Patents by Inventor Marc Vauclair

Marc Vauclair has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11790069
    Abstract: A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE.
    Type: Grant
    Filed: April 5, 2022
    Date of Patent: October 17, 2023
    Assignee: NXP B.V.
    Inventors: Christine van Vredendaal, Hans de Jong, Marc Vauclair
  • Publication number: 20230289480
    Abstract: A method is provided for securely provisioning a plurality of integrated circuits (ICs) manufactured by a first entity for use in a plurality of manufactured product types manufactured by a second entity. Each IC of the plurality of ICs includes a key pair and a unique identifier (UID). The first entity generates a plurality of key pairs that are not related to the plurality of ICs. A plurality of product types is received from the second entity. A plurality of certificates is generated by the first entity using the UIDs and the key pairs. The plurality of certificates is transferred from a first computer system of the first entity to a second computer system under physical control of the second entity. The second entity injects the plurality of ICs with selected certificates of the plurality of certificates. Unused certificates may be deleted from the second computer system.
    Type: Application
    Filed: March 2, 2023
    Publication date: September 14, 2023
    Inventors: Fabien Jacques Deboyser, Marc Vauclair
  • Patent number: 11501108
    Abstract: Various embodiments relate to a method of producing a machine learning model with a fingerprint that maps an input value to an output label, including: selecting a set of extra input values, wherein the set of extra input values does not intersect with a set of training labeled input values for the machine learning model; selecting a first set of artificially encoded output label values corresponding to each of the extra input values in the set of extra input values, wherein the first set of artificially encoded output label values are selected to indicate the fingerprint of a first machine learning model; and training the machine learning model using a combination of the extra input values with associated first set of artificially encoded output values and the set of training labeled input values to produce the first learning model with the fingerprint.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: November 15, 2022
    Assignee: NXP B.V.
    Inventors: Wilhelmus Petrus Adrianus Johannus Michiels, Gerardus Antonius Franciscus Derks, Marc Vauclair, Nikita Veshchikov
  • Publication number: 20220229892
    Abstract: A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE.
    Type: Application
    Filed: April 5, 2022
    Publication date: July 21, 2022
    Inventors: Christine van Vredendaal, Hans de Jong, Marc Vauclair
  • Patent number: 11328045
    Abstract: A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE.
    Type: Grant
    Filed: January 27, 2020
    Date of Patent: May 10, 2022
    Assignee: NXP B.V.
    Inventors: Christine van Vredendaal, Hans de Jong, Marc Vauclair
  • Publication number: 20210232667
    Abstract: A data processing system and a method are provided for recognizing a scanned biometric characteristic in the data processing system. The data processing system includes a biometric sensor, a rich execution environment (REE), and a secure element (SE). In one embodiment, during an enrollment operation, a random challenge is applied to scanned data to produce a biometric template that is stored. During subsequent validation operations, the SE determines if user data includes evidence of the random challenge before providing access to a secure application. Evidence of the random challenge indicates the user data was provided by the biometric sensor. In another embodiment, the sensor data is split between the REE and the SE and partially processed in the SE. The described embodiments prevent a replay attack from being conducted in communications between the REE and the SE.
    Type: Application
    Filed: January 27, 2020
    Publication date: July 29, 2021
    Inventors: Christine van Vredendaal, Hans de Jong, Marc Vauclair
  • Patent number: 10762311
    Abstract: A method is provided for authenticating a device in a system having a blockchain. The method includes executing a one-side authentication of the device. The results of the one-side authentication are submitted to the blockchain at a first blockchain node of a plurality of blockchain nodes. The one-side authentication is later verified at a second blockchain node of the plurality of blockchain nodes. The device may be a tag in a radio frequency identification (RFID) system.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: September 1, 2020
    Assignee: NXP B.V.
    Inventors: Stefan Lemsitzer, Marc Vauclair
  • Publication number: 20200242313
    Abstract: A method is provided for authenticating a device in a system having a blockchain. The method includes executing a one-side authentication of the device. The results of the one-side authentication are submitted to the blockchain at a first blockchain node of a plurality of blockchain nodes. The one-side authentication is later verified at a second blockchain node of the plurality of blockchain nodes. The device may be a tag in a radio frequency identification (RFID) system.
