Patents by Inventor Gary L. Graunke

Gary L. Graunke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8155306
    Abstract: Encrypting data in a cascaded block cipher system may be accomplished by applying a first encryption algorithm using a secret shared between first and second parties as a key to generate a secret inner key; applying a second encryption algorithm for a predetermined number of rounds using the secret inner key to generate a plurality of blocks of ciphertext data from a plurality of blocks of plaintext data; and repeating the applying the first encryption algorithm and the applying the second encryption algorithm steps.
    Type: Grant
    Filed: December 9, 2004
    Date of Patent: April 10, 2012
    Assignee: Intel Corporation
    Inventors: Ernic F. Brickell, Gary L. Graunke
  • Publication number: 20120076296
    Abstract: A method and apparatus for a high-bandwidth stream cipher. In one embodiment of the invention, the stream cipher has an output function that receives secret state bits from a block cipher and generates an encryption mask. In one embodiment of the invention, the encryption mask has a lesser or smaller number of bits than the secret state bits. The stream cipher uses the encryption mask to encrypt a video data stream to generate an encrypted video data stream.
    Type: Application
    Filed: September 24, 2010
    Publication date: March 29, 2012
    Inventor: GARY L. GRAUNKE
  • Patent number: 7957531
    Abstract: Detecting loss of stream cipher synchronization between a transmitter and a receiver in a video processing system may be achieved by receiving, by the receiver, an encrypted video frame from the transmitter, obtaining an encrypted value for a selected pixel in the encrypted video frame, decrypting the encrypted pixel value using a first portion of the receiver's current key stream, re-encrypting the pixel value using a second portion of the receiver's current key stream, sending the re-encrypted pixel value from the receiver to the transmitter, obtaining, by the transmitter, a plaintext value for the selected pixel from a corresponding original video frame and encrypting the plaintext pixel value using a second portion of the transmitter's current key stream, and comparing the re-encrypted pixel value received from the receiver with the encrypted pixel value generated by the transmitter and detecting a loss of cipher synchronization when the values do not match.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: June 7, 2011
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 7845015
    Abstract: Protected content distribution is accomplished by a first entity generating a set of asymmetric key pairs, creating a plurality of sets of private keys by selecting a combination of private keys from the set of asymmetric key pairs for each created set, and distributing the sets of private keys to playback devices. A second entity produces protected content including encrypted content and a public key media key block, encrypts a symmetric content key with each public key in the set of asymmetric key pairs to form the public key media key block and encrypts a content title with the symmetric content key to form the encrypted content. A playback device stores one set of private keys, receives the protected content, and decrypts and plays the content title stored in the protected content when a selected one of the set of private keys stored by the playback device successfully decrypts the encrypted symmetric content key stored in the public key media key block of the received protected content.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: November 30, 2010
    Assignee: Intel Corporation
    Inventors: Carl M. Ellison, Brendan S. Traw, Michael S. Ripley, Gary L. Graunke
  • Patent number: 7802085
    Abstract: In some embodiments, a method and apparatus for distributing private keys to an entity with minimal secret, unique information are described. In one embodiment, the method includes the storage of a chip secret key within a manufactured chip. Once the chip secret key is stored or programmed within the chip, the chip is sent to a system original equipment manufacturer (OEM) in order to integrate the chip within a system or device. Subsequently, a private key is generated for the chip by a key distribution facility (KDF) according to a key request received from the system OEM. In one embodiment, the KDF is the chip manufacturer. Other embodiments are described and claims.
    Type: Grant
    Filed: February 18, 2004
    Date of Patent: September 21, 2010
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Publication number: 20100183154
    Abstract: In some embodiments, a method and apparatus for distributing private keys to an entity with minimal secret, unique information are described. In one embodiment, the method includes the storage of a chip secret key within a manufactured chip. Once the chip secret key is stored or programmed within the chip, the chip is sent to a system original equipment manufacturer (OEM) in order to integrate the chip within a system or device. Subsequently, a private key is generated for the chip by a key distribution facility (KDF) according to a key request received from the system OEM. In one embodiment, the KDF is the chip manufacturer. Other embodiments are described and claims.
    Type: Application
    Filed: March 30, 2010
    Publication date: July 22, 2010
    Inventor: Gary L. Graunke
  • Publication number: 20100077228
    Abstract: A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by shuffling associated data. The program may be developed using a source language that is applicative on the associated data. To obscure the embedded secrets, in one embodiment, pre-compiler software may be deployed for compiling the program in a random-execution-order based on a random seed indication that randomly selects compilation conventions and a shuffling algorithm that moves the associated data across the program during execution.
