Patents by Inventor Peter Montgomery

Peter Montgomery has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240127420
    Abstract: A method of evaluating the microstructure of a surface, such as a coating on a substrate. The surface is illuminated using at least one light source. One or more images of the illuminated surface are captured. The captured images are processed to identify one or more features of the microstructure, and then determine one or more parameters of the microstructure features. The parameters are compared to thresholds or limits to determine whether remedial action is needed.
    Type: Application
    Filed: October 16, 2023
    Publication date: April 18, 2024
    Applicant: PDF Solutions, Inc.
    Inventors: Peter Kostka, Jenna Slomowitz, Darcy Montgomery
  • Patent number: 8548160
    Abstract: One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g., into a single inversion in respective levels of a binary tree representation of elements of the computation). The mathematical pairings for the curve are determined in affine coordinates from a binary representation of a scalar read from right to left using the aggregated plurality of inversions.
    Type: Grant
    Filed: January 13, 2010
    Date of Patent: October 1, 2013
    Assignee: Microsoft Corporation
    Inventors: Kristin Lauter, Peter Montgomery, Michael Naehrig
  • Publication number: 20110170684
    Abstract: One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g., into a single inversion in respective levels of a binary tree representation of elements of the computation). The mathematical pairings for the curve are determined in affine coordinates from a binary representation of a scalar read from right to left using the aggregated plurality of inversions.
    Type: Application
    Filed: January 13, 2010
    Publication date: July 14, 2011
    Applicant: Microsoft Corporation
    Inventors: Kristin Lauter, Peter Montgomery, Michael Naehrig
  • Publication number: 20070237324
    Abstract: Executable instructions designed to provide faster cryptographic processing, fixed-timing memory access, and dedicated memory usage are implementable on an x86 CPU utilizing XMM registers. The instructions can be utilized to implement cryptographic processing in accordance with the Advanced Encryption Standard (AES). To encrypt, a single instruction performs nonlinear transformation, rotation, and linear transformation. Another single instruction used during encryption performs nonlinear transformation and rotation. New instructions also are implemented to perform decryption. The instructions implemented to perform decryption perform the mathematical inverse functions of their counterparts used for encryption.
    Type: Application
    Filed: March 15, 2006
    Publication date: October 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Niels Ferguson, Peter Montgomery
  • Publication number: 20070192397
    Abstract: A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.
    Type: Application
    Filed: December 19, 2005
    Publication date: August 16, 2007
    Applicant: Microsoft Corporation
    Inventors: Kristin Lauter, Peter Montgomery, Ramarathnam Venkatesan
  • Publication number: 20070189511
    Abstract: Techniques are described that facilitate cryptographic operations, such as data encryption, signing and others, encryption using a computerized method for multiplying a scalar by a point. In one implementation, a set of random integers is selected, wherein the set comprises at least one integer selected randomly. A string is configured, based in part on the set of random integers. Output in the form of a product of the scalar and the point is then calculated, based on the string.
    Type: Application
    Filed: December 28, 2005
    Publication date: August 16, 2007
    Applicant: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, David Jao, Peter Montgomery, S. Raju
  • Publication number: 20070058802
    Abstract: A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.
    Type: Application
    Filed: December 19, 2005
    Publication date: March 15, 2007
    Applicant: Microsoft Corporation
    Inventors: Kristin Lauter, Peter Montgomery, Ramarathnam Venkatesan
  • Publication number: 20060248338
    Abstract: Techniques are described for generating and validating signatures. In an implementation, a method includes generating a signature by utilizing a plurality of isogenies included on a private key and incorporating the signature and a public key on a product, in which the public key is configured to validate the signature.
    Type: Application
    Filed: April 29, 2005
    Publication date: November 2, 2006
    Applicant: Microsoft Corporation
    Inventors: David Jao, Peter Montgomery, Ramarathnam Venkatesan, Victor Boyko
  • Publication number: 20060242417
    Abstract: Systems and methods for providing signatures are described. In an implementation, a system includes a backend configured to generate a plurality of incomplete signatures using an offline portion of an online/offline signature algorithm, storage configured to store the plurality of incomplete signatures and a front end configured to process a plurality of messages using the plurality of incomplete signatures to form a plurality of digital signatures such that each of the messages has a corresponding one of the digital signatures.
    Type: Application
    Filed: April 22, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Ismail Paya, Peter Montgomery, Adam Back
  • Publication number: 20060182273
    Abstract: A cryptosystem based on a Jacobian of a hyperelliptic curve is being used. Various methods and apparati are provided for generating a compressed data format that identifies one or more points—on the Jacobian of the hyperelliptic curve, and for subsequently decompressing the compressed format data.
    Type: Application
    Filed: April 3, 2006
    Publication date: August 17, 2006
    Applicant: Microsoft Corporation
    Inventors: Kristin Lauter, Peter Montgomery
  • Publication number: 20060177062
    Abstract: A cryptosystem based on a Jacobian of a hyperelliptic curve is being used. Various methods and apparati are provided for generating a compressed data format that identifies one or more points—on the Jacobian of the hyperelliptic curve, and for subsequently decompressing the compressed format data.
    Type: Application
    Filed: March 27, 2006
    Publication date: August 10, 2006
    Applicant: Microsoft Corporation
    Inventors: Kristin Lauter, Peter Montgomery
  • Patent number: 7038583
    Abstract: A single communication apparatus for alarm system control boxes that include the combination of a digital communicator and a remote communicating device. The communicating apparatus transmits status reports and events to a remote location. Remote login is permitted to access the control box through a external port or through the remote communication device.
