Patents by Inventor Paul Carl Kocher
Paul Carl Kocher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210058387Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.Type: ApplicationFiled: September 4, 2020Publication date: February 25, 2021Inventors: Paul Carl Kocher, Benjamin Chen-Min Jun, Andrew John Leiserson
-
Patent number: 10897363Abstract: A table key capable of decrypting a first table from a plurality of encrypted tables may be received. Each of the encrypted tables may include at least one pair of values corresponding to a challenge value and a response value. A request to authenticate a secondary device may be received and in response to the request to authenticate the secondary device, a challenge value obtained by using the table key to decrypt an entry in the first table may be transmitted to the secondary device. A second challenge value may be transmitted to the secondary device and a cryptographic proof may be received from the secondary device. The validity of the cryptographic proof received from the secondary device may be authenticated based on the second challenge value and the response value obtained by using the table key to decrypt the entry in the first table.Type: GrantFiled: November 16, 2016Date of Patent: January 19, 2021Assignee: Cryptography Research, Inc.Inventors: Joel Patrick Wittenauer, Scott C. Best, Paul Carl Kocher
-
Patent number: 10771448Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.Type: GrantFiled: March 14, 2013Date of Patent: September 8, 2020Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Patent number: 10666641Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit, singing, by the root authority system, the command using a root authority key to create a root signed block (RSB), and providing the RSB to a security manager of the integrated circuit.Type: GrantFiled: September 21, 2018Date of Patent: May 26, 2020Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Publication number: 20190097999Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit, singing, by the root authority system, the command using a root authority key to create a root signed block (RSB), and providing the RSB to a security manager of the integrated circuit.Type: ApplicationFiled: September 21, 2018Publication date: March 28, 2019Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Publication number: 20180316512Abstract: A table key capable of decrypting a first table from a plurality of encrypted tables may be received. Each of the encrypted tables may include at least one pair of values corresponding to a challenge value and a response value. A request to authenticate a secondary device may be received and in response to the request to authenticate the secondary device, a challenge value obtained by using the table key to decrypt an entry in the first table may be transmitted to the secondary device. A second challenge value may be transmitted to the secondary device and a cryptographic proof may be received from the secondary device. The validity of the cryptographic proof received from the secondary device may be authenticated based on the second challenge value and the response value obtained by using the table key to decrypt the entry in the first table.Type: ApplicationFiled: November 16, 2016Publication date: November 1, 2018Inventors: Joel Patrick WITTENAUER, Scott C. BEST, Paul Carl KOCHER
-
Patent number: 10084771Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit, singing, by the root authority system, the command using a root authority key to create a root signed block (RSB), and providing the RSB to a security manager of the integrated circuit.Type: GrantFiled: September 30, 2015Date of Patent: September 25, 2018Assignee: Cryptography Research, Inc.Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Publication number: 20170169254Abstract: A container corresponding to executable code may be received. The container may be executed in a secure computation environment by performing one or more operations specified by the executable code of the container. An instruction to terminate the executing of the container may be received from a high level operating system (HLOS) that is external to the secure computation environment. A determination may be made as to whether the container is associated with a preemption privilege and the executing of the container may be terminated after receiving the instruction from the HLOS based on the determination of whether the container is associated with the preemption privilege.Type: ApplicationFiled: December 7, 2016Publication date: June 15, 2017Inventors: Ambuj Kumar, William Craig Rawlings, Ronald Perez, Denis Alexandrovich Pochuev, Michael A. Hamburg, Paul Carl Kocher
-
Patent number: 9436848Abstract: A computing device receives a feature name or key name for an integrated circuit comprising a security manager core and an additional component. At least one of a) the additional component is associated with the key name or b) a feature provided by the additional component is associated with the feature name. The computing device receives a specified number of bits associated with the feature name or the key name, and maps the feature name to a feature address space or the key name to a key interface of the security manager core based at on the specified number of bits. The computing device generates at least one hardware description logic (HDL) module based on the mapping, wherein the at least one HDL module is usable to configure the security manager core for delivery of payloads associated with the feature name or the key name to the additional component.Type: GrantFiled: May 28, 2014Date of Patent: September 6, 2016Assignee: CRYPTOGRAPHY RESEARCH, INC.Inventors: Daniel Beitel, Lauren Gao, Christopher Gori, Paul Carl Kocher, Ambuj Kumar, Andrew John Leiserson
-
