Patents by Inventor Arnaud Boscher

Arnaud Boscher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210399899
    Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.
    Type: Application
    Filed: July 8, 2021
    Publication date: December 23, 2021
    Applicant: Cypress Semiconductor Corporation
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Patent number: 11063768
    Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.
    Type: Grant
    Filed: March 31, 2020
    Date of Patent: July 13, 2021
    Assignee: Cypress Semiconductor Corporation
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Publication number: 20200382316
    Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.
    Type: Application
    Filed: March 31, 2020
    Publication date: December 3, 2020
    Applicant: Cypress Semiconductor Corporation
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Patent number: 10630482
    Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: April 21, 2020
    Assignee: Cypress Semiconductor Corporation
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Publication number: 20170287366
    Abstract: An example secure embedded device includes a secure non-volatile memory coupled to a processor. The processor provides a scramble or cipher key and uses a scramble algorithm or a cipher algorithm to scramble or cipher information received from an external device into transformed information. The processor writes a least a portion of the transformed information to a plurality of memory locations of the secure non-volatile memory. The plurality of memory locations is based on the scramble or cipher key.
    Type: Application
    Filed: April 13, 2017
    Publication date: October 5, 2017
    Applicant: Cypress Semiconductor Corporation
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Patent number: 9653004
    Abstract: A method for downloading information into a secure non-volatile memory of a secure embedded device (SED) during a manufacturing or personalization process. The method involves communicating the information and a software program from a device to a temporary storage memory of the SED. The method also involves starting the software program provided to facilitate an initialization of a first key and to facilitate a transfer of at least a portion of the information from the temporary storage memory to the secure non-volatile memory. In response to starting, the software program, the first key is initialized and the portion of information is transformed into transformed information locally at the SED using at least one of a scramble algorithm and a cipher algorithm. Thereafter, the transformed information is written to a memory element of the secure non-volatile memory.
    Type: Grant
    Filed: October 16, 2008
    Date of Patent: May 16, 2017
    Assignee: Cypress Semiconductor Corporation
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Patent number: 9524144
    Abstract: Data processing method and related devices for determining the result of a first type of operation involving an operand in an electronic entity comprising a non-volatile storage unit, includes the following steps: converting a data, derived from at least one key portion designed to be used with the operand in the first type of operation, into a key data adapted to be used with the operand in a second type of operation; storing the key data in the non-volatile storage unit; reading in the non-volatile storage unit the key data; performing the second type of operation with the read key data and the operand.
    Type: Grant
    Filed: December 16, 2005
    Date of Patent: December 20, 2016
    Assignee: OBERTHUR TECHNOLOGIES
    Inventors: Arnaud Boscher, Robert Naciri
  • Publication number: 20140359268
    Abstract: Disclosed are methods and apparatus for changing a security key on a computer chip that has a CPU, a first OTPROM (OTPROM1) storing a root key of the chip or derivative thereof (RKPUB1), and a second OTPROM (OTPROM2) on which the chip manufacturer stores nothing. A ROM of the chip stores a first software program (SW1). A device manufacturer can take that chip and interface it to a mass memory of a memory block of an electronic device, then execute a second software program (SW2) that is stored on the mass memory only if SW2 is authenticated by SW1 using the RKPUB1. Then a new root key of the chip or derivative thereof (RKPUB2) is provided (via SW2 or a USB connection for example) which is stored to the OTPROM2 via a security service portion of SW1. Thereafter RKPUB2 can be used to authenticate SW2.
    Type: Application
    Filed: May 30, 2014
    Publication date: December 4, 2014
    Applicant: Broadcom Corporation
    Inventors: Antti JAUHIAINEN, Vesa PELLIKKA, Arnaud BOSCHER, Kenichi ITO, Taina Maria ANTTILA
  • Patent number: 8774400
    Abstract: Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman (“RSA”) cryptography using the Chinese Remainder Theorem (“CRT”) are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.
    Type: Grant
    Filed: January 3, 2008
    Date of Patent: July 8, 2014
    Assignee: Spansion LLC
    Inventors: Arnaud Boscher, Elena Vasilievna Trichina, Helena Handschuh
  • Patent number: 8682951
    Abstract: A data processing method, whereby an element is subjected to a first operation with a given operand. The method includes a step of updating by a second operation a first variable (B; a0; S?p, S?q) or a second variable (A; a1; Sp, Sq), depending on whether a corresponding bit of the operand=0 or 1; and a step of testing a relationship between a first value (B; a0; S?) derived from the first variable and a second value (A; a1; S) derived from the second variable. A related device is also disclosed.
