Patents by Inventor Oded GOLOMBEK

Oded GOLOMBEK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12229324
    Abstract: Security measures for signal paths with tree structures can be implemented at design phase using an EDA software program or tool with security feature functionality that, when executed by a computing system, directs the computing system to: display a canvas through which components of a circuit are arranged; and provide a menu of commands, including an option to add components from a library to the canvas and an option to secure a tree. In response to receiving a selection of the option to secure the tree, the system can be directed to add a hardware countermeasure coupled to at least two lines or terminal nodes of a tree structure identified from components on the canvas or in a netlist corresponding to a circuit's design.
    Type: Grant
    Filed: September 21, 2023
    Date of Patent: February 18, 2025
    Assignee: ARM LIMITED
    Inventors: Michael Weiner, Robert John Harrison, Oded Golombek, Yoav Asher Levy
  • Patent number: 12099593
    Abstract: A method for authenticating an integrated circuit is provided. At an intellectual property facility, a random encryption key and a number of random input vectors are generated. For each input vector, the input vector is encrypted, based on the encryption key, to generate a corresponding output vector, and the input vector and the corresponding output vector are formed into an authentication vector pair. The encryption key is embedded into hardware description language instructions that define an integrated circuit that includes a cryptography engine. A number of authentication vector pairs is transmitted, via a secure communication link, to a semiconductor assembly and test facility. An input vector of an authentication vector pair is presented to the integrated circuit, which encrypts the input vector using the embedded encryption key. If the result matches the output vector of the authentication vector pair, the integrated circuit is determined to be authentic.
    Type: Grant
    Filed: April 30, 2021
    Date of Patent: September 24, 2024
    Assignee: Arm Limited
    Inventors: Oded Golombek, Einat Luko
  • Publication number: 20240012946
    Abstract: Security measures for signal paths with tree structures can be implemented at design phase using an EDA software program or tool with security feature functionality that, when executed by a computing system, directs the computing system to: display a canvas through which components of a circuit are arranged; and provide a menu of commands, including an option to add components from a library to the canvas and an option to secure a tree. In response to receiving a selection of the option to secure the tree, the system can be directed to add a hardware countermeasure coupled to at least two lines or terminal nodes of a tree structure identified from components on the canvas or in a netlist corresponding to a circuit's design.
    Type: Application
    Filed: September 21, 2023
    Publication date: January 11, 2024
    Inventors: Michael WEINER, Robert John HARRISON, Oded GOLOMBEK, Yoav Asher LEVY
  • Patent number: 11797714
    Abstract: Security measures for signal paths with tree structures can be implemented at design phase using an EDA software program or tool with security feature functionality that, when executed by a computing system, directs the computing system to: display a canvas through which components of a circuit are arranged; and provide a menu of commands, including an option to add components from a library to the canvas and an option to secure a tree. In response to receiving a selection of the option to secure the tree, the system can be directed to add a hardware countermeasure coupled to at least two lines or terminal nodes of a tree structure identified from components on the canvas or in a netlist corresponding to a circuit's design.
    Type: Grant
    Filed: December 20, 2019
    Date of Patent: October 24, 2023
    Assignee: ARM LIMITED
    Inventors: Michael Weiner, Robert John Harrison, Oded Golombek, Yoav Asher Levy
  • Patent number: 11734009
    Abstract: A data processing system comprises fetch circuitry to fetch data as a sequence of blocks of data from a memory. Processing circuitry comprising a plurality of processing pipelines performs at least partially temporally overlapping processing by at least two processes so as to produce respective results for the combined sequence of blocks, i.e. the processing of the data is performed on a block-by-block process at least partially in parallel by the two processing pipelines. The processes performed may comprise a cryptographic hash processing operation performing verification of the data file and a AES MAC process serving to re-signature the data file.
    Type: Grant
    Filed: June 4, 2018
    Date of Patent: August 22, 2023
    Assignee: Arm Limited
    Inventors: Oded Golombek, Nimrod Diamant
  • Publication number: 20230018185
    Abstract: A method for obfuscating data at-transit can include receiving, at a first component on a chip, an instruction request for communicating a first data to a second component on the chip. The first component can be a processor and the second component can be an associated memory. The method can further include, determining a sequence of data arranged to obfuscate the first data while including valid bits of the first data, wherein the sequence of data indicates what is to be conveyed across lines on the chip during each time slot over a window of time controlled by a clock signal on the chip; and providing, over the window of time, the first data to the second component across the lines on the chip according to the sequence of data.