    Type: Application
    Filed: July 23, 2009
    Publication date: March 25, 2010
    Inventor: Gary L. Graunke
  • Patent number: 7664269
    Abstract: A system, apparatus, and method are provided for enhancing entropy in a pseudo-random number generator (PRNG) using remote sources. According to one embodiment of the present invention, first, the PRNG's internal state is initialized. Local seeding information is then obtained from a local host. For added security, additional seeding information is obtained from one or more remote entropy servers operating independently to each maintain a constantly updated state pool. Finally, the PRNG is stirred based upon the local seeding information, and the additional seeding information.
    Type: Grant
    Filed: December 15, 2004
    Date of Patent: February 16, 2010
    Assignee: Intel Corporation
    Inventors: Matthew D. Wood, Gary L. Graunke
  • Publication number: 20100005289
    Abstract: A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to generate cipher data, based at least in part on (a) a session key and (b) at least one constant value obtained from a certificate authority. The processing system may use the cipher data to encrypt data, and the processing system may transmit the encrypted data to a receiving device via a wireless connection. Other embodiments are described and claimed.
    Type: Application
    Filed: June 24, 2008
    Publication date: January 7, 2010
    Inventors: Priyadarsini Devanand, Gary L. Graunke
  • Publication number: 20090296938
    Abstract: A processing system to serve as a source device for protected digital content comprises a processor and control logic. When used by the processor, the control logic causes the processing system to receive a digital certificate from a presentation device. The processing system then uses public key infrastructure (PKI) to determine Whether the presentation device has been authorized by a certificate authority (CA) to receive protected content. The processing system may also generate a session key and use the session key to encrypt data. The processing system may transmit the encrypted data to the presentation device only if the presentation device has been authorized by the CA to receive protected content. Presentation devices and repeaters may perform corresponding operations, thereby allowing content to be transmitted and presented in a protected manner. Other embodiments are described and claimed.
    Type: Application
    Filed: May 27, 2008
    Publication date: December 3, 2009
    Applicant: Intel Corporation
    Inventors: Priyadarsini Devanand, Gary L. Graunke
  • Publication number: 20090296941
    Abstract: A processing system to serve as a source device for protected digital content comprises a processor and control logic. The processing system may generate and save a first master key, and may transmit that key to a first receiving device for use during a first session. During a second session, the processing system may obtain an identifier for a candidate receiving device. The processing system may use the identifier to determine whether the processing system contains a master key for the candidate receiving device. If the processing system such a master key, the processing system may send verification data concerning that key to the candidate receiving device, and may use that key to encrypt a session key for the second session. If not, a second master key may be generated and transmitted to the candidate receiving device for use during the second session. Other embodiments are described and claimed.
    Type: Application
    Filed: June 24, 2008
    Publication date: December 3, 2009
    Inventors: Priyadarsini R. Devanand, Gary L. Graunke
  • Patent number: 7600118
    Abstract: In a cryptographic system, a nonce is removed from a communication stream. The nonce is encrypted based on a shared secret. The encrypted nonce is inserted into the communication stream. The encrypted nonce is removed from the communication stream. The encrypted nonce is decrypted based on the shared secret formed by an authenticated key exchange. The decrypted nonce is inserted into the communication stream. The nonce may be an An value generated by a HDCP function. The authenticated key exchange may use Diffie-Hellman Key Exchange.
    Type: Grant
    Filed: September 27, 2002
    Date of Patent: October 6, 2009
    Assignee: Intel Corporation
    Inventors: David A. Lee, Gary L Graunke, C. Brendan Traw
  • Patent number: 7584354
    Abstract: A source-level compiler may randomly select compilation conventions to implement portable content protection, securing the secrets embedded in a program by shuffling associated data. The program may be developed using a source language that is applicative on the associated data. To obscure the embedded secrets, in one embodiment, pre-compiler software may be deployed for compiling the program in a random-execution-order based on a random seed indication that randomly selects compilation conventions and a shuffling algorithm that moves the associated data across the program during execution.
    Type: Grant
    Filed: January 31, 2003
    Date of Patent: September 1, 2009
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 7522725
    Abstract: Secure communication from one encryption domain to another using a trusted module. In one embodiment, the invention includes receiving encrypted streamed content encrypted with a first key, generating a substitution key stream based on the first key and a second key, generating a transposition key stream based on the first and second keys, and simultaneously decrypting and re-encrypting the encrypted streamed content using a combination of the substitution and transposition streams to produce re-encrypted streamed content encrypted with the second key.
