Patents by Inventor Peter Montgomery
Peter Montgomery has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240127420Abstract: A method of evaluating the microstructure of a surface, such as a coating on a substrate. The surface is illuminated using at least one light source. One or more images of the illuminated surface are captured. The captured images are processed to identify one or more features of the microstructure, and then determine one or more parameters of the microstructure features. The parameters are compared to thresholds or limits to determine whether remedial action is needed.Type: ApplicationFiled: October 16, 2023Publication date: April 18, 2024Applicant: PDF Solutions, Inc.Inventors: Peter Kostka, Jenna Slomowitz, Darcy Montgomery
-
Patent number: 8548160Abstract: One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g., into a single inversion in respective levels of a binary tree representation of elements of the computation). The mathematical pairings for the curve are determined in affine coordinates from a binary representation of a scalar read from right to left using the aggregated plurality of inversions.Type: GrantFiled: January 13, 2010Date of Patent: October 1, 2013Assignee: Microsoft CorporationInventors: Kristin Lauter, Peter Montgomery, Michael Naehrig
-
Publication number: 20110170684Abstract: One or more techniques and/or systems are disclosed that provide for determining mathematical pairings for a curve for use in cryptography. A plurality of inversions used for determining the mathematical pairings for the curve are aggregated (e.g., into a single inversion in respective levels of a binary tree representation of elements of the computation). The mathematical pairings for the curve are determined in affine coordinates from a binary representation of a scalar read from right to left using the aggregated plurality of inversions.Type: ApplicationFiled: January 13, 2010Publication date: July 14, 2011Applicant: Microsoft CorporationInventors: Kristin Lauter, Peter Montgomery, Michael Naehrig
-
Publication number: 20070237324Abstract: Executable instructions designed to provide faster cryptographic processing, fixed-timing memory access, and dedicated memory usage are implementable on an x86 CPU utilizing XMM registers. The instructions can be utilized to implement cryptographic processing in accordance with the Advanced Encryption Standard (AES). To encrypt, a single instruction performs nonlinear transformation, rotation, and linear transformation. Another single instruction used during encryption performs nonlinear transformation and rotation. New instructions also are implemented to perform decryption. The instructions implemented to perform decryption perform the mathematical inverse functions of their counterparts used for encryption.Type: ApplicationFiled: March 15, 2006Publication date: October 11, 2007Applicant: Microsoft CorporationInventors: Niels Ferguson, Peter Montgomery
-
Publication number: 20070192397Abstract: A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.Type: ApplicationFiled: December 19, 2005Publication date: August 16, 2007Applicant: Microsoft CorporationInventors: Kristin Lauter, Peter Montgomery, Ramarathnam Venkatesan
-
Publication number: 20070189511Abstract: Techniques are described that facilitate cryptographic operations, such as data encryption, signing and others, encryption using a computerized method for multiplying a scalar by a point. In one implementation, a set of random integers is selected, wherein the set comprises at least one integer selected randomly. A string is configured, based in part on the set of random integers. Output in the form of a product of the scalar and the point is then calculated, based on the string.Type: ApplicationFiled: December 28, 2005Publication date: August 16, 2007Applicant: Microsoft CorporationInventors: Ramarathnam Venkatesan, David Jao, Peter Montgomery, S. Raju
-
Publication number: 20070058802Abstract: A cryptosystem has a secret based on an order of a group of points on a Jacobian of a curve. In certain embodiments, the cryptosystem is used to generate a product identifier corresponding to a particular product. The product identifier is generated by initially receiving a value associated with a copy (or copies) of a product. The received value is padded using a recognizable pattern, and the padded value is converted to a number represented by a particular number of bits. The number is then converted to an element of the Jacobian of the curve, and the element is then raised to a particular power. The result of raising the element to the particular power is then compressed and output as the product identifier. Subsequently, the encryption process can be reversed and the decrypted value used to indicate validity and/or authenticity of the product identifier.Type: ApplicationFiled: December 19, 2005Publication date: March 15, 2007Applicant: Microsoft CorporationInventors: Kristin Lauter, Peter Montgomery, Ramarathnam Venkatesan