    Type: Grant
    Filed: March 27, 2006
    Date of Patent: March 25, 2014
    Assignee: Oberthur Technologies
    Inventors: Arnaud Boscher, Christophe Giraud, Robert Naciri
  • Patent number: 8670557
    Abstract: Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates securing data associated with messages in accordance with a cryptographic protocol. The cryptographic component includes a randomized exponentiation component that facilitates decryption of data and generation of digital signatures by exponentiating exponents associated with messages. An exponent is divided into more than one subexponent at an exponent bit that corresponds to a random number. Exponentiation of the first subexponent can be performed based on a left-to-right-type of exponentiation algorithm, and exponentiation of the second subexponent can be performed based on a right-to-left square-and-multiply-type of exponentiation algorithm. The final value is based on the exponentiations of the subexponents and can be decrypted data or a digital signature, which can be provided as an output.
    Type: Grant
    Filed: September 10, 2007
    Date of Patent: March 11, 2014
    Assignee: Spansion LLC
    Inventors: Elena Trichina, Helena Handschuh, Arnaud Boscher
  • Patent number: 8370644
    Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.
    Type: Grant
    Filed: May 30, 2008
    Date of Patent: February 5, 2013
    Assignee: Spansion LLC
    Inventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joël Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau
  • Patent number: 8139763
    Abstract: Systems and/or methods that facilitate secure electronic communication of data are presented. A cryptographic component facilitates data encryption, data decryption, and/or generation of digital signatures, associated with messages. The cryptographic component includes a randomized exponentiation component that facilitates decryption of data and/or generation of digital signatures by exponentiating exponents associated with messages. A random number is generated and utilized to randomize the value of a message. After an exponentiation is performed on the randomized message value, intermediate results can be analyzed to determine if there was error in the exponentiation. If there was no error in the exponentiation, a final value of the exponentiation is determined and provided as output as decrypted data or a digital signature; if there is error, an “error” output can be provided.
    Type: Grant
    Filed: October 10, 2007
    Date of Patent: March 20, 2012
    Assignee: Spansion LLC
    Inventors: Arnaud Boscher, Elena Vasilievna Trichina, Helena Handschuh
  • Patent number: 8140746
    Abstract: Systems and/or methods that facilitate data management on a memory device are presented. A data management component can log and tag data creating data tags. The data tags can comprise static metadata, dynamic metadata or a combination thereof. The data management component can perform file management to allocate placement of data and data tags to the memory or to erase data from the memory. Allocation and erasure are based in part on the characteristics of the data tags, and can follow embedded rules, an intelligent component or a combination thereof. The data management component can provide a search activity that can utilize the characteristics of the data tags and an intelligent component. The data management component can thereby optimize the useful life, increase operating speed, improve accuracy and precision, improve efficiency of non-volatile (e.g., flash) memory and provide improved functionality to memory devices.
    Type: Grant
    Filed: December 14, 2007
    Date of Patent: March 20, 2012
    Assignee: Spansion LLC
    Inventors: Elena Trichina, Arnaud Boscher
  • Publication number: 20100100747
    Abstract: A method (400) for downloading information into a secure non-volatile memory (150) of a secure embedded device (SEP) during a manufacturing or personalization process. The method involves communicating the information and a software program from a device (104) to a temporary storage memory (108) of the SEP (106). The method also involves starting the software program provided to facilitate an initialization of a first key and to facilitate a transfer of at least a portion of the information from the temporary storage memory to the secure non-volatile memory. In response to starting the software program, the first key is initialized and the portion of information is transformed into transformed information locally at the SED using at least one of an SED scramble algorithm and a cipher algorithm. Thereafter, the transformed information is written to a memory element (216) of the secure non-volatile memory.
