Patents by Inventor SAUVIK BHATTACHARYA
SAUVIK BHATTACHARYA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11991274Abstract: Some embodiments are directed to a system with a first cryptographic device (10) and second cryptographic device (20). The devices may compute a final seed from a preshared secret known to the devices, and on a pre-seed that exchanged between them. The final seed may be used to derive a common object (a).Type: GrantFiled: June 11, 2020Date of Patent: May 21, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya
-
Patent number: 11991285Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix A being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: January 12, 2023Date of Patent: May 21, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Publication number: 20240062888Abstract: In a method of locating medical equipment to be serviced, a map of a medical facility is accessed using an electronic processing device. The map includes a plurality of medical equipment each having a tag indicative of a location thereof. A user input is received which is indicative of a selection of a medical equipment of the plurality of medical equipment. A list of service actions to be performed for the selected medical equipment is displayed on a display device of the electronic processing device.Type: ApplicationFiled: August 8, 2023Publication date: February 22, 2024Inventors: Sebastiaan Jacobus Antonius DE HOOGH, Sauvik BHATTACHARYA, Falk UHLEMANN, Mauro BARBIERI, Tiblets Zeray DEMEWEZ
-
Patent number: 11909877Abstract: Some embodiments are directed to a public-key encryption device (20) and a private-key decryption device (10). The public-key encryption device is configured to compute a second public-key matrix (u), the second public-key matrix (u) having fewer matrix elements than the first public-key matrix (b) of the private-key decryption device. This reduces computation and bandwidth requirements at the side of the public-key encryption device.Type: GrantFiled: September 2, 2019Date of Patent: February 20, 2024Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Sauvik Bhattacharya, Ludovicus Marinus Gerardus Maria Tolhuizen
-
Publication number: 20240055112Abstract: A service actions database stores credentials for performing respective service actions. A service engineer (SE) database stores credentials of respective SE's. In a method of authorizing a servicing session of a medical device, a service ticket to perform a servicing session of the medical device is received. Credentials of a candidate SE are retrieved from the SE database. One or more service actions are determined for resolving the service ticket. Credentials required to perform the servicing session are retrieved from the service actions database based on the determined one or more service actions. It is determined whether the credentials of the candidate SE satisfy the credentials required to perform the servicing session. An indication is output that the candidate SE is unqualified to perform the servicing session when the credentials of the candidate SE do not satisfy the credentials required to perform the servicing session.Type: ApplicationFiled: August 8, 2023Publication date: February 15, 2024Inventors: Falk UHLEMANN, Sebastiaan Jacobus Antonius DE HOOGH, Sauvik BHATTACHARYA, Mauro BARBIERI, Tiblets Zeray DEMEWEZ
-
Publication number: 20230336346Abstract: An electronic key pre-distribution device (110) for configuring multiple network nodes (210, 211) with local key information is provided. The key pre-distribution device comprises applies at least a first hash function (147) and a second hash function (148) to a digital identifier of a network node. The first and second hash functions map the digital identifier to a first public point (141; H1(ID)) and a second public point (142; H2(ID)) on a first elliptic curve (131) and second elliptic curve (132). A first and second secret isogeny (135) is applied to the first and second public elliptic curve point (141, 142), to obtain a first private elliptic curve point (151) and second private elliptic curve point (152) being part of private key material (155) for the network node (210).Type: ApplicationFiled: June 26, 2023Publication date: October 19, 2023Inventors: Oscar GARCIA MORCHON, Sauvik BHATTACHARYA, Ludovicus Marinus Gerardus Maria TOLHUIZEN, Ronald RIETMAN, I
-
Patent number: 11728988Abstract: An electronic key pre-distribution device for configuring multiple network nodes with local key information is provided. The key pre-distribution device applies at least a first hash function and a second hash function to a digital identifier of a network node. The first and second hash functions map the digital identifier to a first public point and a second public point on a first elliptic curve and second elliptic curve. A first and second secret isogeny are applied to the first and second public elliptic curve points, to obtain a first private elliptic curve point and second private elliptic curve point that are part of private key material for the network node.Type: GrantFiled: February 12, 2018Date of Patent: August 15, 2023Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Sauvik Bhattacharya, Ludovicus Marinus Gerardus Maria Tolhuizen, Ronald Rietman
