Patents Assigned to Verayo, Inc.
-
Patent number: 9792089Abstract: A random number generator uses a looped circuit that produces pulses dependent on manufacturing variations and noise, and fed into a counting circuit. In certain embodiments, the technology can be merged with a Physical Unclonable Function (PUF) such that a single circuit provides both 1) bits that are unique to each chip that remain fairly similar each time they are queried on the same chip; as well as 2) bits that are random, i.e., different each time the randomness is queried, even on the same device.Type: GrantFiled: September 10, 2014Date of Patent: October 17, 2017Assignee: Verayo, Inc.Inventors: Meng-Day (Mandel) Yu, David M'raihi
-
Publication number: 20160127365Abstract: The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The token interacts with a device and authenticates the user to the system using lower power consumption and minimal bandwidth user for communication. The token may be part of the device or stand alone. The various aspects of the present invention capture a novel design for an authentication token that eliminates the need for user interaction with the token.Type: ApplicationFiled: June 3, 2014Publication date: May 5, 2016Applicant: Verayo, Inc.Inventors: William Henry BARES, David M'RAIHI
-
Publication number: 20160127346Abstract: The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The user can use movements or gesture that are recorded by an accelerometer and the token interacts with a device and authenticates the user to the system. The token may be part of the device or stand alone. The various aspects of the present invention capture a novel design for an authentication token that authenticated the token and the user of the token.Type: ApplicationFiled: June 2, 2014Publication date: May 5, 2016Applicant: Verayo, Inc.Inventors: William Henry BARES, David M'RAIHI, Eric DUPRAT
-
Publication number: 20140331288Abstract: A system and methods are disclosed that limiting the number of challenge/response pairs available to an adversary. In accordance with the various aspects of the present invention, gate the access to an authentication module with a gatekeeper. The system can create a challenge/response protocol whereby the amount of challenge/response information leaked is controlled by the server. The device cannot leak challenge/response pairs when the device is in the possession of or being queried by an adversary or false device.Type: ApplicationFiled: May 1, 2014Publication date: November 6, 2014Applicant: VERAYO, INC.Inventors: Meng-Day (Mandel) YU, David M'RAIHI
-
Patent number: 8811615Abstract: Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of outputs from pseudo-random source(s). In some examples, the numerical ordering of re-generated device-specific quantities is used to re-generate the hidden value, without necessarily requiring additional error correction mechanisms. Information leak may be reduced by constructing system whose “syndrome” helper bits are random, as measured, for example, by NIST's Statistical Tests for Randomness In some examples, index based coding provides coding gain that exponentially reduces total error correction code complexity, resulting in efficiently realizable PRS-based key generation systems. In some examples, index based coding allows noisy PRS to be robust across conditions where conventional error correction code cannot error correct.Type: GrantFiled: August 5, 2010Date of Patent: August 19, 2014Assignee: Verayo, Inc.Inventors: Meng-Day Yu, Srinivas Devadas
-
Patent number: 8782396Abstract: Physical Unclonable Functions (PUFs) for authentication can be implemented in a variety of electronic devices including FPGAs, RFIDs, and ASICs. In some implementations, challenge-response pairs corresponding to individual PUFs can be enrolled and used to determine authentication data, which may be managed in a database. Later when a target object with a PUF is intended to be authenticated a set (or subset) of challenges are applied to each PUF device to authenticate it and thus distinguish it from others. In some examples, authentication is achieved without requiring complex cryptography circuitry implemented on the device. Furthermore, an authentication station does not necessarily have to be in communication with an authority holding the authentication data when a particular device is to be authenticated.Type: GrantFiled: September 19, 2008Date of Patent: July 15, 2014Assignee: Verayo, Inc.Inventors: Thomas Ziola, Zdenek Paral, Srinivas Devadas, Gookwon Edward Suh, Vivek Khandelwal
-
