Patents by Inventor Durgesh Pattamatta

Durgesh Pattamatta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11783057
    Abstract: A method is provided for secure provisioning of a device. In the method, a plurality of integrated circuit (IC) devices is manufactured by a first entity for use in the device. The first entity provides signed provisioning software and stores in at least one provisioning IC device one or more keys used for provisioning the plurality of ICs. The provisioning device with the signed provisioning software is provided to a second entity. The second entity verifies the provisioning software using a stored key. The provisioning software encrypts provisioning assets provided by the second entity and provides the encrypted provisioning assets to the third entity. The signed provisioning software is provided to a third entity by the first entity. During manufacturing of the manufactured products by the third entity, the provisioning software verifies and decrypts the encrypted provisioning assets of the second entity to provision all the plurality of IC devices.
    Type: Grant
    Filed: August 24, 2021
    Date of Patent: October 10, 2023
    Assignee: NXP B.V.
    Inventors: Björn Fay, Miroslav Knezevic, Durgesh Pattamatta, Alexander Vogt
  • Patent number: 11677541
    Abstract: A method is provided for securely accessing code in an external memory. In the method, plaintext code may be stored in internal memory as sets of multiple blocks, each of the multiple blocks having N-bits. The code is encrypted and stored in the external memory. A block cipher having an authenticated encryption mode is used to convert the plaintext code to ciphertext code plus an authentication tag corresponding to each set of the multiple blocks. The external memory is formatted to store the ciphertext and the authentication tag. A translated address for the ciphertext is created from a plaintext address. During a read operation, the generated authentication tag is checked with an expected authentication tag. If the check is successful, the ciphertext code is decrypted and provided to a CPU for execution as plaintext code. In one embodiment, the CPU executes the plaintext code “in place” in the external memory.
    Type: Grant
    Filed: October 12, 2021
    Date of Patent: June 13, 2023
    Assignee: NXP B.V.
    Inventors: Miroslav Knezevic, Tuongvu Van Nguyen, Durgesh Pattamatta, Tung-Hao Huang
  • Publication number: 20230114689
    Abstract: A method is provided for securely accessing code in an external memory. In the method, plaintext code may be stored in internal memory as sets of multiple blocks, each of the multiple blocks having N-bits. The code is encrypted and stored in the external memory. A block cipher having an authenticated encryption mode is used to convert the plaintext code to ciphertext code plus an authentication tag corresponding to each set of the multiple blocks. The external memory is formatted to store the ciphertext and the authentication tag. A translated address for the ciphertext is created from a plaintext address. During a read operation, the generated authentication tag is checked with an expected authentication tag. If the check is successful, the ciphertext code is decrypted and provided to a CPU for execution as plaintext code. In one embodiment, the CPU executes the plaintext code “in place” in the external memory.
    Type: Application
    Filed: October 12, 2021
    Publication date: April 13, 2023
    Inventors: Miroslav Knezevic, Tuongvu Van Nguyen, Durgesh Pattamatta, Tung-Hao Huang
  • Publication number: 20230063743
    Abstract: A method is provided for secure provisioning of a device. In the method, a plurality of integrated circuit (IC) devices is manufactured by a first entity for use in the device. The first entity provides signed provisioning software and stores in at least one provisioning IC device one or more keys used for provisioning the plurality of ICs. The provisioning device with the signed provisioning software is provided to a second entity. The second entity verifies the provisioning software using a stored key. The provisioning software encrypts provisioning assets provided by the second entity and provides the encrypted provisioning assets to the third entity. The signed provisioning software is provided to a third entity by the first entity. During manufacturing of the manufactured products by the third entity, the provisioning software verifies and decrypts the encrypted provisioning assets of the second entity to provision all the plurality of IC devices.
    Type: Application
    Filed: August 24, 2021
    Publication date: March 2, 2023
    Inventors: Björn Fay, Miroslav Knezevic, Durgesh Pattamatta, Alexander Vogt
  • Publication number: 20220200807
    Abstract: As may be implemented in accordance with one or more aspects of the disclosure, an apparatus and/or method involves generating, using hash circuitry, successive hash values corresponding to operational states of an apparatus using, for respective ones of the hash values, a previous one of the hash values and a current operational sate of the apparatus. The hash values may be written into a register. In response to an attestation request, one of the hash values may be retrieved from the register and signed using cryptographic circuitry. The signed hash value may be communicated to a remote circuit, therein providing attestation of an operational state of the apparatus.
    Type: Application
    Filed: December 17, 2020
    Publication date: June 23, 2022
    Inventors: Durgesh Pattamatta, Miroslav Knezevic
  • Publication number: 20210349990
    Abstract: A method is provided for protecting execution of a program against a fault injection attack. In one embodiment, a portion of the program includes multiple substantially logically identical conditional operations that are executed in a sequence. An attacker must successfully inject a fault at each instance of the conditional operations to cause the program execution to reach the final state. The multiple conditional operations may ask the same question differently so that the glitch will not cause the same response from both conditional operations. Also, the program portion may make advancement from one state to the next contingent on arriving at the next state from a valid previous state. The described program portions with multiple instances of a conditional operation make a program execution more resistant to a glitch type of fault injection attack.
    Type: Application
    Filed: May 7, 2020
    Publication date: November 11, 2021
    Inventors: Rob COSARO, Miroslav Knezevic, Durgesh Pattamatta