-
公开(公告)号:US20210173576A1
公开(公告)日:2021-06-10
申请号:US17112864
申请日:2020-12-04
Applicant: Cryptography Research, Inc.
Inventor: Benjamin Che-Ming JUN , William Craig RAWLINGS , Ambuj KUMAR , Mark Evan MARSON
Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.
-
公开(公告)号:US20220405404A1
公开(公告)日:2022-12-22
申请号:US17854295
申请日:2022-06-30
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan MARSON , Michael A. HAMBURG
Abstract: Systems and methods for protecting cryptographic keys stored in a non-volatile memory. An example method may comprise: storing a device root key in a non-volatile memory; storing a volatile key in a volatile memory; storing a masked cryptographic key in the non-volatile memory, wherein the masked cryptographic key is produced by combining a cryptographic key and the device root key; storing a masked device root key in the non-volatile memory, wherein the masked root key is produced by combining the device root key and the volatile key; and erasing the device root key from the non-volatile memory.
-
公开(公告)号:US20220293152A1
公开(公告)日:2022-09-15
申请号:US17636982
申请日:2020-08-14
Applicant: Cryptography Research, Inc.
Inventor: Scott C. BEST , Mark Evan MARSON , Joel WITTENAUER
Abstract: A random number generator selects addresses while a ‘scoreboard’ bank of registers (or bits) tracks which addresses have already been output (e.g., for storing or retrieval of a portion of the data.) When the scoreboard detects an address has already been output, a second address which has not been used yet is output rather than the randomly selected one. The second address may be selected from nearby addresses that have not already been output.
-
公开(公告)号:US20230155845A1
公开(公告)日:2023-05-18
申请号:US17915367
申请日:2021-03-26
Applicant: Cryptography Research, Inc.
Inventor: Mark Evan MARSON , Scott C. BEST
CPC classification number: H04L9/3271 , H04L9/0825 , H04L9/3073 , H04L9/3218
Abstract: A prover chip uses a key multiplier value generated by a proof-of-work function from a challenge value, a random number, and elliptic curve cryptography (ECC) techniques to generate a one-time (or ephemeral) use private key. Similarly, a verifier chip uses the key multiplier value generated by an equivalent proof-of-work function, a public key received from the prover, and ECC techniques to derive a one-time use public key that corresponds to the ephemeral private key generated by the prover chip. The prover chip uses the ephemeral private key to sign the second challenge value and send this signed second challenge value to the verifier chip. The verifier verifies the value it receives using the one-time use public key and if the signature on the second challenge value is valid, authenticates the prover chip to a system.
-
公开(公告)号:US20230047575A1
公开(公告)日:2023-02-16
申请号:US17876960
申请日:2022-07-29
Applicant: Cryptography Research, Inc.
Inventor: Benjamin Che-Ming JUN , William Craig RAWLINGS , Ambuj KUMAR , Mark Evan MARSON
Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.
-
公开(公告)号:US20210081547A1
公开(公告)日:2021-03-18
申请号:US16963724
申请日:2019-01-30
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Mark Evan MARSON , Michael A. HAMBURG
Abstract: Systems and methods for protecting cryptographic keys stored in a non-volatile memory. An example method may comprise: storing a device root key in a non-volatile memory; storing a volatile key in a volatile memory; storing a masked cryptographic key in the non-volatile memory, wherein the masked cryptographic key is produced by combining a cryptographic key and the device root key; storing a masked device root key in the non-volatile memory, wherein the masked root key is produced by combining the device root key and the volatile key; and erasing the device root key from the non-volatile memory.
-
公开(公告)号:US20200328163A1
公开(公告)日:2020-10-15
申请号:US16838577
申请日:2020-04-02
Applicant: Cryptography Research, Inc
Inventor: Scott C. BEST , Ming LI , Gary B. BRONNER , Mark Evan MARSON
IPC: H01L23/00
Abstract: An anti-tamper layer is applied to a blank wafer. The layered wafer is then diced into shield dies. A shield die is oxide-to-oxide bonded to the top of an active die such that removing the shield die will damage the active die. The shield die may be sized and positioned such that wirebond pads along one or more edges of the active die remain exposed. The exposed wirebond pads may be used to electrically connect, via wirebonds, the active die to a substrate. A second shield die may be attached to the bottom of the active die to help protect against the use of bottom-to-top delayering.
-
公开(公告)号:US20170249099A1
公开(公告)日:2017-08-31
申请号:US15512041
申请日:2015-08-31
Applicant: CRYPTOGRAPHY RESEARCH, INC.
Inventor: Benjamin Che-Ming JUN , William Craig RAWLINGS , Ambuj KUMAR , Mark Evan MARSON
CPC classification number: G06F3/0637 , G06F3/0622 , G06F3/0688 , G06F21/71 , G06F21/76 , G11C17/16 , G11C17/18
Abstract: A request associated with one or more privileges assigned to a first entity may be received. Each of the one or more privileges may correspond to an operation of an integrated circuit. Information corresponding to the first entity and stored in a memory that is associated with the integrated circuit may be identified. Furthermore, the memory may be programmed to modify the information stored in the memory that is associated with the integrated circuit in response to the request associated with the one or more privileges assigned to the first entity.
-
-
-
-
-
-
-