Patents by Inventor Hervé Sibert
Hervé Sibert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240372855Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.Type: ApplicationFiled: July 18, 2024Publication date: November 7, 2024Inventors: Max M. GUNTHER, Onar VIKINGSTAD, Ramiro CALVO, Isabella M. FUNKE, Eric D. FRIEDMAN, Hervé SIBERT, David P. REMAHL, Yannick L. SIERRA, Frank B. DANCS, Sudhakar N. MAMBAKKAM
-
Patent number: 12074865Abstract: This application relates to establishing a communication session between a host device and a trusted client device. A host device generates a one-time secret (OTS) and transmits the OTS to a trusted client device via an out-of-band communication channel. The trusted client device verifies an identity of a user of the trusted client device utilizing one or more sensors of the trusted client device. Responsive to verifying the identity of the user, the trusted client device negotiates an encryption key with the host device based on the OTS. The trusted client device then establishes a communication session with the host device utilizing the encryption key. The communication session can be utilized to pass credentials in a protected manner from the trusted client device to the host device that enable the host device to access a user account associated with a service.Type: GrantFiled: January 18, 2019Date of Patent: August 27, 2024Assignee: Apple Inc.Inventors: Max M. Gunther, Onar Vikingstad, Ramiro Calvo, Isabella M. Funke, Eric D. Friedman, Hervé Sibert, David P. Remahl, Yannick L. Sierra, Frank B. Dancs, Sudhakar N. Mambakkam
-
Patent number: 11985231Abstract: Certain embodiments disclosed herein provide attestation for a transient version of an application while reusing the attestation and the cryptographic key on which the attestation is based for the full version of the application should the user obtain the full version of the application prior to the transient version being deleted. As an example, a computing device can detect an upgrade event corresponding to replacing an application clip with the full version of the application, and associate the cryptographic key already stored in a key database with the full version of the application. Associating the existing key with the full version of the application enables the full application to automatically take over the attestation previously provided for the application clip, saving time and resources that would otherwise be used for establishing a new attestation for the full version of the application.Type: GrantFiled: October 20, 2021Date of Patent: May 14, 2024Assignee: APPLE INC.Inventors: Eric Kar Wai Tong, Hervé Sibert
-
Publication number: 20240078343Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.Type: ApplicationFiled: September 8, 2023Publication date: March 7, 2024Inventors: Hervé Sibert, Eric D. Friedman, Erik C. Neuenschwander, Jerrold V. Hauck, Thomas P. Mensch, Julien F. Freudiger, Alan W. Yu
-
Patent number: 11790119Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.Type: GrantFiled: November 13, 2019Date of Patent: October 17, 2023Assignee: Apple Inc.Inventors: Hervé Sibert, Eric D. Friedman, Erik C. Neuenschwander, Jerrold V. Hauck, Thomas P. Mensch, Julien F. Freudiger, Alan W. Yu
-
Publication number: 20220393862Abstract: Certain embodiments disclosed herein provide attestation for a transient version of an application while reusing the attestation and the cryptographic key on which the attestation is based for the full version of the application should the user obtain the full version of the application prior to the transient version being deleted. As an example, a computing device can detect an upgrade event corresponding to replacing an application clip with the full version of the application, and associate the cryptographic key already stored in a key database with the full version of the application. Associating the existing key with the full version of the application enables the full application to automatically take over the attestation previously provided for the application clip, saving time and resources that would otherwise be used for establishing a new attestation for the full version of the application.Type: ApplicationFiled: October 20, 2021Publication date: December 8, 2022Applicant: Apple Inc.Inventors: Eric Kar Wai Tong, Hervé Sibert
-
Patent number: 11228580Abstract: Implementations of the subject technology provide for performing, by a device, a request for obtaining information related to a phone authentication certificate (PAC) that was generated for the device, the PAC authenticating that a particular phone number is associated with the device, the request including packets of data. The subject technology receives the information related to the PAC, the information including an indication that the PAC was generated for the device. The subject technology sends, from the device, a request for validating the PAC to a remote server based at least in part on the information related to the PAC. Further, the subject technology receives a confirmation of validating the PAC from the remote server based at least in part on the information related to the PAC.Type: GrantFiled: September 28, 2018Date of Patent: January 18, 2022Assignee: Apple Inc.Inventors: Gokul P. Thirumalai, Daniel B. Pollack, Robert D. Butler, Ryan W. Baker, David G. Knipp, Sudhakar N. Mambakkam, Jonathon Sodos, Hannah S. Story, Hervé Sibert, Gianpaolo Fasoli
-
