Patents by Inventor YONI KAHANA

YONI KAHANA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10680834
    Abstract: A supplier network device is provided and includes a supplier processor and memory that stores a credential package including information for a chip or a vehicle control module (VCM). The supplier processor: receives ID and signature public keys from the chip, where the ID and signature public keys correspond respectively to private keys stored in the chip; transmit the ID and signature public keys to a certificate authority processor of a vehicle manufacturer data center; and receive the credential package including signing certificates from the certificate authority processor prior to assembling the VCM. The supplier processor: reads the ID public key from the VCM subsequent to incorporating the chip in the VCM; identifies the credential package based on the ID public key; and based on the identifying of the credential package, programs the VCM with the signing certificates prior to installation of the vehicle control module in a vehicle.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: June 9, 2020
    Assignee: GM GLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: David W. Racklyeft, Jessica S. Moreno, Jian Shen, Leonard J. Leshinsky, Jr., Yoni Kahana, Monica E. Mitchell, Hariharan Krishnan, Mohammad Naserian
  • Publication number: 20190238343
    Abstract: A supplier network device is provided and includes a supplier processor and memory that stores a credential package including information for a chip or a vehicle control module (VCM). The supplier processor: receives ID and signature public keys from the chip, where the ID and signature public keys correspond respectively to private keys stored in the chip; transmit the ID and signature public keys to a certificate authority processor of a vehicle manufacturer data center; and receive the credential package including signing certificates from the certificate authority processor prior to assembling the VCM. The supplier processor: reads the ID public key from the VCM subsequent to incorporating the chip in the VCM; identifies the credential package based on the ID public key; and based on the identifying of the credential package, programs the VCM with the signing certificates prior to installation of the vehicle control module in a vehicle.
    Type: Application
    Filed: January 31, 2018
    Publication date: August 1, 2019
    Inventors: David W. Racklyeft, Jessica S. Moreno, Jian Shen, Leonard J. Leshinsky, JR., Yoni Kahana, Monica E. Mitchell, Hariharan Krishnan, Mohammad Naserian
  • Patent number: 10019602
    Abstract: Systems and methods for improved security for a core in a portable computing device (PCD), such as a core operating a high level operating system (HLOS) are presented. In operation, a monitor module on the SoC is initialized. The monitor module sends a request to the core of the SoC and the monitor module receives a response from the core. A timer in communication with the monitor module is checked. The timer is reset or disabled by the monitor module if the response from the core is received at the monitor module before the expiration of the timer. Otherwise, the monitor module applies at least one security measure to the core as a result of the timer expiring.
    Type: Grant
    Filed: August 28, 2014
    Date of Patent: July 10, 2018
    Assignee: QUALCOMM Incorporated
    Inventors: Yoni Kahana, Laurence Geoffrey Lundblade
  • Publication number: 20160070656
    Abstract: Write protection management systems are disclosed. In this regard, in one exemplary aspect, a security control system is provided to authorize and write a specified number of data blocks to a write-protected region in a storage device. In another exemplary aspect, a write control system is provided to keep track of data blocks written to the write-protected region. The write control system automatically re-enables write protection on the write-protected region after the specified number of data blocks has been written to the write-protected region. By automatically protecting the write-protected region after writing the specified number of data blocks, it is possible to prevent unauthorized attempts to write to the write-protected region, thus ensuring data security and integrity in the write-protected region.
    Type: Application
    Filed: August 28, 2015
    Publication date: March 10, 2016
    Inventors: Benish Babu, Yoni Kahana, Hyunsuk Shin
  • Publication number: 20160063281
    Abstract: Systems and methods for improved security for a core in a portable computing device (PCD), such as a core operating a high level operating system (HLOS) are presented. In operation, a monitor module on the SoC is initialized. The monitor module sends a request to the core of the SoC and the monitor module receives a response from the core. A timer in communication with the monitor module is checked. The timer is reset or disabled by the monitor module if the response from the core is received at the monitor module before the expiration of the timer. Otherwise, the monitor module applies at least one security measure to the core as a result of the timer expiring.
    Type: Application
    Filed: August 28, 2014
    Publication date: March 3, 2016
    Inventors: YONI KAHANA, LAURENCE GEOFFREY LUNDBLADE
  • Publication number: 20160065375
    Abstract: Techniques for dynamically validating the integrity of a High Level Operating System (HLOS) stored on a data processing device are provided. The techniques include a method for execution on a data processing device including initiating a boot sequence on the data processing device, reading a code partition from a memory unit in the data processing device, such that the code partition is associated with a HLOS stored in the memory unit, performing a cryptographic function on the code partition, storing a result of the cryptographic function in a secure memory, continuing the boot sequence to load at least a portion of the HLOS into a non-secure memory unit, cryptographically signing the result of the cryptographic function stored in the secure memory unit, and sending the encrypted result of the cryptographic function to a remote server.
    Type: Application
    Filed: August 28, 2014
    Publication date: March 3, 2016
    Inventors: Yoni KAHANA, Erez TSIDON, Elad LEVI
  • Publication number: 20150286823
    Abstract: Various embodiments of methods and systems for modification of instructions and/or data associated with one or more boot stages in a boot sequence are disclosed. The authenticity and integrity of the modified instructions and/or data in certain embodiments may be ensured by using a confidential key and a message authentication code (“MAC”) algorithm to generate a MAC output. The MAC output is compared to an expected MAC associated with the modified instructions and/or data. The confidential key is uniquely associated with the system on a chip (“SoC”) or a component of the SoC. In this way, embodiments of the solution guard against unauthorized modification or replacement of the OEM boot instructions.
    Type: Application
    Filed: May 1, 2014
    Publication date: October 8, 2015
    Applicant: QUALCOMM INCORPORATED
    Inventors: OR ELNEKAVEH, YONI KAHANA, ADI KAROLITSKY