    Type: Application
    Filed: October 16, 2008
    Publication date: April 22, 2010
    Inventors: Arnaud Boscher, Nicolas Prawitz
  • Publication number: 20090300312
    Abstract: Systems and methods that facilitate securing data associated with a memory from security breaches are presented. A memory component includes nonvolatile memory, and a secure memory component (e.g., volatile memory) used to store information such as secret information related to secret processes or functions (e.g., cryptographic functions). A security component detects security-related events, such as security breaches or completion of security processes or functions, associated with the memory component and in response to a security-related event, the security component can transmit a reset signal to the secure memory component to facilitate efficiently erasing or resetting desired storage locations in the secure memory component in parallel and in a single clock cycle to facilitate data security. A random number generator component can facilitate generating random numbers after a reset based on a change in scrambler keys used by a scrambler component to descramble data read from the reset storage locations.
    Type: Application
    Filed: May 30, 2008
    Publication date: December 3, 2009
    Applicant: SPANSION LLC
    Inventors: Helena Handschuh, Arnaud Boscher, Elena Trichina, Joel Le Bihan, Nicolas Prawitz, Frederic Cherpantier, Jimmy Lau
  • Publication number: 20090240756
    Abstract: A data processing method, whereby an element is subjected to a first operation with a given operand. The method includes a step of updating by a second operation a first variable (B; a0; S?p, S?q) or a second variable (A; a1; Sp, Sq), depending on whether a corresponding bit of the operand=0 or 1; and a step of testing a relationship between a first value (B; a0; S?) derived from the first variable and a second value (A; a1; S) derived from the second variable. A related device is also disclosed.
    Type: Application
    Filed: March 27, 2006
    Publication date: September 24, 2009
    Applicant: OBERTHUR CARD SYSTEMS SA
    Inventors: Arnaud Boscher, Christophe Giraud, Robert Naciri
  • Publication number: 20090175441
    Abstract: Systems and methods for effectively protecting data against differential fault analysis involved in Rivest, Shamir, and Adleman (“RSA”) cryptography using the Chinese Remainder Theorem (“CRT”) are described herein. A CRT RSA component facilitates modular exponentiation of a received message, and a verification component reconstructs the received message. An exponentiation component performs a first modular exponentiation and a second modular exponentiation of the received message. A recombination component performs a recombination step utilizing CRT computation as a function of the first and second modular exponentiations. A modular exponentiation component performs first and second public exponent derivations as a function of a private exponent. The verification component can reconstructs the received message as a function of the first and second public exponent derivations. The verification component calculates the received message utilizing Chinese Remainder Theorem computation.
    Type: Application
    Filed: January 3, 2008
    Publication date: July 9, 2009
    Applicant: SPANSION LLC
    Inventors: Arnaud Boscher, Elena Vasilievna Trichina, Helena Handschuh
  • Publication number: 20090157948
    Abstract: Systems and/or methods that facilitate data management on a memory device are presented. A data management component can log and tag data creating data tags. The data tags can comprise static metadata, dynamic metadata or a combination thereof. The data management component can perform file management to allocate placement of data and data tags to the memory or to erase data from the memory. Allocation and erasure are based in part on the characteristics of the data tags, and can follow embedded rules, an intelligent component or a combination thereof. The data management component can provide a search activity that can utilize the characteristics of the data tags and an intelligent component. The data management component can thereby optimize the useful life, increase operating speed, improve accuracy and precision, improve efficiency of non-volatile (e.g., flash) memory and provide improved functionality to memory devices.
    Type: Application
    Filed: December 14, 2007
    Publication date: June 18, 2009
    Applicant: SPANSION LLC
    Inventors: Elena Trichina, Arnaud Boscher
  • Publication number: 20090125727
    Abstract: A method for cryptographic processing of a message by a secret key includes the following steps: determination of a third data item (a0) and a fifth data item (a1?eCtrl), including calculation, as a function at least of a first data item (m) obtained from the message and a second data item (d) obtained from the secret key, of the third data item (a0) and a fourth data item (a1) linked by a verification relationship, and including obtaining the fifth data item (a1?eCtrl) by combination of the fourth data item (a1) and a data item (eCtrl) representing the second data item (d); verification of the verification relationship between the third data item and a combination of the fifth data item and the second data item.
    Type: Application
    Filed: May 7, 2008
    Publication date: May 14, 2009
    Applicant: OBERTHUR TECHNOLOGIES
    Inventors: Robert Naciri, Arnaud Boscher