-
Patent number: 11569993Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: GrantFiled: October 10, 2018Date of Patent: January 31, 2023Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Sauvik Bhattacharya, Jose Luis Torre Arce
-
Patent number: 11483153Abstract: Some embodiments are directed to a cryptographic device (20). A reliable bit function may be applied to a raw shared key (k*) to obtain reliable indices, indicating coefficients of a raw shared key, and reliable bits derived from the indicated coefficients. Reconciliation data (h) may be generated for the indicated coefficients of the raw shared key. A code word may be encapsulated using the reliable bits by applying an encapsulation function, obtaining encapsulated data (c) which may be transferred.Type: GrantFiled: July 17, 2019Date of Patent: October 25, 2022Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia-Morchon, Sauvik Bhattacharya, Ludovicus Marinus Gerardus Maria Tolhuizen
-
Publication number: 20220231843Abstract: Some embodiments are directed to a system with a first cryptographic device (10) and second cryptographic device (20). The devices may compute a final seed from a preshared secret known to the devices, and on a pre-seed that exchanged between them. The final seed may be used to derive a common object (a).Type: ApplicationFiled: June 11, 2020Publication date: July 21, 2022Inventors: OSCAR GARCIA MORCHON, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN, SAUVIK BHATTACHARYA
-
Publication number: 20220078011Abstract: Some embodiments are directed to a public-key encryption device (20) and a private-key decryption device (10). The public-key encryption device is configured to compute a second public-key matrix (u), the second public-key matrix (u) having fewer matrix elements than the first public-key matrix (b) of the private-key decryption device. This reduces computation and bandwidth requirements at the side of the public-key encryption device.Type: ApplicationFiled: September 2, 2019Publication date: March 10, 2022Inventors: OSCAR GARCIA MORCHON, SAUVIK BHATTACHARYA, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN
-
Patent number: 11212098Abstract: A network node (110) is provided configured for a cryptographic protocol based on a shared matrix. The network node is arranged to construct the shared matrix (A) in accordance with the selection data and a shared sequence of values. Multiple entries of the shared matrix are assigned to multiple values of the sequence of data as assigned by the selection data. The shared matrix is applied in the cryptographic protocol.Type: GrantFiled: February 27, 2018Date of Patent: December 28, 2021Assignee: Koninklijke Philips N.V.Inventors: Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Ronald Rietman, Sauvik Bhattacharya
-
Publication number: 20210266164Abstract: Some embodiments are directed to a cryptographic device (20). A reliable bit function may be applied to a raw shared key (k*) to obtain reliable indices, indicating coefficients of a raw shared key, and reliable bits derived from the indicated coefficients. Reconciliation data (h) may be generated for the indicated coefficients of the raw shared key. A code word may be encapsulated using the reliable bits by applying an encapsulation function, obtaining encapsulated data (c) which may be transferred.Type: ApplicationFiled: July 17, 2019Publication date: August 26, 2021Inventors: OSCAR GARCIA-MORCHON, SAUVIK BHATTACHARYA, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN
-
Patent number: 11070367Abstract: A first electronic network node (110) is provided configured for goo a key exchange (KEX) protocol, the first network node is configured to—obtain a shared matrix (A) shared with a second network node, entries in the shared matrix A being selected modulo a first modulus q, generate a private key matrix (SI), entries in the private key matrix being bounded in absolute value by a bound (s) generate a public key matrix (PI) by computing a matrix product between the shared matrix (A) and the private key matrix (SI) modulo the first modulus (q) and scaling the entries in the matrix product down to a second modulus (p).Type: GrantFiled: February 15, 2018Date of Patent: July 20, 2021Assignee: Koninklijke Philips N.V.Inventors: Sauvik Bhattacharya, Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Ronald Rietman
-