    Type: Application
    Filed: September 22, 2022
    Publication date: January 19, 2023
    Inventors: Michael WEINER, Oded GOLOMBEK, Harel ADANI
  • Patent number: 11550733
    Abstract: Disclosed are methods, systems and devices for storing states in a memory in support of applications residing in a trusted execution environment (TEE). In an implementation, one or more memory devices accessible by a memory controller may be shared between and/or among processes in an untrusted execution environment (UEE) and a TEE.
    Type: Grant
    Filed: July 1, 2020
    Date of Patent: January 10, 2023
    Assignee: Arm Limited
    Inventors: Richard Andrew Paterson, Rainer Herberholz, Peter Andrew Rees Williams, Oded Golombek, Einat Luko
  • Publication number: 20220350875
    Abstract: A method for authenticating an integrated circuit is provided. At an intellectual property facility, a random encryption key and a number of random input vectors are generated. For each input vector, the input vector is encrypted, based on the encryption key, to generate a corresponding output vector, and the input vector and the corresponding output vector are formed into an authentication vector pair. The encryption key is embedded into hardware description language instructions that define an integrated circuit that includes a cryptography engine. A number of authentication vector pairs is transmitted, via a secure communication link, to a semiconductor assembly and test facility. An input vector of an authentication vector pair is presented to the integrated circuit, which encrypts the input vector using the embedded encryption key. If the result matches the output vector of the authentication vector pair, the integrated circuit is determined to be authentic.
    Type: Application
    Filed: April 30, 2021
    Publication date: November 3, 2022
    Applicant: Arm Limited
    Inventors: Oded Golombek, Einat Luko
  • Patent number: 11480613
    Abstract: Disclosed are methods, systems and devices for implementing built-in self-test (BIST) to be performed by an untrusted party and/or in an unsecure testing environment. In an embodiment, a test access port (TAP) on a device may enable a party to initiate execution of one or more BIST procedures on the device. Additionally, such a TAP may enable loading of encrypted instructions to be executed by one or more processors formed on a device under test.
    Type: Grant
    Filed: December 18, 2020
    Date of Patent: October 25, 2022
    Assignee: Arm Limited
    Inventors: Richard Andrew Paterson, Rainer Herberholz, Peter Andrew Rees Williams, Oded Golombek, Einat Luko, Jeffrey Scott Boyer
  • Patent number: 11461505
    Abstract: A method for obfuscation of operations using minimal additional hardware is presented herein. The method can begin by executing a first iteration of a set of computations, the execution of the set of computations resulting in a first iteration output. The method can continue by executing a second iteration of the set of computations, wherein the second execution is distinct from the first iteration but should satisfy a matching condition. The distinction can be a rearrangement of sub-operations, insertion of dummy sub-operations, or a combination of the two. After the iterations are complete, the iteration outputs can be compared. If the comparison of the first iteration output and the second iteration output satisfy the matching condition, the process result can be output. If the matching condition is not satisfied, an error detected signal can be output.
    Type: Grant
    Filed: October 17, 2019
    Date of Patent: October 4, 2022
    Assignee: ARM LIMITED
    Inventors: Michael Weiner, Oded Golombek, David Yellin
  • Patent number: 11456855
    Abstract: A method for obfuscating data at-transit can include receiving a request for communicating data, determining a sequence of data at-transit for a window of time; and providing the sequence of the data at transit for performing communications across interconnect to another component. The described method can be carried out by an obfuscation engine implemented in an electronic system such as within a secure element. A secure element can include a processor and a memory. The obfuscation engine can be part of the processor, part of the memory, or a stand-alone component.
    Type: Grant
    Filed: October 17, 2019
    Date of Patent: September 27, 2022
    Assignee: ARM LIMITED
    Inventors: Michael Weiner, Oded Golombek, Harel Adani
  • Publication number: 20220196734
    Abstract: Disclosed are methods, systems and devices for implementing built-in self-test (BIST) to be performed by an untrusted party and/or in an unsecure testing environment. In an embodiment, a test access port (TAP) on a device may enable a party to initiate execution of one or more BIST procedures on the device. Additionally, such a TAP may enable loading of encrypted instructions to be executed by one or more processors formed on a device under test.
    Type: Application
    Filed: December 18, 2020
    Publication date: June 23, 2022
    Inventors: Richard Andrew Paterson, Rainer Herberholz, Peter Andrew Rees Williams, Oded Golombek, Einat Luko, Jeffrey Scott Boyer
  • Publication number: 20220004622
    Abstract: Disclosed are methods, systems and devices for storing states in a memory in support of applications residing in a trusted execution environment (TEE). In an implementation, one or more memory devices accessible by a memory controller may be shared between and/or among processes in an untrusted execution environment (UEE) and a TEE.