    Type: Grant
    Filed: November 7, 2005
    Date of Patent: April 21, 2009
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 7512238
    Abstract: Detecting loss of stream cipher synchronization between a transmitter and a receiver in a video processing system may be achieved by receiving, by the receiver, an encrypted video frame from the transmitter, obtaining an encrypted value for a selected pixel in the encrypted video frame, decrypting the encrypted pixel value using a first portion of the receiver's current key stream, re-encrypting the pixel value using a second portion of the receiver's current key stream, sending the re-encrypted pixel value from the receiver to the transmitter, obtaining, by the transmitter, a plaintext value for the selected pixel from a corresponding original video frame and encrypting the plaintext pixel value using a second portion of the transmitter's current key stream, and comparing the re-encrypted pixel value received from the receiver with the encrypted pixel value generated by the transmitter and detecting a loss of cipher synchronization when the values do not match.
    Type: Grant
    Filed: September 18, 2007
    Date of Patent: March 31, 2009
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 7472285
    Abstract: A method and apparatus for memory encryption with reduced decryption latency. In one embodiment, the method includes reading an encrypted data block from memory. During reading of the encrypted data block, a keystream used to encrypt the data block is regenerated according to one or more stored criteria of the encrypted data block. Once the encrypted data block is read, the encrypted data block is decrypted using the regenerated keystream. Accordingly, in one embodiment, encryption of either random access memory (RAM) or disk memory is performed. A keystream is regenerated during data retrieval such that once the data is received, the data may be decrypted using a single clock operation. As a result, memory encryption is performed without exacerbating memory latency between the processor and memory.
    Type: Grant
    Filed: June 25, 2003
    Date of Patent: December 30, 2008
    Assignee: Intel Corporation
    Inventors: Gary L. Graunke, Carlos Rozas
  • Patent number: 7426274
    Abstract: A video source device includes a cipher unit. The video source device uses the cipher unit to generate cipher bits for ciphering video to be transmitted to protect the video from unauthorized copying. The video source device authenticates video receiving devices using a symmetric ciphering/deciphering process that requires the video source device to generate and provide the video receiving device with a pseudo random number as the seed/basis number for the symmetric ciphering/deciphering process. The video source device is further provided with a state machine that controls the cipher unit to generate the required pseudo random number for the video source devices, thereby eliminating the need of having to provide separate circuitry to generate the required pseudo random numbers.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: September 16, 2008
    Assignee: Intel Corporation
    Inventors: Robert W. Faber, David A. Lee, Brendan S. Traw, Gary L. Graunke
  • Patent number: 7369661
    Abstract: Detecting loss of stream cipher synchronization between a transmitter and a receiver in a video processing system may be achieved by receiving, by the receiver, an encrypted video frame from the transmitter, obtaining an encrypted value for a selected pixel in the encrypted video frame, decrypting the encrypted pixel value using a first portion of the receiver's current key stream, re-encrypting the pixel value using a second portion of the receiver's current key stream, sending the re-encrypted pixel value from the receiver to the transmitter, obtaining, by the transmitter, a plaintext value for the selected pixel from a corresponding original video frame and encrypting the plaintext pixel value using a second portion of the transmitter's current key stream, and comparing the re-encrypted pixel value received from the receiver with the encrypted pixel value generated by the transmitter and detecting a loss of cipher synchronization when the values do not match.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: May 6, 2008
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 7366914
    Abstract: In one embodiment, the present invention may perform a transformation based on existing program operations or operators which may provide encrypting compiler-generated code for compilation with original source code, securing distributable content in hostile environments. As an example, use of compiler analysis and heuristics for pairing variables and identifying encryption/decryption points may protect distributable software, such as the compiled code from automated attacks. In one embodiment, pre-compiler software may dynamically obtain one or more program operators from the source code for applying data transformation based on custom ciphers to encrypt/decrypt data in between references to data variables in a particular portion of the source code, providing encrypting compiler-generated code for mixing with the source code prior to compilation into tamper-resistant object code.
    Type: Grant
    Filed: August 29, 2003
    Date of Patent: April 29, 2008
    Assignee: Intel Corporation
    Inventor: Gary L. Graunke
  • Patent number: 7305711
    Abstract: Protected content distribution is accomplished by a first entity generating a set of asymmetric key pairs, creating a plurality of sets of private keys by selecting a combination of private keys from the set of asymmetric key pairs for each created set, and distributing the sets of private keys to playback devices. A second entity produces protected content including encrypted content and a public key media key block, encrypts a symmetric content key with each public key in the set of asymmetric key pairs to form the public key media key block and encrypts a content title with the symmetric content key to form the encrypted content. A playback device stores one set of private keys, receives the protected content, and decrypts and plays the content title stored in the protected content when a selected one of the set of private keys stored by the playback device successfully decrypts the encrypted symmetric content key stored in the public key media key block of the received protected content.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: December 4, 2007
    Assignee: Intel Corporation
    Inventors: Carl M. Ellison, Brendan Traw, Michael S. Ripley, Gary L. Graunke