Patent number: 10936719Abstract: Systems, methods, and computer-readable media for preserving trust data during operating system updates of a secure element of an electronic device are provide. An update package is received to update an existing secure element operating system to a new secure element operating system by exporting trust data from the existing secure element operating system, after the exporting, uninstalling the existing secure element operating system, migrating the exported trust data using a migration operating system when a data format version of the existing secure element operating system is different than a data format version of the new secure element operating system, installing the new secure element operating system, and importing the migrated trust data into the installed new secure element operating system.Type: GrantFiled: September 21, 2017Date of Patent: March 2, 2021Assignee: Apple Inc.Inventors: Hervé Sibert, Matthias Lerch, Oren M. Elrad, Peng Liu, Rahul Narayan Singh
-
Publication number: 20200159966Abstract: Techniques are disclosed relating to application verification. In various embodiments, a computing device includes a secure circuit configured to maintain a plurality of cryptographic keys of the computing device. In such an embodiment, the computing device receives, from an application, a request for an attestation usable to confirm an integrity of the application, instructs the secure circuit to use one of the plurality of cryptographic keys to supply the attestation for the application, and provides the attestation to a remote computing system in communication with the application. In some embodiments, the secure circuit is configured to verify received metadata pertaining to the identity of the application and use the cryptographic key to generate the attestation indicative of the identity of the application.Type: ApplicationFiled: November 13, 2019Publication date: May 21, 2020Inventors: Hervé Sibert, Eric D. Friedman, Erik C. Neuenschwander, Jerrold V. Hauck, Thomas P. Mensch, Julien F. Freudiger, Alan W. Yu
-
Publication number: 20190394189Abstract: Implementations of the subject technology provide for performing, by a device, a request for obtaining information related to a phone authentication certificate (PAC) that was generated for the device, the PAC authenticating that a particular phone number is associated with the device, the request including packets of data. The subject technology receives the information related to the PAC, the information including an indication that the PAC was generated for the device. The subject technology sends, from the device, a request for validating the PAC to a remote server based at least in part on the information related to the PAC. Further, the subject technology receives a confirmation of validating the PAC from the remote server based at least in part on the information related to the PAC.Type: ApplicationFiled: September 28, 2018Publication date: December 26, 2019Inventors: Gokul P. Thirumalai, Daniel B. Pollack, Robert D. Butler, Ryan W. Baker, David G. Knipp, Sudhakar N. Mambakkam, Jonathon Sodos, Hannah S. Story, Hervé Sibert, Gianpaolo Fasoli
-
Publication number: 20180089434Abstract: Systems, methods, and computer-readable media for preserving trust data during operating system updates of a secure element of an electronic device are provided.Type: ApplicationFiled: September 21, 2017Publication date: March 29, 2018Inventors: Hervé Sibert, Matthias Lerch, Oren M. Elrad, Peng Liu, Rahul Narayan Singh
-
Patent number: 9292712Abstract: An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE), and a separate Trusted Execution Environment (TEE). The TEE maintains a real-time clock (RTC) that provides a RTC time to the REE. A RTC offset is stored in non-volatile memory, with the RTC offset indicating a difference between the RTC time and a protected reference (PR) time. Responsive to a request from the REE to read the RTC time, a current RTC time is returned to the REE. Responsive to a request from the REE to adjust the RTC time, the RTC time and the corresponding RTC offset are adjusted by a same amount, such that the PR time is not altered by the RTC adjustment. An exemplary computing device operable to implement the method is also disclosed.Type: GrantFiled: September 28, 2012Date of Patent: March 22, 2016Assignee: ST-Ericsson SAInventors: Per Ståhl, Håkan Englund, Martin Hovang, Hervé Sibert
-
Patent number: 9166956Abstract: Wireless communication apparatus (WAP) which comprises means of receiving data streams such as Access Stratum User Plane (AS UP), Access Stratum Control Plane (AS CP), and Non-Access Stratum Control Plane (NAS CP), each at least partly requiring a cryptographic processing operation, a cryptographic module comprising a cryptoprocessor, and management means configured to deliver at least some of the data streams to the crypto-processor according to an order of priority defined from the data types and cryptographic processing types assigned to each data stream.Type: GrantFiled: January 19, 2010Date of Patent: October 20, 2015Assignee: ST-Ericsson (France) SASInventors: Hervé Sibert, Sylviane Roullier
-
Patent number: 9081724Abstract: A method of protecting digital data stored in a storage medium. The method comprises providing a first and a second addressable storage region in the storage medium, and selector means for selectively indicating one of the first and the second addressable storage regions as active; storing the digital data in the first addressable storage region of the storage medium, wherein the digital data stored in the first addressable storage region is stored encrypted with a first encryption key; and causing the selector means to indicate the first addressable storage region as being active; and, responsive to a trigger event, copying the digital data from the first to the second addressable storage region, wherein the digital data stored in the second addressable storage region is stored encrypted with a second encryption key; and causing the selector means to indicate the second addressable storage region as being active.Type: GrantFiled: April 6, 2011Date of Patent: July 14, 2015Assignee: ST-ERICSSON SAInventors: Nicolas Anquet, Hervé Sibert
