2024
|
Invention
|
Protection of neural networks by obfuscation of activation functions.
Aspects of the present dis... |
|
Invention
|
Supply chain security manager.
A system receives, from a first provisioning entity, a request fo... |
|
Invention
|
Reconfigurable processing units for efficient support of multiple post-quantum cryptographic algo... |
|
Invention
|
Protection of homomorphic encryption computations by masking without unmasking.
Aspects and impl... |
|
Invention
|
Functions with a pre-charge operation and an evaluation operation.
An input data may be received... |
|
Invention
|
Low latency metadata decryption using hash and pseudorandom functions.
Systems and techniques fo... |
|
Invention
|
Protection of secret data using unprotected data path.
Disclosed systems and techniques include ... |
|
Invention
|
Generating a target data based on a function associated with a physical variation of a device.
A... |
|
Invention
|
Provisioning a volatile security context in a root of trust.
A first device receives, from a sec... |
|
Invention
|
Cryptographic key usage management. A system limits the use (e.g., number of encryptions and/or d... |
|
Invention
|
Determining a physically unclonable function (puf) selection vector.
Technologies for generating... |
|
Invention
|
Integrity tree architecture for data authentication. Technologies for providing an integrity tree... |
2023
|
Invention
|
Structural control flow integrity for protection against code reuse attacks. Systems and techniqu... |
|
Invention
|
Obfuscation of data in a memory.
A request to perform a memory operation addressed to a first ad... |
|
Invention
|
Performing verified restore of data assets in a cryptographic device.
A first platform receives ... |
|
Invention
|
Unlimited reprovisionable hardware root of trust.
Technologies for protecting a secure context i... |
|
Invention
|
Split counters with dynamic epoch tracking for cryptographic protection of secure data.
Aspects ... |
|
Invention
|
Protection of polynomial cryptographic operations against side-channel attacks with change-of-var... |
|
Invention
|
Integrity-protection authentication through intermediate states. Technologies for protecting data... |
|
Invention
|
Verifiable remote resource management for cryptographic devices.
Aspects of the present disclosu... |
|
Invention
|
Securely provisioning a secure data asset to a target device using an authorization token.
A req... |
|
Invention
|
Secure feature and key management in integrated circuits. A mechanism for providing secure featur... |
|
Invention
|
Encryption of error correction data using symbol-level ciphers.
Aspects and implementations incl... |
|
Invention
|
Providing access to a hardware resource based on a canary value. A container corresponding to exe... |
|
Invention
|
Multiplicative masking for cryptographic operations.
A value corresponding to an input for a cry... |
|
Invention
|
Techniques and devices for configurable memory encryption and authentication. Disclosed systems a... |
2022
|
Invention
|
Multi-platform use case implementations to securely provision a secure data asset to a target dev... |
|
Invention
|
Masking of key generation operations with random matrices in cryptographic applications.
Disclos... |
|
Invention
|
Batch transfer of commands and data in a secure computer system. A computing system includes a ho... |
|
Invention
|
Data flow control module for autonomous flow control of multiple dma engines.
A DMA system inclu... |
|
Invention
|
Pipelined hardware error classification and handling.
Technologies for detecting and classifying... |
|
Invention
|
Using cryptographic blinding for efficient use of montgomery multiplication. Aspects of the prese... |
|
Invention
|
Low-latency multi-domain masking. A multi-domain masked AND gate includes inner-domain calculatio... |
|
Invention
|
Physically uncloneable function as secure storage. Multiple helper data solutions (a.k.a., helper... |
|
Invention
|
Efficient integrity monitoring of processing operations with multiple memory arrays.
Disclosed s... |
|
Invention
|
Entropy distribution.
Technologies for selectively distributing a same random number to multiple... |
|
Invention
|
Packaging techniques for backside mesh connectivity.
The embodiments herein are directed to tech... |
|
Invention
|
Secure asset management infrastructure for enforcing access control policies.
An application exe... |
|
Invention
|
Secure asset management infrastructure for enforcing access control policies. An application exec... |
|
Invention
|
Low-latency multi-key encryption and decryption engine and techniques. Disclosed systems and tech... |
|
Invention
|
Protection of cryptographic substitution-permutation networks from fault injection attacks.
Aspe... |
|
Invention
|
Managing privileges of different entities for an integrated circuit. A request associated with on... |
|
Invention
|
Multi-lane cryptographic engines with systolic architecture and operations thereof.
Aspects of t... |
2021
|
Invention
|
Protection of neural networks by obfuscation of neural network operations and architecture.
Aspe... |
|
Invention
|
Protection of transformations by intermediate randomization in cryptographic operations.
Aspects... |
|
Invention
|
System and method to improve efficiency in multiplication_ladder-based cryptographic operations. ... |
|
Invention
|
Authentication using an ephemeral asymmetric keypair.
A prover chip uses a key multiplier value ... |
|
Invention
|
Correcting the almost binary extended greatest common denominator (gcd).
Computing devices, meth... |
|
Invention
|
Authentication timers.
A first device transmits a first message to a second device as part of a ... |
2020
|
Invention
|
Encrypted physically unclonable function circuit helper data.
Multiple helper data solutions (a.... |
2015
|
P/S
|
Apparatus for recording, transmission or reproduction of sound or images, namely, portable and ha... |
|
P/S
|
Technical support services, namely, computer hardware installation and repair; technological serv... |
2013
|
P/S
|
Hardware and software design and development; electronic
design services for security purposes i... |
|
P/S
|
Hardware and software design and development; electronic design services for security purposes in... |
2009
|
P/S
|
Computer hardware; integrated circuit design and development
software; integrated circuit module... |
|
P/S
|
computer hardware; blank smart cards; encoded smart cards containing programming used to secure t... |
|
P/S
|
computer hardware; integrated circuits; microprocessors; central processing units; integrated cir... |
|
P/S
|
Computer hardware; computer hardware for electronic security functions; blank smart cards; encode... |