Patents by Inventor Yves Rene
Yves Rene has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902412Abstract: Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.Type: GrantFiled: May 26, 2022Date of Patent: February 13, 2024Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Yann Yves Rene Loisel, Frank Lhermet
-
Patent number: 11624399Abstract: The present invention relates to a mechanical system (1), comprising a bearing (4) and a shaft (10) coupled to the bearing (4), especially for an internal combustion engine, being subjected to average contact pressures of less than 200 MPa. The shaft (10) has at least one area (12) provided with an anti-seizing surface coating (20), having a surface hardness at least twice that of the bearing (4), and a microtexturation (30) comprised of a set of individual microcavities (31), distributed in said area (12). The invention also relates to a method for manufacturing such a mechanical system (1).Type: GrantFiled: July 3, 2018Date of Patent: April 11, 2023Assignee: H.E.F.Inventors: Mohamadou Bocar Diew, Yves René Alexis Gachon, Fabrice Prost
-
Publication number: 20220286270Abstract: Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.Type: ApplicationFiled: May 26, 2022Publication date: September 8, 2022Applicant: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Yann Yves Rene Loisel, Frank Lhermet
-
Patent number: 11349635Abstract: Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.Type: GrantFiled: October 8, 2019Date of Patent: May 31, 2022Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Yann Yves Rene Loisel, Frank Lhermet
-
Patent number: 11171780Abstract: Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as simple power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem.Type: GrantFiled: May 6, 2020Date of Patent: November 9, 2021Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Frank Lhermet, Yann Yves Rene Loisel
-
Patent number: 11115210Abstract: Presented are systems and methods for protecting secret data that is stored in memory to prevent unauthorized access and data manipulation. Various embodiments may be applied to hide or mask an RSA exponent used for public key cryptography and stored in a cryptographic hardware block that uses a non-erasable working memory for computations. In certain embodiments, masking RSA exponents is accomplished by a two-step process that combines a specifically calculated, random and secret value with the secret exponent. The random value is stored in an erasable memory, such that in case of attack, both the erasable memory and the non-erasable memory do not leak any embedded secrets. The additional expenditure of memory resources only insignificantly affects system performance.Type: GrantFiled: July 18, 2018Date of Patent: September 7, 2021Assignee: Maxim Integrated Products, Inc.Inventors: Yann Yves Rene Loisel, Frank Lhermet, Jeremy Dubeuf
-
Patent number: 11023567Abstract: Presented are software intellectual property (IP) protection systems and methods that prevent potential attackers as well as customers from having access to plain text versions of both library source code and binary code. Potential attackers are prevented from reusing the software on other platforms. The protection mechanism does not impact the functionality or the performance of the library itself and does not interfere with existing software update mechanisms or application developer tools, such as Joint Test Action Group (JTAG).Type: GrantFiled: July 18, 2018Date of Patent: June 1, 2021Assignee: Maxim Integrated Products, Inc.Inventors: Yann Yves Rene Loisel, Frank Lhermet, Stephane Di Vito, Vincent Albanese
-
Publication number: 20200266986Abstract: Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as simple power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem.Type: ApplicationFiled: May 6, 2020Publication date: August 20, 2020Applicant: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Frank Lhermet, Yann Yves Rene Loisel
-
Patent number: 10680819Abstract: Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as sample power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem.Type: GrantFiled: August 22, 2017Date of Patent: June 9, 2020Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Frank Lhermet, Yann Yves Rene Loisel
-
Publication number: 20200132111Abstract: The present invention relates to a mechanical system (1), comprising a bearing (4) and a shaft (10) coupled to the bearing (4), especially for an internal combustion engine, being subjected to average contact pressures of less than 200 MPa. The shaft (10) has at least one area (12) provided with an anti-seizing surface coating (20), having a surface hardness at least twice that of the bearing (4), and a microtexturation (30) comprised of a set of individual microcavities (31), distributed in said area (12). The invention also relates to a method for manufacturing such a mechanical system (1).Type: ApplicationFiled: July 3, 2018Publication date: April 30, 2020Applicant: H.E.F.Inventors: Mohamadou Bocar DIEW, Yves René Alexis GACHON, Fabrice PROST
-
Publication number: 20200112425Abstract: Described herein are systems and methods that prevent against fault injection attacks. In various embodiments this is accomplished by taking advantage of the fact that an attacker cannot utilize a result that has been faulted to recover a secret. By using infective computation, an error is propagated in a loop such that the faulted value will provide to the attacker no useful information or information from which useful information may be extracted. Faults from a fault attack will be so large that a relatively large number of bits will change. As a result, practically no secret information can be extracted by restoring bits.Type: ApplicationFiled: October 8, 2019Publication date: April 9, 2020Applicant: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Yann Yves Rene Loisel, Frank Lhermet
-
