Patents by Inventor Kambiz Rahimi
Kambiz Rahimi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230198746Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.Type: ApplicationFiled: February 13, 2023Publication date: June 22, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Avdhesh CHHODAVDIA, Ling Tony CHEN, Felix Stefan DOMKE, Kambiz RAHIMI, Jay Scott FULLER
-
Patent number: 11595189Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.Type: GrantFiled: October 27, 2020Date of Patent: February 28, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Avdhesh Chhodavdia, Ling Tony Chen, Felix Stefan Domke, Kambiz Rahimi, Jay Scott Fuller
-
Publication number: 20220393856Abstract: The present disclosure relates to systems for generating network packets that facilitate reliable and secure transmission of data between computing devices. For example, systems described herein involve generating a network packet in which a transport layer and security layer are implemented within an authentication header of the network packet. Information from the authentication header may be evaluated by a receiving device using a security key to compute an integrity check vector and an initialization vector to determine that a network packet has been provided in a correct order as well as check against a variety of security threats.Type: ApplicationFiled: June 7, 2021Publication date: December 8, 2022Inventors: Deepak GOEL, Kambiz RAHIMI
-
Publication number: 20220131686Abstract: A method for secure key exchange. The method comprises receiving a request to certify a key from a communication partner at an interface between an access and tamper resistant circuit block and exposed circuitry. Within the access and tamper resistant circuit block, a first random private key is generated. A corresponding public key of the first random private key is derived, and a cryptographic digest of the public key and attributes associated with the first random private key is generated. The generated cryptographic digest is signed using a second random private key that has been designated for signing by one or more associated attributes. The public key and the signature are then sent to the communication partner via the interface.Type: ApplicationFiled: October 27, 2020Publication date: April 28, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Avdhesh CHHODAVDIA, Ling Tony CHEN, Felix Stefan DOMKE, Kambiz RAHIMI, Jay Scott FULLER
-
Patent number: 11184164Abstract: Disclosed is a cryptographic key management system implemented in access and tamper resistant circuitry. The circuitry includes processing circuitry to perform cryptographic processing based cryptographic keys. Cryptographic key registers include key portions and attribute portions. An interface receives commands from exposed circuitry that controls the processing circuitry to perform cryptographic processing based on the keys and associated attributes. The attributes indicate what operations may be performed on, or using, the associated keys. of the associated keys. The attributes indicate intended uses of the keys.Type: GrantFiled: February 2, 2018Date of Patent: November 23, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Kambiz Rahimi, Jay Scott Fuller, Ling Tony Chen, Felix Stefan Domke
-
Publication number: 20190245686Abstract: Disclosed is a cryptographic key management system implemented in access and tamper resistant circuitry. The circuitry includes processing circuitry to perform cryptographic processing based cryptographic keys. Cryptographic key registers include key portions and attribute portions. An interface receives commands from exposed circuitry that controls the processing circuitry to perform cryptographic processing based on the keys and associated attributes. The attributes indicate what operations may be performed on, or using, the associated keys. of the associated keys. The attributes indicate intended uses of the keys.Type: ApplicationFiled: February 2, 2018Publication date: August 8, 2019Inventors: Kambiz Rahimi, Jay Scott Fuller, Ling Tony Chen, Felix Stefan Domke
-
Patent number: 9418251Abstract: A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid lines. The system also includes transformation logic to transform the first set of signals to generate a second set of signals, to transmit the second set of signals on a third set of grid lines that are coupled to the first set of grid lines, and to transmit the second set of signals on a fourth set of grid lines that are coupled to the second set of grid lines. In addition, the system includes verification logic to compare the second set of signals on the third and fourth set of grid lines to an expected set of signals.Type: GrantFiled: September 29, 2015Date of Patent: August 16, 2016Assignee: Broadcom CorporationInventors: Kambiz Rahimi, Mark Buer, Rolando Ogot
