Patents by Inventor Marcos A. Simplicio, JR.
Marcos A. Simplicio, JR. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11930123Abstract: Digital certificates are generated for devices by a Certificate Authority (CA), which communicates with devices via another entity—registration authority (RA)—so that the CA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by CA to encrypt the certificate to hide it from the RA. Both keys are derived by CA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the CA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.Type: GrantFiled: April 30, 2021Date of Patent: March 12, 2024Assignees: LG Electronics Inc., University of Sao PauloInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini Fernandez, Marcos Vinicius M. Silva
-
Patent number: 11811943Abstract: According to some embodiments, in a Vehicular-to-Everything (V2X) communications environment where vehicles can exchange messages with other entities, including nearby vehicles and pedestrians, systems and methods are provided to implement a mechanism or technique based on hash chaining that allows a large sequence of messages from the same source to be validated by verifying a single digital signature.Type: GrantFiled: March 31, 2021Date of Patent: November 7, 2023Assignees: LG ELECTRONICS INC., UNIVERSITY OF SAO PAULOInventors: Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio, Jr., Harsh Kupwade Patil, Jefferson E. Ricardini F. de Oliveira
-
Patent number: 11606216Abstract: Improved pseudonym certificate management is provided for connected vehicle authentication and other applications. Temporary revocation of a certificate is enabled. With respect to Security Credential Management Systems (SCMS), pre-linkage values can be employed. The pre-linkage values can be encrypted using homomorphic encryption. Other embodiments are also provided.Type: GrantFiled: August 17, 2020Date of Patent: March 14, 2023Assignees: LG ELECTRONICS, INC., UNIVERSITY OF SAO PAULOInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
-
Publication number: 20230029523Abstract: In a vehicle-to-everything (V2X) technology environment, systems and methods are provided for extending the distribution of activation codes (ACs) in an Activation Codes for Pseudonym Certificates (ACPC) system, in a privacy-preserving manner, to a unicast mode of communication. In this unicast ACPC (uACPC), in some embodiments, the ACs are distributed by the back-end system via a unicast channel upon the receipt of the vehicle's direct request for its respective ACs. In some embodiments, uACPC can leverage edge computing architecture for low latency delivery of certificate revocation lists (CRLs) and higher availability for the distribution of ACs.Type: ApplicationFiled: December 4, 2020Publication date: February 2, 2023Inventors: Helmiton Cunha, Thomas E. Luther, Jefferson E. RICARDINI FERNANDES DE OLIVEIRA, Henrique S. Ogawa, Marcos A. Simplicio, JR., Harsh Kupwade Patil
-
Publication number: 20220376931Abstract: According to some embodiments, systems and methods are provided for revoking one or more of a plurality of entities in a vehicular public-key infrastructure. The systems and methods balance privacy and efficiency by distributing activation codes according to various approaches, including a direct request approach, a fixed-size subset approach, and a variable-size subset approach.Type: ApplicationFiled: October 7, 2020Publication date: November 24, 2022Inventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini Fernandes De Oliveira, Marcos Vinicius M. Silva
-
Publication number: 20220294645Abstract: Embodiments described herein provide systems and methods to prevent, or provide a countermeasure, to a co-existence attack, for example, that may occur in a Security Credential Management System (SCMS) where both regular butterfly key (RBK) protocol and unified butterfly key (UBK) protocol are supported. Embodiments described herein provide, support, employ, or implement hardware acceleration for a Hardware Security Module (HSM), for example, for cryptographic operations (e.g., block ciphers, digital signature schemes, and key exchange protocols).Type: ApplicationFiled: June 2, 2022Publication date: September 15, 2022Inventors: Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Jr., Marcos A. Simplicio, Jr., Harsh Kupwade-Patil
-
Patent number: 11356281Abstract: Embodiments described herein provide systems and methods to prevent, or provide a countermeasure, to a co-existence attack, for example, that may occur in a Security Credential Management System (SCMS) where both regular butterfly key (RBK) protocol and unified butterfly key (UBK) protocol are supported. Embodiments described herein provide, support, employ, or implement hardware acceleration for a Hardware Security Module (HSM), for example, for cryptographic operations (e.g., block ciphers, digital signature schemes, and key exchange protocols).Type: GrantFiled: May 13, 2020Date of Patent: June 7, 2022Assignees: LG ELECTRONICS, INC., UNIVERSITY OF SAO PAULOInventors: Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Jr., Marcos A. Simplicio, Jr., Harsh Kupwade-Patil
