Patents by Inventor Balaji Badam

Balaji Badam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9323950
    Abstract: An integrated circuit device comprises a processor and a secure protection zone with security properties that can be verified by a remote device communicating with the integrated circuit device. The secure protection zone includes a persistent storage that is configured for storing cryptographic keys and data. The secure protection zone also includes instructions that are configured for causing the processor to perform cryptographic operations using the cryptographic keys. In addition, the secure protection zone includes an ephemeral memory that is configured for storing information associated with the cryptographic operations. The instructions are configured for causing the processor to perform the cryptographic operations on the data stored in the persistent storage and the information in the ephemeral memory as part of a secure communication exchange with the remote device.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: April 26, 2016
    Assignee: Atmel Corporation
    Inventors: Kerry Maletsky, David Durant, Balaji Badam, Michael Seymour
  • Patent number: 9182802
    Abstract: A method and device include a power pin, a ground pin, and a communications pin. A communications module receives power from the power pin and utilizes an edge counting communication protocol over the communication pin.
    Type: Grant
    Filed: October 22, 2013
    Date of Patent: November 10, 2015
    Assignee: Atmel Corporation
    Inventors: Kerry David Maletsky, David Durant, John Landreman, Balaji Badam
  • Patent number: 9076002
    Abstract: A hardware authentication device is disclosed that uses a cryptographic signature verification operation to authorize a subsequent cryptographic operation to be performed using the same or different keys and stores that authorization status in protected memory. The cryptographic algorithm may be an ECDSA signature, SHA-based Message Authentication Code (MAC) or any other cryptographic algorithm. The authorization status may be stored for a number of uses for a period of time or until a certain event occurs. In some implementations, the authorization status and the key that was authorized are stored in the same protected location in memory to preserve their relation to each other and prevent modification of either of them. Depending on system policy, the authorization mechanism might be a static stored external token that authorizes key use or an authorization process that is regenerated using a random (e.g., unique) number.
    Type: Grant
    Filed: March 7, 2013
    Date of Patent: July 7, 2015
    Assignee: Atmel Corporation
    Inventors: Kerry Maletsky, Balaji Badam
  • Patent number: 8909929
    Abstract: Systems and techniques for performing cryptographic operations based on public key validity registers are described. A described system includes a controller and a memory structure to store one or more public keys. The memory structure includes one or more validity registers that respectively correspond to the one or more public keys. The controller has exclusive write access to the validity register. The controller can be configured to perform an authentication of a public key, write an authentication status value to the corresponding validity register based on a result of the authentication, and perform one or more cryptographic operations using the public key that are conditional on the validity register indicating an authenticated status for the public key.
    Type: Grant
    Filed: May 31, 2012
    Date of Patent: December 9, 2014
    Assignee: Atmel Corporation
    Inventors: Balaji Badam, Kerry Maletsky, David Durant
  • Publication number: 20140258729
    Abstract: A hardware authentication device is disclosed that uses a cryptographic signature verification operation to authorize a subsequent cryptographic operation to be performed using the same or different keys and stores that authorization status in protected memory. The cryptographic algorithm may be an ECDSA signature, SHA-based Message Authentication Code (MAC) or any other cryptographic algorithm. The authorization status may be stored for a number of uses for a period of time or until a certain event occurs. In some implementations, the authorization status and the key that was authorized are stored in the same protected location in memory to preserve their relation to each other and prevent modification of either of them. Depending on system policy, the authorization mechanism might be a static stored external token that authorizes key use or an authorization process that is regenerated using a random (e.g., unique) number.