-
Patent number: 9305195Abstract: RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.Type: GrantFiled: March 27, 2015Date of Patent: April 5, 2016Assignee: IMPINJ, INC.Inventors: Christopher J. Diorio, Theron Stanford, Scott A. Cooper, Harley K. Heinrich, Chad A. Lindhorst, Kambiz Rahimi
-
Publication number: 20160092703Abstract: A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid lines. The system also includes transformation logic to transform the first set of signals to generate a second set of signals, to transmit the second set of signals on a third set of grid lines that are coupled to the first set of grid lines, and to transmit the second set of signals on a fourth set of grid lines that are coupled to the second set of grid lines. In addition, the system includes verification logic to compare the second set of signals on the third and fourth set of grid lines to an expected set of signals.Type: ApplicationFiled: September 29, 2015Publication date: March 31, 2016Applicant: Broadcom CorporationInventors: Kambiz Rahimi, Mark Buer, Rolando Ogot
-
Patent number: 9147090Abstract: A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid lines. The system also includes transformation logic to transform the first set of signals to generate a second set of signals, to transmit the second set of signals on a third set of grid lines that are coupled to the first set of grid lines, and to transmit the second set of signals on a fourth set of grid lines that are coupled to the second set of grid lines. In addition, the system includes verification logic to compare the second set of signals on the third and fourth set of grid lines to an expected set of signals.Type: GrantFiled: June 27, 2014Date of Patent: September 29, 2015Assignee: Broadcom CorporationInventors: Kambiz Rahimi, Mark Buer, Rolando Ogot
-
Patent number: 9024731Abstract: RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.Type: GrantFiled: May 22, 2013Date of Patent: May 5, 2015Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Theron Stanford, Scott A. Cooper, Harley K. Heinrich, Chad A. Lindhorst, Kambiz Rahimi
-
Publication number: 20140310826Abstract: A mesh grid protection system is provided. The system includes assertion logic configured to transmit a first set of signals on a first set of grid lines and a second set of grid. lines. The system also includes transformation logic to transform the first set of signals to generate a second set of signals, to transmit the second set of signals on a third set of grid lines that are coupled to the first set of grid lines, and to transmit the second set of signals on a fourth set of grid lines that are coupled to the second set of grid lines. In addition, the system includes verification logic; to compare the second set of signals on the third and fourth set of grid lines to an expected set of signals.Type: ApplicationFiled: June 27, 2014Publication date: October 16, 2014Applicant: Broadcom CorporationInventors: Kambiz RAHIMI, Mark Buer, Rolando Ogot
-
Patent number: 8776260Abstract: A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines. The system also includes transformation logic coupled to the grid lines and configured to receive the first set of signals and transform the first set of signals to generate a second set of signals and transmit the second set of signals on a second set of grid lines. The system further includes verification logic coupled to the transformation logic and configured to compare the second set of signals to an expected set of signals.Type: GrantFiled: September 25, 2012Date of Patent: July 8, 2014Assignee: Broadcom CorporationInventors: Kambiz Rahimi, Mark Buer, Rolando Ogot
-
Publication number: 20140090093Abstract: A mesh grid protection system is provided. The system includes grid lines forming a mesh grid proximate to operational logic and assertion logic configured to transmit a first set of signals on a first set of grid lines. The system also includes transformation logic coupled to the grid lines and configured to receive the first set of signals and transform the first set of signals to generate a second set of signals and transmit the second set of signals on a second set of grid lines. The system further includes verification logic coupled to the transformation logic and configured to compare the second set of signals to an expected set of signals.Type: ApplicationFiled: September 25, 2012Publication date: March 27, 2014Applicant: Broadcom CorporationInventors: Kambiz RAHIMI, Mark Buer, Rolando Ogot
-