Patent number: 11050557Abstract: A first electronic network node (110) is provided configured for a key exchange (KEX) protocol, the first network node is configured to obtain a shared polynomial (a) shared with a second network node, coefficients of the shared polynomial a being selected modulo a first modulus q, generate a private key polynomial (skI), coefficients of the private key polynomial being bounded in absolute value by a bound (s) generate a public key polynomial (pkI) by computing a polynomial product between the shared polynomial (a) and the private key polynomial (skI) modulo the first modulus (q) and scaling the coefficients of the polynomial product down to a second modulus (p).Type: GrantFiled: May 2, 2018Date of Patent: June 29, 2021Assignee: Koninklijke Philips N.V.Inventors: Sauvik Bhattacharya, Oscar Garcia Morchon, Ludovicus Marinus Gerardus Maria Tolhuizen, Ronald Rietman
-
Publication number: 20200259649Abstract: Some embodiments relate to a first electronic network node is provided (110) configured for a cryptographic operation. The first network node is configured to receive as input a difficulty parameter (d), and a structure parameter (n), and to obtain a shared matrix (A), the shared matrix being shared a second network node through a communication interface, entries in the shared matrix (A) being selected modulo a first modulus (q), the shared matrix (A) being a square matrix (k×k) of dimension (k) equal to the difficulty parameter (d) divided by the structure parameter (n), the entries in the shared matrix (A) being polynomials modulo a reduction polynomial (ƒ) of degree equal to the structure parameter (n), said cryptographic operation using the shared matrix.Type: ApplicationFiled: October 10, 2018Publication date: August 13, 2020Inventors: OSCAR GARCIA MORCHON, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN, SAUVIK BHATTACHARYA, JOSE LUIS TORRE ARCE
-
Publication number: 20200153618Abstract: A first electronic network node (110) is provided configured for a key exchange (KEX) protocol, the first network node is configured to obtain a shared polynomial (a) shared with a second network node, coefficients of the shared polynomial a being selected modulo a first modulus q, generate a private key polynomial (skI), coefficients of the private key polynomial being bounded in absolute value by a bound (s) generate a public key polynomial (pkI) by computing a polynomial product between the shared polynomial (a) and the private key polynomial (skI) modulo the first modulus (q) and scaling the coefficients of the polynomial product down to a second modulus (p).Type: ApplicationFiled: May 2, 2018Publication date: May 14, 2020Inventors: SAUVIK BHATTACHARYA, OSCAR GARCIA MORCHON, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN, RONALD RIETMAN
-
Publication number: 20200014534Abstract: An electronic key pre-distribution device (110) for configuring multiple network nodes (210, 211) with local key information is provided. The key pre-distribution device comprises applies at least a first hash function (147) and a second hash function (148) to a digital identifier of a network node. The first and second hash functions map the digital identifier to a first public point (141; H1ID)) and a second public point (142; H2(ID)) on a first elliptic curve (131) and second elliptic curve (132). A first and second secret isogeny (135) is applied to the first and second public elliptic curve point (141, 142), to obtain a first private elliptic curve point (151) and second private elliptic curve point (152) being part of private key material (155) for the network node (210).Type: ApplicationFiled: February 12, 2018Publication date: January 9, 2020Applicant: Koninklijke Phlips N.V.Inventors: Oscar GARCIA MORCHON, Sauvik BHATTACHARYA, Ludovicus Marinus Gerardus Maria TOLHUIZEN, Ronald RIETMAN, I
-
Publication number: 20190386828Abstract: A network node (110) is provided configured for a cryptographic protocol based on a shared matrix. The network node is arranged to construct the shared matrix (A) in accordance with the selection data and a shared sequence of values. Multiple entries of the shared matrix are assigned to multiple values of the sequence of data as assigned by the selection data. The shared matrix is applied in the cryptographic protocol.Type: ApplicationFiled: February 27, 2018Publication date: December 19, 2019Inventors: Oscar GARCIA MORCHON, Ludovicus Marinus Gerardus Maria TOLHUIZEN, Ronald RIETMAN, Sauvik BHATTACHARYA
-
Publication number: 20190386825Abstract: A first electronic network node (110) is provided configured for goo a key exchange (KEX) protocol, the first network node is configured to—obtain a shared matrix (A) shared with a second network node, entries in the shared matrix A being selected modulo a first modulus q, generate a private key matrix (SI), entries in the private key matrix being bounded in absolute value by a bound (s) generate a public key matrix (PI) by computing a matrix product between the shared matrix (A) and the private key matrix (SI) modulo the first modulus (q) and scaling the entries in the matrix product down to a second modulus (p).Type: ApplicationFiled: February 15, 2018Publication date: December 19, 2019Inventors: SAUVIK BHATTACHARYA, OSCAR GARCIA MORCHON, LUDOVICUS MARINUS GERARDUS MARIA TOLHUIZEN, RONALD RIETMAN