Patents by Inventor Michael Borza
Michael Borza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220197982Abstract: Some aspects of this disclosure are directed to implementing hardware-based obfuscation of digital data. For example, some aspects of this disclosure relate to a method, including performing a capture operation that loads a plurality of primary input (PI) bits into corresponding shift registers of a plurality of test data registers (TDRs) disposed on one or more digital semiconductor devices and configured to store a plurality of secret information bits. The method further includes performing a sequence of shift operations on the plurality of TDRs to obtain a plurality of output bits. The method further includes applying, by an authenticating processor, a derivation function on the plurality of output bits to extract the plurality of secret information bits thereby authenticating the one or more digital semiconductor devices.Type: ApplicationFiled: December 21, 2021Publication date: June 23, 2022Inventors: Adam Cron, Andrew Elias, Bandi Chandra Sekhar Reddy, Michael Borza
-
Patent number: 10740497Abstract: A method is disclosed for providing first data and a first secret key to a cipher processor for ciphering. The first data is ciphered in accordance with a first cipher process and the first secret key to provide output data. Before ciphering of the first data, extra data is inserted within the cipher processor for ciphering in accordance with at least a portion of said first cipher process. The extra data is inserted within a sequence of cipher processor operations for obfuscating the output data.Type: GrantFiled: June 1, 2018Date of Patent: August 11, 2020Assignee: Synopsys, Inc.Inventors: Neil Hamilton, Francois Bourdon, Michael Borza
-
Patent number: 10541979Abstract: A method for ciphering protected content communicated between a first device and a plurality of devices over a plurality of channels comprises performing authentication between the first device and each of the plurality of devices to create two or more shared key and initialization vector pairs allowing the ciphering of the protected content; generating a key stream for each of the channels based on a selected one of the two or more of shared key and initialization vector pairs; maintaining a buffer for each channel, each of the buffer containing the key stream generated for the corresponding channel; and ciphering data incoming on a selected channel using the selected key stream from the buffer corresponding to the selected channel.Type: GrantFiled: February 17, 2015Date of Patent: January 21, 2020Assignee: Synopsys, Inc.Inventors: Neil Farquhar Hamilton, Michael James Lewis, Michael Borza, Andrew A. Elias, A. A. Jithra Adikari
-
Patent number: 10244428Abstract: The invention relates to the field of data packet management, and more specifically to the field of managing of data packets in such a manner that power consumption is reduced, such reduction being especially beneficial for portable device applications. In accordance with an embodiment of the invention there is provided a method of handling and manipulating data wherein padding and unpadding operations for a packet of data are performed at the transmission/reception of a packet from a network, and data handling is minimized within the portable device. According to another embodiment of the invention there is provided a method of encryption for packet data absent the padding data.Type: GrantFiled: September 4, 2015Date of Patent: March 26, 2019Assignee: Synopsys, Inc.Inventors: Stephen Davis, Michael Borza
-
Patent number: 10228965Abstract: A system and method to automatically provision a trusted virtual appliance (VA) (which may include one or more virtual machines (VM)) for installation onto a consumer-owned acceptable device (COAD) where the system and method may create a provision the VA for the COAD without human interaction and a COAD may install a received trusted VA without human interaction, and the VM of a VA may operate independently of other applications on the COAD other than a VM supervisory program such as a hypervisor.Type: GrantFiled: May 15, 2017Date of Patent: March 12, 2019Assignee: Synopsys, Inc.Inventor: Michael Borza
-
Publication number: 20180329736Abstract: A system and method to automatically provision a trusted virtual appliance (VA) (which may include one or more virtual machines (VM)) for installation onto a consumer-owned acceptable device (COAD) where the system and method may create a provision the VA for the COAD without human interaction and a COAD may install a received trusted VA without human interaction, and the VM of a VA may operate independently of other applications on the COAD other than a VM supervisory program such as a hypervisor.Type: ApplicationFiled: May 15, 2017Publication date: November 15, 2018Inventor: Michael Borza
-