    Type: Grant
    Filed: September 7, 2001
    Date of Patent: May 2, 2006
    Assignee: Edwards Systems Technology, Inc.
    Inventors: Hilario Costa, Michael Slack, Peter Montgomery, Douglas Price
  • Publication number: 20060081166
    Abstract: A vessel mooring system which includes at least two mooring robots secured to a terminal, each robot includes an attractive force attachment element eg. a vacuum cup and a base structure fixed relative to the terminal. The attachment element is able to be engaged with a vertically extending side vessel surface and to exert an attractive force normal to the vessel surface at where it is to be attached. Each robot can measure the attractive force between the attachment element and the vessel to provide an “attractive force capacity reading”. Also provided is capability to measure the force between the attachment element and the fixed structure of the mooring robot to provide a “normal force reading”. From monitoring of the relationship between the attractive force capacity reading and the normal force a control of the mooring robot can be provided such that if there is a tending to separate the attachment elements from said vessel the attractive force may be increased and/or alarm is sounded.
    Type: Application
    Filed: July 30, 2003
    Publication date: April 20, 2006
    Applicant: Mooring Systems Limited
    Inventors: Peter Montgomery, Bryan Rossiter
  • Publication number: 20050165323
    Abstract: Preferred embodiments of the invention employ a portable and wearable EEG monitoring device having a patient-worn amplifier releasably coupled to a host computer for transmitting EEG signals. When patient disconnection from the host computer is desired, a portable operations device (POD) can be connected to the amplifier. Preferably upon detecting disconnection, a controller causes new EEG signals to be routed to a removable memory or transmitter peripheral card, enabling seamless data acquisition. Upon detecting reconnection between the amplifier and the host computer, the controller causes new EEG signals to be routed to the host computer. The controller also preferably transmits EEG signals stored on the peripheral memory card (if used) to the host computer. Preferred embodiments include a handheld display apparatus for viewing EEG signals and electrode information. Also, preferred embodiments reduce patient tethers by connecting multiple amplifiers in a daisy-chain format (most preferably on a PAN bus).
    Type: Application
    Filed: May 19, 2004
    Publication date: July 28, 2005
    Inventors: Anthony Montgomery, Jason Bold, Douglas Carpiaux, Ming Chang, Douglas Code, Ernest Jacobs, Scott Micoley, Jeffrey Milsap, Peter Montgomery, Robert Palmer, Daniel Strelow, Jeffrey Wierschke, Elaine Jamieson
  • Publication number: 20050087118
    Abstract: A method of operating a mooring system exemplified by active mooring devices having attractive attachment elements fixable to a ship's hull. Each mooring device includes active means for moving the attachment element vertically and in the horizontal plane, and the method involves repositioning the attachment elements in a stepwise manner. The mooring devices also includes a seal for a vaccum attachment element.
    Type: Application
    Filed: February 26, 2001
    Publication date: April 28, 2005
    Inventors: John Hadcroft, Peter Montgomery
  • Publication number: 20050084099
    Abstract: An architecture and methodology for implementing Montgomery multiplication on a computer system that supports SIMD instructions is described.
    Type: Application
    Filed: October 15, 2003
    Publication date: April 21, 2005
    Inventor: Peter Montgomery
  • Publication number: 20050036609
    Abstract: Methods and apparati are provided for use in determining “Squared Weil pairings” and/or “Squared Tate Pairing” based on an elliptic curve, for example, and which are then used to support cryptographic processing of selected information. Significant improvements are provided in computing efficiency over the conventional implementation of the Weil and Tate pairings. The resulting Squared Weil and/or Tate pairings can be substituted for conventional Weil or Tate pairings in a variety of applications.
    Type: Application
    Filed: July 25, 2003
    Publication date: February 17, 2005
    Inventors: Anne Eisentraeger, Kristin Lauter, Peter Montgomery
  • Publication number: 20050036621
    Abstract: An implementation of a digital signature technique, described herein, generates, and another implementation of a digital signature technique, also described herein, validates, a hidden plaintext or ciphertext message wherein one or more portions of that message have another ciphertext message implicitly embedded therein. In other implementations, two or more portions of that message have another ciphertext message implicitly embedded therein. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Application
    Filed: July 23, 2003
    Publication date: February 17, 2005
    Inventors: Ramarathnam Venkatesan, Peter Montgomery
  • Publication number: 20050036606
    Abstract: Methods and apparati are provided for use in cryptographically processing information based on elliptic and other like curves. The methods and apparati allow pairings, such as, for example, Weil pairings, Tate Pairings, Squared Weil pairings, Squared Tate pairings, and/or other like pairings to be determined based on algorithms that utilize a parabola. The methods and apparati represent an improvement over conventional algorithms since they tend to me more computationally efficient.
    Type: Application
    Filed: July 25, 2003
    Publication date: February 17, 2005
    Inventors: Anne Eisentraeger, Kristin Lauter, Peter Montgomery
  • Publication number: 20050025311
    Abstract: Methods and apparati are provided for determining a “Squared Tate pairing” for hyperelliptic curves and using the results so support at least one cryptographic process. The improved techniques provide increased efficiency and an alternative method to the conventional method of implementing the Tate pairing for Jacobians of hyperelliptic curves. With the Squared Tate pairing for hyperelliptic curves, one may obtain a significant speed-up over a contemporary implementation of the Tate pairing for hyperelliptic curves. The Squared Tate pairing for hyperelliptic curves can be substituted for the Tate pairing for hyperelliptic curves in any applicable cryptographic application.
    Type: Application
    Filed: July 28, 2003
    Publication date: February 3, 2005
    Inventors: Anne Eisentraeger, Kristin Lauter, Peter Montgomery