Patents by Inventor William Orlando
William Orlando has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250245362Abstract: A device and method for protecting a writing of data is provided. An example device and method includes protecting a writing of data into at least one register of at least a first electronic circuit. The device is adapted to storing a first verification table comprising for each of the at least one register: at least one first piece of information concerning the writing of data into the at least one register; and at least a second piece of information indicating whether or not a data item has been written into the at least one register.Type: ApplicationFiled: January 14, 2025Publication date: July 31, 2025Inventors: Marc LACRUCHE, William ORLANDO
-
Patent number: 12058255Abstract: The present description concerns an electronic system including one or a plurality of first microprocessors, a second microprocessor for securely managing first encryption keys of the first microprocessors, the second microprocessor being configured to communicate with each first microprocessor and including a first non-volatile memory having at least one second key stored therein, and for each first microprocessor, a second non-volatile memory external to the second microprocessor and containing the first keys of the first microprocessor encrypted with the second key.Type: GrantFiled: December 16, 2021Date of Patent: August 6, 2024Assignees: STMicroelectro cs (Rousset) SAS, STMicroelectronics (Grand Ouest) SASInventors: Julien Couvrand, William Orlando
-
Publication number: 20220209947Abstract: The present description concerns an electronic system including one or a plurality of first microprocessors, a second microprocessor for securely managing first encryption keys of the first microprocessors, the second microprocessor being configured to communicate with each first microprocessor and including a first non-volatile memory having at least one second key stored therein, and for each first microprocessor, a second non-volatile memory external to the second microprocessor and containing the first keys of the first microprocessor encrypted with the second key.Type: ApplicationFiled: December 16, 2021Publication date: June 30, 2022Applicants: STMicroelectronics (Rousset) SAS, STMicroelectronics (Grand Ouest) SASInventors: Julien COUVRAND, William ORLANDO
-
Patent number: 11340798Abstract: A method includes receiving, by a first microprocessor, a request of modification of a content of a first memory of the first microprocessor, the first memory being accessible only by the first microprocessor. The method includes accessing, by the first microprocessor, first data associated with the request and a signature generated from the first data with an asymmetric cipher algorithm. The first data and the signature are available in a second memory of a second microprocessor, and the first data is representative of a modification to be applied to the content of the first memory. The modification is representative of a modification of a set of services exposed by the first microprocessor. The method includes verifying, by the first microprocessor, authenticity of the first data based on the signature; and modifying the content of the first memory according to the first data, the modifying being conditioned by the verifying.Type: GrantFiled: June 11, 2020Date of Patent: May 24, 2022Assignees: STMICROELECTRONICS (GRAND OUEST) SAS, STMICROELECTRONICS (ROUSSET) SASInventors: William Orlando, Julien Couvrand, Pierre Guillemin
-
Patent number: 11143701Abstract: A method for managing a product includes: placing an integrated circuit in a bootstrap mode with debugging prohibition in response to each reset or power-up of the integrated circuit and in an absence of a reception, on a test access port of the product, of a first command; and placing the integrated circuit in an analysis mode with debugging authorization in response to reception, on the test access port, of the first command following the reset or the power-up of the integrated circuit. Placing the integrated circuit in the analysis mode is maintained at least as long as a second command has not been received on the test access port. Placing the integrated circuit in the bootstrap mode and placing the integrated circuit in the analysis mode are performed in response to a determination that the integrated circuit has never before been placed in the analysis mode with debugging authorization.Type: GrantFiled: June 23, 2020Date of Patent: October 12, 2021Assignee: STMICROELECTRONICS (ROUSSET) SASInventors: Lionel Sinegre, Eric Sagnard, Stephan Courcambeck, William Orlando, Layachi Daineche
-
Patent number: 11113384Abstract: A hardware monitor circuit includes an electronic control circuit coupled to a processing unit. The electronic control circuit generates multi-bit protection codes and directs operations of the hardware monitor circuit. A bus interface is coupled to an address bus of the processing unit, and the bus interface passes signals associated with a stack structure of the processing unit. The stack structure is arranged to store the multi-bit protection codes in an internal memory coupled to the processing unit. Comparators in the hardware monitor circuit are arranged to accept values from the internal memory and gating logic coupled to the comparators is arranged to generate an error signal when it detects that an address on the address bus read via the bus interface is equal to an address stored in the internal memory. Upon generating the error signal, the processing unit is placed in a secure mode.Type: GrantFiled: December 19, 2017Date of Patent: September 7, 2021Assignee: STMICROELECTRONICS (ROUSSET) SASInventors: Pierre Guillemin, William Orlando
-
