-
公开(公告)号:US10460084B2
公开(公告)日:2019-10-29
申请号:US16122362
申请日:2018-09-05
Applicant: Cryptography Research, Inc.
Inventor: Paul C. Kocher , Helena Handschuh
Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.
-
22.
公开(公告)号:US20150178478A1
公开(公告)日:2015-06-25
申请号:US14415568
申请日:2013-07-17
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Paul C. Kocher , Helena Handschuh
IPC: G06F21/10
CPC classification number: G06F21/10 , G06F2221/0724
Abstract: A media storage device includes a media security controller and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller sends a message in response to the rendering device reading an authorization file. The message being for the rendering device to read a portion of data from the memory and to provide the portion of data to the media security controller. The media security controller receives the portion of the data from the rendering device, trans forms the portion of the data, and sends the transformed portion of the data to the rendering device.
Abstract translation: 媒体存储设备包括媒体安全控制器和用于存储与由呈现设备呈现的媒体项目相关的数据的存储器。 媒体安全控制器响应于渲染设备读取授权文件发送消息。 该消息用于呈现设备从存储器读取一部分数据并将该部分数据提供给媒体安全控制器。 媒体安全控制器从呈现设备接收数据的一部分,转换形成数据的一部分,并将转换后的部分数据发送到呈现设备。
-
公开(公告)号:US20240419831A1
公开(公告)日:2024-12-19
申请号:US18818336
申请日:2024-08-28
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
24.
公开(公告)号:US20240345916A1
公开(公告)日:2024-10-17
申请号:US18644084
申请日:2024-04-23
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Scott C. Best , Helena Handschuh , Winthrop John Wu
CPC classification number: G06F11/10 , H04L9/0866 , H04L9/3278
Abstract: A value corresponding to a physical variation of a device may be received. Furthermore, helper data associated with the physical variation of the device may be received. A result data may be generated based on a combination of the value corresponding to the physical variation of the device and the helper data. An error correction operation may be performed on the result data to identify one or more code words associated with the error correction operation. Subsequently, a target data may be generated based on the one or more code words.
-
25.
公开(公告)号:US20240078308A1
公开(公告)日:2024-03-07
申请号:US18267773
申请日:2021-12-16
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
IPC: G06F21/55
CPC classification number: G06F21/55
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
公开(公告)号:US11521203B2
公开(公告)日:2022-12-06
申请号:US15203722
申请日:2016-07-06
Applicant: Cryptography Research, Inc.
Inventor: Ambuj Kumar , Philippe Martineau , William Craig Rawlings , Helena Handschuh
Abstract: A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated. First transaction data corresponding to a first transaction associated with the mobile device may be received. Furthermore, the first dynamic key may be updated to generate a second dynamic key based on a combination of the first dynamic key and the first transaction data corresponding to the first transaction. Authentication of a second transaction associated with the mobile device may be requested based on the second dynamic key.
-
公开(公告)号:US20220198045A1
公开(公告)日:2022-06-23
申请号:US17553536
申请日:2021-12-16
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan Marson , Michael Alexander Hamburg , Helena Handschuh
IPC: G06F21/62
Abstract: Aspects of the present disclosure involve implementations that may be used to protect neural network models against adversarial attacks by obfuscating neural network operations and architecture. Obfuscation techniques include obfuscating weights and biases of neural network nodes, obfuscating activation functions used by neural networks, as well as obfuscating neural network architecture by introducing dummy operations, dummy nodes, and dummy layers into the neural networks.
-
公开(公告)号:US20210056053A1
公开(公告)日:2021-02-25
申请号:US16935925
申请日:2020-07-22
Applicant: Cryptography Research, Inc.
Inventor: Mark E. Marson , Scott Best , Winthrop Wu , Matthew Evan Orzen , Helena Handschuh
Abstract: Described herein are technologies for application authentication and/or data encryption without stored pre-shared keys. In one resource controller, a processing device receives an application identifier (ID) from the application. The processing device provides a current nonce responsive to the application ID and provides the application access to the system resource responsive to determining that a hash of a current key received from the application equals a current tag. The current key is generated by the application based on code of the application and the current nonce. The current tag was previously provided from the application to the resource controller. The current tag can also be hashed by the application using the current key.
-
公开(公告)号:US10902096B2
公开(公告)日:2021-01-26
申请号:US16665113
申请日:2019-10-28
Applicant: Cryptography Research, Inc.
Inventor: Paul C. Kocher , Helena Handschuh
IPC: G06F21/10
Abstract: A media storage device includes a media security controller circuit and a memory to store data that relates to a media item to be rendered by a rendering device. The media security controller circuit sends a message to the rendering device that causes the rendering device to obtain a portion of data from memory of the media storage device and provide it to the media security controller circuit. The portion is received and transformed by the media security controller circuit. The media security controller circuit sends the transformed portion to the rendering device.
-
-
-
-
-
-
-
-