Patents by Inventor Sami James Saab

Sami James Saab has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11757617
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Grant
    Filed: December 15, 2020
    Date of Patent: September 12, 2023
    Assignee: Cryptography Research, Inc.
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
  • Publication number: 20210218546
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Application
    Filed: December 15, 2020
    Publication date: July 15, 2021
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
  • Patent number: 10897344
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Grant
    Filed: July 23, 2019
    Date of Patent: January 19, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
  • Publication number: 20200175162
    Abstract: Embodiments herein facilitate resisting side channel attacks through various implementations and combinations of implementations. In embodiments, this is accomplished by preventing sensitive data from consecutively following other data through potentially vulnerable resources which otherwise may cause data to leak. Where such vulnerabilities to attacks are known, suspected, or as a proactive precaution, a cleaner can be used to inhibit the sensitive data from passing through the vulnerable areas consecutively and thus inhibit the leakage. Embodiments also envision utilizing certain types of circuits to assist in preventing leakage. By using such circuits one can reduce or even potentially eliminate the requirement for cleaners as mentioned previously.
    Type: Application
    Filed: October 12, 2016
    Publication date: June 4, 2020
    Inventors: Sami James Saab, Elke De Mulder, Pankaj Rohatgi, Craig E. Hampel, Jeremy Cooper, Winthrop Wu
  • Publication number: 20200021426
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Application
    Filed: July 23, 2019
    Publication date: January 16, 2020
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
  • Patent number: 10382193
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: August 13, 2019
    Assignee: Cryptography Research, Inc.
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
  • Publication number: 20170085368
    Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting an internal state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.
    Type: Application
    Filed: May 15, 2015
    Publication date: March 23, 2017
    Applicant: Cryptography Research, Inc.
    Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel