Patents by Inventor Jay Chen

Jay Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250208010
    Abstract: An embedding system and an embedding method are provided. The embedding system includes: a cooling container defining a cavity having an opening; a cooling liquid contained in the cavity of the cooling container; a mold arranged in the cavity and at least partially immersed in the cooling liquid, when cooled by the cooling container; and an embedding medium arranged in the mold and a sample enclosed in the embedding medium, when the mold is cooled by the cooling container. The mold is configured to exchange heat with the cooling liquid in such a manner that the embedding medium is cooled and solidified by the cooling liquid to embed the sample in the embedding medium.
    Type: Application
    Filed: March 24, 2022
    Publication date: June 26, 2025
    Inventors: Chun JIN, Jay CHEN, Jingjing CAO, Hongjian TAO
  • Patent number: 12189824
    Abstract: An integrated circuit chip can provide protection with registers of a register file. A processor can be part of general or security-oriented (e.g., root-of-trust (RoT)) circuitry. In described implementations, the processor includes multiple register blocks for storing multiple register values. The processor also includes multiple integrity blocks for storing multiple integrity codes. A respective integrity block is associated with a respective register block. The respective integrity block can store a respective integrity code that is derived from a respective register value that is stored in the respective register block. The integrity code can enable detection or correction of one or more corrupted bits in the register value. An integrity controller of the processor can monitor the register value regularly or in response to an access by an execution unit. The controller can take a protective action if corruption is detected. This enables information protection to extend to processor execution units.
    Type: Grant
    Filed: June 3, 2021
    Date of Patent: January 7, 2025
    Assignee: Google LLC
    Inventors: Thomas Edward Roberts, Timothy Jay Chen
  • Patent number: 12153720
    Abstract: An IC chip can provide silicon root of trust (RoT) functionality. In described implementations, the IC chip includes a processor, an interconnect, and multiple peripheral devices. These comportable circuit components are designed to facilitate interoperability and consistent, expected communications for security circuitry. Each peripheral device includes an interface that adheres to a common framework for interacting with the processor and with other peripheral devices. The interface includes an interconnect interface coupling the peripheral device to the interconnect and an inter-device interface coupling the peripheral device to at least one other peripheral device. The peripheral device is realized based on a peripheral device design code that indicates inter-device signaling in accordance with an inter-device scheme of an interface specification.
    Type: Grant
    Filed: October 31, 2020
    Date of Patent: November 26, 2024
    Assignee: Google LLC
    Inventors: Scott D. Johnson, Timothy Jay Chen, Mark David Hayter, Dominic Anthony Rizzo, Eunchan Kim, Michael Stefano Fritz Schaffner
  • Publication number: 20240361923
    Abstract: An apparatus with an integrated circuit (IC) chip can provide protection against attacks on a read-only memory (ROM), such as a boot ROM for security circuitry. An attacker can gain control of an IC by modifying ROM contents and/or redirecting ROM reads. To combat these attacks, example implementations store encrypted ROM data in the ROM array. A ROM controller is used to cryptographically tie the address of each ROM line to the corresponding encrypted ROM datum. To access the encrypted ROM datum, cryptographic circuitry decrypts the encrypted ROM datum using a key that is generated based on the corresponding ROM address. As part of an integrity checking procedure, a digest can be computed based on the encrypted ROM data. To further thwart would-be attacks, the ROM address can be adjusted (e.g., scrambled) before the controller uses the adjusted address to read encrypted data from the ROM array.
    Type: Application
    Filed: April 1, 2022
    Publication date: October 31, 2024
    Applicant: Google LLC
    Inventors: Rupert James Swarbrick, Michael Stefano Fritz Schaffner, Timothy Jay Chen
  • Publication number: 20240354417
    Abstract: This document describes systems and techniques for deriving identity and root keys for embedded systems. In aspects, a boot process and key manager of an embedded system may implement a secure or trusted boot process for embedded systems in which code of next-level boot loader or software image is verified using root keys or other protected information before execution of the boot process is passed to the next stage in the boot process. Alternatively or additionally, the key manager may enable sealing and attestation of various levels of root and identity keys to enable respective verification of software or hardware throughout a life cycle of a device to prevent unauthorized access to protected or private code of an embedded system. By so doing, the described aspects may enable an embedded system with a secure boot process and robust identity and root key management system.
