Patents by Inventor Jorge Guajardo Merchan

Jorge Guajardo Merchan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210194921
    Abstract: A system includes a memory and a processor in communication with the memory. The processor is programmed to receive a runtime measurement from a sensor regarding the physical attribute of at least the separate processor during runtime; compare the runtime measurement of the physical attribute to a fingerprint that includes a baseline measurement of a physical attribute of at least a separate processor during an evaluation period of the system, and in response to the measurement exceeding a threshold, executing a countermeasure operation against software ran by the separate processor.
    Type: Application
    Filed: December 20, 2019
    Publication date: June 24, 2021
    Inventors: Jorge GUAJARDO MERCHAN, Stefan GEHRER, Shalabh JAIN, Saraswathy RAMANATHAPURAM VANCHEESWARAN, Timo LOTHSPEICH
  • Publication number: 20210157388
    Abstract: An electronic control unit (ECU) includes a processor, a Controller Area Network (CAN) controller, clock gating logic, and security gating logic. The CAN controller having a status and configured to receive data and control signals from the processor, and a clock signal, package the data to create a CAN protocol frame held in at least one transmit buffer, and shift the CAN protocol frame to a CAN transceiver that is configured to transmit the CAN protocol frame to a CAN bus. The clock gating logic may be configured to selectively disable a clock signal to the CAN controller based on a control signal from the processor. The security gating logic configured to, in response to the status of the CAN controller being active, inhibit disabling the clock signal.
    Type: Application
    Filed: November 27, 2019
    Publication date: May 27, 2021
    Inventors: Sekar KULANDAIVEL, Shalabh JAIN, Jorge GUAJARDO MERCHAN
  • Publication number: 20210135850
    Abstract: An oblivious distributed file system is provided using an oblivious random access machine (ORAM), including an ORAM balanced tree structure, where each node in the tree is configured to store data blocks, the structure including at least two shares. The system also includes at least two ORAM servers, each of the servers configured to communicate with a client ORAM device, and programmed to facilitate storage of a different subset of the shares of the tree structure using a distributed file system and to implement an access procedure of a tree-based ORAM using the tree structure, including a retrieval phase and an eviction phase. In the retrieval phase, the servers utilize an authenticated Private Information Retrieval (PIR) protocol to retrieve data blocks as requested from the client ORAM device. In the eviction phase, the servers utilize a linear secret sharing scheme.
    Type: Application
    Filed: November 6, 2019
    Publication date: May 6, 2021
    Inventors: Thang HOANG, Jorge GUAJARDO MERCHAN
  • Patent number: 10958680
    Abstract: A method of operating at least one node in a communication network that uses a shared communication medium has been developed. The method includes adjusting, with a controller in a first node, a resistance of a first potentiometer in the first node to a first resistance level that the controller in the first node determines randomly, the first potentiometer in the first node being connected to an output of a transceiver in the first node and to a shared communication medium, and transmitting, with the transceiver in the first node, a first data bit through the output that is connected to the shared communication medium with the first potentiometer producing the first resistance level.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: March 23, 2021
    Assignee: Robert Bosch GmbH
    Inventors: Shalabh Jain, Qian Wang, Md Tanvir Arafin, Jorge Guajardo Merchan
  • Patent number: 10956356
    Abstract: A computer system for performing control of an electronic control unit (ECU) having a processor for executing computer-readable instructions and a memory for maintaining the computer-executable instructions, the computer-executable instructions when executed by the processor perform the following functions by a processor. The functions include configuring a communication controller to while operating in a secure mode, transiting to an unsecure mode, executing a program in the unsecure mode that utilizes the communication controller; and in response to detecting a clock off request while a transmit buffer of the communication controller is not empty, inhibiting the clock off request until the transmit buffer is empty.