Publication number: 20200067693Abstract: Presented are low-cost secure systems and methods that protect cryptographic systems against attacks that seek to exploit the shortcomings of common software-based erasure mechanisms. Various embodiments, protect an Elliptic-Curve Cryptography (ECC) secret from fault attacks. This may be accomplished, for example, by not exposing ECC secrets from the Modular Arithmetic Accelerator (MAA) memory after a Destructive Reset Source (DRS).Type: ApplicationFiled: August 21, 2019Publication date: February 27, 2020Applicant: Maxim Integrated Products, Inc.Inventors: Frank Lhermet, Jeremy Dubeuf, Yann Yves Rene Loisel
-
Publication number: 20190044717Abstract: Presented are systems and methods for protecting secret data that is stored in memory to prevent unauthorized access and data manipulation. Various embodiments may be applied to hide or mask an RSA exponent used for public key cryptography and stored in a cryptographic hardware block that uses a non-erasable working memory for computations. In certain embodiments, masking RSA exponents is accomplished by a two-step process that combines a specifically calculated, random and secret value with the secret exponent. The random value is stored in an erasable memory, such that in case of attack, both the erasable memory and the non-erasable memory do not leak any embedded secrets. The additional expenditure of memory resources only insignificantly affects system performance.Type: ApplicationFiled: July 18, 2018Publication date: February 7, 2019Applicant: Maxim Integrated Products, Inc.Inventors: Yann Yves Rene Loisel, Frank Lhermet, Jeremy Dubeuf
-
Publication number: 20190042712Abstract: Presented are software IP protection systems and methods that prevent potential attackers as well as customers from having access to plain text versions of both library source code and binary code. Potential attackers are prevented from reusing the software on other platforms. The protection mechanism does not impact the functionality or the performance of the library itself and does not interfere with existing software update mechanisms or application developer tools, such as JTAG.Type: ApplicationFiled: July 18, 2018Publication date: February 7, 2019Applicant: Maxim Integrated Products, Inc.Inventors: Yann Yves Rene Loisel, Frank Lhermet, Stephane Di Vito, Vincent Albanese
-
Patent number: 10044682Abstract: A method for distributing a piece of content in a content distribution network, provided by a source entity of which the integrity is ensured by means of a private key, the method comprising the following steps implemented by a content distribution entity: —receiving a request to access the piece of content from a user device; —sending, to a proxy entity, a request to have at least one piece of data signed by means of the private key; —receiving the at least one piece of signed data, the at least one piece of signed data certifying the integrity of said distribution entity for the user device; —sending a public key associated with the private key to the user device; —sending the at least one piece of signed data to the user device and distributing the content to the user device.Type: GrantFiled: May 28, 2014Date of Patent: August 7, 2018Assignee: OrangeInventors: Yves-Rene L'Azou, Benoit Gaussen, Sebastien Cubaud
-
Publication number: 20180080704Abstract: A modular interconnecting refrigeration system assembling two or more individual sub-units in place to function and appear as a larger refrigeration unit. Individual sub-units are easily carried though the smaller openings of older buildings. Assembled sub-units may integrate utility systems (electricity, water, data) and coolant systems (coolant, ventilation).Type: ApplicationFiled: September 19, 2017Publication date: March 22, 2018Inventor: Yves RENE
-
Publication number: 20180062844Abstract: Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as sample power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem.Type: ApplicationFiled: August 22, 2017Publication date: March 1, 2018Applicant: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Frank Lhermet, Yann Yves Rene Loisel
-
Patent number: 9832027Abstract: Embodiments of the invention prevent unauthorized access to electronic systems by providing an enclosure with improved intrusion detection around sensitive areas of a secured electronic system. Certain embodiments eliminate the need for constant battery power and yet provide uninterrupted high-security supervision at the device perimeter such that even following a power down event it is possible to determine whether a device has been tampered with, so that appropriate action can be taken. This is especially useful in applications in which batteries are not acceptable.Type: GrantFiled: September 9, 2015Date of Patent: November 28, 2017Assignee: Maxim Integrated Products, Inc.Inventors: Yann Yves Rene Loisel, Frank Lhermet, Alain-Christophe Rollet
-
Patent number: 9716584Abstract: Various embodiments of the invention implement countermeasures designed to withstand attacks by potential intruders who seek partial or full retrieval of elliptic curve secrets by using known methods that exploit system vulnerabilities, including elliptic operation differentiation, dummy operation detection, lattice attacks, and first real operation detection. Various embodiments of the invention provide resistance against side-channel attacks, such as sample power analysis, caused by the detectability of scalar values from information leaked during regular operation flow that would otherwise compromise system security. In certain embodiments, system immunity is maintained by performing elliptic scalar operations that use secret-independent operation flow in a secure Elliptic Curve Cryptosystem.Type: GrantFiled: June 19, 2015Date of Patent: July 25, 2017Assignee: Maxim Integrated Products, Inc.Inventors: Jeremy Dubeuf, Frank Lhermet, Yann Yves Rene Loisel
-
Publication number: 20170105367Abstract: There is provided a sap collecting device that is configured to be fastened into a tap hole of a tree.Type: ApplicationFiled: October 19, 2016Publication date: April 20, 2017Inventors: Yves RENE, Claude HOULE