Patents by Inventor Arnaud Boscher
Arnaud Boscher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210399899Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: ApplicationFiled: July 8, 2021Publication date: December 23, 2021Applicant: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 11063768Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: GrantFiled: March 31, 2020Date of Patent: July 13, 2021Assignee: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20200382316Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: ApplicationFiled: March 31, 2020Publication date: December 3, 2020Applicant: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 10630482Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: GrantFiled: April 13, 2017Date of Patent: April 21, 2020Assignee: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20170287366Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.Type: ApplicationFiled: April 13, 2017Publication date: October 5, 2017Applicant: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 9653004Abstract: A method for downloading information into a secure non-volatile memory of a secure embedded device (SED) during a manufacturing or personalization process. The method involves communicating the information and a software program from a device to a temporary storage memory of the SED. The method also involves starting the software program provided to facilitate an initialization of a first key and to facilitate a transfer of at least a portion of the information from the temporary storage memory to the secure non-volatile memory. In response to starting, the software program, the first key is initialized and the portion of information is transformed into transformed information locally at the SED using at least one of a scramble algorithm and a cipher algorithm. Thereafter, the transformed information is written to a memory element of the secure non-volatile memory.Type: GrantFiled: October 16, 2008Date of Patent: May 16, 2017Assignee: Cypress Semiconductor CorporationInventors: Arnaud Boscher, Nicolas Prawitz
-
Patent number: 9524144Abstract: Data processing method and related devices for determining the result of a first type of operation involving an operand in an electronic entity comprising a non-volatile storage unit, includes the following steps: converting a data, derived from at least one key portion designed to be used with the operand in the first type of operation, into a key data adapted to be used with the operand in a second type of operation; storing the key data in the non-volatile storage unit; reading in the non-volatile storage unit the key data; performing the second type of operation with the read key data and the operand.Type: GrantFiled: December 16, 2005Date of Patent: December 20, 2016Assignee: OBERTHUR TECHNOLOGIESInventors: Arnaud Boscher, Robert Naciri
-
Publication number: 20140359268Abstract: Disclosed are methods and apparatus for changing a security key on a computer chip that has a CPU, a first OTPROM (OTPROM1) storing a root key of the chip or derivative thereof (RKPUB1), and a second OTPROM (OTPROM2) on which the chip manufacturer stores nothing. A ROM of the chip stores a first software program (SW1). A device manufacturer can take that chip and interface it to a mass memory of a memory block of an electronic device, then execute a second software program (SW2) that is stored on the mass memory only if SW2 is authenticated by SW1 using the RKPUB1. Then a new root key of the chip or derivative thereof (RKPUB2) is provided (via SW2 or a USB connection for example) which is stored to the OTPROM2 via a security service portion of SW1. Thereafter RKPUB2 can be used to authenticate SW2.Type: ApplicationFiled: May 30, 2014Publication date: December 4, 2014Applicant: Broadcom CorporationInventors: Antti JAUHIAINEN, Vesa PELLIKKA, Arnaud BOSCHER, Kenichi ITO, Taina Maria ANTTILA
-
Patent number: 8774400Abstract: Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman (“RSA”) cryptography using the Chinese Remainder Theorem (“CRT”) are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.Type: GrantFiled: January 3, 2008Date of Patent: July 8, 2014Assignee: Spansion LLCInventors: Arnaud Boscher, Elena Vasilievna Trichina, Helena Handschuh
-
Patent number: 8682951Abstract: A data processing method, whereby an element is subjected to a first operation with a given operand. The method includes a step of updating by a second operation a first variable (B; a0; S?p, S?q) or a second variable (A; a1; Sp, Sq), depending on whether a corresponding bit of the operand=0 or 1; and a step of testing a relationship between a first value (B; a0; S?) derived from the first variable and a second value (A; a1; S) derived from the second variable. A related device is also disclosed.Type: GrantFiled: March 27, 2006Date of Patent: March 25, 2014Assignee: Oberthur TechnologiesInventors: Arnaud Boscher, Christophe Giraud, Robert Naciri
-
Patent number: 8670557Abstract: Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates securing data associated with messages in accordance with a cryptographic protocol. The cryptographic component includes a randomized exponentiation component that facilitates decryption of data and generation of digital signatures by exponentiating exponents associated with messages. An exponent is divided into more than one subexponent at an exponent bit that corresponds to a random number. Exponentiation of the first subexponent can be performed based on a left-to-right-type of exponentiation algorithm, and exponentiation of the second subexponent can be performed based on a right-to-left square-and-multiply-type of exponentiation algorithm. The final value is based on the exponentiations of the subexponents and can be decrypted data or a digital signature, which can be provided as an output.Type: GrantFiled: September 10, 2007Date of Patent: March 11, 2014Assignee: Spansion LLCInventors: Elena Trichina, Helena Handschuh, Arnaud Boscher
-
Patent number: 8370644Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.Type: GrantFiled: May 30, 2008Date of Patent: February 5, 2013Assignee: Spansion LLCInventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joël Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau
-