    Type: Grant
    Filed: November 27, 2019
    Date of Patent: March 23, 2021
    Assignee: Robert Bosch GmbH
    Inventors: Sekar Kulandaivel, Shalabh Jain, Jorge Guajardo Merchan
  • Patent number: 10897354
    Abstract: A method for network-connected tool operation with user anonymity includes generating a first cryptographic key that is stored in a memory in the power tool, generating a first encrypted serial number for the power tool based on an output of an encryption function using the first cryptographic key applied to a non-encrypted serial number for the power tool stored in the memory, and generating usage data based on data received from at least one sensor in the power tool during operation of the power tool. The method further includes transmitting the usage data in association only with the first encrypted serial number from the power tool to a maintenance system to enable usage data collection that prevents identification of the power tool as being associated with the usage data.
    Type: Grant
    Filed: October 12, 2018
    Date of Patent: January 19, 2021
    Assignee: Robert Bosch GmbH
    Inventors: Xinxin Fan, Jorge Guajardo Merchan, Daniel Vesenmaier
  • Patent number: 10833851
    Abstract: A method for shared secret agreement with forward secrecy includes generating a first plurality of bits of data using a cryptographically secure pseudo-random number generator applied to a node seed value and at least one index value, transmitting the first plurality of bits of data through a shared communication medium simultaneously to transmission of a second plurality of bits of data from a second node, identifying shared secret data with the second node using a portion of the first plurality of bits of data that are logical complements of the second plurality of bits of data, generating a shared seed value using a cryptographically secure one-way function applied to the shared secret data, and generating an updated node seed value using the cryptographically secure one-way function applied to the node seed value to replace the node seed value.
    Type: Grant
    Filed: August 29, 2018
    Date of Patent: November 10, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Jorge Guajardo Merchan, Shalabh Jain
  • Patent number: 10805339
    Abstract: A method of operating at least one node in a communication network that uses a shared communication medium has been developed to reduce or eliminate timing side-channel attacks performed by an adversary that is connected to the shared communication medium. The method includes generating, with a controller in a first node, a first jitter time offset randomly generated from within a predetermined time range, and transmitting, with a transceiver in the first node, a first data bit through an output of the transceiver that is connected to a shared communication medium, the first data bit being transmitted at a first time corresponding to the first jitter time offset added to a first predetermined transmission time.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: October 13, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Shalabh Jain, Qian Wang, Jorge Guajardo Merchan
  • Patent number: 10749673
    Abstract: A method for operation of a communication network reduces leakage of data to an adversary that can observe signals transmitted through the communication network. The method includes generating a ranking to order operation of a plurality of nodes that exchange data in a group cryptographic key exchange process based on a leakage map of the nodes. The ranking minimizes leakage of data through a shared communication medium during the group cryptographic key exchange process. The method includes transmitting the ranking to the plurality of nodes through the shared communication medium, and performing, with the plurality of nodes, the group cryptographic key exchange process in an order of operation specified in the ranking to enable the plurality of nodes to exchange a shared cryptographic key through the shared communication medium while minimizing leakage of data.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: August 18, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Shalabh Jain, Jorge Guajardo Merchan, Samarjit Das
  • Publication number: 20200228325
    Abstract: A method for implementing a secure multiparty inner product computation between two parties using an SPDZ protocol involves having a first party and a second party compute, for i=k, a vector (I)=(II) based on a vector (x={1, . . . , xN}), and a vector (w={W1, WN}), respectively, where (I)=(X2i?X2i) (III)=W2i?1W2i, N is the total number of elements in the vectors k=N/2. The vectors (I), and (III) are securely shared between the parties. The parties then jointly compute SPDZ protocol Add([w2i], [x2i?1]) and Add([w2i], [x2i?1]) to determine shares [w2i?1+x2i] and [w2i+x2i?1] respectively, and then compute, for i=1, . . . , k, inner product shares [di] by performing SPDZ protocol Mult([w2i31 1+x2i], [w2i+x2i?1]). SPDZ protocol ([Add d1],. . . , [dk], ?(IV), . . .