    Type: Application
    Filed: July 1, 2020
    Publication date: January 6, 2022
    Inventors: Richard Andrew Paterson, Rainer Herberholz, Peter Andrew Rees Williams, Oded Golombek, Einat Luko
  • Publication number: 20210192089
    Abstract: Security measures for signal paths with tree structures can be implemented at design phase using an EDA software program or tool with security feature functionality that, when executed by a computing system, directs the computing system to: display a canvas through which components of a circuit are arranged; and provide a menu of commands, including an option to add components from a library to the canvas and an option to secure a tree. In response to receiving a selection of the option to secure the tree, the system can be directed to add a hardware countermeasure coupled to at least two lines or terminal nodes of a tree structure identified from components on the canvas or in a netlist corresponding to a circuit's design.
    Type: Application
    Filed: December 20, 2019
    Publication date: June 24, 2021
    Inventors: Michael WEINER, Robert John HARRISON, Oded GOLOMBEK, Yoav Asher LEVY
  • Patent number: 11030065
    Abstract: Aspects of the present disclosure relate to an apparatus comprising analogue circuitry comprising an entropy source, the entropy source being configured to provide a random output. The apparatus comprises first digital circuitry to receive the output of the entropy source and, based on said output, generate random numbers, and second digital circuitry to receive the output of the entropy source and, based on said output, generate random numbers, the second digital circuitry being a duplicate of the first digital circuitry. The apparatus comprises difference detection circuitry to determine a difference of operation between the first digital circuitry and the second digital circuitry. Each of the first digital circuitry and the second digital circuitry comprises entropy checking circuitry to check the entropy of the output of the entropy source.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: June 8, 2021
    Assignee: Arm Limited
    Inventors: Kar-Lik Kasim Wong, Alessandro Renzi, Michael Weiner, Avi Shif, Oded Golombek
  • Publication number: 20210119763
    Abstract: A method for obfuscating data at-transit can include receiving a request for communicating data, determining a sequence of data at-transit for a window of time; and providing the sequence of the data at transit for performing communications across interconnect to another component. The described method can be carried out by an obfuscation engine implemented in an electronic system such as within a secure element. A secure element can include a processor and a memory. The obfuscation engine can be part of the processor, part of the memory, or a stand-alone component.
    Type: Application
    Filed: October 17, 2019
    Publication date: April 22, 2021
    Inventors: Michael WEINER, Oded GOLOMBEK, Harel ADANI
  • Publication number: 20210117575
    Abstract: A method for obfuscation of operations using minimal additional hardware is presented herein. The method can begin by executing a first iteration of a set of computations, the execution of the set of computations resulting in a first iteration output. The method can continue by executing a second iteration of the set of computations, wherein the second execution is distinct from the first iteration but should satisfy a matching condition. The distinction can be a rearrangement of sub-operations, insertion of dummy sub-operations, or a combination of the two. After the iterations are complete, the iteration outputs can be compared. If the comparison of the first iteration output and the second iteration output satisfy the matching condition, the process result can be output. If the matching condition is not satisfied, an error detected signal can be output.
    Type: Application
    Filed: October 17, 2019
    Publication date: April 22, 2021
    Inventors: Michael WEINER, Oded GOLOMBEK, David YELLIN
  • Publication number: 20200151077
    Abstract: Aspects of the present disclosure relate to an apparatus comprising analogue circuitry comprising an entropy source, the entropy source being configured to provide a random output. The apparatus comprises first digital circuitry to receive the output of the entropy source and, based on said output, generate random numbers, and second digital circuitry to receive the output of the entropy source and, based on said output, generate random numbers, the second digital circuitry being a duplicate of the first digital circuitry. The apparatus comprises difference detection circuitry to determine a difference of operation between the first digital circuitry and the second digital circuitry. Each of the first digital circuitry and the second digital circuitry comprises entropy checking circuitry to check the entropy of the output of the entropy source.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 14, 2020
    Inventors: Kar-Lik Kasim WONG, Alessandro RENZI, Michael WEINER, Avi SHIF, Oded GOLOMBEK
  • Publication number: 20190034205
    Abstract: A data processing system comprises fetch circuitry to fetch data as a sequence of blocks of data from a memory. Processing circuitry comprising a plurality of processing pipelines performs at least partially temporally overlapping processing by at least two processes so as to produce respective results for the combined sequence of blocks, i.e. the processing of the data is performed on a block-by-block process at least partially in parallel by the two processing pipelines. The processes performed may comprise a cryptographic hash processing operation performing verification of the data file and a AES MAC process serving to re-signature the data file.
    Type: Application
    Filed: June 4, 2018
    Publication date: January 31, 2019
    Inventors: Oded GOLOMBEK, Nimrod DIAMANT