Patent number: 8139763Abstract: Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data decryption, and/or generation of digital signatures, associated with messages. The cryptographic component includes a randomized exponentiation component that facilitates decryption of data and/or generation of digital signatures by exponentiating exponents associated with messages. A random number is generated and utilized to randomize the value of a message. After an exponentiation is performed on the randomized message value, intermediate results can be analyzed to determine if there was error in the exponentiation. If there was no error in the exponentiation, a final value of the exponentiation is determined and provided as output as decrypted data or a digital signature; if there is error, an “error” output can be provided.Type: GrantFiled: October 10, 2007Date of Patent: March 20, 2012Assignee: Spansion LLCInventors: Arnaud Boscher, Elena Vasilievna Trichina, Helena Handschuh
-
Patent number: 8140746Abstract: Systems and/or methods that facilitate data management on a memory device are presented. A data management component can log and tag data creating data tags. The data tags can comprise static metadata, dynamic metadata or a combination thereof. The data management component can perform file management to allocate placement of data and data tags to the memory or to erase data from the memory. Allocation and erasure are based in part on the characteristics of the data tags, and can follow embedded rules, an intelligent component or a combination thereof. The data management component can provide a search activity that can utilize the characteristics of the data tags and an intelligent component. The data management component can thereby optimize the useful life, increase operating speed, improve accuracy and precision, improve efficiency of non-volatile (e.g., flash) memory and provide improved functionality to memory devices.Type: GrantFiled: December 14, 2007Date of Patent: March 20, 2012Assignee: Spansion LLCInventors: Elena Trichina, Arnaud Boscher
-
Publication number: 20100100747Abstract: A method (400) for downloading information into a secure non-volatile memory (150) of a secure embedded device (SEP) during a manufacturing or personalization process. The method involves communicating the information and a software program from a device (104) to a temporary storage memory (108) of the SEP (106). The method also involves starting the software program provided to facilitate an initialization of a first key and to facilitate a transfer of at least a portion of the information from the temporary storage memory to the secure non-volatile memory. In response to starting the software program, the first key is initialized and the portion of information is transformed into transformed information locally at the SED using at least one of an SED scramble algorithm and a cipher algorithm. Thereafter, the transformed information is written to a memory element (216) of the secure non-volatile memory.Type: ApplicationFiled: October 16, 2008Publication date: April 22, 2010Inventors: Arnaud Boscher, Nicolas Prawitz
-
Publication number: 20090300312Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.Type: ApplicationFiled: May 30, 2008Publication date: December 3, 2009Applicant: SPANSION LLCInventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joel Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau
-
Publication number: 20090240756Abstract: A data processing method, whereby an element is subjected to a first operation with a given operand. The method includes a step of updating by a second operation a first variable (B; a0; S?p, S?q) or a second variable (A; a1; Sp, Sq), depending on whether a corresponding bit of the operand=0 or 1; and a step of testing a relationship between a first value (B; a0; S?) derived from the first variable and a second value (A; a1; S) derived from the second variable. A related device is also disclosed.Type: ApplicationFiled: March 27, 2006Publication date: September 24, 2009Applicant: OBERTHUR CARD SYSTEMS SAInventors: Arnaud Boscher, Christophe Giraud, Robert Naciri
-
Publication number: 20090175441Abstract: Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman (“RSA”) cryptography using the Chinese Remainder Theorem (“CRT”) are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.Type: ApplicationFiled: January 3, 2008Publication date: July 9, 2009Applicant: SPANSION LLCInventors: Arnaud Boscher, Elena Vasilievna Trichina, Helena Handschuh
-
Publication number: 20090157948Abstract: Systems and/or methods that facilitate data management on a memory device are presented. A data management component can log and tag data creating data tags. The data tags can comprise static metadata, dynamic metadata or a combination thereof. The data management component can perform file management to allocate placement of data and data tags to the memory or to erase data from the memory. Allocation and erasure are based in part on the characteristics of the data tags, and can follow embedded rules, an intelligent component or a combination thereof. The data management component can provide a search activity that can utilize the characteristics of the data tags and an intelligent component. The data management component can thereby optimize the useful life, increase operating speed, improve accuracy and precision, improve efficiency of non-volatile (e.g., flash) memory and provide improved functionality to memory devices.Type: ApplicationFiled: December 14, 2007Publication date: June 18, 2009Applicant: SPANSION LLCInventors: Elena Trichina, Arnaud Boscher
-
Publication number: 20090125727Abstract: A method for cryptographic processing of a message by a secret key includes the following steps: determination of a third data item (a0) and a fifth data item (a1?eCtrl), including calculation, as a function at least of a first data item (m) obtained from the message and a second data item (d) obtained from the secret key, of the third data item (a0) and a fourth data item (a1) linked by a verification relationship, and including obtaining the fifth data item (a1?eCtrl) by combination of the fourth data item (a1) and a data item (eCtrl) representing the second data item (d); verification of the verification relationship between the third data item and a combination of the fifth data item and the second data item.Type: ApplicationFiled: May 7, 2008Publication date: May 14, 2009Applicant: OBERTHUR TECHNOLOGIESInventors: Robert Naciri, Arnaud Boscher