    Type: Application
    Filed: March 7, 2013
    Publication date: September 11, 2014
    Applicant: ATMEL CORPORATION
    Inventors: Kerry Maletsky, Balaji Badam
  • Patent number: 8719588
    Abstract: Apparatus, systems, and methods may operate to provide, to a memory device, an obfuscated clear-page address derived from a clear-page address that is not the same as a key-page address and/or providing, to the memory device, an obfuscated key-page address derived from the key-page address when the obfuscated clear-page address is the same as the key-page address. Additional apparatus, systems, and methods are disclosed.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: May 6, 2014
    Assignee: Atmel Corporation
    Inventors: Brad Garner, Balaji Badam
  • Publication number: 20140089670
    Abstract: Methods and systems are disclosed for verifying the use of a client device by a host device in a secure system. In one aspect, a method for authenticating a client device includes receiving, by the client device, a message from a host device, accessing, by the client device, a private key and a unique code stored on the client device, where the unique code is different than the private key, generating, by the client device, a digital signature for the message using the private key and the unique code, and providing, by the client device, the digital signature to the host device for verification of the use of the client device by the host device.
    Type: Application
    Filed: September 27, 2012
    Publication date: March 27, 2014
    Applicant: Atmel Corporation
    Inventors: Kerry Maletsky, David Durant, Balaji Badam, Michael J. Seymour
  • Patent number: 8677145
    Abstract: A method and device include a power pin, a ground pin, and a communications pin. A communications module receives power from the power pin and utilizes an edge counting communication protocol over the communication pin.
    Type: Grant
    Filed: February 27, 2009
    Date of Patent: March 18, 2014
    Assignee: Atmel Corporation
    Inventors: Kerry Maletsky, David Durant, John Landreman, Balaji Badam
  • Publication number: 20140047250
    Abstract: A method and device include a power pin, a ground pin, and a communications pin. A communications module receives power from the power pin and utilizes an edge counting communication protocol over the communication pin.
    Type: Application
    Filed: October 22, 2013
    Publication date: February 13, 2014
    Applicant: Atmel Corporation
    Inventors: Kerry David MALETSKY, David DURANT, John LANDREMAN, Balaji BADAM
  • Publication number: 20140025944
    Abstract: An integrated circuit device comprises a processor and a secure protection zone with security properties that can be verified by a remote device communicating with the integrated circuit device. The secure protection zone includes a persistent storage that is configured for storing cryptographic keys and data. The secure protection zone also includes instructions that are configured for causing the processor to perform cryptographic operations using the cryptographic keys. In addition, the secure protection zone includes an ephemeral memory that is configured for storing information associated with the cryptographic operations. The instructions are configured for causing the processor to perform the cryptographic operations on the data stored in the persistent storage and the information in the ephemeral memory as part of a secure communication exchange with the remote device.
    Type: Application
    Filed: July 19, 2012
    Publication date: January 23, 2014
    Applicant: ATMEL CORPORATION
    Inventors: Kerry Maletsky, David Durant, Balaji Badam, Michael Seymour
  • Publication number: 20130326219
    Abstract: Systems and techniques for performing cryptographic operations based on public key validity registers are described. A described system includes a controller and a memory structure to store one or more public keys. The memory structure includes one or more validity registers that respectively correspond to the one or more public keys. The controller has exclusive write access to the validity register. The controller can be configured to perform an authentication of a public key, write an authentication status value to the corresponding validity register based on a result of the authentication, and perform one or more cryptographic operations using the public key that are conditional on the validity register indicating an authenticated status for the public key.
    Type: Application
    Filed: May 31, 2012
    Publication date: December 5, 2013
    Applicant: ATMEL CORPORATION
    Inventors: BALAJI BADAM, KERRY MALETSKY, DAVID DURANT
  • Publication number: 20100223476
    Abstract: A method and device include a power pin, a ground pin, and a communications pin. A communications module receives power from the power pin and utilizes an edge counting communication protocol over the communication pin.
    Type: Application
    Filed: February 27, 2009
    Publication date: September 2, 2010
    Applicant: Atmel Corporation
    Inventors: Kerry Maletsky, David Durant, John Landreman, Balaji Badam
  • Publication number: 20090327709
    Abstract: Apparatus, systems, and methods may operate to provide, to a memory device, an obfuscated clear-page address derived from a clear-page address that is not the same as a key-page address and/or providing, to the memory device, an obfuscated key-page address derived from the key-page address when the obfuscated clear-page address is the same as the key-page address. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Applicant: Atmel Corporation
    Inventors: Brad Garner, Balaji Badam