Patents by Inventor Abhijit Ambekar

Abhijit Ambekar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240413986
    Abstract: A device may include a cryptographic accelerator configured to perform a cryptographic operation. The device may include a key derivative function (KDF) component configured to receive a ratchet-based key management system (RKMS) key and perfect forward secrecy (PFS) information, and generate a key based on the RKMS key and the PFS information. The device may include a ratchet-based key management system (RKMS) component configured to provide the PFS information to the KDF component in association with generation of one or more keys by the KDF component, receive the key generated by the KDF component, store the key as a successive RKMS key and as a successive output key, provide the successive RKMS key in association with generation of a successive key by the KDF component, and provide an output key to the cryptographic accelerator in association with performing the cryptographic operation.
    Type: Application
    Filed: June 7, 2023
    Publication date: December 12, 2024
    Inventors: Abhijit AMBEKAR, Laurent HEIDT
  • Patent number: 11580229
    Abstract: A computer-implemented method includes: receiving system information data representing configurations of digital systems; receiving attack information data associated one or more of the digital systems; analyzing the received system information data and attack information data, to associated attack types; identifying, for each identified attack type, correlations and/or causalities between individual system constituents or combinations thereof in the digital systems associated with attacks; determining and assigning, based on the identified correlations and/or causalities, an attack vulnerability value, for each attack, respectively, to each of the systems and/or systems' constituents and/or combinations thereof; and retrievably storing attack vulnerability values associated with the systems, system constituents and/or combinations thereof.
    Type: Grant
    Filed: July 30, 2020
    Date of Patent: February 14, 2023
    Assignee: CONTINENTAL TEVES AG & CO. OHG
    Inventors: Abhijit Ambekar, Mohammad Ilyas
  • Patent number: 11550480
    Abstract: A method of identifying errors or manipulations of data or software, includes receiving a first hash value stored in a first block of the memory, receiving a second hash value from a reference memory, and comparing the hash values. If different, error correction information and the content of the first block is received. The content of the first block is reconstructed by in accordance with the error correction information, generating a hash value and comparing the hash value of the modified content with the received first hash value, until the modified content and the received hash values are identical. The content of the first block received from the reference memory and the content of the reconstructed first block stored in the memory of the device are compared for identifying the differences in the content.
    Type: Grant
    Filed: July 7, 2020
    Date of Patent: January 10, 2023
    Assignee: CONTINENTAL TEVES AG & CO. OHG
    Inventors: Marc Sebastian Patric Stöttinger, Abhijit Ambekar
  • Publication number: 20210042422
    Abstract: A computer-implemented method includes: receiving system information data representing configurations of digital systems; receiving attack information data associated one or more of the digital systems; analyzing the received system information data and attack information data, to associated attack types; identifying, for each identified attack type, correlations and/or causalities between individual system constituents or combinations thereof in the digital systems associated with attacks; determining and assigning, based on the identified correlations and/or causalities, an attack vulnerability value, for each attack, respectively, to each of the systems and/or systems' constituents and/or combinations thereof; and retrievably storing attack vulnerability values associated with the systems, system constituents and/or combinations thereof.
    Type: Application
    Filed: July 30, 2020
    Publication date: February 11, 2021
    Inventors: Abhijit AMBEKAR, Mohammad ILYAS
  • Publication number: 20210011632
    Abstract: A method of identifying errors or manipulations of data or software, includes receiving a first hash value stored in a first block of the memory, receiving a second hash value from a reference memory, and comparing the hash values. If different, error correction information and the content of the first block is received. The content of the first block is reconstructed by in accordance with the error correction information, generating a hash value and comparing the hash value of the modified content with the received first hash value, until the modified content and the received hash values are identical. The content of the first block received from the reference memory and the content of the reconstructed first block stored in the memory of the device are compared for identifying the differences in the content.
    Type: Application
    Filed: July 7, 2020
    Publication date: January 14, 2021
    Inventors: Marc Sebastian Patric STÖTTINGER, Abhijit Ambekar