-
Patent number: 11190363Abstract: To revoke a digital certificate, activation of the digital certificate is blocked by withholding an activation code from the certificate user. The certificates are generated by a plurality of entities in a robust process that preserves user privacy (e.g. anonymity) even in case of collusion of some of the entities. The process is suitable for connected vehicles, e.g. as an improvement for Security Credential Management System (SCMS).Type: GrantFiled: January 10, 2019Date of Patent: November 30, 2021Assignees: LG ELECTRONICS, INC., UNIVERSITY OF SAO PAULOInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
-
Patent number: 11184180Abstract: To revoke a digital certificate (160p), activation of the digital certificate is blocked by withholding an activation code from the certificate user (110). The certificates are generated by a plurality of entities (210, 220, 838) in a robust process that preserves user privacy (e.g. anonymity) even in case of collusion of some of the entities. The process is suitable for connected vehicles, e.g. as an improvement for Security Credential Management System (SCMS).Type: GrantFiled: February 5, 2019Date of Patent: November 23, 2021Assignees: LG ELECTRONICS, INC., UNIVERSITY OF SAO PAULOInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos Vinicius M. Silva
-
Publication number: 20210314748Abstract: According to some embodiments, in a Vehicular-to-Everything (V2X) communications environment where vehicles can exchange messages with other entities, including nearby vehicles and pedestrians, systems and methods are provided to implement a mechanism or technique based on hash chaining that allows a large sequence of messages from the same source to be validated by verifying a single digital signature.Type: ApplicationFiled: March 31, 2021Publication date: October 7, 2021Inventors: Eduardo Lopes Cominetti, Marcos Vinicius M. Silva, Marcos A. Simplicio, JR., Harsh Kupwade Patil, Jefferson E. Ricardini
-
Publication number: 20210250184Abstract: Digital certificates are generated for devices by a Certificate Authority (CA), which communicates with devices via another entity registration authority (RA)—so that the CA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by CA to encrypt the certificate to hide it from the RA. Both keys are derived by CA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the CA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.Type: ApplicationFiled: April 30, 2021Publication date: August 12, 2021Inventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini Fernandez, Marcos Vinicius M. Silva
-
Patent number: 11018877Abstract: Pseudonym digital certificates (160p) are generated for devices (110/150) by a Pseudonym Certificate Authority (PCA), which communicates with devices via another entity—registration authority (RA)—so that the PCA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by PCA to encrypt the certificate to hide it from the RA. Both keys are derived by PCA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the PCA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.Type: GrantFiled: December 3, 2019Date of Patent: May 25, 2021Assignees: LG Electronics, Inc., University of Sao PauloInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini Fernandez, Marcos Vinicius M. Silva
-
Patent number: 10972259Abstract: A method for computing a shared key (K) for encrypting data between a first device and a second device. The method includes communicating a first private ephemeral key (XA), and a first parameter set (YA) to a second device. The first parameter set (YA) includes identity data (IDA) that identifies the first device, a random point (VA) on an elliptic curve, and a first public key (UA). The first device receives a second private ephemeral key (XB) and a second parameter set (YB). The second parameter set (YB) includes identity data (IDB) that identifies the second device, a random point (VB) on the elliptic curve, and a second public key (UB). Verifying operations are performed to verify the second public key (UB) and the second private ephemeral key (XB) as valid. A shared key (K) is then computed based at least on the first parameter set (YA), the second parameter set (YB), the first private ephemeral key (XA), and the second private ephemeral key (XB).Type: GrantFiled: September 5, 2017Date of Patent: April 6, 2021Assignees: LG ELECTRONICS INC., UNIVERSIDADE DE SAO PAULOInventors: Marcos A. Simplicio, Jr., Marcos V. M. Silva, Renan C. A. Alves
-
Publication number: 20200382325Abstract: Improved pseudonym certificate management is provided for connected vehicle authentication and other applications. Temporary revocation of a certificate is enabled. With respect to Security Credential Management Systems (SCMS), pre-linkage values can be employed. The pre-linkage values can be encrypted using homomorphic encryption. Other embodiments are also provided.Type: ApplicationFiled: August 17, 2020Publication date: December 3, 2020Inventors: Marcos A. Simplicio, JR., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T.D. Ferraz, Marcos Vinicius M. Silva