Patent number: 8762723Abstract: An approach to cryptographic security uses a “fuzzy” credential, in contrast to a “hard” credential, to eliminate cryptographic algorithmic repeatability on a device that may be subject to physical attacks. By eliminating repeatability performed at an algorithmic (e.g., gate or software) level, a device inherently lacks one of the fundamental setup assumptions associated with certain classes of side channel, fault injection, timing, and related attacks, thus helps to protect the system against such attacks while preserving the cryptographic security of the system.Type: GrantFiled: July 6, 2012Date of Patent: June 24, 2014Assignee: Verayo, Inc.Inventors: Meng-Day Yu, Srinivas Devadas, David M'Raihi, Eric Duprat
-
Patent number: 8756438Abstract: A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data.Type: GrantFiled: April 20, 2010Date of Patent: June 17, 2014Assignee: Verayo, Inc.Inventors: Srinivas Devadas, Thomas J. Ziola
-
Patent number: 8683210Abstract: An integrated circuit includes a sequence generator configured to generate a series of challenges; a hidden output generator configured to generate a series of hidden outputs, each hidden output a function of a corresponding challenge in the series of challenges; and bit reduction circuitry configured to generate a response sequence including a plurality of response parts, each response part a function of a corresponding plurality of hidden outputs.Type: GrantFiled: November 20, 2009Date of Patent: March 25, 2014Assignee: Verayo, Inc.Inventor: Srinivas Devadas
-
Patent number: 8667283Abstract: A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of accuracy (i.e., high probability of rejection of a forged signature and a low probably of false rejection of a true signature). In some examples, the information shared by a recipient of a message signature includes a parametric model of operational characteristics of the PUF used to form the signature.Type: GrantFiled: May 9, 2011Date of Patent: March 4, 2014Assignee: Verayo, Inc.Inventors: William Henry Bares, Srinivas Devadas, Vivek Khandelwal, Zdenek Paral, Richard Sowell, Tonghang Zhou
-
Patent number: 8630410Abstract: Subsets of multiple signal generator circuits embodied in a device are selected, and then a volatile value for the device is generated from the selected subsets. The volatile value may be used for authentication of the device and/or for cryptographic procedures performed on the device. The signal generator circuits may each comprise an oscillator circuit, and the selection of the subsets may be according to a comparison of the outputs of the subsets of circuits, for example, according to a comparison of output oscillation frequencies.Type: GrantFiled: January 24, 2007Date of Patent: January 14, 2014Assignee: Verayo, Inc.Inventors: Gookwon Edward Suh, Srinivas Devadas
-
Publication number: 20130298211Abstract: The disclosed invention is a system and method that allows for authentication of a user to a network using a token. The token interacts with a device and authenticates the user to the system. The token may be part of the device or stand alone. The various aspects of the present invention capture a novel design for an authentication token that eliminates the need for user interaction with the token.Type: ApplicationFiled: April 2, 2013Publication date: November 7, 2013Applicant: VERAYO, INC.Inventors: David M'Raihi, Srinivas Devadas, WILLIAM HENRY BARES, Meng-Day Mandel Yu, ZDENEK SIDNEY PARAL
-
Patent number: 8468186Abstract: Values generated by at least one pseudo-random source (PRS) are recombined to form one or more recombined values. The method involves using analog, digital, or hybrid manipulation techniques to transform characteristics of PRS, including but not limited to statistical characteristics, and input/output characteristics. In some examples, the recombination method provides a way to de-bias output bits from PRS without appreciable increase in self noise. In some examples, the recombined result passes NIST's Statistical Tests for Randomness even if underlying PRS natively does not. In some examples, the recombination method provides a way to make a PRS challengeable, even if the underlying PRS is not natively challengeable. In some examples, recombination is used to allow single PRS to have multiple outputs, and in some cases multi-dimensional (orthogonal) outputs. In some examples, a multi-modal system is created via recombination using multiple PRS.Type: GrantFiled: August 5, 2010Date of Patent: June 18, 2013Assignee: Verayo, Inc.Inventor: Meng-Day Yu
-
Publication number: 20130010957Abstract: An approach to cryptographic security uses a “fuzzy” credential, in contrast to a “hard” credential, to eliminate cryptographic algorithmic repeatability on a device that may be subject to physical attacks. By eliminating repeatability performed at an algorithmic (e.g., gate or software) level, a device inherently lacks one of the fundamental setup assumptions associated with certain classes of side channel, fault injection, timing, and related attacks, thus helps to protect the system against such attacks while preserving the cryptographic security of the system.Type: ApplicationFiled: July 6, 2012Publication date: January 10, 2013Applicant: Verayo, Inc.Inventors: Meng-Day Yu, Srinivas Devadas, David M'Raihi, Eric Duprat