Patent number: 11057194Abstract: A processing system includes a first processing unit; a second processing unit; and a cryptographic coprocessor communicatively coupled to the first processing unit and the second processing unit. The cryptographic coprocessor includes a key storage memory for storing a cryptographic key; a first interface configured to receive source data to be processed directly from the first processing unit; a hardware cryptographic engine configured to process the source data as a function of the cryptographic key stored in the key storage memory; a second interface configured to receive a first cryptographic key directly from the second processing unit; and a hardware key management circuit configured to store the first cryptographic key in the key storage memory.Type: GrantFiled: June 28, 2018Date of Patent: July 6, 2021Assignees: STMICROELECTRONICS S.R.L., STMICROELECTRONICS APPLICATION GMBHInventors: Roberto Colombo, Guido Marco Bertoni, William Orlando, Roberta Vittimani
-
Patent number: 11032067Abstract: A hardware secure module includes a processing unit and a cryptographic coprocessor. The cryptographic coprocessor includes a key storage memory; a hardware key management circuit configured to store a first cryptographic key in the key storage memory; a first interface configured to receive source data to be processed; a second interface configured to receive the first cryptographic key from the processing unit for storing in the key storage memory; a hardware cryptographic engine configured to process the source data as a function of the first cryptographic key stored in the key storage memory; and a third interface configured to receive a second cryptographic key. The hardware secure module further includes a non-volatile memory configured to store the second cryptographic key; and a hardware configuration module configured to read the second cryptographic key from the non-volatile memory and send the second cryptographic key to the third interface.Type: GrantFiled: June 28, 2018Date of Patent: June 8, 2021Assignees: STMICROELECTRONICS S.R.L., STMICROELECTRONICS APPLICATION GMBHInventors: Roberto Colombo, Guido Marco Bertoni, William Orlando, Roberta Vittimani
-
Publication number: 20200409572Abstract: A method includes receiving, by a first microprocessor, a request of modification of a content of a first memory of the first microprocessor, the first memory being accessible only by the first microprocessor. The method includes accessing, by the first microprocessor, first data associated with the request and a signature generated from the first data with an asymmetric cipher algorithm. The first data and the signature are available in a second memory of a second microprocessor, and the first data is representative of a modification to be applied to the content of the first memory. The modification is representative of a modification of a set of services exposed by the first microprocessor. The method includes verifying, by the first microprocessor, authenticity of the first data based on the signature; and modifying the content of the first memory according to the first data, the modifying being conditioned by the verifying.Type: ApplicationFiled: June 11, 2020Publication date: December 31, 2020Inventors: William Orlando, Julien Couvrand, Pierre Guillemin
-
Publication number: 20200319247Abstract: A method for managing a product includes: placing an integrated circuit in a bootstrap mode with debugging prohibition in response to each reset or power-up of the integrated circuit and in an absence of a reception, on a test access port of the product, of a first command; and placing the integrated circuit in an analysis mode with debugging authorization in response to reception, on the test access port, of the first command following the reset or the power-up of the integrated circuit. Placing the integrated circuit in the analysis mode is maintained at least as long as a second command has not been received on the test access port. Placing the integrated circuit in the bootstrap mode and placing the integrated circuit in the analysis mode are performed in response to a determination that the integrated circuit has never before been placed in the analysis mode with debugging authorization.Type: ApplicationFiled: June 23, 2020Publication date: October 8, 2020Inventors: Lionel Sinegre, Eric Sagnard, Stephan Courcambeck, William Orlando, Layachi Daineche
-
Patent number: 10705141Abstract: A method for managing a product includes: placing an integrated circuit in a bootstrap mode with debugging prohibition in response to each reset or power-up of the integrated circuit and in an absence of a reception, on a test access port of the product, of a first command; and placing the integrated circuit in an analysis mode with debugging authorization in response to reception, on the test access port, of the first command following the reset or the power-up of the integrated circuit. Placing the integrated circuit in the analysis mode is maintained at least as long as a second command has not been received on the test access port. Placing the integrated circuit in the bootstrap mode and placing the integrated circuit in the analysis mode are performed in response to a determination that the integrated circuit has never before been placed in the analysis mode with debugging authorization.Type: GrantFiled: October 10, 2018Date of Patent: July 7, 2020Assignee: STMICROELECTRONICS (ROUSSET) SASInventors: Lionel Sinegre, Eric Sagnard, Stephan Courcambeck, William Orlando, Layachi Daineche
-
Publication number: 20190107576Abstract: A method for managing a product includes: placing an integrated circuit in a bootstrap mode with debugging prohibition in response to each reset or power-up of the integrated circuit and in an absence of a reception, on a test access port of the product, of a first command; and placing the integrated circuit in an analysis mode with debugging authorization in response to reception, on the test access port, of the first command following the reset or the power-up of the integrated circuit. Placing the integrated circuit in the analysis mode is maintained at least as long as a second command has not been received on the test access port. Placing the integrated circuit in the bootstrap mode and placing the integrated circuit in the analysis mode are performed in response to a determination that the integrated circuit has never before been placed in the analysis mode with debugging authorization.Type: ApplicationFiled: October 10, 2018Publication date: April 11, 2019Inventors: Lionel Sinegre, Eric Sagnard, Stephan Courcambeck, William Orlando, Layachi Daineche
