security tag that includes a role based authentication tag. In some embodiments, the method may include, if the data packet includes a security tag that includes a role based authentication tag, transmitting, via an egress port, at least the payload portion and the role based authentication tag towards, in a topological sense, the destination network address.
    Type: Grant
    Filed: May 8, 2009
    Date of Patent: April 15, 2014
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Meg Lin, Mark Buer, Nicholas Ilyadis
  • Publication number: 20130230165
    Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.
    Type: Application
    Filed: March 29, 2013
    Publication date: September 5, 2013
    Applicant: Broadcom Corporation
    Inventors: Mark BUER, Zheng QI
  • Publication number: 20130129087
    Abstract: Methods and systems for secure key generation are provided. In embodiments, during the manufacturing process, a device generates a primary seed for the device and stores the seed within the device. The device exports the device primary key to a secure manufacturer server. The secure manufacturer server generates a public/private root key for the device and requests a certificate for the public root key of the device from a certificate authority. The device, having the stored primary seed, is integrated into an end-user system. Upon occurrence of a condition, the device after integration into the end-user system generates the public/private root key in the field. The system also receives and installs the certificate for the public root key.
    Type: Application
    Filed: June 14, 2012
    Publication date: May 23, 2013
    Inventors: Zheng Qi, Mark Buer
  • Patent number: 8411867
    Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.
    Type: Grant
    Filed: April 6, 2009
    Date of Patent: April 2, 2013
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Zheng Qi
  • Patent number: 8315381
    Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.
    Type: Grant
    Filed: July 1, 2008
    Date of Patent: November 20, 2012
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
  • Patent number: 8112622
    Abstract: A networking method, microchip, and device are described in which a first security engine may be associated with a chaining port and configured to perform an inner processing for an inner layer of encryption for a frame of data, while a second security engine may be associated with an external port and configured to perform an outer processing for an outer layer of encryption for the frame of data. Control logic may be configured to instruct the first security engine to execute both a transmit operation and a receive operation of the frame of data in association with the inner processing.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: February 7, 2012
    Assignee: Broadcom Corporation
    Inventor: Zheng Qi
  • Patent number: 8010801
    Abstract: An architecture and associated methods and devices are described in which a first selectable data path may be associated with a first port operating at a first data rate, a second selectable data path may be associated with a second port operating at a second data rate, and a third selectable data path may be associated with a third port operating at a third data rate that is higher than the first data rate and the second data rate. A plurality of security engines may be included which may be configurable to provide cipher key-based security for data associated with the first port and the second port using the first selectable path and the second selectable path, respectively, and configurable to provide cipher key-based security of data associated with the third port using the third selectable data path.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: August 30, 2011
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Meg Lin
  • Patent number: 8000469
    Abstract: Provided is an architecture (hardware implementation) for an authentication engine to increase the speed at which multi-loop and/or multi-round authentication algorithms may be performed on data packets transmitted over a computer network. Authentication engines in accordance with the present invention apply a variety of techniques that may include, in various applications, collapsing two multi-round authentication algorithm (e.g., SHA1 or MD5 or variants) processing rounds into one; reducing operational overhead by scheduling the additions required by a multi-round authentication algorithm in such a matter as to reduce the overall critical timing path (“hiding the ads”); and, for a multi-loop (e.g., HMAC) variant of a multi-round authentication algorithm, pipelining the inner and outer loops.
    Type: Grant
    Filed: January 8, 2007
    Date of Patent: August 16, 2011
    Assignee: Broadcom Corporation
    Inventors: Mark Buer, Patrick Y. Law, Zheng Qi
  • Patent number: 7886143
    Abstract: An architecture and associated methods and devices are described that include a plurality of stages of cipher round logic, each stage configured to perform cryptographic processing of plaintext data in a counter mode and output ciphertext data, a plurality of multipliers, each multiplier configured to receive the ciphertext data output from at least one associated stage of the plurality of stages of cipher round logic and continue the cryptographic processing to output at least a portion of an integrity check value (ICV), and control logic configured to provide a selection between a first option of performing the cryptographic processing at a first data rate using a first number of the plurality of stages and a first number of the plurality of multipliers, and a second option of performing the cryptographic processing at a second data rate using a second number of the plurality of stages and a second number of the plurality of multipliers.
