Patents by Inventor Louis Goubin

Louis Goubin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220293222
    Abstract: Described herein is a secure integrated storage and analysis solution for personal genomic applications. The method guarantees data privacy whilst enabling access and ongoing analysis of genomic data when required. Described is a computer implemented homomorphic encryption method for securely producing natively encrypted sequencing data in a way that allows subsequent analysis on the encrypted data without requiring the file to be decrypted.
    Type: Application
    Filed: May 26, 2020
    Publication date: September 15, 2022
    Inventors: Francois Paillier, Jackeline Palma, Pascal Pallier, Matthieu Rivain, Louis Goubin
  • Patent number: 8656163
    Abstract: The invention relates to a method for generating a session key between two communicating electronic devices not requiring any prerecorded information in one of the two devices and enabling the authentication of one of said devices. The method uses a close collaboration between a symmetrical algorithm and an asymmetrical algorithm.
    Type: Grant
    Filed: January 26, 2010
    Date of Patent: February 18, 2014
    Assignee: Gemalto SA
    Inventors: Karine Villegas, Aline Gouget, Louis Goubin, Pascal Paillier
  • Patent number: 8582774
    Abstract: An aim of this invention is to eliminate the risks of aggression “DPA of the n order” attacks, for all n values, of cryptography electronic assemblies or systems with a secret or private key. The process according to this invention concerns a securing process for an electronic system using a cryptographic calculation procedure using a secret key. The process consists of masking intermediate results in input or output of at least one critical function for the said procedure.
    Type: Grant
    Filed: March 4, 2003
    Date of Patent: November 12, 2013
    Assignee: Gemalto SA
    Inventors: Louis Goubin, Mehdi-Laurent Akkar
  • Publication number: 20110283107
    Abstract: The invention relates to a method for generating a session key between two communicating electronic devices not requiring any prerecorded information in one of the two devices and enabling the authentication of one of said devices. The method uses a close collaboration between a symmetrical algorithm and an asymmetrical algorithm.
    Type: Application
    Filed: January 26, 2010
    Publication date: November 17, 2011
    Applicant: Gemalto SA
    Inventors: Karine Villegas, Aline Gouget, Louis Goubin, Pascal Paillier
  • Patent number: 8000473
    Abstract: The method according to this invention concerns a method for automatically generating cryptographic algorithms with optional supplementary data, said algorithms comprising two different zones: external algorithm secrecy zone, in external parts of the algorithm exposed to side-channel analysis, and an internal purely cryptographic zone that is not exposed to side-channel analysis, such that in the algorithm secrecy zone, the code of the algorithm is locally made of random (or pseudo-random) and independent sequences of instructions and/or table-lookups chosen from some fixed set of instructions and random constants, with some fixed prescribed probability distribution, and such that the internal cryptographic security zone can be any cryptographic algorithm or method that handles algorithmic security only and does not have to be protected against side-channel attacks.
    Type: Grant
    Filed: October 7, 2005
    Date of Patent: August 16, 2011
    Assignee: Gemalto SA
    Inventors: Louis Goubin, Nicolas Courtois
  • Patent number: 7826610
    Abstract: The invention concerns a method to secure an electronic assembly implementing any algorithm against attacks by error introduction. The method according to the invention consists in performing an additional calculation using a verification function on at least one intermediate result in order to obtain a calculation signature and in performing a least once more all or part of the calculation in order to recalculate said signature and compare them in order to detect a possible error.
    Type: Grant
    Filed: July 7, 2003
    Date of Patent: November 2, 2010
    Assignee: Gemalto SA
    Inventors: Mehdi-Laurent Akkar, Louis Goubin
  • Publication number: 20100272264
    Abstract: An aim of this invention is to eliminate the risks of aggression “DPA of the n order” attacks, for all n values, of cryptography electronic assemblies or systems with a secret or private key. The process according to this invention concerns a securing process for an electronic system using a cryptographic calculation procedure using a secret key. The process consists of masking intermediate results in input or output of at least one critical function for the said procedure.
    Type: Application
    Filed: March 4, 2003
    Publication date: October 28, 2010
    Applicant: SCHLUMBERGER SYSTEMES
    Inventors: Louis Goubin, Mehdi-Laurent Akkar
  • Patent number: 7774653
    Abstract: The invention concerns an automatic method to secure an electronic calculation assembly against attacks by error introduction or by radiation. The following are used: 1) Static information generated by the automatic process; 2) A dynamic part of the memory of the electronic system allocated by the automatic process; 3) Beacons and check points to mark out the code, introduced by the automatic process; 4) Beacon functions storing information in the dynamic memory; 5) History verification functions using the static information and the dynamic memory to check that no errors have been introduced.
    Type: Grant
    Filed: March 17, 2004
    Date of Patent: August 10, 2010
    Assignee: Gemalto SA
    Inventors: Mehdi-Laurent Akkar, Louis Goubin, Olivier Thanh-Khiet Ly
  • Publication number: 20080130869
    Abstract: The invention concerns a method to secure an electronic assembly implementing any algorithm against attacks by error introduction. The method according to the invention consists in performing an additional calculation using a verification function on at least one intermediate result in order to obtain a calculation signature and in performing a least once more all or part of the calculation in order to recalculate said signature and compare them in order to detect a possible error.
