Patents by Inventor Rosario Cammarota

Rosario Cammarota has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160269175
    Abstract: Various features pertain to cryptographic ciphers such as Advanced Encryption Standard (AES) block ciphers. In some examples described herein, a modified masked AES SubBytes procedure uses a static lookup table that is its own inverse in GF(22). The static lookup table facilitates computation of the multiplicative inverse during nonlinear substitution operations in GF(22) In an AES encryption example, the AES device combines plaintext with a round key to obtain combined data, then routes the combined data through an AES SubBytes substitution stage that employs the static lookup table and a dynamic table to perform a masked multiplicative inverse in GF(22) to obtain substituted data. The substituted data is then routed through additional cryptographic AES stages to generate ciphertext. The additional stages may include further SubBytes stages that also exploit the static and dynamic tables. Other examples employ either a static lookup table or a dynamic lookup table but not both.
    Type: Application
    Filed: March 9, 2015
    Publication date: September 15, 2016
    Inventors: Rosario Cammarota, Olivier Jean Benoit, Anand Palanigounder
  • Publication number: 20160261403
    Abstract: A distributed technique for implementing a cryptographic process performs operations in parallel on both valid and irrelevant data to prevent differentiation of the operations based on an encryption key content. A control entity switches or points valid data to appropriate CPU(s) that are responsible for operations such as squaring or multiplying. Irrelevant data is also switched or pointed to appropriate CPU(s) that execute operations in parallel with the CPU(s) operating on the valid data. The distributed technique contributes to obscuring side channel analysis phenomena from observation, such that cryptographic operations cannot easily be tied to the content of the encryption key.
    Type: Application
    Filed: March 6, 2015
    Publication date: September 8, 2016
    Inventors: Olivier Jean BENOIT, Rosario CAMMAROTA
  • Publication number: 20160241705
    Abstract: Techniques for authenticating a user of a mobile device at a computing platform are provided. A method according to these techniques includes generating a first profile and second profile of user behavior for the user of the mobile device, the first profile comprising a first type of profile having at least a first duration and the second profile comprising a second type of profile having a second duration that is shorter than the first duration, monitoring user behavior to generate usage behavior data, comparing the usage behavior data to the first profile and the second profile, performing a first type of authentication action responsive to the usage behavior data deviating from the first profile, and performing a second type of authentication action responsive to the usage behavior data deviating from the second profile.
    Type: Application
    Filed: February 13, 2015
    Publication date: August 18, 2016
    Inventors: Olivier Jean BENOIT, Rishab NITHYANAND, Rosario CAMMAROTA, Anand PALANIGOUNDER
  • Patent number: 9407754
    Abstract: Techniques for authenticating a user of a mobile device at a computing platform are provided. A method according to these techniques includes generating a first profile and second profile of user behavior for the user of the mobile device, the first profile comprising a first type of profile having at least a first duration and the second profile comprising a second type of profile having a second duration that is shorter than the first duration, monitoring user behavior to generate usage behavior data, comparing the usage behavior data to the first profile and the second profile, performing a first type of authentication action responsive to the usage behavior data deviating from the first profile, and performing a second type of authentication action responsive to the usage behavior data deviating from the second profile.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: August 2, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Olivier Jean Benoit, Rishab Nithyanand, Rosario Cammarota, Anand Palanigounder
  • Patent number: 9344553
    Abstract: Techniques for authenticating a user of a mobile device at a computing platform are provided. A method according to these techniques includes generating a first profile and second profile of user behavior for the user of the mobile device, the first profile comprising a first type of profile having at least a first duration and the second profile comprising a second type of profile having a second duration that is shorter than the first duration, monitoring user behavior to generate usage behavior data, comparing the usage behavior data to the first profile and the second profile, performing a first type of authentication action responsive to the usage behavior data deviating from the first profile, and performing a second type of authentication action responsive to the usage behavior data deviating from the second profile.
    Type: Grant
    Filed: February 13, 2015
    Date of Patent: May 17, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Olivier Jean Benoit, Rishab Nithyanand, Rosario Cammarota, Anand Palanigounder
  • Patent number: 9208053
    Abstract: A system and method for identifying optimal system architectures for a reference application are provided. The system and method comprise executing a reference application and a plurality of test applications on a current system architecture and sampling performance data for each of the applications. The performance data is used to compute an application signature for each application. A similarity element is derived from the application signatures that illustrates the similarity between each application and every other application. Using a similarity threshold and an algorithm, a subset of test applications that are similar to the reference application are derived.
    Type: Grant
    Filed: July 17, 2014
    Date of Patent: December 8, 2015
    Assignee: Yahoo! Inc.
    Inventors: Arun Kejariwal, Paolo D'Alberto, Sapan Panigrahi, Rosario Cammarota
  • Publication number: 20140350912
    Abstract: A system and method for identifying optimal system architectures for a reference application are provided. The system and method comprise executing a reference application and a plurality of test applications on a current system architecture and sampling performance data for each of the applications. The performance data is used to compute an application signature for each application. A similarity element is derived from the application signatures that illustrates the similarity between each application and every other application. Using a similarity threshold and an algorithm, a subset of test applications that are similar to the reference application are derived.
    Type: Application
    Filed: July 17, 2014
    Publication date: November 27, 2014
    Applicant: Yahoo! Inc.
    Inventors: Arun Kejariwal, Paolo D'Alberto, Sapan Panigrahi, Rosario Cammarota
  • Patent number: 8818787
    Abstract: A system and method for identifying optimal system architectures for a reference application are provided. The system and method comprise executing a reference application and a plurality of test applications on a current system architecture and sampling performance data for each of the applications. The performance data is used to compute an application signature for each application. A similarity element is derived from the application signatures that illustrates the similarity between each application and every other application. Using a similarity threshold and an algorithm, a subset of test applications that are similar to the reference application are derived.
    Type: Grant
    Filed: January 31, 2011
    Date of Patent: August 26, 2014
    Assignee: Yahoo! Inc.
    Inventors: Arun Kejariwal, Paolo D'Alberto, Sapan Panigrahi, Rosario Cammarota
  • Publication number: 20120197626
    Abstract: A system and method for identifying optimal system architectures for a reference application are provided. The system and method comprise executing a reference application and a plurality of test applications on a current system architecture and sampling performance data for each of the applications. The performance data is used to compute an application signature for each application. A similarity element is derived from the application signatures that illustrates the similarity between each application and every other application. Using a similarity threshold and an algorithm, a subset of test applications that are similar to the reference application are derived.
    Type: Application
    Filed: January 31, 2011
    Publication date: August 2, 2012
    Inventors: Arun Kejariwal, Paolo D'Alberto, Sapan Panigrahi, Rosario Cammarota