Patents by Inventor Tze-Lei Poo
Tze-Lei Poo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11977121Abstract: Described herein is a device for autonomously monitoring a battery is provided. The device is integrated with the battery (e.g., by being electrically coupled to the battery). The device obtains measurement data by injecting electrical signals into the battery and measuring an electrical response of the battery. The device participates in an authentication protocol with a computing device to verify a unique identity of the device to the computing device. After performing the authentication protocol verifying the unique identity of the device, the device transmits battery data to the computer. Further, techniques for verifying the identity of the battery using measurement data obtained by the device are described herein. The techniques generate a battery signature using the measurement data that is then used to verify the identity of the battery. For example, the battery signature may be used to determine whether the battery is counterfeit or defective.Type: GrantFiled: September 14, 2021Date of Patent: May 7, 2024Assignee: Analog Devices International Unlimited CompanyInventors: Shane O'Mahony, Narsimh Dilip Kamath, Tze Lei Poo, Gina G. Aquilano, Hemtej Gullapalli, Lance Robert Doherty
-
Patent number: 11934524Abstract: Herein disclosed are approaches for protecting sensitive information within a fingerprint authentication system that can be snooped and utilized to access the device, secured information, or a secured application. The approaches can utilize encryption keys and hash functions that are unique to the device in which the fingerprint authentication is being performed to protect the sensitive information that can be snooped.Type: GrantFiled: June 19, 2020Date of Patent: March 19, 2024Assignee: Analog Devices, Inc.Inventors: Patrick Riehl, Tze Lei Poo
-
Publication number: 20230297679Abstract: Herein disclosed are approaches for protecting sensitive information within a fingerprint authentication system that can be snooped and utilized to access the device, secured information, or a secured application. The approaches can utilize encryption keys and hash functions that are unique to the device in which the fingerprint authentication is being performed to protect the sensitive information that can be snooped.Type: ApplicationFiled: May 26, 2023Publication date: September 21, 2023Inventors: Patrick RIEHL, Tze Lei Poo
-
Publication number: 20230286465Abstract: Remote keyless entry (RKE) systems and devices are described. The RKE devices include one or more passive radios that respond to an interrogation signal from an interrogating device such as a vehicle. The passive radio sends a responsive signal that can include a decaying portion representing a ringdown signal. The passive radio includes a SAW resonator in some situations.Type: ApplicationFiled: May 18, 2023Publication date: September 14, 2023Applicant: Analog Devices, Inc.Inventors: Harvey Weinberg, Tze Lei Poo, Tao Yu, Eugene Oh Hwang
-
Patent number: 11736838Abstract: A passive wireless sensor may be wirelessly coupled with an interrogator. The sensor uses multiple antennas to receive an interrogation signal from the interrogator and compares a path length difference between the signal received at each antenna. The path length difference changes based on the relative position of the sensor and interrogator. Using the path length difference, the sensor transmits a response signal to the interrogator. The interrogator analyzes the response signal to determine sensor position. The interrogator compares the determined sensor position to a previous known sensor position to determine if an attack has occurred, such as a replay, counterfeit, or tampering attack. The sensor may include cryptographic circuitry that scrambles the response signal, thwarting an attack such as a sniffing attack. The interrogator may include multiple antennas and determine a position of the sensor by calculating an angle-of-arrival that enhances a signal from the sensor, via beamforming.Type: GrantFiled: August 6, 2021Date of Patent: August 22, 2023Assignee: Analog Devices, Inc.Inventors: Eugene Oh Hwang, Tao Yu, Tze Lei Poo, Rui Zhang
-
Publication number: 20220209946Abstract: Described herein are techniques of remotely performing key revocation on a device that cannot communicate outside of a local network of the device. The techniques involve including key revocation instructions in software update instructions that are sent to the device. The device may verify the software update instructions using one or more keys to determine whether they are safe for execution on the device. For example, the device may verify that the software update instructions have been sent by a trusted software provider. The device may execute the key revocation instructions included in the software update instruction to revoke use of a key of the key(s), and initiate use of a new key in place of the revoked key.Type: ApplicationFiled: December 10, 2021Publication date: June 30, 2022Applicant: Analog Devices, Inc.Inventors: Jonathan Noah Simon, Tze Lei Poo