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: February 8, 2011
    Assignee: Broadcom Corporation
    Inventors: Zheng Qi, Meg Lin
  • Patent number: 7853691
    Abstract: Aspects of a method and system for securing a network utilizing IPsec and MACsec protocols are provided. In one or more network nodes, aspects of the invention may enable conversion between Ethernet packets comprising payloads secured utilizing IPsec protocols and Ethernet packets secured utilizing MACsec protocols. For example, IPsec connections may be terminated at an ingress network node and IPsec connections may be regenerated at an egress network node. Packets secured utilizing MACsec protocols may be detected based on an Ethertype. Packets comprising payloads secured utilizing IPsec protocols may be detected based on a protocol field or a next header field. The conversion may be based on a data structure stored by and/or accessible to the network nodes. Aspects of the invention may enable securing data utilizing MACsec protocols when tunneling IPsec secured data through non-IPsec enabled nodes.
    Type: Grant
    Filed: November 2, 2007
    Date of Patent: December 14, 2010
    Assignee: Broadcom Corporation
    Inventors: Uri Elzur, Bora Akyol, Zheng Qi, Mark Buer, Ford Tamer, Yongbum Kim
  • Patent number: 7822797
    Abstract: Methods and systems are disclosed for generating random numbers and initial vectors. A random number generator generates one or more random numbers that are used to repetitively seed pseudo random number generators so that the pseudo random number generators generate random numbers. Thus, a single random number generator may be used to simultaneously generate several random numbers. The random numbers generated by the pseudo random number generators may be used as initial vectors in encryption engines.
    Type: Grant
    Filed: July 29, 2002
    Date of Patent: October 26, 2010
    Assignee: Broadcom Corporation
    Inventors: Mark L. Buer, Zheng Qi
  • Publication number: 20100254537
    Abstract: A method and system for secure and scalable key management for cryptographic processing of data is described herein. In the method, a General Purpose Cryptographic Engine (GPE) receives key material via a secure channel from a key server and stores the received Key encryption keys (KEKs) and/or plain text keys in a secure key cache. When a request is received from a host to cryptographically process a block of data, the requesting entity is authenticated using an authentication tag included in the request. The GPE retrieves a plaintext key or generate a plaintext using a KEK if the authentication is successful, cryptographically processes the data using the plaintext key and transmits the processed data. The system includes a key server that securely provides encrypted keys and/or key handles to a host and key encryption keys and/or plaintext keys to the GPE.
    Type: Application
    Filed: April 6, 2009
    Publication date: October 7, 2010
    Applicant: Broadcom Corporation
    Inventors: Mark BUER, Zheng QI
  • Patent number: 7708572
    Abstract: A burn-in socket includes a base, a number of contacts received in the base, and a protecting device. The base has a first projection and a second projection. The protecting device is assembled to the base and moves from a first position to a second position relative to the base. The protecting device includes a planar bottom plate and a pair of spring arms extending upwardly from opposite sides of the bottom plate. Each spring arm has a first stopper for engaging with the first projection at the first position, and a second stopper for engaging with the second projection at the second position.
    Type: Grant
    Filed: April 21, 2009
    Date of Patent: May 4, 2010
    Assignee: Hon Hai Precision Ind. Co. Ltd.
    Inventors: Zheng-Qi Yang, Quan Wang, Jia-Jia Cai, Fu-Jin Peng
  • Publication number: 20090319804
    Abstract: Systems and methods for providing asymmetrical cryptographic acceleration are provided. The scalable asymmetric cryptographic accelerator engine uses a layered approach based on the collaboration of firmware and hardware to perform a specific cryptographic operation. Upon receipt of a request for a cryptographic function, the system accesses a sequence of operations required to perform the requested function. A micro code sequence is prepared for each hardware operation and sent to the hardware module. The micro code sequence includes a set of load instructions, a set of data processing instructions, and a set of unload instructions. An instruction may include a register operand having a register type and a register index. Upon receipt of a load instruction, the hardware module updates size information in a content addressable memory for a register included in the instruction. The hardware module continuously monitors the content addressable memory to avoid buffer overflow or underflow conditions.
    Type: Application
    Filed: May 15, 2008
    Publication date: December 24, 2009
    Applicant: Broadcom Corporation
    Inventors: Zheng QI, Tao Long