776 Junipero Serra Blvd, San Francisco, CA 94127 • 4155867729
Napa, CA
776 Junipero Serra Blvd, San Francisco, CA 94127 • 5105930009
Work
Company:
Broadcom
Nov 2016
Position:
Principal systems engineer, technical operations
Education
Degree:
Master of Science, Masters
School / High School:
National Technical University of Ukraine 'Kyiv Polytechnic Institute'
Specialities:
Engineering
Skills
Integration • Product Management • Wireless • Cloud Computing • Network Security • Mobile Devices • Linux • Cross Functional Team Leadership • Embedded Systems • Management • Start Ups • Program Management • Vendor Management • Wireless Technologies • Saas • Data Center • System Deployment • Testing • Software Engineering • Location Based Services • It Management • Software As A Service • Storage • Security • Operations Management • It Strategy • It Outsourcing • It Service Management • Information Security
Languages
English • Russian • Ukrainian
Interests
Exercise • Sweepstakes • Home Improvement • Reading • Gourmet Cooking • Sports • Home Decoration • Health • Cooking • Electronics • Environment • Education • Science and Technology • Music • Movies • Automobiles • Travel • Career • Investing • Traveling • Arts and Culture
Industries
Computer Networking
Name / Title
Company / Classification
Phones & Addresses
Alexander M. Usach
NET4BAY, LLC Computer Consulting
776 Junipero Serra Blvd, San Francisco, CA 94127 4155865976, 6502139033
Broadcom
Principal Systems Engineer, Technical Operations
Rubicon Labs, Inc Nov 2014 - Jul 2016
Technology and Service Operations Director
Broadcom Aug 2007 - Nov 2014
Senior Technical Manager, Mobile and Wireless Group and Gps
Global Locate Inc. 2004 - 2007
Senior Network Manager
Net4Bay Sep 1997 - Jun 2004
Principal Partner
Education:
National Technical University of Ukraine 'Kyiv Polytechnic Institute'
Master of Science, Masters, Engineering
Skills:
Integration Product Management Wireless Cloud Computing Network Security Mobile Devices Linux Cross Functional Team Leadership Embedded Systems Management Start Ups Program Management Vendor Management Wireless Technologies Saas Data Center System Deployment Testing Software Engineering Location Based Services It Management Software As A Service Storage Security Operations Management It Strategy It Outsourcing It Service Management Information Security
Interests:
Exercise Sweepstakes Home Improvement Reading Gourmet Cooking Sports Home Decoration Health Cooking Electronics Environment Education Science and Technology Music Movies Automobiles Travel Career Investing Traveling Arts and Culture
Languages:
English Russian Ukrainian
Us Patents
Method And System For Determining A Position Of A Mobile Communication Device
Steven Malkos - San Jose CA, US Andrei Kosolobov - San Jose CA, US David Albert Lundgren - Mill Valley CA, US Manuel del Castillo - Madrid, ES Christopher Lane - Ridgewood NJ, US Alexander Michael Usach - San Francisco CA, US
Assignee:
BROADCOM CORPORATION - Irvine CA
International Classification:
G01S 5/14
US Classification:
3423571, 34235712, 4554561
Abstract:
A GNSS enabled mobile device transmits to a location server a combination of GNSS-based location data and non-GNSS based location data used to determining reference positions at the location server. The GNSS mobile device receives the determined reference positions from the location server to calculate an associated GNSS position fix. The transmitted GNSS-based location data comprises GNSS position fixes associated with the GNSS enabled mobile device. The transmitted non-GNSS-based location data comprises a serving Cell-ID, neighbor Cell-IDs, neighbor cell fingerprinting, timing advance parameters, and/or a mobile country code. Reference positions associated with the serving Cell-ID are determined and/or refined based on location information acquired from each of associated mobile devices. To respond to a reference position request from the GNSS enabled mobile device without an associated serving Cell-ID, the location server determines corresponding reference positions by combing subscriber population density with an associated MCC.
