Patents by Inventor Osman Koyuncu
Osman Koyuncu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12169588Abstract: Techniques and apparatuses are described that implement the secure external data storage. A computing system may include a system-on-chip as a main processing complex and one or more secure elements that execute specialized functions related to sensitive information. While the secure element may use an external flash for storage for performance reasons, storing sensitive information on an external flash may expose the sensitive information if the external flash is ever compromised. The disclosed techniques and apparatuses provide an integrated secure element, of a system-on-chip, which leverages a secure channel with a secure flash to manage a cryptographic key for securing sensitive information stored on an unsecured external flash to prevent the exposure of sensitive information.Type: GrantFiled: August 29, 2019Date of Patent: December 17, 2024Assignee: Google LLCInventors: Olivier Jean Benoit, Osman Koyuncu
-
Publication number: 20240411613Abstract: A method for self-sovereign resource tracking for domain isolation includes receiving, by a controller unit, a request by an entity to access a first entry in the resource tracking table. The first entry corresponds to a first resource of a computing system. A first identifier associated with the entity is detected. The controller unit compares the first identifier with first owner information specified in the first entry of the resource tracking table. The controller unit controls access from the entity to the first entry of the resource tracking table based on the comparison of the first identifier and the first owner information.Type: ApplicationFiled: December 18, 2023Publication date: December 12, 2024Inventor: Osman KOYUNCU
-
Patent number: 12056266Abstract: Methods and systems are described that secure application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.Type: GrantFiled: March 9, 2022Date of Patent: August 6, 2024Assignee: Google PLLCInventors: Osman Koyuncu, William Alexander Drewry
-
Patent number: 11698996Abstract: Methods and systems are described that secure application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.Type: GrantFiled: October 13, 2021Date of Patent: July 11, 2023Assignee: Google LLCInventors: Osman Koyuncu, William Alexander Drewry
-
Publication number: 20220335945Abstract: Methods, systems, and apparatus, for handling applications in an ambient computing system with a privacy processor. One of the methods includes to remain in a monitoring power state until a controller receives an interrupt indicating that one or more sensor signals are present. The one or more sensor signals are provided as input to a machine learning engine. An inference pass is performed by the machine learning engine to generate an output representing a particular context that is specific to a particular user. It is determined that one or more components of an ambient computing system should be disabled based on the on the particular context for the particular user. In response, the one or more components of the ambient computing system are disabled.Type: ApplicationFiled: December 17, 2020Publication date: October 20, 2022Inventors: Lawrence J. Madar, III, Osman Koyuncu
-
Publication number: 20220198074Abstract: Methods and systems are described that secure application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.Type: ApplicationFiled: March 9, 2022Publication date: June 23, 2022Applicant: Google LLCInventors: Osman Koyuncu, William Alexander Drewry
-
Publication number: 20220156411Abstract: Techniques and apparatuses are described that implement the secure external data storage. A computing system may include a system-on-chip as a main processing complex and one or more secure elements that execute specialized functions related to sensitive information. While the secure element may use an external flash for storage for performance reasons, storing sensitive information on an external flash may expose the sensitive information if the external flash is ever compromised. The disclosed techniques and apparatuses provide an integrated secure element, of a system-on-chip, which leverages a secure channel with a secure flash to manage a cryptographic key for securing sensitive information stored on an unsecured external flash to prevent the exposure of sensitive information.Type: ApplicationFiled: August 29, 2019Publication date: May 19, 2022Applicant: Google LLCInventors: Olivier Jean Benoit, Osman Koyuncu
-
Publication number: 20220075863Abstract: A system on chip (SoC) includes one or more SoC dies each having a die identification and a die specific secret. A computer obtains the device identification of each chip and extracts from memory the device specific secret of each chip based on the device identification. A challenge is generated based on a random number and encrypted using a first key that is generated based on the die specific secret stored locally in association with each SoC die. After sending the challenge to the SoC, the computer receives a response. The response is generated based on the random number and encrypted using a second key that is generated by the SoC based on the device specific secret of each SoC die stored on the SoC. In accordance with a determination that the response matches the challenge, the computer authenticates the SoC for subsequent trusted operations.Type: ApplicationFiled: August 4, 2021Publication date: March 10, 2022Inventor: Osman Koyuncu
-
Publication number: 20220067222Abstract: Methods and systems are described that secure application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.Type: ApplicationFiled: October 13, 2021Publication date: March 3, 2022Applicant: Google LLCInventors: Osman Koyuncu, William Alexander Drewry
-
Patent number: 11188685Abstract: A system is described that secures application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components of the system, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.Type: GrantFiled: February 22, 2019Date of Patent: November 30, 2021Assignee: Google LLCInventors: Osman Koyuncu, William Alexander Drewry
-
