Patents by Inventor Hervé Sibert

Hervé Sibert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240372855
    Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.
    Type: Application
    Filed: July 18, 2024
    Publication date: November 7, 2024
    Inventors: Max M. GUNTHER, Onar VIKINGSTAD, Ramiro CALVO, Isabella M. FUNKE, Eric D. FRIEDMAN, Hervé SIBERT, David P. REMAHL, Yannick L. SIERRA, Frank B. DANCS, Sudhakar N. MAMBAKKAM
  • Patent number: 12074865
    Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: August 27, 2024
    Assignee: Apple Inc.
    Inventors: Max M. Gunther, Onar Vikingstad, Ramiro Calvo, Isabella M. Funke, Eric D. Friedman, Hervé Sibert, David P. Remahl, Yannick L. Sierra, Frank B. Dancs, Sudhakar N. Mambakkam
  • Patent number: 11985231
    Abstract: Certain embodiments disclosed herein provide attestation for a transient version of an application while reusing the attestation and the cryptographic key on which the attestation is based for the full version of the application should the user obtain the full version of the application prior to the transient version being deleted. As an example, a computing device can detect an upgrade event corresponding to replacing an application clip with the full version of the application, and associate the cryptographic key already stored in a key database with the full version of the application. Associating the existing key with the full version of the application enables the full application to automatically take over the attestation previously provided for the application clip, saving time and resources that would otherwise be used for establishing a new attestation for the full version of the application.
    Type: Grant
    Filed: October 20, 2021
    Date of Patent: May 14, 2024
    Assignee: APPLE INC.
    Inventors: Eric Kar Wai Tong, Hervé Sibert
  • Publication number: 20240078343
    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.
    Type: Application
    Filed: September 8, 2023
    Publication date: March 7, 2024
    Inventors: Hervé Sibert, Eric D. Friedman, Erik C. Neuenschwander, Jerrold V. Hauck, Thomas P. Mensch, Julien F. Freudiger, Alan W. Yu
  • Patent number: 11790119
    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: October 17, 2023
    Assignee: Apple Inc.
    Inventors: Hervé Sibert, Eric D. Friedman, Erik C. Neuenschwander, Jerrold V. Hauck, Thomas P. Mensch, Julien F. Freudiger, Alan W. Yu
  • Publication number: 20220393862
    Abstract: Certain embodiments disclosed herein provide attestation for a transient version of an application while reusing the attestation and the cryptographic key on which the attestation is based for the full version of the application should the user obtain the full version of the application prior to the transient version being deleted. As an example, a computing device can detect an upgrade event corresponding to replacing an application clip with the full version of the application, and associate the cryptographic key already stored in a key database with the full version of the application. Associating the existing key with the full version of the application enables the full application to automatically take over the attestation previously provided for the application clip, saving time and resources that would otherwise be used for establishing a new attestation for the full version of the application.
    Type: Application
    Filed: October 20, 2021
    Publication date: December 8, 2022
    Applicant: Apple Inc.
    Inventors: Eric Kar Wai Tong, Hervé Sibert
  • Patent number: 11228580
    Abstract: Implementations of the subject technology provide for performing, by a device, a request for obtaining information related to a phone authentication certificate (PAC) that was generated for the device, the PAC authenticating that a particular phone number is associated with the device, the request including packets of data. The subject technology receives the information related to the PAC, the information including an indication that the PAC was generated for the device. The subject technology sends, from the device, a request for validating the PAC to a remote server based at least in part on the information related to the PAC. Further, the subject technology receives a confirmation of validating the PAC from the remote server based at least in part on the information related to the PAC.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: January 18, 2022
    Assignee: Apple Inc.
    Inventors: Gokul P. Thirumalai, Daniel B. Pollack, Robert D. Butler, Ryan W. Baker, David G. Knipp, Sudhakar N. Mambakkam, Jonathon Sodos, Hannah S. Story, Hervé Sibert, Gianpaolo Fasoli
  • Patent number: 10936719
    Abstract: Systems, methods, and computer-readable media for preserving trust data during operating system updates of a secure element of an electronic device are provide. An update package is received to update an existing secure element operating system to a new secure element operating system by exporting trust data from the existing secure element operating system, after the exporting, uninstalling the existing secure element operating system, migrating the exported trust data using a migration operating system when a data format version of the existing secure element operating system is different than a data format version of the new secure element operating system, installing the new secure element operating system, and importing the migrated trust data into the installed new secure element operating system.
