Patents by Inventor Gerardo Pelosi

Gerardo Pelosi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8812845
    Abstract: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.
    Type: Grant
    Filed: January 7, 2013
    Date of Patent: August 19, 2014
    Assignees: STMicroelectronics S.r.l., Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Keith Harrison, Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi
  • Patent number: 8381267
    Abstract: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P. This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of the scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.
    Type: Grant
    Filed: October 10, 2006
    Date of Patent: February 19, 2013
    Assignee: STMicroelectronics S.r.l.
    Inventors: Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi, Keith Harrison, Liqun Chen
  • Patent number: 8352736
    Abstract: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.
    Type: Grant
    Filed: December 22, 2005
    Date of Patent: January 8, 2013
    Assignees: STMicroelectronics S.R.L., Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Keith Harrison, Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi
  • Patent number: 8223970
    Abstract: A method for decrypting the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device (ME). In one embodiment, first and second tokens are generated and exchanged, respectively, by the first and second electronic devices, which then generate a joint decryption key in order to decrypt the encrypted message.
    Type: Grant
    Filed: November 4, 2010
    Date of Patent: July 17, 2012
    Assignee: STMicroelectronics S.r.l.
    Inventors: Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Patent number: 8117251
    Abstract: A computing method and circuit for computing a modular operation with at least one operand having a binary representation. Iteratively for each bit of this operand, doubling the value of an intermediate result stored in a first memory element by shifting the bits of the intermediate result towards the most significant bit and, while the most significant bit of the intermediate result is one, updating this intermediate result by subtracting a modulus stored in a second memory element.
    Type: Grant
    Filed: April 11, 2007
    Date of Patent: February 14, 2012
    Assignee: STMicroelectronics S.r.l.
    Inventors: Guido Marco Bertoni, Pasqualina Fragneto, Andrew Richard Marsh, Gerardo Pelosi, Moris Ravasio
  • Patent number: 7929691
    Abstract: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.
    Type: Grant
    Filed: December 21, 2005
    Date of Patent: April 19, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Alexander Harrison, Liqun Chen, Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi
  • Patent number: 7925010
    Abstract: A method decrypts the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device. In one embodiment, first and second tokens are generated and exchanged, respectively, by the first and second electronic devices, which then generate a joint decryption key in order to decrypt the encrypted message.
    Type: Grant
    Filed: December 17, 2004
    Date of Patent: April 12, 2011
    Assignee: STMicroelectronics S.r.l.
    Inventors: Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Publication number: 20110058672
    Abstract: A method for decrypting the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device (ME). In one embodiment, first and second tokens are generated and exchanged, respectively, by the first and second electronic devices, which then generate a joint decryption key in order to decrypt the encrypted message.
    Type: Application
    Filed: November 4, 2010
    Publication date: March 10, 2011
    Applicant: STMICROELECTRONICS S.R.L.
    Inventors: Roberto Valerio Sannino, Fabio Sozzani, Guido Marco Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Patent number: 7716483
    Abstract: A method establishes a communication between a first electronic device associated with a first trusted authority and a second electronic device. The method includes: making a first key available to the first device for the communication between the first authority and the first device. A second trusted authority, associated with the second device and distinct and autonomous with respect to the first authority, generates a second key in order to communicate with the second device. Furthermore, the method includes: making the second key available to the second device; and providing the first and second devices with a communication key, to be used communication between the first and second devices, through at least one of the first and second authorities.
    Type: Grant
    Filed: November 16, 2004
    Date of Patent: May 11, 2010
    Assignee: STMicroelectronics S.r.1
    Inventors: Fabio Sozzani, Roberto Valerio Sannino, Guido Marco Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Patent number: 7620186
    Abstract: A method of establishing an encrypted communication by using keys between a first electronic device associated with a first trusted authority and a second electronic device, including generating a first secret key associated with the first device for the management of the communication, generating, at least in part by the first authority, a second secret key associated with the second device for the management of the communication. The method includes generating the first key at least in part by a second trusted authority associated with the second device that is distinct and autonomous from the first authority. Alternatively, the generation of the first key is performed, at least in part, by the second device passing through the second trusted authority.
    Type: Grant
    Filed: September 28, 2004
    Date of Patent: November 17, 2009
    Assignee: STMicroelectronics S.r.l.
    Inventors: Fabio Sozzani, Roberto Valerio Sannino, Guido Marco Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Publication number: 20080016346
    Abstract: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.