-
Publication number: 20190007202Abstract: A hardware secure module includes a processing unit and a cryptographic coprocessor. The cryptographic coprocessor includes a key storage memory; a hardware key management circuit configured to store a first cryptographic key in the key storage memory; a first interface configured to receive source data to be processed; a second interface configured to receive the first cryptographic key from the processing unit for storing in the key storage memory; a hardware cryptographic engine configured to process the source data as a function of the first cryptographic key stored in the key storage memory; and a third interface configured to receive a second cryptographic key. The hardware secure module further includes a non-volatile memory configured to store the second cryptographic key; and a hardware configuration module configured to read the second cryptographic key from the non-volatile memory and send the second cryptographic key to the third interface.Type: ApplicationFiled: June 28, 2018Publication date: January 3, 2019Inventors: Roberto Colombo, Guido Marco Bertoni, William Orlando, Roberta Vittimani
-
Publication number: 20190007201Abstract: A processing system includes a first processing unit; a second processing unit; and a cryptographic coprocessor communicatively coupled to the first processing unit and the second processing unit. The cryptographic coprocessor includes a key storage memory for storing a cryptographic key; a first interface configured to receive source data to be processed directly from the first processing unit; a hardware cryptographic engine configured to process the source data as a function of the cryptographic key stored in the key storage memory; a second interface configured to receive a first cryptographic key directly from the second processing unit; and a hardware key management circuit configured to store the first cryptographic key in the key storage memory.Type: ApplicationFiled: June 28, 2018Publication date: January 3, 2019Inventors: Roberto Colombo, Guido Marco Bertoni, William Orlando, Roberta Vittimani
-
Patent number: 10108530Abstract: Synchronization points are inserted into a program code to be monitored, and are associated with different branches resulting from execution of an indirect branch instruction. The synchronization points can be accessed by the monitored program code for the purpose of identifying which branch to use during execution of the indirect branch instruction of the monitored program code.Type: GrantFiled: September 20, 2016Date of Patent: October 23, 2018Assignee: STMICROELECTRONICS (ROUSSET) SASInventors: Lydie Terras, William Orlando
-
Publication number: 20180181748Abstract: A hardware monitor circuit includes an electronic control circuit coupled to a processing unit. The electronic control circuit generates multi-bit protection codes and directs operations of the hardware monitor circuit. A bus interface is coupled to an address bus of the processing unit, and the bus interface passes signals associated with a stack structure of the processing unit. The stack structure is arranged to store the multi-bit protection codes in at least one internal memory coupled to the processing unit. A plurality of comparators in the hardware monitor circuit are arranged to accept values from the at least one internal memory and gating logic coupled to the plurality of comparators is arranged to generate an error signal when it detects that an address on the address bus read via the bus interface is equal to an address stored in the at least one internal memory. Upon generating the error signal, the processing unit is placed in a secure mode.Type: ApplicationFiled: December 19, 2017Publication date: June 28, 2018Inventors: Pierre Guillemin, William Orlando
-
Publication number: 20170242778Abstract: Synchronization points are inserted into a program code to be monitored, and are associated with different branches resulting from execution of an indirect branch instruction. The synchronization points can be accessed by the monitored program code for the purpose of identifying which branch to use during execution of the indirect branch instruction of the monitored program code.Type: ApplicationFiled: September 20, 2016Publication date: August 24, 2017Inventors: Lydie TERRAS, William Orlando
-
Patent number: 9582675Abstract: A method for loading a program, contained in at least a first memory, into a second memory accessible by an execution unit, in which the program is in a cyphered form in the first memory, a circuit for controlling the access to the second memory is configured from program initialization data, instructions of the program, and at least initialization data being decyphered to be transferred into the second memory after configuration of the circuit.Type: GrantFiled: September 30, 2015Date of Patent: February 28, 2017Assignee: STMicroelectronics S.A.Inventors: Albert Martinez, William Orlando
-
Patent number: 9447539Abstract: The present invention provides compositions and methods for the pretreatment of lignocellulosic material. The present invention further provides for pretreated lignocellulosic material that can be used to produce useful products, such as fermentable sugars.Type: GrantFiled: December 9, 2013Date of Patent: September 20, 2016Assignee: Syngenta Participations AGInventors: Zhanying Zhang, Ian Mark O'Hara, William Orlando Sinclair Doherty
-
Publication number: 20160026811Abstract: A method for loading a program, contained in at least a first memory, into a second memory accessible by an execution unit, in which the program is in a cyphered form in the first memory, a circuit for controlling the access to the second memory is configured from program initialization data, instructions of the program, and at least initialization data being decyphered to be transferred into the second memory after configuration of the circuit.Type: ApplicationFiled: September 30, 2015Publication date: January 28, 2016Inventors: Albert Martinez, William Orlando