Publication number: 20200272770Abstract: A system is described that secures application data being maintained in transient data buffers that are located in a memory that is freely accessible to other components of the system, regardless as to whether those components have permission to access the application data. The system includes an application processor, a memory having a portion configured as a transient data buffer, a hardware unit, and a secure processor. The hardware unit accesses the transient data buffer during execution of an application at the application processor. The secure processor is configured to manage encryption of the transient data buffer as part of giving the hardware unit access to the transient data buffer.Type: ApplicationFiled: February 22, 2019Publication date: August 27, 2020Applicant: Google LLCInventors: Osman Koyuncu, William Alexander Drewry
-
Patent number: 10740494Abstract: The present disclosure describes use of two security processors for a mobile device. In some aspects, a first security processor device embodied in a security component of an apparatus receives a user input via an input device and transmits a security condition signal to a second security processor device embodied in a System on Chip (SoC) component of the apparatus, causing the SoC component to perform a security operation. In other aspects, the first security processor receives a signal via a sensor device sensing environmental conditions surrounding the apparatus and, in response, transmits a security condition signal to the second security processor, causing the SoC component to perform a security operation. The security operation is directly controlled, maintained, and implemented by the second security processor embodied in the SoC component.Type: GrantFiled: September 6, 2017Date of Patent: August 11, 2020Assignee: Google LLCInventors: Osman Koyuncu, William A. Drewry, Xiaowen Xin
-
Publication number: 20190073491Abstract: The present disclosure describes use of two security processors for a mobile device. In some aspects, a first security processor device embodied in a security component of an apparatus receives a user input via an input device and transmits a security condition signal to a second security processor device embodied in a System on Chip (SoC) component of the apparatus, causing the SoC component to perform a security operation. In other aspects, the first security processor receives a signal via a sensor device sensing environmental conditions surrounding the apparatus and, in response, transmits a security condition signal to the second security processor, causing the SoC component to perform a security operation. The security operation is directly controlled, maintained, and implemented by the second security processor embodied in the SoC component.Type: ApplicationFiled: September 6, 2017Publication date: March 7, 2019Applicant: Google LLCInventors: Osman Koyuncu, William Drewry, Xiaowen Xin
-
Patent number: 10176139Abstract: System and method for providing adaptive access to a hardware block on a computer system.Type: GrantFiled: May 15, 2017Date of Patent: January 8, 2019Assignee: QUALCOMM IncorporatedInventors: Ron Keidar, Osman Koyuncu, Michael Batenburg
-
Publication number: 20170325088Abstract: Techniques for securing transactions on a mobile device are provided. An example method according to these techniques includes receiving an input of a code to authorize a transaction in a security sensitive application, authenticating the transaction responsive to the input of the code, monitoring sensor information indicative of a context change, and authorizing subsequent transactions responsive to the sensor information indicating that the context change has not occurred since receiving the input of the code.Type: ApplicationFiled: June 6, 2016Publication date: November 9, 2017Inventors: Adam Edward NEWHAM, Osman KOYUNCU, Chandrasekhar GHANTA, Ivan McLean, Stuart MOSKOVICS, Rashid Ahmed Akbar Attar, Justin McGloin
-
Patent number: 9779262Abstract: Disclosed is a method and apparatus to decrypt file segments in parallel. In one embodiment, an integrated circuit may be used with a storage device of a computing device that comprises: a hardware interface to communicate with the storage device; a crypto-engine to encrypt file segments to be stored on the storage device and to decrypt file segments read from the storage device; and a processor. The processor may be configured to: read a plurality of decrypted file segments from the storage device through the crypto-engine in parallel; and to store the plurality of decrypted file segments.Type: GrantFiled: April 20, 2015Date of Patent: October 3, 2017Assignee: QUALCOMM IncorporatedInventors: Ron Keidar, Osman Koyuncu, Assaf Shacham
-
Patent number: 9767063Abstract: System and method for providing adaptive access to a hardware block on a computer system.Type: GrantFiled: March 4, 2015Date of Patent: September 19, 2017Assignee: QUALCOMM IncorporatedInventors: Ron Keidar, Osman Koyuncu, Michael Batenburg
-
Publication number: 20170249183Abstract: System and method for providing adaptive access to a hardware block on a computer system.Type: ApplicationFiled: May 15, 2017Publication date: August 31, 2017Inventors: Ron KEIDAR, Osman KOYUNCU, Michael BATENBURG
-
Publication number: 20170061144Abstract: Disclosed is a method and apparatus to decrypt file segments in parallel. In one embodiment, an integrated circuit may be used with a storage device of a computing device that comprises: a hardware interface to communicate with the storage device; a crypto-engine to encrypt file segments to be stored on the storage device and to decrypt file segments read from the storage device; and a processor. The processor may be configured to: read a plurality of decrypted file segments from the storage device through the crypto-engine in parallel; and to store the plurality of decrypted file segments.Type: ApplicationFiled: April 20, 2015Publication date: March 2, 2017Inventors: Ron KEIDAR, Osman KOYUNCU, Assaf SHACHAM
-
Publication number: 20160259750Abstract: System and method for providing adaptive access to a hardware block on a computer system.Type: ApplicationFiled: March 4, 2015Publication date: September 8, 2016Inventors: Ron KEIDAR, Osman KOYUNCU, Michael BATENBURG