Patents by Inventor Guilherme Ozari de Almeida

Guilherme Ozari de Almeida has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210256165
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Application
    Filed: February 5, 2021
    Publication date: August 19, 2021
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Publication number: 20210152331
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Application
    Filed: November 25, 2020
    Publication date: May 20, 2021
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Patent number: 10915667
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Grant
    Filed: December 13, 2017
    Date of Patent: February 9, 2021
    Assignee: Cryptography Research, Inc.
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Patent number: 10855443
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Grant
    Filed: July 11, 2017
    Date of Patent: December 1, 2020
    Assignee: Cryptography Research Inc.
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Publication number: 20200125756
    Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise: an access control unit comprising a secure memory for storing access control data, the access control unit to: receive a message comprising an access control data item; store the access control data item in the secure memory; perform at least one of: authenticating the message using a message digest function, or validating contents of the secure memory by comparing a stored reference value with a calculated value of a message digest function of the contents of the secure memory; and control, in view of the access control data item, access by an initiator device to a target device.
    Type: Application
    Filed: October 11, 2019
    Publication date: April 23, 2020
    Inventors: Craig E. Hampel, Jean-Michel Cioranesco, Rodrigo Portella do Canto, Guilherme Ozari de Almeida
  • Publication number: 20200026883
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving universal polynomial hash functions computation.
    Type: Application
    Filed: December 13, 2017
    Publication date: January 23, 2020
    Inventors: Guilherme Ozari de Almeida, Elena Trichina, Elke De Mulder
  • Patent number: 10482275
    Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise: an access control unit comprising a secure memory for storing access control data, the access control unit to: receive a message comprising an access control data item; store the access control data item in the secure memory; perform at least one of: authenticating the message using a message digest function, or validating contents of the secure memory by comparing a stored reference value with a calculated value of a message digest function of the contents of the secure memory; and control, in view of the access control data item, access by an initiator device to a target device.
    Type: Grant
    Filed: January 27, 2015
    Date of Patent: November 19, 2019
    Assignee: Cryptography Research, Inc.
    Inventors: Craig E. Hampel, Jean-Michel Cioranesco, Rodrigo Portella do Canto, Guilherme Ozari de Almeida
  • Publication number: 20180034628
    Abstract: Systems and methods for protecting from external monitoring attacks cryptographic data processing operations involving computation of a universal polynomial hash function, such as GHASH function. An example method may comprise: receiving an input data block, an iteration result value, and a mask value; performing a non-linear operation to produce a masked result value, wherein a first operand of the non-linear operation is represented by a combination of the iteration result value and the input data block, and the second operand of the non-linear operation is represented by a secret hash value, and wherein one of the first operand or the second operand is masked using a mask value; determining, based on the mask value, a mask correction value; and producing a new iteration result value by applying the mask correction value to the masked result value.
    Type: Application
    Filed: July 11, 2017
    Publication date: February 1, 2018
    Inventors: Elena Trichina, Guilherme Ozari de Almeida, Elke De Mulder
  • Patent number: 9853974
    Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message comprising an access control data item; validate the message using a value of a message digest function of contents of the message and a value of a state variable reflecting a state of communications between the access control unit and a programming agent that has initiated the message, wherein the value of the state variable is derived from a previous value of the message digest function calculated within a current communication session between the access control unit and the programming agent; update the state variable using the value of the message digest function of the contents of the message; and control, using the access control data item, access by an initiator device to a target device.
    Type: Grant
    Filed: July 28, 2015
    Date of Patent: December 26, 2017
    Assignee: Cryptography Research, Inc.
    Inventors: Craig E. Hampel, Jean-Michel Cioranesco, Rodrigo Portella do Canto, Guilherme Ozari de Almeida, Christopher Gori
  • Publication number: 20160350549
    Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise: an access control unit comprising a secure memory for storing access control data, the access control unit to: receive a message comprising an access control data item; store the access control data item in the secure memory; perform at least one of: authenticating the message using a message digest function, or validating contents of the secure memory by comparing a stored reference value with a calculated value of a message digest function of the contents of the secure memory; and control, in view of the access control data item, access by an initiator device to a target device.
    Type: Application
    Filed: January 27, 2015
    Publication date: December 1, 2016
    Inventors: Craig E. Hampel, Jean-Michel Cioranesco, Rodrigo Portella do Canto, Guilherme Ozari de Almeida
  • Publication number: 20160028728
    Abstract: Systems and methods for implementing access control by systems-on-chip (SoCs). An example SoC may comprise an access control unit employed to: receive a message comprising an access control data item; validate the message using a value of a message digest function of contents of the message and a value of a state variable reflecting a state of communications between the access control unit and a programming agent that has initiated the message, wherein the value of the state variable is derived from a previous value of the message digest function calculated within a current communication session between the access control unit and the programming agent; update the state variable using the value of the message digest function of the contents of the message; and control, using the access control data item, access by an initiator device to a target device.
    Type: Application
    Filed: July 28, 2015
    Publication date: January 28, 2016
    Inventors: Craig E. Hampel, Jean-Michel Cioranesco, Rodrigo Portella do Canto, Guilherme Ozari de Almeida, Christopher Gori