    Type: Application
    Filed: December 21, 2005
    Publication date: January 17, 2008
    Inventors: Keith Harrison, Liqun Chen, Guido Bertoni, Pasqualina Fragneto, Gerardo Pelosi
  • Publication number: 20070260664
    Abstract: A computing method and circuit for computing a modular operation with at least one operand having a binary representation. Iteratively for each bit of this operand, doubling the value of an intermediate result stored in a first memory element by shifting the bits of the intermediate result towards the most significant bit and, while the most significant bit of the intermediate result is one, updating this intermediate result by subtracting a modulus stored in a second memory element.
    Type: Application
    Filed: April 11, 2007
    Publication date: November 8, 2007
    Inventors: Guido Bertoni, Pasqualina Fragneto, Andrew Marsh, Gerardo Pelosi, Moris Ravasio
  • Publication number: 20070244944
    Abstract: A method of processing information to be confidentially transmitted from a first module to a second module provides that a first scalar multiplication may be carried out in order to obtain a first result [r]P). This first scalar multiplication comprises a plurality of generation steps of ordered factors from which a plurality of first partial sums are required to be built. The method also comprises the carrying out of a second scalar multiplication in order to obtain a second result. This second multiplication provides that a plurality of second partial sums may be built. A piece of encrypted information is obtained by processing the information based on the results of said scalar multiplications. The second partial sums of the second scalar multiplication use the same ordered factors obtained by the generation step of the first scalar multiplication.
    Type: Application
    Filed: October 10, 2006
    Publication date: October 18, 2007
    Applicant: STMICROELECTRONICS S.R.L.
    Inventors: Guido Bertoni, Pasqualina Fragneto, Gerardo Pelosi, Keith Harrison, Liqun Chen
  • Publication number: 20070180241
    Abstract: An authentication method of a first module by a second module includes the steps of generating a first random datum by the second module to be sent to the first module, generating a first number by the first module starting from the first datum and by way of a private key, and generating a second number by the second module to be compared with the first number, so as to authenticate the first module. The step of generating the second number is performed starting from public parameters and is independent of the step of generating the first number.
    Type: Application
    Filed: December 22, 2005
    Publication date: August 2, 2007
    Inventors: Liqun Chen, Keith Harrison, Guido Bertoni, Pasqualina Fragneto, Gerardo Pelosi
  • Publication number: 20050169464
    Abstract: A method for decrypting the encrypted messages sent by a transmission device to a first electronic device associated with a first trusted authority and to a second electronic device (ME). In one embodiment, first and second tokens are generated and exchanged, respectively, by the first and second electronic devices, which then generate a joint decryption key in order to decrypt the encrypted message.
    Type: Application
    Filed: December 17, 2004
    Publication date: August 4, 2005
    Applicant: STMicroelectronics S.r.l.
    Inventors: Roberto Sannino, Fabio Sozzani, Guido Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Publication number: 20050125670
    Abstract: A method establishes a communication between a first electronic device associated with a first trusted authority and a second electronic device. The method includes: making a first key available to the first device for the communication between the first authority and the first device. A second trusted authority, associated with the second device and distinct and autonomous with respect to the first authority, generates a second key in order to communicate with the second device. Furthermore, the method includes: making the second key available to the second device; and providing the first and second devices with a communication key, to be used communication between the first and second devices, through at least one of the first and second authorities.
    Type: Application
    Filed: November 16, 2004
    Publication date: June 9, 2005
    Applicant: STMicroelectronics S.r.l.
    Inventors: Fabio Sozzani, Roberto Sannino, Guido Bertoni, Gerardo Pelosi, Pasqualina Fragneto
  • Publication number: 20050102507
    Abstract: A method of establishing an encrypted communication by means of keys between a first electronic device associated with a first trusted authority and a second electronic device, including generating a first secret key associated with the first device for the management of the communication, generating, at least in part by means of the first authority, a second secret key associated with the second device for the management of the communication. The method includes generating the first key at least in part by a second trusted authority associated with the second device that is distinct and autonomous from the first authority. Alternatively, the generation of the first key is performed, at least in part, by the second device passing through the second trusted authority.
    Type: Application
    Filed: September 28, 2004
    Publication date: May 12, 2005
    Applicant: STMicroelectronics S.r.l.
    Inventors: Fabio Sozzani, Roberto Sannino, Guido Bertoni, Gerardo Pelosi, Pasqualina Fragneto