Method And System For Positioning Neighbor Cells In A Cellular Network Using Learned Cell Data
Manuel Del Castillo - Madrid, ES Steve Malkos - San Jose CA, US David Albert Lundgren - Mill Valley CA, US Vladimir Belov - Union City CA, US Alexander Usach - San Francisco CA, US Andrei Kosolobov - San Jose CA, US James William Lamance - Hixson TN, US
International Classification:
H04W 64/00
US Classification:
4554561
Abstract:
A mobile device learns cell information for a serving cell and for neighbor cells. The learned cell information is communicated to a remote location server for locating base stations within the serving and/or neighbor cells. The learned cell information comprises cell signal strength information and/or other cell information such as cell identifiers (Cell-IDs) and Country Code (MCC). Received signal strength (RSS) on the serving cell and the neighbor cells are measured. Locations pertaining to the RSS measurements are determined. The mobile device location stamps the RSS measurements utilizing the determined locations to generate a neighbor cell report, which is utilized by a cellular communication network to prepare a handover operation whenever needed, and/or to build a local cell-learning database. A portion of the local cell-learning database is transmitted as cell data to the remote location server that collects cell data from a plurality of mobile devices.
Method And System For Determining A Position Of A Mobile Communication Device
Steven Malkos - San Jose CA, US Andrei Kosolobov - San Jose CA, US David Albert Lundgren - Mill Valley CA, US Manuel del Castillo - Madrid, ES Christopher Lane - Ridgewood NJ, US Alexander Michael Usach - San Francisco CA, US
Assignee:
BROADCOM CORPORATION - Irvine CA
International Classification:
G01S 19/06 G01S 19/12
US Classification:
34235743, 34235749
Abstract:
A GNSS enabled mobile device transmits to a location server a combination of GNSS-based location data and non-GNSS based location data used to determining reference positions at the location server. The GNSS mobile device receives the determined reference positions from the location server to calculate an associated GNSS position fix. The transmitted GNSS-based location data comprises GNSS position fixes associated with the GNSS enabled mobile device. The transmitted non-GNSS-based location data comprises a serving Cell-ID, neighbor Cell-IDs, neighbor cell fingerprinting, timing advance parameters, and/or a mobile country code. Reference positions associated with the serving Cell-ID are determined and/or refined based on location information acquired from each of associated mobile devices. To respond to a reference position request from the GNSS enabled mobile device without an associated serving Cell-ID, the location server determines corresponding reference positions by combing subscriber population density with an associated MCC.
Method And System For An Efficient Shared-Derived Secret Provisioning Mechanism
- San Francisco CA, US Stephen E. Smith - Austin TX, US Roderick Schultz - San Francisco CA, US Marcos Portnoi - Austin TX, US Stuart W. Juengst - Austin TX, US Charles T. Schad - Austin TX, US Michael K. Eneboe - Georgetown TX, US Alexander Usach - San Francisco CA, US Keith Evans - San Jose CA, US
International Classification:
H04L 29/06 H04L 9/32
Abstract:
Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments of this mechanism use a trusted third-party topology, but only a single instance of a public-private key exchange is required for initialization. Embodiments of the system and methods are secure and any of the derived secret keys are completely renewable in untrusted environments without any reliance on asymmetric cryptography. The derived secrets exhibit zero knowledge attributes and the associated zero knowledge proofs are open and available for review. Embodiments of systems and methods can be implemented in a wide range of previously-deployed devices as well as integrated into a variety of new designs using minimal roots-of-trust.
System And Method For Initializing A Shared Secret System
- San Francisco CA, US Roderick Schultz - San Francisco CA, US Stephen E. Smith - Austin TX, US Alexander Usach - San Francisco CA, US Marcos Portnoi - Austin TX, US
International Classification:
H04L 29/06
Abstract:
Embodiments as described herein provide systems and methods for sharing secrets between a device and another entity. The shared secret may be generated on the device as a derivative of a secret value contained on the device itself in a manner that will not expose the secret key on the device and may be sent to the entity. The shared secret may also be stored on the device such that it can be used in future secure operations on the device. In this manner, a device may be registered with an external service such that a variety of functionality may be securely accomplished, including, for example, the generation of authorization codes for the device by the external service based on the shared secret or the symmetric encryption of data between the external service and the device using the shared secret.
Distributed And Hierarchical Device Activation Mechanisms
- San Francisco CA, US Roderick Schultz - San Francisco CA, US Stephen E. Smith - Austin TX, US Alexander Usach - San Francisco CA, US Marcos Portnoi - Austin TX, US
International Classification:
H04L 29/06 H04L 9/30 H04L 9/14 H04L 9/32
Abstract:
Embodiments of systems and methods disclosed herein include a distributed device activation mechanism involving a group of external entities without using asymmetric cryptography. Systems and methods include techniques for deriving a device secret using a hardware secret and authenticated unique input data provided to the device by one or more external entities. A hardware hash function uses the hardware secret as a key and the authenticated unique input data as input data to output the derived device secret. The derived device secret is written to a security register of the device to enter a new security layer.