-
Publication number: 20200382320Abstract: Embodiments described herein provide systems and methods to prevent, or provide a countermeasure, to a co-existence attack, for example, that may occur in a Security Credential Management System (SCMS) where both regular butterfly key (RBK) protocol and unified butterfly key (UBK) protocol are supported. Embodiments described herein provide, support, employ, or implement hardware acceleration for a Hardware Security Module (HSM), for example, for cryptographic operations (e.g., block ciphers, digital signature schemes, and key exchange protocols).Type: ApplicationFiled: May 13, 2020Publication date: December 3, 2020Inventors: Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, JR., Marcos A. Simplicio, JR., Harsh Kupwade-Patil
-
Patent number: 10771265Abstract: Improved pseudonym certificate management is provided for connected vehicle authentication and other applications. Temporary revocation of a certificate is enabled. With respect to Security Credential Management Systems (SCMS), linkage authorities can be eliminated without compromising the system security. Other embodiments are also provided.Type: GrantFiled: September 20, 2018Date of Patent: September 8, 2020Assignees: LG Electronics, Inc., University of Sao PauloInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius M. Silva
-
Publication number: 20200119930Abstract: Pseudonym digital certificates (160p) are generated for devices (110/150) by a Pseudonym Certificate Authority (PCA), which communicates with devices via another entity—registration authority (RA)—so that the PCA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by PCA to encrypt the certificate to hide it from the RA. Both keys are derived by PCA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the PCA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.Type: ApplicationFiled: December 3, 2019Publication date: April 16, 2020Inventors: Marcos A. Simplicio, JR., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini Fernandez, Marcos Vinicius M. Silva
-
Patent number: 10536279Abstract: Pseudonym digital certificates (160p) are generated for devices (110/150) by a Pseudonym Certificate Authority (PCA), which communicates with devices via another entity—registration authority (RA)—so that the PCA and RA cannot associate certificates with devices. Each certificate is associated with a public signature key, and with a public encryption key used by PCA to encrypt the certificate to hide it from the RA. Both keys are derived by PCA from a single key. For example, the signature key can be derived from the public encryption key rather than generated independently. However, high security is obtained even when the PCA does not sign the encrypted certificate. Reduced bandwidth and computational costs are obtained as a result. Other embodiments are also provided.Type: GrantFiled: October 19, 2018Date of Patent: January 14, 2020Assignees: LG ELECTRONICS, INC., UNIVERSITY OF SAO PAULOInventors: Marcos A. Simplicio, Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini Fernandez, Marcos Vinicius M. Silva
-
Publication number: 20190215165Abstract: To revoke a digital certificate, activation of the digital certificate is blocked by withholding an activation code from the certificate user. The certificates are generated by a plurality of entities in a robust process that preserves user privacy (e.g. anonymity) even in case of collusion of some of the entities. The process is suitable for connected vehicles, e.g. as an improvement for Security Credential Management System (SCMS).Type: ApplicationFiled: January 10, 2019Publication date: July 11, 2019Inventors: Marcos A. Simplicio, JR., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson B. Ricardini, Marcos Vinicius M. Silva
-
Publication number: 20190215154Abstract: A method for computing a shared key (K) for encrypting data between a first device and a second device. The method includes communicating a first private ephemeral key (XA), and a first parameter set (YA) to a second device. The first parameter set (YA) includes identity data (IDA) that identifies the first device, a random point (VA) on an elliptic curve, and a first public key (UA). The first device receives a second private ephemeral key (XB) and a second parameter set (YB). The second parameter set (YB) includes identity data (IDB) that identifies the second device, a random point (VB) on the elliptic curve, and a second public key (UB). Verifying operations are performed to verify the second public key (UB) and the second private ephemeral key (XB) as valid. A shared key (K) is then computed based at least on the first parameter set (YA), the second parameter set (YB), the first private ephemeral key (XA), and the second private ephemeral key (XB).Type: ApplicationFiled: September 5, 2017Publication date: July 11, 2019Applicants: LG ELECTRONICS INC., UNIVERSIDADE DE SAO PAULOInventors: Marcos A. SIMPLICIO JR., Marcos V. M. SILVA, Renan C. A. ALVES