-
Publication number: 20060248338Abstract: Techniques are described for generating and validating signatures. In an implementation, a method includes generating a signature by utilizing a plurality of isogenies included on a private key and incorporating the signature and a public key on a product, in which the public key is configured to validate the signature.Type: ApplicationFiled: April 29, 2005Publication date: November 2, 2006Applicant: Microsoft CorporationInventors: David Jao, Peter Montgomery, Ramarathnam Venkatesan, Victor Boyko
-
Publication number: 20060242417Abstract: Systems and methods for providing signatures are described. In an implementation, a system includes a backend configured to generate a plurality of incomplete signatures using an offline portion of an online/offline signature algorithm, storage configured to store the plurality of incomplete signatures and a front end configured to process a plurality of messages using the plurality of incomplete signatures to form a plurality of digital signatures such that each of the messages has a corresponding one of the digital signatures.Type: ApplicationFiled: April 22, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Ismail Paya, Peter Montgomery, Adam Back
-
Publication number: 20060182273Abstract: A cryptosystem based on a Jacobian of a hyperelliptic curve is being used. Various methods and apparati are provided for generating a compressed data format that identifies one or more points—on the Jacobian of the hyperelliptic curve, and for subsequently decompressing the compressed format data.Type: ApplicationFiled: April 3, 2006Publication date: August 17, 2006Applicant: Microsoft CorporationInventors: Kristin Lauter, Peter Montgomery
-
Publication number: 20060177062Abstract: A cryptosystem based on a Jacobian of a hyperelliptic curve is being used. Various methods and apparati are provided for generating a compressed data format that identifies one or more points—on the Jacobian of the hyperelliptic curve, and for subsequently decompressing the compressed format data.Type: ApplicationFiled: March 27, 2006Publication date: August 10, 2006Applicant: Microsoft CorporationInventors: Kristin Lauter, Peter Montgomery
-
Patent number: 7038583Abstract: A single communication apparatus for alarm system control boxes that include the combination of a digital communicator and a remote communicating device. The communicating apparatus transmits status reports and events to a remote location. Remote login is permitted to access the control box through a external port or through the remote communication device.Type: GrantFiled: September 7, 2001Date of Patent: May 2, 2006Assignee: Edwards Systems Technology, Inc.Inventors: Hilario Costa, Michael Slack, Peter Montgomery, Douglas Price
-
Publication number: 20060081166Abstract: A vessel mooring system which includes at least two mooring robots secured to a terminal, each robot includes an attractive force attachment element eg. a vacuum cup and a base structure fixed relative to the terminal. The attachment element is able to be engaged with a vertically extending side vessel surface and to exert an attractive force normal to the vessel surface at where it is to be attached. Each robot can measure the attractive force between the attachment element and the vessel to provide an “attractive force capacity reading”. Also provided is capability to measure the force between the attachment element and the fixed structure of the mooring robot to provide a “normal force reading”. From monitoring of the relationship between the attractive force capacity reading and the normal force a control of the mooring robot can be provided such that if there is a tending to separate the attachment elements from said vessel the attractive force may be increased and/or alarm is sounded.Type: ApplicationFiled: July 30, 2003Publication date: April 20, 2006Applicant: Mooring Systems LimitedInventors: Peter Montgomery, Bryan Rossiter
-