    Type: Grant
    Filed: September 21, 2017
    Date of Patent: March 2, 2021
    Assignee: Apple Inc.
    Inventors: Hervé Sibert, Matthias Lerch, Oren M. Elrad, Peng Liu, Rahul Narayan Singh
  • Publication number: 20200159966
    Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.
    Type: Application
    Filed: November 13, 2019
    Publication date: May 21, 2020
    Inventors: Hervé Sibert, Eric D. Friedman, Erik C. Neuenschwander, Jerrold V. Hauck, Thomas P. Mensch, Julien F. Freudiger, Alan W. Yu
  • Publication number: 20190394189
    Abstract: Implementations of the subject technology provide for performing, by a device, a request for obtaining information related to a phone authentication certificate (PAC) that was generated for the device, the PAC authenticating that a particular phone number is associated with the device, the request including packets of data. The subject technology receives the information related to the PAC, the information including an indication that the PAC was generated for the device. The subject technology sends, from the device, a request for validating the PAC to a remote server based at least in part on the information related to the PAC. Further, the subject technology receives a confirmation of validating the PAC from the remote server based at least in part on the information related to the PAC.
    Type: Application
    Filed: September 28, 2018
    Publication date: December 26, 2019
    Inventors: Gokul P. Thirumalai, Daniel B. Pollack, Robert D. Butler, Ryan W. Baker, David G. Knipp, Sudhakar N. Mambakkam, Jonathon Sodos, Hannah S. Story, Hervé Sibert, Gianpaolo Fasoli
  • Publication number: 20180089434
    Abstract: Systems, methods, and computer-readable media for preserving trust data during operating system updates of a secure element of an electronic device are provided.
    Type: Application
    Filed: September 21, 2017
    Publication date: March 29, 2018
    Inventors: Hervé Sibert, Matthias Lerch, Oren M. Elrad, Peng Liu, Rahul Narayan Singh
  • Patent number: 9292712
    Abstract: An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE), and a separate Trusted Execution Environment (TEE). The TEE maintains a real-time clock (RTC) that provides a RTC time to the REE. A RTC offset is stored in non-volatile memory, with the RTC offset indicating a difference between the RTC time and a protected reference (PR) time. Responsive to a request from the REE to read the RTC time, a current RTC time is returned to the REE. Responsive to a request from the REE to adjust the RTC time, the RTC time and the corresponding RTC offset are adjusted by a same amount, such that the PR time is not altered by the RTC adjustment. An exemplary computing device operable to implement the method is also disclosed.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: March 22, 2016
    Assignee: ST-Ericsson SA
    Inventors: Per Ståhl, Håkan Englund, Martin Hovang, Hervé Sibert
  • Patent number: 9166956
    Abstract: Wireless communication apparatus (WAP) which comprises means of receiving data streams such as Access Stratum User Plane (AS UP), Access Stratum Control Plane (AS CP), and Non-Access Stratum Control Plane (NAS CP), each at least partly requiring a cryptographic processing operation, a cryptographic module comprising a cryptoprocessor, and management means configured to deliver at least some of the data streams to the crypto-processor according to an order of priority defined from the data types and cryptographic processing types assigned to each data stream.
    Type: Grant
    Filed: January 19, 2010
    Date of Patent: October 20, 2015
    Assignee: ST-Ericsson (France) SAS
    Inventors: Hervé Sibert, Sylviane Roullier
  • Patent number: 9081724
    Abstract: A method of protecting digital data stored in a storage medium. The method comprises providing a first and a second addressable storage region in the storage medium, and selector means for selectively indicating one of the first and the second addressable storage regions as active; storing the digital data in the first addressable storage region of the storage medium, wherein the digital data stored in the first addressable storage region is stored encrypted with a first encryption key; and causing the selector means to indicate the first addressable storage region as being active; and, responsive to a trigger event, copying the digital data from the first to the second addressable storage region, wherein the digital data stored in the second addressable storage region is stored encrypted with a second encryption key; and causing the selector means to indicate the second addressable storage region as being active.