Patent number: 10103876Abstract: A processor is disclosed for ciphering of first data. The processor includes a key store and a first data store. In use the processor for ciphering the first data in accordance with a first cipher process and a first secret key to provide output data, during ciphering of the first data inserting within the cipher processor other data for ciphering in accordance with at least a portion of the first cipher process, the other data inserted within a sequence of cipher processor operations and scheduled for obfuscating the output data.Type: GrantFiled: October 17, 2013Date of Patent: October 16, 2018Assignee: Synopsys, Inc.Inventors: Neil Hamilton, François Bourdon, Michael Borza
-
Publication number: 20180278411Abstract: A method is disclosed for providing first data and a first secret key to a cipher processor for ciphering. The first data is ciphered in accordance with a first cipher process and the first secret key to provide output data. Before ciphering of the first data, extra data is inserted within the cipher processor for ciphering in accordance with at least a portion of said first cipher process. The extra data is inserted within a sequence of cipher processor operations for obfuscating the output data.Type: ApplicationFiled: June 1, 2018Publication date: September 27, 2018Inventors: Neil Hamilton, Francois Bourdon, Michael Borza
-
Patent number: 9900149Abstract: A method of improving the efficiency of an encryption/decryption process implementing the NIST FIPS 197 standard which includes a substitution box (S-box) and an inverse substitution (inverse S-box), comprises concatenating the S-box and inverse S-box to form a combined lookup table, and folding the concatenated table to generate a folded lookup table. The folded lookup table may be indexed for an encryption operation and for a decryption operation using a signal indicative of whether encryption or decryption is used.Type: GrantFiled: August 14, 2014Date of Patent: February 20, 2018Assignee: Synopsys, Inc.Inventors: A. A. Jithra Adikari, Michael Borza
-
Patent number: 9846568Abstract: A random number generator includes a first circuit producing a random sequence of values, the first circuit having an adjustable input that changes the entropy of the random sequence of numbers; a second circuit receiving the random sequence of values from the first circuit and producing an output indicative of the degree of entropy of the random sequence of values, and a third circuit that adjusts the adjustable input of the first circuit in response to the output of the second circuit.Type: GrantFiled: May 13, 2014Date of Patent: December 19, 2017Assignee: Synopsys, Inc.Inventors: Neil Farquhar Hamilton, Scott Andrew Hamilton, Michael Borza
-
Publication number: 20160344551Abstract: A method of improving the efficiency of an encryption/decryption process implementing the NIST FIPS 197 standard which includes a substitution box (S-box) and an inverse substitution (inverse S-box), comprises concatenating the S-box and inverse S-box to form a combined lookup table, and folding the concatenated table to generate a folded lookup table. The folded lookup table may be indexed for an encryption operation and for a decryption operation using a signal indicative of whether encryption or decryption is used.Type: ApplicationFiled: August 14, 2014Publication date: November 24, 2016Inventors: A.A. Jithra Adikari, Michael Borza
-
Patent number: 9503255Abstract: A method is disclosed for intermixing a first stream of data and a second stream of data. An associated first secret key is expanded to form a first associated expanded secret key. An associated second secret key is expanded to form a second associated expanded secret key. The first stream of data and the second stream of data are intermixed to form a combined stream of data, which is ciphered. The combined stream of data is de-multiplexed after ciphering thereof and provided at an output port.Type: GrantFiled: October 17, 2013Date of Patent: November 22, 2016Assignee: Synopsys, Inc.Inventors: Neil Hamilton, François Bourdon, Michael Borza
-
Publication number: 20160241386Abstract: A method for ciphering protected content communicated between a first device and a plurality of devices over a plurality of channels comprises performing authentication between the first device and each of the plurality of devices to create two or more shared key and initialization vector pairs allowing the ciphering of the protected content; generating a key stream for each of the channels based on a selected one of the two or more of shared key and initialization vector pairs; maintaining a buffer for each channel, each of the buffer containing the key stream generated for the corresponding channel; and ciphering data incoming on a selected channel using the selected key stream from the buffer corresponding to the selected channel.Type: ApplicationFiled: February 17, 2015Publication date: August 18, 2016Inventors: Neil Farquhar Hamilton, Michael James Lewis, Michael Borza, Andrew A. Elias, A.A. Jithra Adikari
-
