Patents Assigned to Cryptography Research, Inc.
-
Patent number: 11310227Abstract: The embodiments described herein describe technologies for Module management, including Module creation and Module deployment to a target device in an operation phase of a manufacturing lifecycle of the target device in a cryptographic manager (CM) environment. One implementation includes a Root Authority (RA) device that receives a first command to create a Module and executes a Module Template to generate the Module in response to the first command. The RA device receives a second command to create a deployment authorization message. The Module and the deployment authorization message are deployed to an Appliance device. A set of instructions of the Module, when permitted by the deployment authorization message and executed by the Appliance device, results in a secure construction of a sequence of operations to securely provision a data asset to the target device.Type: GrantFiled: February 28, 2020Date of Patent: April 19, 2022Assignee: Cryptography Research, Inc.Inventors: Michael Hamburg, Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev
-
Patent number: 11307253Abstract: An indication of an operating mode of an asynchronous circuit may be received. A determination may be made as to whether the operating mode of the asynchronous circuit corresponds to a self-test of the asynchronous circuit. In response to determining that the operating mode of the asynchronous circuit corresponds to the self-test, a first clock signal may be provided to a first portion of a self-test component in a feedback path of the asynchronous circuit and a second clock signal may be provided to a second portion of the self-test component in the feedback path of the asynchronous circuit. Furthermore, a test value may be generated based on the first clock signal and the second clock signal.Type: GrantFiled: December 29, 2020Date of Patent: April 19, 2022Assignee: Cryptography Research, Inc.Inventor: Matthew Pond Baker
-
Patent number: 11301216Abstract: The embodiments described herein describe technologies of self-timed pattern generators. The self-timed pattern generators can be used to form a random number generator to generate a random digital value. Asynchronous digital logic in a first generator asynchronously updates a next state based on a current state, a second state of a second generator that is before the first generator in the chain or ring topology, and a third state of a third generator that is after the first generator in the chain or ring topology. The self-timed pattern generators are to output a random digital value based at least in part on the current state output from the first generator.Type: GrantFiled: August 21, 2020Date of Patent: April 12, 2022Assignee: Cryptography Research, Inc.Inventor: Scott C. Best
-
Patent number: 11250134Abstract: A container corresponding to executable code may be received. In response to receiving the container, a container manager resident in a memory of a computation environment may be executed to verify the container. The container manager may be verified by a boot loader of the computation environment. Permissions of the container to access the resources of a computation environment may be determined after the verification of the container by the container manager. Access to one or more resources of the computation environment may be provided by transferring control to the one or more resources from the container manager to the container based on the permissions of the container for the resources of the computation environment.Type: GrantFiled: August 10, 2016Date of Patent: February 15, 2022Assignee: Cryptography Research, Inc.Inventor: Ambuj Kumar
-
Patent number: 11251935Abstract: A value corresponding to an input for a cryptographic operation may be received. The value may blinded by multiplying the value based on an exponentiation of a random number raised to an exponent value that is associated with a public key. A cryptographic operation may be performed based on the blinded value.Type: GrantFiled: March 12, 2020Date of Patent: February 15, 2022Assignee: Cryptography Research, Inc.Inventor: Michael Tunstall
-
Patent number: 11228422Abstract: Input signals may be received. Furthermore, a control signal controlling the implementation of a Differential Power Analysis (DPA) countermeasure may be received. One of the input signals may be transmitted as an output signal based on the control signal. A cryptographic operation may be performed based on the first output signal that is transmitted based on the control signal.Type: GrantFiled: January 3, 2020Date of Patent: January 18, 2022Assignee: Cryptography Research, Inc.Inventors: Christopher Gori, Pankaj Rohatgi
-
Patent number: 11200348Abstract: A side-channel attack resistant circuit topology for performing logic functions. This topology includes combinatorial logic to perform the at least one logic function. A logic input selector alternately supplies, in response to a first timing reference signal, an input to the combinatorial logic with noise generating input values and valid input values. A first latch input selector alternately supplies, in response to the first timing reference signal, a first memory element input with noise generating input values and valid logic output values. The valid logic output values are received from the combinatorial logic. A first memory element latches the valid logic output values in response to a second timing reference signal.Type: GrantFiled: October 24, 2019Date of Patent: December 14, 2021Assignee: Cryptography Research, Inc.Inventors: Roberto Rivoir, Elke De Mulder, Jean-Michel Cioranesco
-
Patent number: 11101981Abstract: Share values for use in a cryptographic operation may be received and the cryptographic operation may be performed based on the share values. A pseudorandom number that is to be used by the cryptographic operation may be identified and the pseudorandom number may be generated based on a portion of the share values that are used in the cryptographic operation. The cryptographic operation may then be performed based on the generated pseudorandom number.Type: GrantFiled: June 18, 2019Date of Patent: August 24, 2021Assignee: Cryptography Research, Inc.Inventors: Pankaj Rohatgi, Elke De Mulder, Michael Hutter
-
