-
11.
公开(公告)号:US20210271542A1
公开(公告)日:2021-09-02
申请号:US16972560
申请日:2019-06-05
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
公开(公告)号:US20190238347A1
公开(公告)日:2019-08-01
申请号:US16339172
申请日:2017-10-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Helena Handschuh
CPC classification number: H04L9/3271 , H04L9/0822 , H04L9/0827 , H04L2209/80
Abstract: An encrypted sequence that includes an authentication key may be received. A base key stored at a device may be identified and the encrypted sequence may be decrypted with the base key to obtain the authentication key. A challenge value may be received and the authentication key may be combined with the challenge value to generate a device ephemeral key. An authentication result may be generated for the device based on a combination of the device ephemeral key and the challenge value. Furthermore, the authentication result may be transmitted to a mobile network to authenticate the device.
-
公开(公告)号:US10120985B2
公开(公告)日:2018-11-06
申请号:US14415568
申请日:2013-07-17
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Paul C. Kocher , Helena Handschuh
IPC: G06F21/10
Abstract: A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller sends a message in response to the rendering device reading an authorization file. The message being for the rendering device to read a portion of data from the memory and to provide the portion of data to the media security controller. The media security controller receives the portion of the data from the rendering device, trans forms the portion of the data, and sends the transformed portion of the data to the rendering device.
-
公开(公告)号:US20170011394A1
公开(公告)日:2017-01-12
申请号:US15203722
申请日:2016-07-06
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Philippe Martineau , William Craig Rawlings , Helena Handschuh
CPC classification number: G06Q20/3829 , G06Q20/3227 , G06Q20/401 , G06Q2220/00 , H04L9/3242 , H04L2209/56 , H04W12/04 , H04W12/06
Abstract: A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated. First transaction data corresponding to a first transaction associated with the mobile device may be received. Furthermore, the first dynamic key may be updated to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction. Authentication of a second transaction associated with the mobile device may be requested based on the second dynamic key.
Abstract translation: 可以接收存储在移动设备处的基本密钥。 可以生成基于基本密钥的第一动态密钥。 可以接收对应于与移动设备相关联的第一事务的第一交易数据。 此外,可以基于第一动态密钥和对应于第一事务的第一事务数据的组合来更新第一动态密钥以生成第二动态密钥。 可以基于第二动态密钥来请求与移动设备相关联的第二事务的认证。
-
公开(公告)号:US12056219B2
公开(公告)日:2024-08-06
申请号:US17553545
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
16.
公开(公告)号:US12013751B2
公开(公告)日:2024-06-18
申请号:US16972560
申请日:2019-06-05
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
CPC classification number: G06F11/10 , H04L9/0866 , H04L9/3278
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
公开(公告)号:US11539535B2
公开(公告)日:2022-12-27
申请号:US16339172
申请日:2017-10-05
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Philippe Alain Martineau , Helena Handschuh
Abstract: An encrypted sequence that includes an authentication key may be received. A base key stored at a device may be identified and the encrypted sequence may be decrypted with the base key to obtain the authentication key. A challenge value may be received and the authentication key may be combined with the challenge value to generate a device ephemeral key. An authentication result may be generated for the device based on a combination of the device ephemeral key and the challenge value. Furthermore, the authentication result may be transmitted to a mobile network to authenticate the device.
-
公开(公告)号:US20220398339A1
公开(公告)日:2022-12-15
申请号:US17834511
申请日:2022-06-07
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Described are implementations directed to protecting secret data against adversarial attacks by obfuscating the secret data during storage and communication. Obfuscation techniques include, among other things, splitting secret data into a plurality of portions, performing rotation of secret data, splitting secret data into a plurality of shares, modifying shares of secret data in view of the values of the shares, and various other protection mechanisms.
-
公开(公告)号:US20220006628A1
公开(公告)日:2022-01-06
申请号:US17305416
申请日:2021-07-07
Applicant: Cryptography Research, Inc.
Inventor: Helena Handschuh
Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.
-
公开(公告)号:US11063755B2
公开(公告)日:2021-07-13
申请号:US16405065
申请日:2019-05-07
Applicant: Cryptography Research, Inc.
Inventor: Helena Handschuh
Abstract: An indication of a key generation function may be received from a server. A random value may be received based on a volatile memory of a device. A cryptographic key may be generated based on the key generation function from the server and the random value that is based on the volatile memory of the device. The cryptographic key may be stored at a non-volatile memory of the device.
-
-
-
-
-
-
-
-
-