Patents by Inventor Zheng Qi

Zheng Qi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7007163
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: February 28, 2006
    Assignee: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20040128553
    Abstract: Methods and associated systems for providing secured data transmission over a data network are disclosed. Security association updates may be provided in a load-balanced system. Before encryption, the system may calculate values for header fields that need to be updated as a result of an encryption process. Encrypted packets may be decrypted by a parallel decryption system. After decryption, the system may calculates value for fields in the header information that need to be updated as a result of the decryption process.
    Type: Application
    Filed: July 11, 2003
    Publication date: July 1, 2004
    Inventors: Mark L. Buer, Timothy R. Paaske, Zheng Qi
  • Publication number: 20040019619
    Abstract: Methods and systems are disclosed for generating random numbers and initial vectors. A random number generator generates one or more random numbers that are used to repetitively seed pseudo random number generators so that the pseudo random number generators generate random numbers. Thus, a single random number generator may be used to simultaneously generate several random numbers. The random numbers generated by the pseudo random number generators may be used as initial vectors in encryption engines.
    Type: Application
    Filed: July 29, 2002
    Publication date: January 29, 2004
    Inventors: Mark L. Buer, Zheng Qi
  • Publication number: 20030233539
    Abstract: Methods and apparatus are provided for an entity such as a CPU to efficiently call a cryptography accelerator to perform cryptographic operations. A function call causes the cryptography accelerator to execute multiple cryptographic operations in a manner tailored for specific processing steps, such as steps during a handshake phase of a secured session. The techniques provide efficient use of hardware processing resources, data interfaces, and memory interfaces.
    Type: Application
    Filed: May 31, 2002
    Publication date: December 18, 2003
    Applicant: Broadcom Corporation
    Inventors: Joseph Tardo, Mark Buer, Jianjun Luo, Don Matthews, Zheng Qi, Ronald Squires
  • Publication number: 20030185391
    Abstract: Methods and apparatus are provided for implementing a cryptography accelerator for performing operations such as hash operations. The cryptography accelerator recognizes characteristics associated with input data and retrieves an instruction set for processing the input data. The instruction set is used to configure or control components such as MD5 and SHA-1 hash cores, XOR components, memory, etc. By providing a cryptography accelerator with access to multiple instruction sets, a variety of hash operations can be performed in a configurable cryptographic accelerator.
    Type: Application
    Filed: December 24, 2002
    Publication date: October 2, 2003
    Applicant: Broadcom Corporation
    Inventors: Zheng Qi, Ronald Squires, Mark Buer, David K. Chin
  • Publication number: 20020184498
    Abstract: Provided is an architecture (hardware implementation) for an authentication engine to increase the speed at which SHA1 multi-loop and/or multi-round authentication algorithms may be performed on data packets transmitted over a computer network. As described in this application, the invention has particular application to the variant of the SHA1 authentication algorithms specified by the IPSec cryptography standard. In accordance with the IPSec standard, the invention may be used in conjunction with data encryption/encryption architecture and protocols. However it is also suitable for use in conjunction with other non-IPSec cryptography algorithms, and for applications in which encryption/decryption is not conducted (in IPSec or not) and where it is purely authentication that is accelerated. Among other advantages, an authentication engine in accordance with the present invention provides improved performance with regard to the processing of short data packets.
    Type: Application
    Filed: January 8, 2002
    Publication date: December 5, 2002
    Applicant: Broadcom Corporation
    Inventor: Zheng Qi
  • Publication number: 20020106080
    Abstract: Methods and apparatus are provided for implementing a cryptography engine for cryptography processing. A variety of techniques are described. A cryptography engine such as a DES engine can be decoupled from surrounding logic by using asynchronous buffers. Bit-sliced design can be implemented by moving expansion and permutation logic out of the timing critical data path. An XOR function can be decomposed into functions that can be implemented more efficiently. A two-level multiplexer can be used to preserve a clock cycle during cryptography processing. Key scheduling can be pipelined to allow efficient round key generation.
    Type: Application
    Filed: June 26, 2001
    Publication date: August 8, 2002
    Applicant: Broadcom Corporation
    Inventors: Zheng Qi, Mark Buer
  • Publication number: 20020108048
    Abstract: Methods and apparatus are provided for implementing a cryptography engine for cryptography processing. A variety of techniques are described. A cryptography engine such as a DES engine can be decoupled from surrounding logic by using asynchronous buffers. Bit-sliced design can be implemented by moving expansion and permutation logic out of the timing critical data path. An XOR function can be decomposed into functions that can be implemented more efficiently. A two-level multiplexer can be used to preserve a clock cycle during cryptography processing. Key scheduling can be pipelined to allow efficient round key generation.
    Type: Application
    Filed: June 26, 2001
    Publication date: August 8, 2002
    Applicant: Broadcom Corporation
    Inventors: Zheng Qi, Mark Buer
  • Publication number: 20020106078
    Abstract: Methods and apparatus are provided for implementing a cryptography engine for cryptography processing. A variety of techniques are described. A cryptography engine such as a DES engine can be decoupled from surrounding logic by using asynchronous buffers. Bit-sliced design can be implemented by moving expansion and permutation logic out of the timing critical data path. An XOR function can be decomposed into functions that can be implemented more efficiently. A two-level multiplexer can be used to preserve a clock cycle during cryptography processing. Key scheduling can be pipelined to allow efficient round key generation.
    Type: Application
    Filed: June 26, 2001
    Publication date: August 8, 2002
    Applicant: Broadcom Corporation
    Inventors: Zheng Qi, Mark Buer
  • Publication number: 20020001384
    Abstract: Provided is an architecture (hardware implementation) for an authentication engine to increase the speed at which multi-loop and/or multi-round authentication algorithms may be performed on data packets transmitted over a computer network. Authentication engines in accordance with the present invention apply a variety of techniques that may include, in various applications, collapsing two multi-round authentication algorithm (e.g., SHA1 or MD5 or variants) processing rounds into one; reducing operational overhead by scheduling the additions required by a multi-round authentication algorithm in such a matter as to reduce the overall critical timing path (“hiding the ads”); and, for a multi-loop (e.g., HMAC) variant of a multi-round authentication algorithm, pipelining the inner and outer loops.
    Type: Application
    Filed: April 4, 2001
    Publication date: January 3, 2002
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Patrick Y. Law, Zheng Qi