-
Publication number: 20220082627Abstract: Described herein is a device for autonomously monitoring a battery is provided. The device is integrated with the battery (e.g., by being electrically coupled to the battery). The device obtains measurement data by injecting electrical signals into the battery and measuring an electrical response of the battery. The device participates in an authentication protocol with a computing device to verify a unique identity of the device to the computing device. After performing the authentication protocol verifying the unique identity of the device, the device transmits battery data to the computer. Further, techniques for verifying the identity of the battery using measurement data obtained by the device are described herein. The techniques generate a battery signature using the measurement data that is then used to verify the identity of the battery. For example, the battery signature may be used to determine whether the battery is counterfeit or defective.Type: ApplicationFiled: September 14, 2021Publication date: March 17, 2022Applicant: Analog Devices International Unlimited CompanyInventors: Shane O'Mahony, Narsimh Dilip Kamath, Tze Lei Poo, Gina G. Aquilano, Hemtej Gullapalli, Lance Robert Doherty
-
Publication number: 20220046337Abstract: A passive wireless sensor may be wirelessly coupled with an interrogator. The sensor uses multiple antennas to receive an interrogation signal from the interrogator and compares a path length difference between the signal received at each antenna. The path length difference changes based on the relative position of the sensor and interrogator. Using the path length difference, the sensor transmits a response signal to the interrogator. The interrogator analyzes the response signal to determine sensor position. The interrogator compares the determined sensor position to a previous known sensor position to determine if an attack has occurred, such as a replay, counterfeit, or tampering attack. The sensor may include cryptographic circuitry that scrambles the response signal, thwarting an attack such as a sniffing attack. The interrogator may include multiple antennas and determine a position of the sensor by calculating an angle-of-arrival that enhances a signal from the sensor, via beamforming.Type: ApplicationFiled: August 6, 2021Publication date: February 10, 2022Applicant: Analog Devices, Inc.Inventors: Eugene Oh Hwang, Tao Yu, Tze Lei Poo, Rui Zhang
-
Patent number: 11151290Abstract: According to various aspects, systems and methods are provided for improving a computer system's resistance to tampering. A PUF may be one component of a system. Other components of the system may not have the same level of protection against tampering as the PUF. According to one aspect, tamper protection provided by the PUF may be extended to one or more other components of the system, thus creating a network of tamper-resistant components. The system may include a tamper detection circuit that receives signals from the component(s). The tamper detection circuit generates an output signal based on the received signals that indicates whether any of the components has been tampered with. The PUF may be configured to use the output signal to generate secret information. If the output signal indicates that one of the components has been tampered with, the PUF may prevent generation of the correct secret information.Type: GrantFiled: September 17, 2018Date of Patent: October 19, 2021Assignee: Analog Devices, Inc.Inventors: Deniz Karakoyunlu, Tze Lei Poo
-
Patent number: 10932220Abstract: Systems and methods permit automatic joining of a network associated with a specified area within which wireless nodes reside. Network managers located in or near the specified area use wireless proximity detection to estimate distances to wireless nodes requesting to join the network. The network managers can use the estimated distances to determine whether or not a requesting wireless node is located within the specified area. If the requesting wireless node is located within the specified area, the network managers can permit the wireless node to join the wireless network associated with the respective specified area.Type: GrantFiled: October 22, 2019Date of Patent: February 23, 2021Assignee: Analog Devices, Inc.Inventors: Tao Yu, Tze Lei Poo, Lance Doherty, Philip P. E. Quinlan
-