    Type: Application
    Filed: January 29, 2019
    Publication date: July 30, 2020
    Inventors: Stefan Lemsitzer, Marc Vauclair
  • Publication number: 20200034663
    Abstract: Various embodiments relate to a method of producing a machine learning model with a fingerprint that maps an input value to an output label, including: selecting a set of extra input values, wherein the set of extra input values does not intersect with a set of training labeled input values for the machine learning model; selecting a first set of artificially encoded output label values corresponding to each of the extra input values in the set of extra input values, wherein the first set of artificially encoded output label values are selected to indicate the fingerprint of a first machine learning model; and training the machine learning model using a combination of the extra input values with associated first set of artificially encoded output values and the set of training labeled input values to produce the first learning model with the fingerprint.
    Type: Application
    Filed: July 24, 2018
    Publication date: January 30, 2020
    Inventors: Wilhelmus Petrus Adrianus Johannus MICHIELS, Gerardus Antonius Franciscu Derks, Marc Vauclair, Nikita Veshchikov
  • Patent number: 9823860
    Abstract: A portion of a reprogrammable storage device is used to implement permanent data storage. The storage device includes a plurality of electrically erasable memory elements and a controller. The plurality of electrically erasable memory elements are configured to store data. Each memory element is programmable a number of write cycles before reaching a write failure state. The controller is coupled to the plurality of memory elements. The controller includes a receiver and a write engine. The receiver receives an instruction to drive a selected memory element to the write failure state. The write engine repeatedly writes a data value, in a plurality of write operations, to the selected memory element until the write failure state of the selected memory element is established.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: November 21, 2017
    Assignee: NXP B.V.
    Inventors: Marc Vauclair, Philippe Teuwen
  • Patent number: 9298955
    Abstract: A proximity check ensures that a card is physically close to the reader device in order to inhibit relay attacks. The proximity check makes relay attacks more difficult because an additional channel must be intercepted and/or spoofed or relayed. This solution can be used for any kind of short-range communication, including Near Field Communications (NFC).
    Type: Grant
    Filed: November 4, 2011
    Date of Patent: March 29, 2016
    Assignee: NXP B.V.
    Inventors: Timo van Roermund, Jan Rene Brands, Lukasz Szostek, Marc Vauclair, Zoran Zivkovic
  • Publication number: 20150261458
    Abstract: A portion of a reprogrammable storage device is used to implement permanent data storage. The storage device includes a plurality of electrically erasable memory elements and a controller. The plurality of electrically erasable memory elements are configured to store data. Each memory element is programmable a number of write cycles before reaching a write failure state. The controller is coupled to the plurality of memory elements. The controller includes a receiver and a write engine. The receiver receives an instruction to drive a selected memory element to the write failure state. The write engine repeatedly writes a data value, in a plurality of write operations, to the selected memory element until the write failure state of the selected memory element is established.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 17, 2015
    Applicant: NXP B.V.
    Inventors: Marc Vauclair, Philippe Teuwen
  • Patent number: 8856500
    Abstract: A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses in an irregular way, with position dependent address steps between the addresses of logically successive instructions. Preferably pseudo-random address steps are used, for example with address steps that have mutually opposite sign with equal frequency. The data processing device has an instruction flow control unit that updates instruction addresses according the position dependent address steps. The instruction flow control unit may comprise a circuit that contains secret information, which is not normally accessible from the outside, to control the updates. A lookup table may be used for example, with address steps, successor addresses or mapped address values. In an embodiment the mapping of original instruction addresses to target addresses may be visualized by means of a path (36) along points in an n-dimensional array, where n is greater than one.
    Type: Grant
    Filed: February 2, 2009
    Date of Patent: October 7, 2014
    Assignee: NXP B.V.
    Inventors: Marc Vauclair, Pieter J. Janssens
  • Patent number: 8813188
    Abstract: Pairing is achieved between a host communications device and a peripheral communications device, in order to establish an ad hoc wireless or wired network. A device identification, relating uniquely to the peripheral device, is displayed on the host device. In order to accept the pairing, the user confirms that the device identification displayed on the host device matches that printed on the peripheral device, and then completes the pairing procedure by pressing a key on the peripheral device, or, if Near Field Communication (NFC) techniques are implemented in the devices, by placing the peripheral device in contact with, or sufficiently close to, the host device. Thus, secure pairing is achieved, without requiring a complex user interface on the peripheral device.
    Type: Grant
    Filed: August 31, 2005
    Date of Patent: August 19, 2014
    Assignee: Koninklijke Philips N.V.
