Patents by Inventor Justin Yongjin Kim

Justin Yongjin Kim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10747883
    Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of authenticating executable images in a system-on-chip (SoC), the method comprising: storing a plurality of executable images; storing, as separate from the plurality of executable images, a signed image of hashes comprising a plurality of hashes corresponding to the plurality of executable images and a first signature; authenticating the signed image of hashes based on the first signature; and using a first hash of the plurality of hashes to authenticate a first executable image of the plurality of executable images when the signed image of hashes passes authentication.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: August 18, 2020
    Assignee: QUALCOMM Incorporated
    Inventors: Dhamim Packer Ali, Dhaval Patel, Justin Yongjin Kim, Maria Miranda, Cory David Feitelson, Eric Taseski
  • Patent number: 10367637
    Abstract: A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: July 30, 2019
    Assignee: QUALCOMM Incorporated
    Inventors: Lu Xiao, Jing Deng, Justin Yongjin Kim
  • Publication number: 20180330095
    Abstract: Various additional and alternative aspects are described herein. In some aspects, the present disclosure provides a method of authenticating executable images in a system-on-chip (SoC), the method comprising: storing a plurality of executable images; storing, as separate from the plurality of executable images, a signed image of hashes comprising a plurality of hashes corresponding to the plurality of executable images and a first signature; authenticating the signed image of hashes based on the first signature; and using a first hash of the plurality of hashes to authenticate a first executable image of the plurality of executable images when the signed image of hashes passes authentication.
    Type: Application
    Filed: June 23, 2017
    Publication date: November 15, 2018
    Inventors: Dhamim PACKER ALI, Dhaval PATEL, Justin Yongjin KIM, Maria MIRANDA, Cory David FEITELSON, Eric TASESKI
  • Publication number: 20180129826
    Abstract: Techniques for authenticating data on a computing device are provided. An example method according to these techniques includes generating a first cryptographic output by applying a first cryptographic algorithm to each block of a first subset of the plurality of blocks of data to be authenticated, combining a last block of the first cryptographic output with a second subset of the plurality of blocks of data to generate an intermediate result, and generating an authentication output by applying a second cryptographic algorithm to the intermediate result, the second cryptographic algorithm being different than the first cryptographic algorithm.
    Type: Application
    Filed: November 4, 2016
    Publication date: May 10, 2018
    Inventors: Justin Yongjin KIM, Lu XIAO, Shenghu LIU
  • Publication number: 20180026782
    Abstract: A method of implementing security in a modular exponentiation function for cryptographic operations is provided. A key is obtained as a parameter when the modular exponentiation function is invoked. The key may be one of either a public key or a private key of a cryptographic key pair. Within the modular exponentiation function, the method ascertains whether the key is greater than L bits long, where L is a positive integer. A countermeasure against an attack is implemented if the key is greater than L bits long. The countermeasure may include one or more techniques (e.g., hardware and/or software techniques) that inhibit or prevent information about the key from being ascertained through analysis. One or more exponentiation operations may then be performed using the key. The same modular exponentiation function may be used to perform encryption and decryption operations but with different keys.
    Type: Application
    Filed: July 22, 2016
    Publication date: January 25, 2018
    Inventors: Lu Xiao, Jing Deng, Justin Yongjin Kim