    Type: Grant
    Filed: April 6, 2011
    Date of Patent: July 14, 2015
    Assignee: ST-ERICSSON SA
    Inventors: Nicolas Anquet, Hervé Sibert
  • Patent number: 8913743
    Abstract: Method for decrypting, within a wireless communication device, a sequence of encrypted packets received via a wireless communication channel between the communication device and a cell assigned to this device, comprising for each packet the following steps: —the computation of an encrypting sequence corresponding to the packet (21); and —the decrypting of the packet with the aid of the said encrypting sequence (22). In this method, the encrypting sequences are computed before the reception of the packets while the reception quality is above a threshold (20, TH) and an indication of change of cell is not received (24).
    Type: Grant
    Filed: January 19, 2010
    Date of Patent: December 16, 2014
    Assignee: ST-Ericsson SA
    Inventors: Hervé Sibert, Sylviane Roullier
  • Publication number: 20140310535
    Abstract: Electronic device (1) comprising a chipset component (2) and a flash memory component (3), the said chipset component being associated with an identifier, the said chipset component comprising a monotonic counter (21) and being configured to:—derive a key from the identifier and a current value of the monotonic counter, by using a cryptographic key derivation function,—build a provisioning command related to the key,—send the provisioning command to the flash memory component, and—use the key to manage a secure storage area in the flash memory component.
    Type: Application
    Filed: March 7, 2012
    Publication date: October 16, 2014
    Applicant: ST-ERICSSON SA
    Inventor: Hervé Sibert
  • Publication number: 20140095918
    Abstract: An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE), and a separate Trusted Execution Environment (TEE). The TEE maintains a real-time clock (RTC) that provides a RTC time to the REE. A RTC offset is stored in non-volatile memory, with the RTC offset indicating a difference between the RTC time and a protected reference (PR) time. Responsive to a request from the REE to read the RTC time, a current RTC time is returned to the REE. Responsive to a request from the REE to adjust the RTC time, the RTC time and the corresponding RTC offset are adjusted by a same amount, such that the PR time is not altered by the RTC adjustment. An exemplary computing device operable to implement the method is also disclosed.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Per Ståhl, Håkan Englund, Martin Hovang, Hervé Sibert
  • Patent number: 8543839
    Abstract: An electronic device is provided having a memory driver unit for reading partition headers including encrypted version numbers from a memory and for writing updated encrypted version numbers to the memory. The electronic device has an update agent unit for controlling a software or firmware update, a one-time programmable memory for storing a first value, and an encrypt-decrypt unit for decrypting the partition headers stored in the memory. The update agent is configured to compare the retrieved version numbers with a version number from a software or firmware update. The first value is incremented and stored in the one-time programmable memory if an update is performed. The encrypt-decrypt unit is configured to encrypt the version numbers of the software or firmware update based on the new first value. The memory driver unit is configured to write a new partition header with the updated encrypted version numbers into the memory.
    Type: Grant
    Filed: December 22, 2010
    Date of Patent: September 24, 2013
    Assignee: ST-Ericsson SA
    Inventor: Hervé Sibert
  • Patent number: 8484451
    Abstract: A composite customer ID (CCID) is stored in the OTP memory of integrated circuit chipsets used by a number of different customers. The CCID includes individual customer IDs (CIDs) at defined index positions, each corresponding to a different customer. Each chipset allows or disallows software booting, based reading a certificate index value from a given customer's certificate, reading an OTP CID from OTP, as pointed to the by certificate index value, and evaluating the OTP CID with a certificate CID read from the certificate. Thus, while CCID carries information for a plurality of customers, each customer's certificate points only to that customer's OTP CID, which can be changed to revoke that customer's certificate without revoking the other customers' certificates. The CCID also may include a version number, where the chipsets allow or disallow software booting based on evaluating the certificate version number in view of the CCID version number.
    Type: Grant
    Filed: March 11, 2010
    Date of Patent: July 9, 2013
    Assignee: ST-Ericsson SA
    Inventors: Hervé Sibert, Per Ståhl
  • Patent number: 8402282
    Abstract: Method for encrypting an initial digital data set, which comprises a compression of the initial digital data set delivering a compressed set comprising at least one compressed digital data stream and at least one dictionary making it possible to describe the content of the compressed digital data stream or streams, and an encryption of each dictionary only delivering an encrypted digital data set.
    Type: Grant
    Filed: June 6, 2011
    Date of Patent: March 19, 2013
    Assignee: ST-Ericsson SA
    Inventor: Hervé Sibert