    Type: Application
    Filed: December 13, 2018
    Publication date: July 16, 2020
    Inventors: Xinxin FAN, Qingji ZHENG, Jorge GUAJARDO MERCHAN
  • Publication number: 20200186528
    Abstract: A method for secure multiparty computation of an inner product includes performing multiparty additions to generate a first sum share and a second sum share between two shares of alternating elements from corresponding pairs of elements in a first vector and a second vector, performing multiparty multiplications with at least one other node to generate inner product pair shares corresponding to products of the first sum shares and the second sum shares corresponding to pairs of elements in the first and second vectors, and performing another multiparty addition of each inner product pair share with a first negated shares of pair products corresponding to pairs of elements in the first vector and a second negated shares of pair products corresponding to pairs of elements in the second vector to generate a share of an inner product of the first and second vectors.
    Type: Application
    Filed: September 25, 2018
    Publication date: June 11, 2020
    Inventors: Xinxin Fan, Qingji Zheng, Jorge Guajardo Merchan
  • Patent number: 10630655
    Abstract: A method for operating an aggregator in a private stream aggregation (PSA) system has been developed. The method includes receiving a plurality of encrypted messages from a plurality of clients, each encrypted message corresponding to a vector in a learning with errors (LWE) public key, adding, the plurality of encrypted messages to generate an aggregate data set, extracting a summation of a plurality of error vectors in the plurality of encrypted messages from the aggregate data set, decrypting the summation of the encrypted data contained in the plurality of encrypted messages using a private key stored in the memory of the aggregator to generate a plaintext sum of noisy data generated by the plurality of clients, and generating, with the processor, an output of the plaintext sum of noisy data that preserves differential privacy of each client in the plurality of clients.
    Type: Grant
    Filed: May 15, 2018
    Date of Patent: April 21, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Daniela Becker, Jorge Guajardo Merchan
  • Patent number: 10554241
    Abstract: A method for operating at least one node connected to a shared communication medium reduces or eliminates the ability of an adversary node to identify the at least one node based on transient signal characteristics of a signal that the at least one node generates when transmitting a bit through the shared communication medium. The method includes adjusting, with a controller in a first node, an impedance of a variable impedance circuit in the first node to a first impedance level that the controller determines randomly, the variable impedance circuit in the first node being connected to an output of a transceiver in the first node and to a shared communication medium, and transmitting, with the transceiver, a first data bit through the shared communication medium with the variable impedance circuit producing the first impedance level.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: February 4, 2020
    Assignee: Robert Bosch GmbH
    Inventors: Shalabh Jain, Qian Wang, Md Tanvir Arafin, Jorge Guajardo Merchan
  • Publication number: 20190372760
    Abstract: A method for implementing a secure multiparty computation protocol between a plurality of parties for a multiparty computation includes performing an offline phase of an SPDZ protocol for each of the parties participating in the multiparty computation. A secret share redistribution phase is then performed wherein the secret shares of the parties are redistributed to a subset of the parties. A secret share recombination phase is performed during which the subset of the parties recombines the redistributed secret shares to recover the secret shares of the parties not in the subset. An online phase of the SPDZ protocol is then performed during which the function is computed with respect to the private inputs of the parties and using the secret shares of all the parties.
    Type: Application
    Filed: January 31, 2019
    Publication date: December 5, 2019
    Inventors: Qingji Zheng, Shalabh Jain, Jorge Guajardo Merchan, Sebastian Becker, Sven Trieflinger
  • Publication number: 20190349208
    Abstract: A method for authenticating a first device is disclosed. In embodiment, the method includes the steps of: receiving a helper bit string from a second device that is remote from the first device; measuring a first response bit string of a physical unclonable function of the first device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; reconstructing a random matrix using a pseudo-random number generator initialized with a seed; and decoding a result of the subtraction using the random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise.