    Type: Application
    Filed: July 7, 2003
    Publication date: June 5, 2008
    Inventors: Mehdi-Laurent Akkar, Louis Goubin
  • Publication number: 20080063192
    Abstract: The method according to this invention concerns a method for automatically generating cryptographic algorithms with optional supplementary data, said algorithms comprising two different zones: external algorithm secrecy zone, in external parts of the algorithm exposed to side-channel analysis, and an internal purely cryptographic zone that is not exposed to side-channel analysis, such that in the algorithm secrecy zone, the code of the algorithm is locally made of random (or pseudo-random) and independent sequences of instructions and/or table-lookups chosen from some fixed set of instructions and random constants, with some fixed prescribed probability distribution, and such that the internal cryptographic security zone can be any cryptographic algorithm or method that handles algorithmic security only and does not have to be protected against side-channel attacks.
    Type: Application
    Filed: October 7, 2005
    Publication date: March 13, 2008
    Applicant: AXALTO SA
    Inventors: Louis Goubin, Nicolas Courtois
  • Patent number: 7334133
    Abstract: The invention relates to security for computer systems and a method for protecting computer systems, particularly those employing an encryption for the protection of sensitive information. A cryptographic algorithm is implemented in the protected system using Boolean operations and arithmetic operations wherein at least one variable is separated into several parts, in a Boolean separation using a Boolean operation, and in an arithmetic separation using an arithmetic operation. In order to switch from one of the operations to the other, a predetermined number of Boolean and arithmetic operations is performed on the parts and at least one random number, so that for each of the values appearing during the operation, there is no correlation with the variable.
    Type: Grant
    Filed: February 14, 2002
    Date of Patent: February 19, 2008
    Assignee: Axalto, S.A.
    Inventor: Louis Goubin
  • Publication number: 20060282741
    Abstract: The invention concerns an automatic method to secure an electronic calculation assembly against attacks by error introduction or by radiation. The following are used: 1) Static information generated by the automatic process; 2) A dynamic part of the memory of the electronic system allocated by the automatic process; 3) Beacons and check points to mark out the code, introduced by the automatic process; 4) Beacon functions storing information in the dynamic memory; 5) History verification functions using the static information and the dynamic memory to check that no errors have been introduced.
    Type: Application
    Filed: March 17, 2004
    Publication date: December 14, 2006
    Inventors: Mehdi-Laurent Akkar, Louis Goubin, Olivier-Than-Khiet Ly
  • Patent number: 7100051
    Abstract: The invention provides for a cryptographic method for digital signature. A set S1 of k polynomial functions Pk(x1, . . . , xn+v, y1, . . . , yk) are supplied as a public key, where k, v, and n are integers, x1, . . . , xn+v are n+v variables of a first type, and y1, . . . , yk are k variables of a second type, the set S1 being obtained by applying a secret key operation on a given set S2 of k polynomial functions P?k(a1, . . . , an+v, y1, . . . , yk), a1, . . . , an+v designating n+v variables including a set of n “oil” and v “vinegar” variables. A message to be signed is provided and submitted to a hash function to produce a series of k values b1, . . . , bk. These k values are substituted for the k variables y1, . . . . , yk of the set S2 to produce a set S3 of k polynomial functions P?k(a1, . . . , an+v), and v values a?n+1, . . . , a?n+1, are selected for the v “vinegar” variables. A set of equations P?k(a1, . . . , a?n+v)=0 is solved to obtain a solution for a?1, . . .
    Type: Grant
    Filed: April 19, 2000
    Date of Patent: August 29, 2006
    Assignees: NDS Limited, CP8 Technologies
    Inventors: Aviad Kipnis, Jacques Patarin, Louis Goubin
  • Patent number: 7050581
    Abstract: The invention relates to a method for protecting one or more computer systems using the same secret key (Ks) cryptographic algorithm, characterized in that the way in which said calculation is performed depends, for each computer system and for each secret key, on secret data (Ds) stored in a secret area of the computer system or systems.
    Type: Grant
    Filed: April 7, 2000
    Date of Patent: May 23, 2006
    Assignee: CP8 Technologies
    Inventors: Louis Goubin, Jacques Patarin
  • Patent number: 6973190
    Abstract: The invention concerns a method for protecting an electronic system implementing a cryptographic calculation process involving a modular exponentiation of a quantity (x), said modular exponentiation using a secret exponent (d), characterized in that said secret exponent is broken down into a plurality of k unpredictable values (d1, d2, . . . , dk), the sum of which is equal to said secret exponent.
    Type: Grant
    Filed: October 26, 2000
    Date of Patent: December 6, 2005
    Assignee: CP8 Technologies
    Inventor: Louis Goubin
  • Publication number: 20040139136
    Abstract: The invention concerns a method for securing a computer system implementing a cryptographic algorithm using Boolean operations and arithmetic operations wherein at least one variable is separated into several parts, in a Boolean separation using a Boolean operation, and in an arithmetic separation using an arithmetic operation, characterized in that, in order to switch from one of these operations to the other, a predetermined number of Boolean and arithmetic operations is performed on said parts and at least one random number, so that for each of the values appearing during the calculation, there is no correlation with said variable.
    Type: Application
    Filed: January 5, 2004
    Publication date: July 15, 2004
    Inventor: Louis Goubin
  • Patent number: 6658569
    Abstract: The invention relates to a secret-key cryptographic calculation process for protecting a computer system against physical attacks, wherein a) the standard cryptographic calculation process is separated into several distinct, parallel process parts using partial intermediate results distinct from those of the standard calculation, and b) the final value of the standard cryptographic calculation is reconstructed from the distinct partial intermediate results. The invention is particularly applicable to computer systems such as embedded systems such as a smart card.
    Type: Grant
    Filed: June 17, 1999
    Date of Patent: December 2, 2003
    Assignee: Bull CP8
    Inventors: Jacques Patarin, Louis Goubin