Patents by Inventor Cédric Alain Marie Christophe Fournet

Cédric Alain Marie Christophe Fournet has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240137210
    Abstract: A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor. The device generates a TEE signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the TEE signature to a second TLS endpoint within a TLS handshake message exchange between the first TLS endpoint and the second TLS endpoint.
    Type: Application
    Filed: December 15, 2022
    Publication date: April 25, 2024
    Inventors: Kapil VASWANI, Siddharth JAYASHANKAR, Antoine DELIGNAT-LAVAUD, Cedric Alain Marie Christophe FOURNET
  • Publication number: 20240064033
    Abstract: Systems and methods are provided for generating a combined receipt in a distributed ledger system implemented by replicas of a network. The replicas maintain a distributed ledger comprising a plurality of executed transactions authenticated using a hash tree having a hash root. Some or all of the replicas cryptographically sign the hash root. A combined receipt for a first transaction and second transaction of a plurality of executed transactions is generated by determining path information comprising a minimum set of values required to generate the hash root from either the first transaction or the second transaction given the first transaction and the second transaction. The combined receipt for the first and second transactions comprises: i) the determined path information; and ii) signatures of one or more of the replicas which signed the hash root.
    Type: Application
    Filed: January 25, 2022
    Publication date: February 22, 2024
    Inventors: Alexander SHAMIS, Amaury Pierre Paul CHAMAYOU, Edward ASHTON, Julien MAFFRE, Sylvan CLEBSCH, Cedric Alain Marie Christophe FOURNET, Miguel Oom Temudo de CASTRO, Antoine Jean DELIGNAT-LAVAUD, Peter Robert PIETZUCH
  • Publication number: 20230370273
    Abstract: The disclosed technology is generally directed to code transparency. In one example of the technology, evidence associated with a policy is obtained. The evidence includes data that includes cryptographically verifiable evidence associated with initial source code in accordance with the policy. The initial source code is source code for a CTS. The initial binary is based on the initial source code is executed in a TEE such that a CTS instance begins operation. The CTS instance is configured to register guarantee(s) associated with code approved by the CTS instance. The TEE is used to provide a ledger. The evidence is stored on the ledger. Measurement(s) associated with the binary are provided. A service key associated with CTS instance is generated. TEE attestation of the measurement(s), the evidence, and the service key is provided.
    Type: Application
    Filed: May 10, 2022
    Publication date: November 16, 2023
    Inventors: Mark Eugene RUSSINOVICH, Sylvan W. CLEBSCH, Kahren TEVOSYAN, Antoine Jean Denis DELIGNAT-LAVAUD, Cédric Alain Marie Christophe FOURNET, Hervey Oliver WILSON, Manuel Silverio da Silva COSTA
  • Publication number: 20230368193
    Abstract: The disclosed technology is generally directed to code transparency. In one example of the technology, a claim associated with an application is received. The claim is a document that is signed with a claim signature and that includes evidence associated with a policy, and further includes an expected set of at least one binary measurement associated with the application. The evidence is cryptographically verifiable evidence associated with the application. A trusted execution environment (TEE) is used to provide a distributed ledger. The claim is verified. Verifying the claim includes verifying the expected set of at least one binary measurement associated with the application, verifying the claim signature, and, based at least on the evidence, verifying that the application meets the policy. Upon successful verification of the claim, the claim is appended to the distributed ledger. A ledger countersignature associated with the claim is generated.
    Type: Application
    Filed: May 10, 2022
    Publication date: November 16, 2023
    Inventors: Mark Eugene RUSSINOVICH, Sylvan W. CLEBSCH, Kahren TEVOSYAN, Antoine Jean Denis DELIGNAT-LAVAUD, Cédric Alain Marie Christophe FOURNET, Hervey Oliver WILSON, Manuel Silverio da Silva COSTA
  • Publication number: 20220391326
    Abstract: According to a first aspect, execution logic is configured to perform a linear capability transfer operation which transfers a physical capability from a partition of a first software modules to a partition of a second of software module without retaining it in the partition of the first. According to a second, alternative or additional aspect, the execution logic is configured to perform a sharding operation whereby a physical capability is divided into at least two instances, which may later be combined.
    Type: Application
    Filed: October 28, 2020
    Publication date: December 8, 2022
    Inventors: David T. Chisnall, Sylvan W. Clebsch, Cédric Alain Marie Christophe Fournet
  • Publication number: 20220374349
    Abstract: According to a first aspect, execution logic is configured to perform a linear capability transfer operation which transfers a physical capability from a partition of a first software modules to a partition of a second of software module without retaining it in the partition of the first. According to a second, alternative or additional aspect, the execution logic is configured to perform a sharding operation whereby a physical capability is divided into at least two instances, which may later be combined.
    Type: Application
    Filed: October 20, 2020
    Publication date: November 24, 2022
    Inventors: David T. Chisnall, Sylvan W. Clebsch, Cédric Alain Marie Christophe Fournet
  • Publication number: 20170372226
    Abstract: A multi-party privacy-preserving machine learning system is described which has a trusted execution environment comprising at least one protected memory region. An code loader at the system loads machine learning code, received from at least one of the parties, into the protected memory region. A data uploader uploads confidential data, received from at least one of the parties, to the protected memory region. The trusted execution environment executes the machine learning code using at least one data-oblivious procedure to process the confidential data and returns the result to at least one of the parties, where a data-oblivious procedure is a process where any patterns of memory accesses, patterns of disk accesses and patterns of network accesses are such that the confidential data cannot be predicted from the patterns.
    Type: Application
    Filed: August 23, 2016
    Publication date: December 28, 2017
    Inventors: Manuel Silverio da Silva Costa, Cédric Alain Marie Christophe Fournet, Aastha Mehta, Sebastian Nowozin, Olga Ohrimenko, Felix Schuster, Kapil Vaswani