Patents by Inventor Jack Connor

Jack Connor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12277220
    Abstract: A method is provided for detecting a profiling attack in an electronic device. The method includes causing provisioning of the device with a key and causing key operations using the key. A total key provisions counter value of a total key provisions counter is updated in response to the key provisioning. Also, a counter value of a total operations counter corresponding to a total number of operations is updated using the detected provisioned keys. A predetermined relationship between the total key provisions counter value and the total operations counter value is detected. An indication of the profiling attack is provided in response to the relationship meeting a predetermined criterion. In another embodiment, an electronic device having a total key provisions counter value and a total key operations counter value is provided. A predetermined relationship between the counter values indicates a profiling attack of the electronic device.
    Type: Grant
    Filed: February 16, 2022
    Date of Patent: April 15, 2025
    Assignee: NXP B.V.
    Inventors: Nikita Veshchikov, Jack Connor
  • Publication number: 20240235808
    Abstract: In accordance with a first aspect of the present disclosure, a method of protecting a cryptographic device against side-channel attacks is conceived, the cryptographic device comprising a cryptographic unit and a processing unit, and the method comprising: performing, by the cryptographic unit, a cryptographic operation on input data, wherein said cryptographic operation generates at least one intermediate result; generating, by the processing unit, a set of possible values of the intermediate result; leaking, by the cryptographic device, said set of possible values of the intermediate result. In accordance with a second aspect of the present disclosure, a computer program is provided for carrying out said method. In accordance with a third aspect of the present disclosure, a corresponding cryptographic device is provided.
    Type: Application
    Filed: December 11, 2023
    Publication date: July 11, 2024
    Inventors: Jack Connor, Nikita Veshchikov, Melissa Azouaoui
  • Publication number: 20240020383
    Abstract: A method is provided for protecting an electronic device from a side-channel attack (SCA). The method includes providing a plurality of countermeasures that are for protecting the electronic device from the SCA. A set of countermeasures of the plurality of countermeasures is randomly enabled from the plurality of countermeasures to provide the protection during operation of the electronic device, such as for example, during an encryption operation. The method makes it more difficult for an attacker to construct a template of the electronic device that could be used in the SCA. In another embodiment, an electronic device is provided that incorporates the method.
    Type: Application
    Filed: July 13, 2022
    Publication date: January 18, 2024
    Inventors: Jack Connor, Nikita Veshchikov, Lutz Pape
  • Publication number: 20230394139
    Abstract: A method is provided for defending against a fuzzing analysis in a device. The method including: receiving, by the first device, a message from a second device; determining the message type of the message; determining that the message type is different from known message types of a protocol used by the first device; determining that the fuzzing analysis of the protocol is underway; and using the message type of the message to randomly determine an action against the fuzzing analysis. The action is intended to cause an attacker who tries to use fuzzing against a device to spend much more effort to discover a bug that can be exploited, and thus discourage the attacker from continuing the attack.
    Type: Application
    Filed: June 6, 2022
    Publication date: December 7, 2023
    Inventors: Nikita Veshchikov, Lutz Pape, Jack Connor
  • Publication number: 20230259618
    Abstract: A method is provided for detecting a profiling attack in an electronic device. The method includes causing provisioning of the device with a key and causing key operations using the key. A total key provisions counter value of a total key provisions counter is updated in response to the key provisioning. Also, a counter value of a total operations counter corresponding to a total number of operations is updated using the detected provisioned keys. A predetermined relationship between the total key provisions counter value and the total operations counter value is detected. An indication of the profiling attack is provided in response to the relationship meeting a predetermined criterion. In another embodiment, an electronic device having a total key provisions counter value and a total key operations counter value is provided. A predetermined relationship between the counter values indicates a profiling attack of the electronic device.
    Type: Application
    Filed: February 16, 2022
    Publication date: August 17, 2023
    Inventors: Nikita Veshchikov, Jack Connor