Patent number: 9330251Abstract: A memory device including a ferroelectric memory array is described. In one embodiment, the ferroelectric memory array includes a user memory space. The memory device includes control logic configured to provide external read and write access for a host system to the user memory space upon authentication between the host system and the memory device. The host system accesses the user memory space and communicates with the control logic through address, data and control buses. The memory device further includes memory interface configured to interface between the address, data and control buses and the control logic, and through which the host system communicates with the control logic, and a cipher engine in communication with the control logic and the memory interface, the cipher engine comprising a random number generator and an encryption/decryption block. Other embodiments are also described.Type: GrantFiled: November 12, 2013Date of Patent: May 3, 2016Assignee: Cypress Semiconductor CorporationInventors: Kurt S. Schwartz, Michael Borza, Qidao Li
-
Publication number: 20150382238Abstract: The invention relates to the field of data packet management, and more specifically to the field of managing of data packets in such a manner that power consumption is reduced, such reduction being especially beneficial for portable device applications. In accordance with an embodiment of the invention there is provided a method of handling and manipulating data wherein padding and unpadding operations for a packet of data are performed at the transmission/reception of a packet from a network, and data handling is minimized within the portable device. According to another embodiment of the invention there is provided a method of encryption for packet data absent the padding data.Type: ApplicationFiled: September 4, 2015Publication date: December 31, 2015Inventors: Stephen Davis, Michael Borza
-
Patent number: 9130800Abstract: The invention relates to the field of data packet management, and more specifically to the field of managing of data packets in such a manner that power consumption is reduced, such reduction being especially beneficial for portable device applications. In accordance with an embodiment of the invention there is provided a method of handling and manipulating data wherein padding and unpadding operations for a packet of data are performed at the transmission/reception of a packet from a network, and data handling is minimized within the portable device. According to another embodiment of the invention there is provided a method of encryption for packet data absent the padding data.Type: GrantFiled: August 2, 2013Date of Patent: September 8, 2015Inventors: Stephen Davis, Michael Borza
-
Publication number: 20140351305Abstract: A random number generator includes a first circuit producing a random sequence of values, the first circuit having an adjustable input that changes the entropy of the random sequence of numbers; a second circuit receiving the random sequence of values from the first circuit and producing an output indicative of the degree of entropy of the random sequence of values, and a third circuit that adjusts the adjustable input of the first circuit in response to the output of the second circuit.Type: ApplicationFiled: May 13, 2014Publication date: November 27, 2014Applicant: Elliptic Technologies Inc.Inventors: Neil Farquhar Hamilton, Scott Andrew Hamilton, Michael Borza
-
Publication number: 20140192974Abstract: A method is disclosed for providing first data and a first secret key to a cipher processor for ciphering. The first data is ciphered in accordance with a first cipher process and the first secret key to provide output data. Before ciphering of the first data, extra data is inserted within the cipher processor for ciphering in accordance with at least a portion of said first cipher process. The extra data is inserted within a sequence of cipher processor operations for obfuscating the output data.Type: ApplicationFiled: October 17, 2013Publication date: July 10, 2014Applicant: ELLIPTIC TECHNOLOGIES INC.Inventors: Neil HAMILTON, François BOURDON, Michael BORZA
-
Publication number: 20140192983Abstract: A method is disclosed for intermixing a first stream of data and a second stream of data. An associated first secret key is expanded to form a first associated expanded secret key. An associated second secret key is expanded to form a second associated expanded secret key. The first stream of data and the second stream of data are intermixed to form a combined stream of data, which is ciphered. The combined stream of data is de-multiplexed after ciphering thereof and provided at an output port.Type: ApplicationFiled: October 17, 2013Publication date: July 10, 2014Applicant: Elliptic Technologies Inc.Inventors: Neil HAMILTON, François BOURDON, Michael BORZA
-
Publication number: 20140192975Abstract: A processor is disclosed for ciphering of first data. The processor includes a key store and a first data store. In use the processor for ciphering the first data in accordance with a first cipher process and a first secret key to provide output data, during ciphering of the first data inserting within the cipher processor other data for ciphering in accordance with at least a portion of the first cipher process, the other data inserted within a sequence of cipher processor operations and scheduled for obfuscating the output data.Type: ApplicationFiled: October 17, 2013Publication date: July 10, 2014Applicant: Elliptic Technologies Inc.Inventors: Neil HAMILTON, François BOURDON, Michael BORZA