Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Inventor:
Kocher; Paul C.
Address:
San Francisco, CA
No. of patents:
24
Patents:












Patent Number Title Of Patent Date Issued
8571993 Reprogrammable security for controlling piracy and enabling interactive content October 29, 2013
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations tha
8055910 Reprogrammable security for controlling piracy and enabling interactive content November 8, 2011
Technologies to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disk (200) carries an encrypted digital video title combined with data processing operations that implem
7987510 Self-protecting digital content July 26, 2011
Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations tha
7941666 Payment smart cards with hierarchical session key derivation providing security against differen May 10, 2011
Chip cards are used to secure credit and debit payment transactions. To prevent fraudulent transactions, the card must protect cryptographic keys used to authenticate transactions. In particular, cards should resist differential power analysis and/or other attacks. To address security
7792287 Leak-resistant cryptographic payment smartcard September 7, 2010
We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A "self-healing" property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing usefu
7787620 Prevention of side channel attacks against block cipher implementations and other cryptographic August 31, 2010
Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead use
7668310 Cryptographic computation using masking to prevent differential power analysis and other attacks February 23, 2010
Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead use
7634083 Differential power analysis December 15, 2009
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consump
7599488 Differential power analysis October 6, 2009
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consump
7587044 Differential power analysis method and apparatus September 8, 2009
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consump
7506165 Leak-resistant cryptographic payment smartcard March 17, 2009
We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A "self-healing" property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing usefu
7039816 Using smartcards or other cryptographic modules for enabling connected devices to access encrypt May 2, 2006
To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cry
6999943 Routing methods and systems for increasing payment transaction volume and profitability February 14, 2006
Customers often have access to multiple payment methods for any given transaction. In one embodiment of the invention, a merchant obtains information regarding multiple payment methods from a customer, and sends said information to a transaction evaluator. Via computer networks, the
6978370 Method and system for copy-prevention of digital copyright works December 20, 2005
Methods and apparati for marking digital material and for detecting marks therein. For mark detection, the material is divided into a plurality of blocks, to which a non-collision resistant compression function is applied. Compression outputs are placed in a shift register, whose value
6654884 Hardware-level mitigation and DPA countermeasures for cryptographic devices November 25, 2003
Differential power analysis is a powerful cryptanalytic method that can be used to extract secret keys from cryptographic hardware during operation. To reduce the risk of compromise, cryptographic hardware can employ countermeasures to reduce the amount of secret information that can be
6640305 Digital content protection method and apparatus October 28, 2003
Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each
6539092 Leak-resistant cryptographic indexed key update March 25, 2003
Methods and apparatuses for increasing the leak-resistance of cryptographic systems using an indexed key update technique are disclosed. In one embodiment, a cryptographic client device maintains a secret key value as part of its state. The client can update its secret value at any time,
6510518 Balanced cryptographic computational method and apparatus for leak minimizational in smartcards January 21, 2003
Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartca
6381699 Leak-resistant cryptographic method and apparatus April 30, 2002
The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A "self-healing" property is introduced, enabling security to be continually re-established following partial compromises. In addition to
6327661 Using unpredictable information to minimize leakage from smartcards and other cryptosystems December 4, 2001
Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. This is generally accomplished by incorporating unpredictable information into the c
6304658 Leak-resistant cryptographic method and apparatus October 16, 2001
The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A "self-healing" property is introduced, enabling security to be continually re-established following partial compromises. In addition to
6298442 Secure modular exponentiation with leak minimization for smartcards and other cryptosystems October 2, 2001
Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using "branchless"
6289455 Method and apparatus for preventing piracy of digital content September 11, 2001
A secure cryptographic rights unit for cryptographically regulating access to digital content includes an interface control processor and a specialized cryptographic unit that protects access to a memory. Rights keys, which allow access to content, are added by the cryptographic unit
6278783 Des and other cryptographic, processes with leak minimization for smartcards and other cryptosys August 21, 2001
Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses










 
 
  Recently Added Patents
Wind energy system having a connection protection device
Information processing apparatus, including updating of program and program information, and method of updating program of the information processing apparatus
Cap
Method and system for triggering message waiting indicator delivery
Method and system for electronic assistance in dispensing pharmaceuticals
System and method for advertising messages on distributed document processing devices
Control device with adjusting pulse width modulation function and the backlight module thereof
  Randomly Featured Patents
System and method of live data search on a mobile device
Ear warmer with adjustability
Image scanner
Device for separating dirt and debris in flowing media
Rear bumper for an automobile
Furniture panel
Efficient processing of parent-child relationships in a relational database management system
Method and apparatus for securing fiber in an optical network
Diverter handle
Generic framework for EAP