    Type: Application
    Filed: June 28, 2024
    Publication date: October 24, 2024
    Applicant: Google LLC
    Inventors: Miguel Angel Osorio Lozano, Timothy Jay Chen
  • Publication number: 20240280447
    Abstract: The present disclosure relates to a cassette and a tissue embedding method using the cassette. The cassette includes a frame, a cover and a base. The frame defines an accommodating cavity through a first face and a second face of the frame arranged oppositely in a first direction. The cover is detachably mounted to the frame. The base is detachably mounted to the frame, and the base and the cover are configured to hold and orient a tissue sample therebetween. The base is slidable relative to the frame in a second direction different from the first direction to open and close the accommodating cavity.
    Type: Application
    Filed: June 18, 2021
    Publication date: August 22, 2024
    Inventors: Augustine LI, Frank WU, Jay CHEN, Edison YU, Albert CHEN, Chris JIN
  • Patent number: 12061702
    Abstract: This document describes systems and techniques for deriving identity and root keys for embedded systems. In aspects, a boot process and key manager of an embedded system may implement a secure or trusted boot process for embedded systems in which code of next-level boot loader or software image is verified using root keys or other protected information before execution of the boot process is passed to the next stage in the boot process. Alternatively or additionally, the key manager may enable sealing and attestation of various levels of root and identity keys to enable respective verification of software or hardware throughout a life cycle of a device to prevent unauthorized access to protected or private code of an embedded system. By so doing, the described aspects may enable an embedded system with a secure boot process and robust identity and root key management system.
    Type: Grant
    Filed: October 6, 2021
    Date of Patent: August 13, 2024
    Assignee: Google LLC
    Inventors: Miguel Angel Osorio Lozano, Timothy Jay Chen
  • Publication number: 20240193309
    Abstract: An apparatus with an integrated circuit (IC) chip can provide protection against attacks on a cryptographic coprocessor. An attacker can compromise a cryptographic coprocessor by, for instance, obtaining a private encryption key or instruction code. To combat these attacks, example implementations store information in encrypted form. The information may correspond to data, instruction code, or intermediate values located in state registers. To securely and quickly “erase” such stored information, the cryptographic coprocessor can change the encryption key. In other example implementations, random numbers are provided with two different levels of “randomness quality” that is appropriate for different types of procedures. A cryptographic coprocessor can include two registers that store randomized bits in accordance with the two different quality levels for rapid access during cryptographic operations.
    Type: Application
    Filed: April 5, 2022
    Publication date: June 13, 2024
    Applicant: Google LLC
    Inventors: Philipp Wagner, Gregory Andrew Chadwick, Timothy Jay Chen, Michael Stefano Fritz Schaffner, Christopher Gori, Rupert James Swarbrick
  • Publication number: 20240184735
    Abstract: This document discloses aspects of secure serial peripheral interface (SPI) communication. In some aspects, a secure SPI communication module monitors communications transmitted by a host to a peripheral block that is coupled to the host via a SPI interconnect. The module compares respective commands of the communications sent by the host to information indicating commands that the peripheral block is not authorized to execute. Based on the comparing, the module determines that one of the respective commands is one of the commands that the peripheral block is not authorized to execute. The module then prevents the peripheral block from receiving at least a portion of the respective command of the communication. By so doing, the module can prevent the peripheral block from executing unauthorized commands, which may compromise security of the peripheral block.
    Type: Application
    Filed: April 21, 2022
    Publication date: June 6, 2024
    Applicant: Google LLC
    Inventors: Eunchan Kim, Timothy Jay Chen
  • Publication number: 20240184932
    Abstract: An apparatus with an integrated circuit (IC) chip can provide protection against attacks on a read-only memory (ROM), such as a boot ROM for security circuitry. An attacker can gain control of an IC by modifying ROM contents and/or redirecting ROM reads. To combat these attacks, example implementations store encrypted ROM data in the ROM array. A ROM controller is used to cryptographically tie the address of each ROM line to the corresponding encrypted ROM datum. To access the encrypted ROM datum, cryptographic circuitry decrypts the encrypted ROM datum using a key that is generated based on the corresponding ROM address. As part of an integrity checking procedure, a digest can be computed based on the encrypted ROM data. To further thwart would-be attacks, the ROM address can be adjusted (e.g., scrambled) before the controller uses the adjusted address to read encrypted data from the ROM array.