Patent number: 11082224Abstract: A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with the second entity. A location associated with the first entity may be identified. Furthermore, a first key may be generated based on a combination of the location associated with the first entity and a private key that corresponds to the public key. The first key may decrypt data encrypted by the second key when the location associated with the first entity corresponds to the location associated with the second entity.Type: GrantFiled: June 19, 2019Date of Patent: August 3, 2021Assignee: Cryptography Research, Inc.Inventors: Ambuj Kumar, Mark Evan Marson, Daniel Robert Beitel
-
Patent number: 11063755Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.Type: GrantFiled: May 7, 2019Date of Patent: July 13, 2021Assignee: Cryptography Research, Inc.Inventor: Helena Handschuh
-
Patent number: 11042488Abstract: A symmetric key that is stored at a device may be received. A public key from a remote entity may also be received at the device. Furthermore, a derived key may be generated based on a one way function between the symmetric key that is stored at the device and the public key that is received from the remote entity. The derived key may be encrypted with the public key and transmitted to the remote entity. The encryption of the derived key with the public key may provide secure transmission of the derived key to an authorized remote entity with a private key that may be used to decrypt the encrypted derived key.Type: GrantFiled: May 27, 2016Date of Patent: June 22, 2021Assignee: Cryptography Research, Inc.Inventor: Ambuj Kumar
-
Patent number: 11032060Abstract: A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is updated using a second equation that is based on the second share value. One of the value of the first register or the value of the second register is selected based on a bit value of the second share value.Type: GrantFiled: August 7, 2019Date of Patent: June 8, 2021Assignee: Cryptography Research, Inc.Inventor: Michael Tunstall
-
Patent number: 11010494Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.Type: GrantFiled: September 10, 2019Date of Patent: May 18, 2021Assignee: Cryptography Research, Inc.Inventors: Ambuj Kumar, William Craig Rawlings, Ronald Perez, Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Paul Kocher
-
Patent number: 10999057Abstract: A container corresponding to executable code may be received. In response receiving the container, an assertion value may be stored in an assertion register. A final canary value may be generated based on a cycles combining a prior canary value and a mix value. A determination may be made as to whether the final canary value matches with the assertion value stored in the assertion register. In response to determining that the final canary value matches with the assertion value, one or more privilege registers may be programmed to provide access to hardware resources for the container corresponding to the executable user code.Type: GrantFiled: December 20, 2019Date of Patent: May 4, 2021Assignee: Cryptography Research, Inc.Inventors: Michael A. Hamburg, Megan Anneke Wachs
-
Patent number: 10999264Abstract: A base key that is stored at a device may be received. A network identification may further be received. A device identification key may be generated based on a combination of the network identification and the base key. Furthermore, the device identification key may be used to authenticate the device with a network that corresponds to the network identification.Type: GrantFiled: August 24, 2015Date of Patent: May 4, 2021Assignee: Cryptography Research, Inc.Inventors: Philippe Alain Martineau, Ambuj Kumar, William Craig Rawlings
-
Patent number: 10915667Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.Type: GrantFiled: December 13, 2017Date of Patent: February 9, 2021Assignee: Cryptography Research, Inc.Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
-
Patent number: 10911221Abstract: A first hash value is calculated by using a first input value that is stored in a first set of registers. The first hash value is then stored in a second set of registers. A second input value is stored in the first set of registers after calculating the first hash value. The second hash value is calculated based on the first hash value and the second input value. During the calculating of the second hash value, the first hash value is shifted from the second set of registers to a portion of the first set of registers when the calculating of the second hash value has reached a state where the portion of the first set of registers is no longer used to store the second input value.Type: GrantFiled: October 17, 2019Date of Patent: February 2, 2021Assignee: Cryptography Research, Inc.Inventors: Michael Hutter, Matthew Pond Baker
-
Patent number: 10902096Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.Type: GrantFiled: October 28, 2019Date of Patent: January 26, 2021Assignee: Cryptography Research, Inc.Inventors: Paul C. Kocher, Helena Handschuh
-
Patent number: 10897344Abstract: Systems and methods for performing cryptographic data processing operations in a manner resistant to external monitoring attacks. An example method may comprise: executing, by a processing device, a first data manipulation instruction, the first data manipulation instruction affecting a state of the processing device; executing a second data manipulation instruction, the second data manipulation instruction interacting with said internal state; and breaking a detectable interaction of the first data manipulation instruction and the second data manipulation instruction by executing a third data manipulation instruction utilizing an unpredictable data item.Type: GrantFiled: July 23, 2019Date of Patent: January 19, 2021Assignee: Cryptography Research, Inc.Inventors: Sami James Saab, Pankaj Rohatgi, Craig E. Hampel
-
Patent number: 10896137Abstract: A first non-volatile memory may store first data and a second non-volatile memory may store second data. An authentication component may be coupled with the first non-volatile memory and the second non-volatile memory and may receive a request to perform an authentication operation. In response to the request to perform the authentication operation, the authentication component may access the first data stored at the first non-volatile memory and the second data stored at the second non-volatile memory and determine whether the second data stored at the second non-volatile memory has become unreliable based on a memory disturbance condition. In response to determining that the second data stored at the second non-volatile memory has become unreliable, a corrective action associated with the first data stored at the first non-volatile memory may be performed.Type: GrantFiled: May 23, 2019Date of Patent: January 19, 2021Assignee: Cryptography Research, Inc.Inventors: Scott C. Best, Brent S. Haukness, Carl W. Werner