3709 Shannon Run Trl, Louisville, KY 40299 • 5024931281 • 5024992038
Crestwood, KY
3709 Shannon Run Trl, Louisville, KY 40299 • 5024992038
Work
Company:
Cryptography research, a division of rambus
Apr 2013
Address:
San Francisco Bay Area
Position:
Principle software engineer
Education
Degree:
BSEE
School / High School:
University of Louisville
1993 to 1997
Specialities:
Electrical Engineering
Skills
C • Perl • Embedded Systems • C++ • Visual C++ • Microsoft Office • Linux • Linux System Administration • Windows • Socket Programming • Public Key Cryptography • Cryptography • AES • Hash Algorithms • Hardware Security Modules • HSM • PFMEA • Java • Databases • Data Analysis • Algorithm Design • Test Automation • Product Development • Product Design • Software Development
Languages
Conversational German
Industries
Semiconductors
Resumes
Principle Software Engineer At Cryptography Research
Principle Software Engineer at Cryptography Research, A Division of Rambus
Location:
San Francisco, California
Industry:
Semiconductors
Work:
Cryptography Research, A Division of Rambus - San Francisco Bay Area since Apr 2013
Principle Software Engineer
Lexmark - Lexington, Kentucky Area Apr 2012 - Apr 2013
Platform Security Infrastructure Architect
Lexmark - Lexington, Kentucky Area May 2009 - Apr 2012
Lead Project Engineer, Supplies Security Team
Lexmark - Lexington, Kentucky Area Sep 2003 - May 2009
Electrical Engineer, Monochrome Laser Cartridge Design Team
Test and Controls International - Louisville, Kentucky Area Oct 1996 - Sep 2003
Electrical Engineer
Education:
University of Louisville 1993 - 1997
BSEE, Electrical Engineering
Skills:
C Perl Embedded Systems C++ Visual C++ Microsoft Office Linux Linux System Administration Windows Socket Programming Public Key Cryptography Cryptography AES Hash Algorithms Hardware Security Modules HSM PFMEA Java Databases Data Analysis Algorithm Design Test Automation Product Development Product Design Software Development
Languages:
Conversational German
Us Patents
Storing Printer Density Control Parameters In Cartridge Memory
Douglas Anthony Able - Shelbyville KY, US William Keith Richardson - Salvisa KY, US Joel Patrick Wittenauer - Shelbyville KY, US
Assignee:
Lexmark International, Inc. - Lexington KY
International Classification:
G03G 15/00
US Classification:
399 12
Abstract:
Data may be obtained in the form of a printer control density table from a memory within a replacement toner cartridge. The cartridge may include parity bits to ensure the accuracy of the data.
Methods And Apparatuses For Determining The Number Of Printed Pages Remaining In A Toner Cartridge
Joel P. Wittenauer - Shelbyville KY, US William K. Richardson - Salvisa KY, US
International Classification:
G03G 15/08
US Classification:
399 27
Abstract:
A method for determining the number of printed pages remaining in a toner cartridge for an electrophotographic image forming device. A toner cartridge and electrophotographic image forming device for storing and/or performing aspects of the method is also provided.
- San Jose CA, US Mark Evan MARSON - Carlsbad CA, US Joel WITTENAUER - Pleasanton CA, US
International Classification:
G11C 8/16 G11C 8/12 G06F 7/58
Abstract:
A random number generator selects addresses while a ‘scoreboard’ bank of registers (or bits) tracks which addresses have already been output (e.g., for storing or retrieval of a portion of the data.) When the scoreboard detects an address has already been output, a second address which has not been used yet is output rather than the randomly selected one. The second address may be selected from nearby addresses that have not already been output.
- Sunnyvale CA, US Matthew Evan Orzen - San Francisco CA, US Joel Patrick Wittenauer - Pleasanton CA, US Steven C. Woo - Saratoga CA, US
International Classification:
G06F 21/44 H04L 29/06 H04L 9/32
Abstract:
Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device.
- Sunyvale CA, US Michael A. HAMBURG - San Francisco CA, US Pankaj ROHATGI - Los Altos CA, US Amit KAPOOR - San Francisco CA, US Joel Patrick WITTENAUER - Pleasanton CA, US
International Classification:
H04L 29/06 H04W 12/06 H04W 12/00
Abstract:
The embodiments described herein describe technologies to address initial establishment of device credentials in an Internet of Things (IoT) infrastructure. The embodiments are directed to unifying secure credential establishment regardless of the endpoint type, thus addressing the challenge of a great diversity among IoT devices. This approach is designed to address a challenge of initial trusted enrollment of the IoT endpoints into a secure infrastructure, which allows secure communications between the devices in the IoT environment.
- Sunnyvale CA, US Matthew Evan Orzen - San Francisco CA, US Joel Patrick Wittenauer - Pleasanton CA, US Steven C. Woo - Saratoga CA, US
International Classification:
G06F 21/44 H04L 29/06 H04L 9/32
Abstract:
Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device.
- San Francisco CA, US Matthew Evan Orzen - San Francisco CA, US Joel Patrick Wittenauer - Pleasanton CA, US Steven C. Woo - Saratoga CA, US
International Classification:
G06F 21/44 H04L 9/32 H04L 29/06
Abstract:
Pairing data associated with a second device may be received at a first device. The pairing data may be received from a server. A first authentication proof may be generated based on the pairing data received from the server. A second authentication proof may be received from the second device. Furthermore, an authentication status of the second device may be updated based on a comparison of the first authentication proof that is based on the pairing data received from the server and the second authentication proof that is received from the second device.
Joel Wittenauer 1993 graduate of Trinity High School in Louisville, KY is on Classmates.com. See pictures, plan your class reunion and get caught up with Joel and other high school ...