Publication number: 20160028722Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example method includes receiving, by a root authority system, data identifying a command that affects operation of an integrated circuit, singing, by the root authority system, the command using a root authority key to create a root signed block (RSB), and providing the RSB to a security manager of the integrated circuit.Type: ApplicationFiled: September 30, 2015Publication date: January 28, 2016Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Publication number: 20140359755Abstract: A computing device receives a feature name or key name for an integrated circuit comprising a security manager core and an additional component. At least one of a) the additional component is associated with the key name or b) a feature provided by the additional component is associated with the feature name. The computing device receives a specified number of bits associated with the feature name or the key name, and maps the feature name to a feature address space or the key name to a key interface of the security manager core based at on the specified number of bits. The computing device generates at least one hardware description logic (HDL) module based on the mapping, wherein the at least one HDL module is usable to configure the security manager core for delivery of payloads associated with the feature name or the key name to the additional component.Type: ApplicationFiled: May 28, 2014Publication date: December 4, 2014Applicant: Cryptography Research, Inc.Inventors: Daniel Beitel, Lauren Gao, Christopher Gori, Paul Carl Kocher, Ambuj Kumar, Andrew John Leiserson
-
Publication number: 20140044265Abstract: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command using the secret key, and configure operation of the integrated circuit using the command.Type: ApplicationFiled: March 14, 2013Publication date: February 13, 2014Applicant: Cryptography Research, Inc.Inventors: Paul Carl Kocher, Benjamin Che-Ming Jun, Andrew John Leiserson
-
Patent number: 8131646Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: October 31, 2007Date of Patent: March 6, 2012Assignee: Rovi Solutions CorporationInventors: Paul Carl Kocher, Joshua Michael Jaffe, Benjamin Che-Ming Jun, Carter Cyrus Laren, Peter Kelley Pearson, Nathaniel James Lawson
-
Patent number: 7996913Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: October 31, 2007Date of Patent: August 9, 2011Assignee: Rovi Solutions CorporationInventors: Paul Carl Kocher, Joshua Michael Jaffe, Benjamin Che-Ming Jun, Carter Cyrus Laren, Peter Kelley Pearson, Nathaniel James Lawson
-
Patent number: 7984511Abstract: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices include a processing environment (e.g., a real-time virtual machine), which plays content by interpreting its processing operations. Players also provide procedure calls to enable content code to load data from media, perform network communications, determine playback environment configurations, access secure nonvolatile storage, submit data to CODECs for output, and/or perform cryptographic operations. Content can insert forensic watermarks in decoded output for tracing pirate copies.Type: GrantFiled: October 31, 2007Date of Patent: July 19, 2011Assignee: Rovi Solutions CorporationInventors: Paul Carl Kocher, Joshua Michael Jaffe, Benjamin Che-Ming Jun, Carter Cyrus Laren, Peter Kelley Pearson, Nathaniel James Lawson
-
Patent number: 7778420Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: GrantFiled: October 31, 2007Date of Patent: August 17, 2010Assignee: Rovi Solutions CorporationInventors: Paul Carl Kocher, Joshua Michael Jaffe, Benjamin Che-Ming Jun, Matthew Thomas Carter, Peter Kelley Pearson
-
Patent number: 7760876Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: GrantFiled: October 15, 2007Date of Patent: July 20, 2010Assignee: Rovi Solutions CorporationInventors: Paul Carl Kocher, Joshua Michael Jaffe, Benjamin Che-Ming Jun, Matthew Thomas Carter, Peter Kelley Pearson
-
Patent number: 7756272Abstract: In an exemplary embodiment, digital content is mastered as a combination of encrypted data and data processing operations that enable use in approved playback environments. Player devices having a processing environment compatible with the content's data processing operations are able to decrypt and play the content. Players can also provide content with basic functions, such as loading data from media, performing network communications, determining playback environment configuration, controlling decryption/playback, and/or performing cryptographic operations using the player's keys. These functions allow the content to implement and enforce its own security policies. If pirates compromise individual players or content titles, new content can be mastered with new security features that block the old attacks. A selective decryption capability can also be provided, enabling on-the-fly watermark insertion so that attacks can be traced back to a particular player.Type: GrantFiled: October 26, 2007Date of Patent: July 13, 2010Assignee: Rovi Solutions CorporationInventors: Paul Carl Kocher, Joshua Michael Jaffe, Benjamin Che-Ming Jun, Matthew Thomas Carter, Peter Kelley Pearson
-
Patent number: 7526644Abstract: Methods and apparatuses for providing cryptographic assurance based on ranges as to whether a particular data item is on a list. According to one computer-implemented method, the items on the list are sorted and ranges are derived from adjacent pairs of data items on the list. Next, cryptographically manipulated data is generated from the plurality of ranges. At least parts of the cryptographically manipulated data is transmitted onto a network for use in cryptographically demonstrating whether any given data item is on the list. According to another computer-implemented method, a request message is received requesting whether a given data item is on a list of data items. In response, a range is selected that is derived from the pair of data items on the list that define the smallest range that includes the given data item. A response message is transmitted that cryptographically demonstrates whether the first data item is on the list using cryptographically manipulated data derived from the range.Type: GrantFiled: March 1, 2005Date of Patent: April 28, 2009Assignee: Axway Inc.Inventor: Paul Carl Kocher
-
Patent number: 7073056Abstract: Methods and apparatuses for providing cryptographic assurance based on ranges as to whether a particular data item is on a list.Type: GrantFiled: March 25, 2002Date of Patent: July 4, 2006Assignee: Tumbleweed Communications Corp.Inventor: Paul Carl Kocher