Publication number: 20200401699Abstract: Herein disclosed are approaches for protecting sensitive information within a fingerprint authentication system that can be snooped and utilized to access the device, secured information, or a secured application. The approaches can utilize encryption keys and hash functions that are unique to the device in which the fingerprint authentication is being performed to protect the sensitive information that can be snooped.Type: ApplicationFiled: June 19, 2020Publication date: December 24, 2020Applicant: Analog Devices, Inc.Inventors: Patrick RIEHL, Tze Lei POO
-
Patent number: 10841107Abstract: According to various aspects, a delay-based physical unclonable function (PUF) device is provided. According to one embodiment, the PUF device includes circuitry for generating output bits of entropy by comparing, or “racing”, a plurality of PUF cells. A PUF cell is a building block of the PUF device. For example, the PUF device may include two identically designed circuits with only process related variations and each circuit can be a PUF cell. According to another aspect, if PUF cells with same history of winning or losing are being compared in a race, adversaries cannot predict the outcome of the current race based on previous race results. Accordingly, systems and methods are described herein for generating multiple rounds of races based on the previous rounds of races. Thus, one PUF cell can be used in multiple pairwise comparisons while maximal entropy is extracted.Type: GrantFiled: November 20, 2017Date of Patent: November 17, 2020Assignee: Analog Devices, Inc.Inventors: Tze Lei Poo, Sadaf Ahmad
-
Publication number: 20200137712Abstract: Systems and methods permit automatic joining of a network associated with a specified area within which wireless nodes reside. Network managers located in or near the specified area use wireless proximity detection to estimate distances to wireless nodes requesting to join the network. The network managers can use the estimated distances to determine whether or not a requesting wireless node is located within the specified area. If the requesting wireless node is located within the specified area, the network managers can permit the wireless node to join the wireless network associated with the respective specified area.Type: ApplicationFiled: October 22, 2019Publication date: April 30, 2020Inventors: Tao Yu, Tze Lei Poo, Lance Doherty, Philip P.E Quinlan
-
Publication number: 20200089921Abstract: According to various aspects, systems and methods are provided for improving a computer system's resistance to tampering. A PUF may be one component of a system. Other components of the system may not have the same level of protection against tampering as the PUF. According to one aspect, tamper protection provided by the PUF may be extended to one or more other components of the system, thus creating a network of tamper-resistant components. The system may include a tamper detection circuit that receives signals from the component(s). The tamper detection circuit generates an output signal based on the received signals that indicates whether any of the components has been tampered with. The PUF may be configured to use the output signal to generate secret information. If the output signal indicates that one of the components has been tampered with, the PUF may prevent generation of the correct secret information.Type: ApplicationFiled: September 17, 2018Publication date: March 19, 2020Applicant: Analog Devices, Inc.Inventors: Deniz Karakoyunlu, Tze Lei Poo
-
Patent number: 10560095Abstract: According to various aspects, systems and methods for providing a soft-decoding physical unclonable function are provided. According to one embodiment, PUF circuitry includes circuit elements with impedance values that are used to generate a PUF value. For example, one or more resistors may be connected to a voltage source. The resistors may generate a resulting voltage signal that is measured and indicates a ratio of the impedance values of the resistors. Due to manufacturing variations, each impedance value may be unique, such that the impedance values may be used to provide a unique number sequence. Each ratio value may be converted into a single bit or multi-bit digital value through digitization, for example with a comparator and/or an analog to digital converter, and the series of digital values may represent or be used to generate a unique number sequence.Type: GrantFiled: May 23, 2018Date of Patent: February 11, 2020Assignee: Analog Devices, Inc.Inventors: Thomas G. O'Dwyer, Tze Lei Poo
-