Patent number: 8665074Abstract: RFID tags, ICs for RFID tags, and methods are provided. In some embodiments, an RFID tag includes a memory with multiple sections, and a processing block. The processing block may map one of these sections, or another of these sections, for purposes of responding to a first command from an RFID reader. As such, an RFID tag can operate according to the data stored in the section mapped at the time. In some embodiments, a tag can even transition from mapping one of the sections to mapping another of the sections. This can amount to the tag exhibiting alternative behaviors, and permits hiding data on the tag.Type: GrantFiled: June 20, 2012Date of Patent: March 4, 2014Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Theron Stanford, Scott A. Cooper, Chad A. Lindhorst, Kambiz Rahimi, Harley K. Heinrich, Gregory T. Kavounas
-
Patent number: 8471708Abstract: RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.Type: GrantFiled: July 19, 2010Date of Patent: June 25, 2013Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Theron Stanford, Scott A. Cooper, Harley K. Heinrich, Chad A. Lindhorst, Kambiz Rahimi
-
Patent number: 8451119Abstract: A method of adjusting operation of an RFID tag for an environment is described. The method includes sensing an aspect of the environment. The method also includes sending an instruction, based on the sensed aspect of the environment, to the RFID tag. The instruction encoded in a TUNE command. The instruction causes the RFID tag to perform a specific act. The specific act includes one of the following: turning a sub-circuit of the RFID tag's semiconductor chip on; turning a sub-circuit of the RFID tag's semiconductor chip off; altering a bias current within a sub-circuit of the RFID tag's semiconductor chip; altering a bias voltage within a sub-circuit of the RFID tag's semiconductor chip; and, adjusting a threshold within a sub-circuit of the RFID tag's semiconductor chip.Type: GrantFiled: February 12, 2009Date of Patent: May 28, 2013Assignee: Impinj, Inc.Inventors: Kambiz Rahimi, Christopher J. Diorio
-
Patent number: 8279045Abstract: RFID tags and chips for RFID tags are capable of being inventoried in one or more early attempts. These tags are capable of then refraining from participating in one or more subsequent inventorying attempts. In some embodiments refraining is performed solely by the tag, while in others it is guided by the RFID reader. In some embodiments, an inventoried indicator in the tag becomes updated upon backscattering. The updated value is used by the tag to recognize a subsequent attempt, and thus refrain from participating in it. This permits the subsequent attempt to be used more intensively for inventorying the more elusive, harder-to-read tags, especially in more demanding scenarios.Type: GrantFiled: March 28, 2008Date of Patent: October 2, 2012Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Paul Dietrich, Theron Stanford, Chad Lindhorst, Kambiz Rahimi, Ali Aiouaz, Aanand Esterberg
-
Patent number: 8228175Abstract: RFID tags, ICs for RFID tags, and methods are provided. In some embodiments, an RFID tag includes a memory with multiple sections, and a processing block. The processing block may map one of these sections, or another of these sections, for purposes of responding to a first command from an RFID reader. As such, an RFID tag can operate according to the data stored in the section mapped at the time. In some embodiments, a tag can even transition from mapping one of the sections to mapping another of the sections. This can amount to the tag exhibiting alternative behaviors, and permits hiding data on the tag.Type: GrantFiled: March 16, 2009Date of Patent: July 24, 2012Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Theron Stanford, Scott A. Cooper, Chad A. Lindhorst, Kambiz Rahimi, Harley K. Heinrich, Gregory T. Kavounas
-
Patent number: 8115632Abstract: A semiconductor chip for an RFID tag is described. The semiconductor chip including wireless transceiver and processing block circuitry to receive and put into effect a wirelessly received instruction encoded in a TUNE command. The instruction commanding the semiconductor chip to perform at least one specific act. The semiconductor chip having circuitry to perform the at least one specific act. The circuitry being coupled to the processing block. The circuitry and its corresponding specific act identified by at least one of the following: enablement circuitry to turn a sub-circuit within the semiconductor chip on; disablement circuitry to turn a sub-circuit within the semiconductor chip off; current bias circuitry to alter a bias current within a sub-circuit of the semiconductor chip; voltage bias circuitry to alter a bias voltage within a sub-circuit of the semiconductor chip; threshold adjustment circuitry to adjust a threshold within a sub-circuit of the semiconductor chip.Type: GrantFiled: February 12, 2009Date of Patent: February 14, 2012Assignee: Impinj, Inc,Inventors: Kambiz Rahimi, Christopher J. Diorio