    Type: Application
    Filed: April 1, 2022
    Publication date: June 6, 2024
    Applicant: Google LLC
    Inventors: Michael Stefano Fritz Schaffner, Rupert James Swarbrick, Timothy Jay Chen
  • Patent number: 11995065
    Abstract: In one aspect, a method of detecting database anomalies, includes reading historical data in a destination database at an end of a data pipeline, determining bounds including an upper bound and a lower bound based on the read historical data, reading current data for a first specified time period in the destination database, responsive to determining the upper or the lower bound is exceeded, determining database transactions that caused the exceeding, and transmitting alerts to owners of the database transactions.
    Type: Grant
    Filed: December 30, 2021
    Date of Patent: May 28, 2024
    Assignee: STRIPE, INC.
    Inventors: Xin Li, Hanhan Xiang, Yue Zhang, Guanglei Song, Mu Lin, Jeffrey Reiter, Wei Keong Mah, Jay Chen
  • Publication number: 20240169098
    Abstract: This document discloses aspects of secure chip-wide communication. In some aspects, a host of a system generates integrity metadata for a command payload issued to a destination over an interconnect of the system. The integrity metadata can be generated based on respective values of bits that form the command payload, such as plaintext data bits. The destination validates the integrity of the command payload based on the integrity metadata before consuming the command payload. In some cases, the destination stores the integrity metadata with data of the command payload, which may be returned to the host along the data when requested. By so doing, the host and destinations of the system can use the integrity metadata to implement secure-chip wide communication, which may prevent fault injection attacks on the command payloads or response data during transit or at temporal storage locations within the system.
    Type: Application
    Filed: April 7, 2022
    Publication date: May 23, 2024
    Applicant: Google LLC
    Inventors: Timothy Jay Chen, Michael Stefano Fritz Schaffner, Christopher Gori, Eunchan Kim, Donald Shanahan Sanders, Miguel Angel Osorio Lozano
  • Patent number: 11972033
    Abstract: An IC chip can provide silicon root of trust (RoT) functionality. In described implementations, the IC chip includes a processor, an alert handler, and multiple peripheral devices, which generate alert indications. The alert handler processes the alert indications, which have security implications. The alert handler includes multiple alert receiver modules to communicate with the multiple peripheral devices. The alert handler also includes a controller, multiple accumulation units, multiple escalation timers, and multiple escalation sender modules. These components can be organized into a hierarchy of increasing escalation severity. In operation, the controller classifies an alert and flexibly implements an adaptable alert handler path that is established through the escalation components responsive to the classification and based on a source of the alert. A path can conclude with an escalation sender module commanding an escalation handler to implement a security countermeasure.
    Type: Grant
    Filed: October 31, 2020
    Date of Patent: April 30, 2024
    Assignee: Google LLC
    Inventors: Scott D. Johnson, Timothy Jay Chen, Christopher Gori, Eunchan Kim, Michael Stefano Fritz Schaffner
  • Publication number: 20240126886
    Abstract: This document describes techniques and systems for providing trusted computing for digital devices. The techniques and systems may use cryptographic algorithms to provide trusted computing and processing. By doing so, the techniques help ensure authentic computation and prevent nefarious acts. For example, a method is described that receives a signature associated with a designee and validates the signature. The signature may be associated with a designee of a host computing device, and the signature may be generated according to firmware associated with an integrated circuit of the host computing device and a first private key of a first asymmetric key pair. Signature validation may be based on a second asymmetric key pair having a second private key and a second public key, the second private key stored in write-once memory of the host computing device.