Publication number: 20190363714Abstract: According to various aspects, systems and methods for providing a soft-decoding physical unclonable function are provided. According to one embodiment, PUF circuitry includes circuit elements with impedance values that are used to generate a PUF value. For example, one or more resistors may be connected to a voltage source. The resistors may generate a resulting voltage signal that is measured and indicates a ratio of the impedance values of the resistors. Due to manufacturing variations, each impedance value may be unique, such that the impedance values may be used to provide a unique number sequence. Each ratio value may be converted into a single bit or multi-bit digital value through digitization, for example with a comparator and/or an analog to digital converter, and the series of digital values may represent or be used to generate a unique number sequence.Type: ApplicationFiled: May 23, 2018Publication date: November 28, 2019Applicant: Analog Devices, Inc.Inventors: Thomas G. O'Dwyer, Tze Lei Poo
-
Publication number: 20190158299Abstract: According to various aspects, a delay-based physical unclonable function (PUF) device is provided. According to one embodiment, the PUF device includes circuitry for generating output bits of entropy by comparing, or “racing”,” a plurality of PUF cells. A PUF cell is a building block of the PUF device. For example, the PUF device may include two identically designed circuits with only process related variations and each circuit can be a PUF cell. According to another aspect, if PUF cells with same history of winning or losing are being compared in a race, adversaries cannot predict the outcome of the current race based on previous race results. Accordingly, systems and methods are described herein for generating multiple rounds of races based on the previous rounds of races. Thus, one PUF cell can be used in multiple pairwise comparisons while maximal entropy is extracted.Type: ApplicationFiled: November 20, 2017Publication date: May 23, 2019Applicant: Analog Devices, Inc.Inventors: Tze Lei Poo, Sadaf Ahmad
-
Patent number: 9350534Abstract: A cryptographic device includes first and second pipeline stages and a pipeline register. The first pipeline stage includes a first byte substitution module configured to (i) receive a first data block including multiple bytes, (ii) perform predetermined mathematical operations on each of the bytes of the first data block, and (iii) for each of the bytes of the first data block, output an intermediate value based on the predetermined mathematical operations. The pipeline register is configured to store the intermediate values. The second pipeline stage includes a second byte substitution module configured to (i) receive the stored intermediate values from the pipeline register, and (ii) generate an output data block, for each intermediate value of the stored intermediate values, by performing predetermined mathematical operations on the intermediate value to generate a corresponding replacement byte of the output data block.Type: GrantFiled: June 9, 2014Date of Patent: May 24, 2016Assignee: Marvell International Ltd.Inventors: Tze Lei Poo, Heng Tang, Siu-Hung Fred Au, Gregory Burd
-
Patent number: 9251380Abstract: A storage drive includes a first memory that stores first text. A first processor generates a first instruction to decrypt the first text. A cryptographic module includes a second memory, a cryptographic device, a memory module, and a second processor. The second memory is inaccessible to the first processor and stores a cryptographic key. The cryptographic device accesses the second memory to obtain the cryptographic key and based on the first instruction, decrypts the first text. The memory module stores a status of execution of the first instruction by the cryptographic device. The second processor, prior to the cryptographic device decrypting the first text, forwards the first instruction to the cryptographic device and stores the status of execution of the first instruction in the memory module. The memory module is connected between the first and second processors and isolates the first processor from the second processor.Type: GrantFiled: September 19, 2013Date of Patent: February 2, 2016Assignee: Marvell International Ltd.Inventors: Siu-Hung Fred Au, Gregory Burd, Wayne C. Datwyler, Leonard J. Galasso, Tze Lei Poo, Minda Zhang
-
Patent number: 9064135Abstract: A hardware implemented system and method of encryption key management may facilitate access to a connected device. In some embodiments, an Input/Output (I/O) controller coupled to a host system may comprise a cryptocontext memory that is only accessible via state machines running on the controller and a key unwrap engine to decrypt wrapped keys associated with commands received from the host system.Type: GrantFiled: December 12, 2007Date of Patent: June 23, 2015Assignee: Marvell International Ltd.Inventors: Tze Lei Poo, David Geddes