    Type: Application
    Filed: December 27, 2017
    Publication date: November 14, 2019
    Applicant: Robert Bosch GmbH
    Inventors: Jorge Guajardo MERCHAN, Paulius DUPLYS, Christopher HUTH
  • Publication number: 20190349207
    Abstract: A method and system for authenticating a device is disclosed. The method includes the steps of: receiving a helper bit string and a first MAC; measuring a first response bit string of a physical unclonable function of the device with respect to a challenge bit string; subtracting the first response bit string from the helper bit string; decoding a result of the subtraction using a uniformly distributed random matrix, the shared secret bit string being provided from the decoding if the helper bit string was encoded using a previously measured second response bit string that is within a threshold level of similarity to the first response bit string, the decoding outputting an error value otherwise; determining a second MAC based on the shared secret bit string, the uniformly distributed random matrix, and the helper bit string; and determining whether the second MAC matches the first MAC.
    Type: Application
    Filed: December 27, 2017
    Publication date: November 14, 2019
    Inventors: Jorge Guajardo MERCHAN, Paulius DUPLYS, Christopher HUTH
  • Publication number: 20190340381
    Abstract: An oblivious encrypted search and update method includes transmitting encrypted search queries and encrypted file update requests from a trusted client to at least two different untrusted servers, receiving encrypted search entries and encrypted file entries from the untrusted servers, and decrypting the encrypted search entries and encrypted file entries with the trusted client. The trusted client re-encrypts the decrypted entries and transmits re-encrypted entries that were received from a first untrusted server to a second untrusted server and vice versa to provide obliviousness for encrypted keyword searches and encrypted file updates from the trusted client.
    Type: Application
    Filed: December 28, 2017
    Publication date: November 7, 2019
    Inventors: Attila Yavuz, Jorge Guajardo Merchan
  • Patent number: 10397195
    Abstract: A method for shared key generation with authentication in a gateway node includes generating, generating a first set of pseudo-random data corresponding to expected transmissions from a first node that communicates with a second node through a shared communication medium, identifying, with the gateway node, bits transmitted from the second node based on a signals received by the gateway node corresponding to simultaneous transmissions from the first node and the second node, identifying, with the gateway node, expected bit values for the bits from the second node based on a combination of shared secret data stored in a memory of the gateway node with another set of random or pseudo-random data generated by the second node, and authenticating the second node in response to the plurality of bits transmitted from the second node matching the plurality of expected bit values.
    Type: Grant
    Filed: July 15, 2016
    Date of Patent: August 27, 2019
    Assignee: Robert Bosch GmbH
    Inventors: Shalabh Jain, Jorge Guajardo Merchan, Xinxin Fan
  • Publication number: 20190229905
    Abstract: A method for network-connected tool operation with user anonymity includes generating a first cryptographic key that is stored in a memory in the power tool, generating a first encrypted serial number for the power tool based on an output of an encryption function using the first cryptographic key applied to a non-encrypted serial number for the power tool stored in the memory, and generating usage data based on data received from at least one sensor in the power tool during operation of the power tool. The method further includes transmitting the usage data in association only with the first encrypted serial number from the power tool to a maintenance system to enable usage data collection that prevents identification of the power tool as being associated with the usage data.
    Type: Application
    Filed: October 12, 2018
    Publication date: July 25, 2019
    Inventors: Xinxin Fan, Jorge Guajardo Merchan, Daniel Vesenmaier
  • Publication number: 20190229916
    Abstract: A star topology network comprises a user device, a 200 central gateway, and one or more sensor nodes added to the existing network. A communication between the user device and the central gateway is secured either based on public-key cryptography, symmetric-key cryptography, or by the use of a secure channel such as a wired communication. A request from the user device to the central gateway can be transmitted over the internet.
    Type: Application
    Filed: June 28, 2017
    Publication date: July 25, 2019
    Inventors: Jorge Guajardo Merchan, Paulius Duplys, Rene Guillaume, Jeffrey Donne