We Invent Things

A design engineer can accrue patents over a 35-year-plus career. Nearly all of mine as an inventor or as a co-inventor are in the field of cryptography or crypto-related. I was never a cryptographer or an advanced mathematics guy; rather, I applied existing, known, proven, mathematical techniques, freely available at the time. So, lest you think I can factor large prime-numbers in my head, I’ll set you straight.

I was a relatively early adopter of cryptography, dating back to the mid-nineties, when we were trying to build a secure (from the moment of Power On) workstation, PC, or laptop. The idea of placing the Root of Trust in the Boot ROM (‘BIOS’) and forcing all updates to be digitally signed, was key to creating secure computing (no pun intended!) and is now a standard.

The exception is the Data Management invention (US 8078687 B1), which is basically a hardware-based, parametric, double-linked-list processor. I designed that to solve an ordering problem in data packets, but it was adapted to video processing. The truth is it could be adapted to sorting at hardware speeds any packet-based data flow.

US 20010007131 A1 — Method For Validating Storage ROMs.
US 6598165 B1 — Secure memory.
US 8078687 B1 — System and method for data management.
US 8543838 B1 — Cryptographic module with secure processor.
US 9251380 B1 — Method and storage device for isolating and preventing access to processor and memory used in decryption of text

The details on this stuff and more will have to wait for my memoirs. I have nineteen design notebooks, dating back to 1987 to help me with that.

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.