Publication number: 20050165323Abstract: Preferred embodiments of the invention employ a portable and wearable EEG monitoring device having a patient-worn amplifier releasably coupled to a host computer for transmitting EEG signals. When patient disconnection from the host computer is desired, a portable operations device (POD) can be connected to the amplifier. Preferably upon detecting disconnection, a controller causes new EEG signals to be routed to a removable memory or transmitter peripheral card, enabling seamless data acquisition. Upon detecting reconnection between the amplifier and the host computer, the controller causes new EEG signals to be routed to the host computer. The controller also preferably transmits EEG signals stored on the peripheral memory card (if used) to the host computer. Preferred embodiments include a handheld display apparatus for viewing EEG signals and electrode information. Also, preferred embodiments reduce patient tethers by connecting multiple amplifiers in a daisy-chain format (most preferably on a PAN bus).Type: ApplicationFiled: May 19, 2004Publication date: July 28, 2005Inventors: Anthony Montgomery, Jason Bold, Douglas Carpiaux, Ming Chang, Douglas Code, Ernest Jacobs, Scott Micoley, Jeffrey Milsap, Peter Montgomery, Robert Palmer, Daniel Strelow, Jeffrey Wierschke, Elaine Jamieson
-
Publication number: 20050087118Abstract: A method of operating a mooring system exemplified by active mooring devices having attractive attachment elements fixable to a ship's hull. Each mooring device includes active means for moving the attachment element vertically and in the horizontal plane, and the method involves repositioning the attachment elements in a stepwise manner. The mooring devices also includes a seal for a vaccum attachment element.Type: ApplicationFiled: February 26, 2001Publication date: April 28, 2005Inventors: John Hadcroft, Peter Montgomery
-
Publication number: 20050084099Abstract: An architecture and methodology for implementing Montgomery multiplication on a computer system that supports SIMD instructions is described.Type: ApplicationFiled: October 15, 2003Publication date: April 21, 2005Inventor: Peter Montgomery
-
Publication number: 20050036609Abstract: Methods and apparati are provided for use in determining “Squared Weil pairings” and/or “Squared Tate Pairing” based on an elliptic curve, for example, and which are then used to support cryptographic processing of selected information. Significant improvements are provided in computing efficiency over the conventional implementation of the Weil and Tate pairings. The resulting Squared Weil and/or Tate pairings can be substituted for conventional Weil or Tate pairings in a variety of applications.Type: ApplicationFiled: July 25, 2003Publication date: February 17, 2005Inventors: Anne Eisentraeger, Kristin Lauter, Peter Montgomery
-
Publication number: 20050036621Abstract: An implementation of a digital signature technique, described herein, generates, and another implementation of a digital signature technique, also described herein, validates, a hidden plaintext or ciphertext message wherein one or more portions of that message have another ciphertext message implicitly embedded therein. In other implementations, two or more portions of that message have another ciphertext message implicitly embedded therein. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.Type: ApplicationFiled: July 23, 2003Publication date: February 17, 2005Inventors: Ramarathnam Venkatesan, Peter Montgomery
-
Publication number: 20050036606Abstract: Methods and apparati are provided for use in cryptographically processing information based on elliptic and other like curves. The methods and apparati allow pairings, such as, for example, Weil pairings, Tate Pairings, Squared Weil pairings, Squared Tate pairings, and/or other like pairings to be determined based on algorithms that utilize a parabola. The methods and apparati represent an improvement over conventional algorithms since they tend to me more computationally efficient.Type: ApplicationFiled: July 25, 2003Publication date: February 17, 2005Inventors: Anne Eisentraeger, Kristin Lauter, Peter Montgomery
-
Publication number: 20050025311Abstract: Methods and apparati are provided for determining a “Squared Tate pairing” for hyperelliptic curves and using the results so support at least one cryptographic process. The improved techniques provide increased efficiency and an alternative method to the conventional method of implementing the Tate pairing for Jacobians of hyperelliptic curves. With the Squared Tate pairing for hyperelliptic curves, one may obtain a significant speed-up over a contemporary implementation of the Tate pairing for hyperelliptic curves. The Squared Tate pairing for hyperelliptic curves can be substituted for the Tate pairing for hyperelliptic curves in any applicable cryptographic application.Type: ApplicationFiled: July 28, 2003Publication date: February 3, 2005Inventors: Anne Eisentraeger, Kristin Lauter, Peter Montgomery