-
Publication number: 20120290845Abstract: A message is signed using a PUF without having to exactly regenerate a cryptographic key. Another party that shares information about the PUF is able to verify the signature to a high degree of accuracy (i.e., high probability of rejection of a forged signature and a low probably of false rejection of a true signature). In some examples, the information shared by a recipient of a message signature includes a parametric model of operational characteristics of the PUF used to form the signature.Type: ApplicationFiled: May 9, 2011Publication date: November 15, 2012Applicant: Verayo, Inc.Inventors: William Henry Bares, Srinivas Devadas, Vivek Khandelwal, Zdenek Paral, Richard Sowell, Tonghang Zhou
-
Publication number: 20120183135Abstract: A method is used to reliably provision and re-generate a finite and exact sequence of bits, for use with cryptographic applications, e.g., as a key, by employing one or more challengeable Physical Unclonable Function (PUF) circuit elements. The method reverses the conventional paradigm of using public challenges to generate secret PUF responses; it exposes the response and keeps the particular challenges that generate the response secret.Type: ApplicationFiled: January 19, 2011Publication date: July 19, 2012Applicant: Verayo, Inc.Inventors: Zdenek Paral, Srinivas Devadas
-
Publication number: 20110066670Abstract: Values generated by at least one pseudo-random source (PRS) are recombined to form one or more recombined values. The method involves using analog, digital, or hybrid manipulation techniques to transform characteristics of PRS, including but not limited to statistical characteristics, and input/output characteristics. In some examples, the recombination method provides a way to de-bias output bits from PRS without appreciable increase in self noise. In some examples, the recombined result passes NIST's Statistical Tests for Randomness even if underlying PRS natively does not. In some examples, the recombination method provides a way to make a PRS challengeable, even if the underlying PRS is not natively challengeable. In some examples, recombination is used to allow single PRS to have multiple outputs, and in some cases multi-dimensional (orthogonal) outputs. In some examples, a multi-modal system is created via recombination using multiple PRS.Type: ApplicationFiled: August 5, 2010Publication date: March 17, 2011Applicant: Verayo, Inc.Inventor: Meng-Day Yu
-
Publication number: 20110033041Abstract: Outputs from at least one pseudo-random source are used to encode hidden value. The hidden value is encoded using index based quantities, for example, based on numerically ordering a sequence of outputs from pseudo-random source(s). In some examples, the numerical ordering of re-generated device-specific quantities is used to re-generate the hidden value, without necessarily requiring additional error correction mechanisms. Information leak may be reduced by constructing system whose “syndrome” helper bits are random, as measured, for example, by NIST's Statistical Tests for Randomness In some examples, index based coding provides coding gain that exponentially reduces total error correction code complexity, resulting in efficiently realizable PRS-based key generation systems. In some examples, index based coding allows noisy PRS to be robust across conditions where conventional error correction code cannot error correct.Type: ApplicationFiled: August 5, 2010Publication date: February 10, 2011Applicant: Verayo, Inc.Inventors: Meng-Day Yu, Srinivas Devadas
-
Patent number: 7839278Abstract: A key is determined from a volatile response using circuitry on the device. The volatile response depend on process variation in fabrication of the device. Error control data that depends on the first volatile response can be computed, stored externally to the device, and then used to generate the key using a volatile response using the circuit. Applications of volatile keys include authentication and rights management for content and software.Type: GrantFiled: June 16, 2009Date of Patent: November 23, 2010Assignee: Verayo, Inc.Inventors: Srinivas Devadas, Thomas Ziola
-
Publication number: 20100272255Abstract: A field configurable device, such as an FPGA, supports secure field configuration without using non-volatile storage for cryptographic keys on the device and without requiring a continuous or ongoing power source to maintain a volatile storage on the device. The approach can be used to secure the configuration data such that it can in general be used on a single or a selected set of devices and/or encryption of the configuration data so that the encrypted configuration data can be exposed without compromising information encoded in the configuration data.Type: ApplicationFiled: April 20, 2010Publication date: October 28, 2010Applicant: Verayo, Inc.Inventors: Srinivas Devadas, Thomas Ziola