    Type: Application
    Filed: February 24, 2021
    Publication date: April 18, 2024
    Applicant: Google LLC
    Inventors: Oskar Gerhard Senft, Miguel Angel Osorio Lozano, Timothy Jay Chen, Dominic Anthony Rizzo
  • Patent number: 11886717
    Abstract: This document includes techniques, apparatuses, and systems related to an interface for revision-limited memory, which can improve various computing aspects and performance. In aspects, confidentiality, integrity, and availability may be ensured while increasing the performance of revision-limited memory. In this example, the techniques also enable the digital computing device to interact with information related to the revision-limited memory.
    Type: Grant
    Filed: November 18, 2022
    Date of Patent: January 30, 2024
    Assignee: Google LLC
    Inventors: Eunchan Kim, Michael Stefano Fritz Schaffner, Timothy Jay Chen, Christopher Gori, Ziv Hershman, Miguel Angel Osorio
  • Publication number: 20230214379
    Abstract: In one aspect, a method of detecting database anomalies, includes reading historical data in a destination database at an end of a data pipeline, determining bounds including an upper bound and a lower bound based on the read historical data, reading current data for a first specified time period in the destination database, responsive to determining the upper or the lower bound is exceeded, determining database transactions that caused the exceeding, and transmitting alerts to owners of the database transactions.
    Type: Application
    Filed: December 30, 2021
    Publication date: July 6, 2023
    Inventors: Xin Li, Hanhan Xiang, Yue Zhang, Guanglei Song, Mu Lin, Jeffrey Reiter, Wei Keong Mah, Jay Chen
  • Publication number: 20230099564
    Abstract: This document includes techniques, apparatuses, and systems related to an interface for revision-limited memory, which can improve various computing aspects and performance. In aspects, confidentiality, integrity, and availability may be ensured while increasing the performance of revision-limited memory. In this example, the techniques also enable the digital computing device to interact with information related to the revision-limited memory.
    Type: Application
    Filed: November 18, 2022
    Publication date: March 30, 2023
    Applicant: Google LLC
    Inventors: Eunchan Kim, Michael Stefano Fritz Schaffner, Timothy Jay Chen, Christopher Gori, Ziv Hershman, Miguel Angel Osorio
  • Publication number: 20230081896
    Abstract: Provided herein is an air monitoring system with a venturi pump including an air supply passageway, a sample passageway, and a discharge passageway, the discharge passageway in fluid communication with the air supply passageway and the sample passageway, and a detection device including a biochip, a light emitting source, a photodetector, and a controller electronically coupled to the photodetector. Also provided herein is a photonic biogel and uses thereof for spectroscopic detection of airborne pathogens.
    Type: Application
    Filed: September 15, 2022
    Publication date: March 16, 2023
    Inventors: Byunghoon Ryu, Jay Chen, Xiaogan Liang, Katsuo Kurabayashi, Young Geun Park
  • Patent number: 11528126
    Abstract: This document includes techniques, apparatuses, and systems related to an interface for revision-limited memory, which can improve various computing aspects and performance. In aspects, confidentiality, integrity, and availability may be ensured while increasing the performance of revision-limited memory. In this example, the techniques also enable the digital computing device to interact with information related to the revision-limited memory.
    Type: Grant
    Filed: February 16, 2021
    Date of Patent: December 13, 2022
    Assignee: Google LLC
    Inventors: Eunchan Kim, Michael Stefano Fritz Schaffner, Timothy Jay Chen, Christopher Gori, Ziv Hershman, Miguel Angel Osorio
  • Publication number: 20220391540
    Abstract: An integrated circuit chip can provide protection with registers of a register file. A processor can be part of general or security-oriented (e.g., root-of-trust (RoT)) circuitry. In described implementations, the processor includes multiple register blocks for storing multiple register values. The processor also includes multiple integrity blocks for storing multiple integrity codes. A respective integrity block is associated with a respective register block. The respective integrity block can store a respective integrity code that is derived from a respective register value that is stored in the respective register block. The integrity code can enable detection or correction of one or more corrupted bits in the register value. An integrity controller of the processor can monitor the register value regularly or in response to an access by an execution unit. The controller can take a protective action if corruption is detected. This enables information protection to extend to processor execution units.
    Type: Application
    Filed: June 3, 2021
    Publication date: December 8, 2022
    Applicant: Google LLC
    Inventors: Thomas Edward Roberts, Timothy Jay Chen