-
Patent number: 8913743Abstract: Method for decrypting, within a wireless communication device, a sequence of encrypted packets received via a wireless communication channel between the communication device and a cell assigned to this device, comprising for each packet the following steps: —the computation of an encrypting sequence corresponding to the packet (21); and —the decrypting of the packet with the aid of the said encrypting sequence (22). In this method, the encrypting sequences are computed before the reception of the packets while the reception quality is above a threshold (20, TH) and an indication of change of cell is not received (24).Type: GrantFiled: January 19, 2010Date of Patent: December 16, 2014Assignee: ST-Ericsson SAInventors: Hervé Sibert, Sylviane Roullier
-
Publication number: 20140310535Abstract: Electronic device (1) comprising a chipset component (2) and a flash memory component (3), the said chipset component being associated with an identifier, the said chipset component comprising a monotonic counter (21) and being configured to:—derive a key from the identifier and a current value of the monotonic counter, by using a cryptographic key derivation function,—build a provisioning command related to the key,—send the provisioning command to the flash memory component, and—use the key to manage a secure storage area in the flash memory component.Type: ApplicationFiled: March 7, 2012Publication date: October 16, 2014Applicant: ST-ERICSSON SAInventor: Hervé Sibert
-
Publication number: 20140095918Abstract: An exemplary method of maintaining secure time in a computing device is disclosed in which one or more processors implements a Rich Execution Environment (REE), and a separate Trusted Execution Environment (TEE). The TEE maintains a real-time clock (RTC) that provides a RTC time to the REE. A RTC offset is stored in non-volatile memory, with the RTC offset indicating a difference between the RTC time and a protected reference (PR) time. Responsive to a request from the REE to read the RTC time, a current RTC time is returned to the REE. Responsive to a request from the REE to adjust the RTC time, the RTC time and the corresponding RTC offset are adjusted by a same amount, such that the PR time is not altered by the RTC adjustment. An exemplary computing device operable to implement the method is also disclosed.Type: ApplicationFiled: September 28, 2012Publication date: April 3, 2014Inventors: Per Ståhl, Håkan Englund, Martin Hovang, Hervé Sibert
-
Patent number: 8543839Abstract: An electronic device is provided having a memory driver unit for reading partition headers including encrypted version numbers from a memory and for writing updated encrypted version numbers to the memory. The electronic device has an update agent unit for controlling a software or firmware update, a one-time programmable memory for storing a first value, and an encrypt-decrypt unit for decrypting the partition headers stored in the memory. The update agent is configured to compare the retrieved version numbers with a version number from a software or firmware update. The first value is incremented and stored in the one-time programmable memory if an update is performed. The encrypt-decrypt unit is configured to encrypt the version numbers of the software or firmware update based on the new first value. The memory driver unit is configured to write a new partition header with the updated encrypted version numbers into the memory.Type: GrantFiled: December 22, 2010Date of Patent: September 24, 2013Assignee: ST-Ericsson SAInventor: Hervé Sibert
-
Patent number: 8484451Abstract: A composite customer ID (CCID) is stored in the OTP memory of integrated circuit chipsets used by a number of different customers. The CCID includes individual customer IDs (CIDs) at defined index positions, each corresponding to a different customer. Each chipset allows or disallows software booting, based reading a certificate index value from a given customer's certificate, reading an OTP CID from OTP, as pointed to the by certificate index value, and evaluating the OTP CID with a certificate CID read from the certificate. Thus, while CCID carries information for a plurality of customers, each customer's certificate points only to that customer's OTP CID, which can be changed to revoke that customer's certificate without revoking the other customers' certificates. The CCID also may include a version number, where the chipsets allow or disallow software booting based on evaluating the certificate version number in view of the CCID version number.Type: GrantFiled: March 11, 2010Date of Patent: July 9, 2013Assignee: ST-Ericsson SAInventors: Hervé Sibert, Per Ståhl
-
Patent number: 8402282Abstract: Method for encrypting an initial digital data set, which comprises a compression of the initial digital data set delivering a compressed set comprising at least one compressed digital data stream and at least one dictionary making it possible to describe the content of the compressed digital data stream or streams, and an encryption of each dictionary only delivering an encrypted digital data set.Type: GrantFiled: June 6, 2011Date of Patent: March 19, 2013Assignee: ST-Ericsson SAInventor: Hervé Sibert