Patents by Inventor Billy B. Brumley

Billy B. Brumley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9673983
    Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.
    Type: Grant
    Filed: February 11, 2013
    Date of Patent: June 6, 2017
    Assignee: QUALCOMM Incorporated
    Inventors: David M. Jacobson, Billy B. Brumley
  • Publication number: 20160299854
    Abstract: Techniques for providing countermeasures against physical attacks on the contents of off-chip memory are provided in which a pseudo-internal memory resistant to physical attack is used. The pseudo-internal memory is mapped to an address space such that the pseudo-internal memory appears to be on-chip memory to a processor or a system on a chip (SoC). A method for protecting sensitive data according to these techniques includes presenting, by a pseudo-internal memory module of a SoC, an address space as internal memory of the SoC, where the address space comprises memory located off-chip from the system on a chip, receiving a data write request at the pseudo-internal memory module from a component of the SoC, encrypting data associated with the data write request using the pseudo-internal memory module to generate encrypted data, and writing the encrypted data to the memory located off-chip from the SoC.
    Type: Application
    Filed: February 12, 2016
    Publication date: October 13, 2016
    Inventors: Vinoth Kumar DEIVASIGAMANI, Laurence Geoffrey LUNDBLADE, Satish ANAND, Billy B. BRUMLEY
  • Patent number: 9390264
    Abstract: Techniques for protecting contents of a stack associated with a processor are provided. The techniques include a method including receiving a store instruction from a software program being executed by the processor, the store instruction including control information associated with a subroutine, altering the control information to generate secured control information responsive to receiving the store instruction from the software program, storing the secured control information on the stack, receiving a load instruction from the software program; and responsive to receiving the load instruction from the software program, loading the secured control information from the stack, altering the secured control information to recover the control information, and returning the control information to the software program.
    Type: Grant
    Filed: April 18, 2014
    Date of Patent: July 12, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Can Erkin Acar, Erich James Plondke, Robert J. Turner, Billy B. Brumley
  • Patent number: 9298947
    Abstract: One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be pre-generated upon boot-up or initiation of a session. An authentication code may be computed for each data structure (e.g., memory block or header block) by selecting a subset of the plurality of pre-generated keys and/or a mask from the plurality of pre-generated masks. The authentication code may be stored within the data structure for future verification of the integrity of the data structure. The keys and/or masks used for all authentication codes (e.g., for other data structures) may be selected from the same plurality of keys and/or masks during the same cycle or session.
    Type: Grant
    Filed: February 7, 2013
    Date of Patent: March 29, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander W. Dent, Can Erkin Acar, Billy B. Brumley
  • Publication number: 20150302195
    Abstract: Techniques for protecting contents of a stack associated with a processor are provided. The techniques include a method including receiving a store instruction from a software program being executed by the processor, the store instruction including control information associated with a subroutine, altering the control information to generate secured control information responsive to receiving the store instruction from the software program, storing the secured control information on the stack, receiving a load instruction from the software program; and responsive to receiving the load instruction from the software program, loading the secured control information from the stack, altering the secured control information to recover the control information, and returning the control information to the software program.
    Type: Application
    Filed: April 18, 2014
    Publication date: October 22, 2015
    Applicant: QUALCOMM Incorported
    Inventors: Can Erkin ACAR, Erich James PLONDKE, Robert J. TURNER, Billy B. BRUMLEY
  • Publication number: 20150222421
    Abstract: Techniques for encrypting data are provided that can be used to help prevent side-channel attacks on the cryptographic algorithms. An example method according to these techniques includes permuting an order of first intermediate data according to a predetermined permutation to produce permuted intermediate data. The first inter mediate data is output by one or more first stages of a cryptographic algorithm. The method also includes permuting a key to be used by one or more second stages of a cryptographic algorithm according to the predetermined permutation, applying the one or more second stages of a cryptographic algorithm to the permuted intermediate data to generate second intermediate data, the one or more second stages of the cryptographic algorithm using the permuted key, and permuting the second intermediate data according to an inverse permutation of the predetermined permutation to generate output.
    Type: Application
    Filed: February 3, 2014
    Publication date: August 6, 2015
    Applicant: QUALCOMM Incorporated
    Inventors: Xiaofei Guo, Xu Guo, Billy B. Brumley
  • Patent number: 9065632
    Abstract: A method for authenticating a message by a wireless device is described. The wireless device obtains the input message. The wireless device generates a keystream. The wireless device computes a message authentication code using the keystream and a universal hash function. The universal hash function is computed using carryless multiplication.
    Type: Grant
    Filed: February 20, 2013
    Date of Patent: June 23, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Billy B. Brumley, Alexander W. Dent
  • Patent number: 9026791
    Abstract: A wireless communication device is described. The wireless communication device includes a linear feedback shift register. The linear feedback shift register is initialized. The linear feedback shift register is a word based odd characteristic linear feedback shift register. The linear feedback shift register includes multiple 64-bit registers. A feedback function output is generated using the 64-bit registers. The feedback function output is placed into a highest register of the linear feedback shift register.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: May 5, 2015
    Assignee: QUALCOMM Incorporated
    Inventors: Roberto Avanzi, Billy B. Brumley
  • Publication number: 20140258721
    Abstract: A wireless communication device is described. The wireless communication device includes a linear feedback shift register. The linear feedback shift register is initialized. The linear feedback shift register is a word based odd characteristic linear feedback shift register. The linear feedback shift register includes multiple 64-bit registers. A feedback function output is generated using the 64-bit registers. The feedback function output is placed into a highest register of the linear feedback shift register.
    Type: Application
    Filed: March 11, 2013
    Publication date: September 11, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Roberto Avanzi, Billy B. Brumley
  • Publication number: 20140237237
    Abstract: A method for authenticating a message by a wireless device is described. The wireless device obtains the input message. The wireless device generates a keystream. The wireless device computes a message authentication code using the keystream and a universal hash function. The universal hash function is computed using carryless multiplication.
    Type: Application
    Filed: February 20, 2013
    Publication date: August 21, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Billy B. Brumley, Alexander W. Dent
  • Publication number: 20140223192
    Abstract: One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be pre-generated upon boot-up or initiation of a session. An authentication code may be computed for each data structure (e.g., memory block or header block) by selecting a subset of the plurality of pre-generated keys and/or a mask from the plurality of pre-generated masks. The authentication code may be stored within the data structure for future verification of the integrity of the data structure. The keys and/or masks used for all authentication codes (e.g., for other data structures) may be selected from the same plurality of keys and/or masks during the same cycle or session.
    Type: Application
    Filed: February 7, 2013
    Publication date: August 7, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: Alexander W. DENT, Can Erkin Acar, Billy B. Brumley
  • Publication number: 20140079213
    Abstract: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data.
    Type: Application
    Filed: February 11, 2013
    Publication date: March 20, 2014
    Applicant: QUALCOMM Incorporated
    Inventors: David M. JACOBSON, Billy B. Brumley