    Inventors: Marc Vauclair, Javier Serret Avila, Lionel Georges Etienne, Philippe Teuwen
  • Patent number: 8621187
    Abstract: A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses. A cache efficient obfuscated program is realized by restricting target addresses of a sequence of instructions to a limited set of the disjoint ranges (33a-d) of target addresses, which are at lease half filled with instructions. Mapped address steps (34) are provided between the target addresses to which successive ones of the original instruction addresses are mapped. The address steps (34) include first address steps within at least a first one of the mutually disjoint ranges (33a-d). Between said first address steps, second address steps within at least a second one of the mutually disjoint ranges (33a-d). Thus, a deviation from successive addresses for logically successive instructions is realized.
    Type: Grant
    Filed: February 9, 2009
    Date of Patent: December 31, 2013
    Assignee: NXP, B.V.
    Inventor: Marc Vauclair
  • Patent number: 8516258
    Abstract: Current MAC algorithms impose a significant system performance requirement in order to process messages in real time. According to an exemplary embodiment of the present invention, a hardware implemented generator for generating a MAC is provided, that results in a significant improvement in hardware performance requirements for processing messages in real time. The engine is based on linear feedback shift registers which are adapted to generate secure MACs.
    Type: Grant
    Filed: February 24, 2006
    Date of Patent: August 20, 2013
    Assignee: NXP B.V.
    Inventors: Marc Vauclair, Serret Avila Javier, Ventzislav Nikov
  • Publication number: 20130116964
    Abstract: A proximity check ensures that a card is physically close to the reader device in order to inhibit relay attacks. The proximity check makes relay attacks more difficult because an additional channel must be intercepted and/or spoofed or relayed. This solution can be used for any kind of short-range communication, including Near Field Communications (NFC).
    Type: Application
    Filed: November 4, 2011
    Publication date: May 9, 2013
    Applicant: NXP B.V.
    Inventors: Timo van Roermund, Jan Rene Brands, Lukasz Szostek, Marc Vauclair, Zoran Zivkovic
  • Publication number: 20100332759
    Abstract: A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses. A cache efficient obfuscated program is realized by restricting target addresses of a sequence of instructions to a limited set of the disjoint ranges (33a-d) of target addresses, which are at lease half filled with instructions. Mapped address steps (34) are provided between the target addresses to which successive ones of the original instruction addresses are mapped. The address steps (34) include first address steps within at least a first one of the mutually disjoint ranges (33a-d). Between said first address steps, second address steps within at least a second one of the mutually disjoint ranges (33a-d). Thus, a deviation from successive addresses for logically successive instructions is realized.
    Type: Application
    Filed: February 9, 2009
    Publication date: December 30, 2010
    Applicant: NXP B.V.
    Inventor: Marc Vauclair
  • Publication number: 20100325402
    Abstract: A program is obfuscated by reordering its instructions. Original instruction addresses are mapped to target addresses in an irregular way, with position dependent address steps between the addresses of logically successive instructions. Preferably pseudo-random address steps are used, for example with address steps that have mutually opposite sign with equal frequency. The data processing device has an instruction flow control unit that updates instruction addresses according the position dependent address steps. The instruction flow control unit may comprise a circuit that contains secret information, which is not normally accessible from the outside, to control the updates. A lookup table may be used for example, with address steps, successor addresses or mapped address values. In an embodiment the mapping of original instruction addresses to target addresses may be visualized by means of a path (36) along points in an n-dimensional array, where n is greater than one.
    Type: Application
    Filed: February 2, 2009
    Publication date: December 23, 2010
    Applicant: NXP B.V.
    Inventors: Marc Vauclair, Pieter J. Janssens
  • Patent number: 7688982
    Abstract: A method, apparatus, and system for providing secure communication between a tamper resistant device (404) and a sink device (406) is disclosed. Encrypted content is received from a source device (402) at the tamper resistant device (404), wherein the content has been encrypted using a first key. The content is decrypted using the decrypted first key. A second key is received at the tamper resistant device (404) from the sink device (406), wherein the second key is encrypted using the public key of the tamper resistant device (404). The second key is decrypted using the private key of the tamper resistant device (404). The content is re-encrypted using the second key. The re-encrypted content is transmitted to the sink device (406).
    Type: Grant
    Filed: March 12, 2004
    Date of Patent: March 30, 2010
    Assignee: Koninklijke Philips Electronics N.V.
    Inventor: Marc Vauclair