1
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Method and apparatus for preventing piracy of digital content. Crypotography Research, Joseph Yang, Thomas R Lane, Skadden Arps, September 11, 2001: US06289455 (324 worldwide citation)

A secure cryptographic rights unit for cryptographically regulating access to digital content includes an interface control processor and a specialized cryptographic unit that protects access to a memory. Rights keys, which allow access to content, are added by the cryptographic unit by transforming ...


2
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, August 21, 2001: US06278783 (147 worldwide citation)

Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit key ...


3
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Using unpredictable information to minimize leakage from smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps et al, December 4, 2001: US06327661 (102 worldwide citation)

Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. This is generally accomplished by incorporating unpredictable information into the cryptographic pro ...


4
Paul C Kocher: Leak-resistant cryptographic indexed key update. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, March 25, 2003: US06539092 (95 worldwide citation)

Methods and apparatuses for increasing the leak-resistance of cryptographic systems using an indexed key update technique are disclosed. In one embodiment, a cryptographic client device maintains a secret key value as part of its state. The client can update its secret value at any time, for example ...


5
Erik Cota Robles, Sebastian Schoenberg, Stalinselvaraj Jeyasingh, Alain Kagi, Michael Kozuch, Gilbert Neiger, Richard Uhlig: Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor. Intel Corporation, Thomas R Lane, March 13, 2007: US07191440 (79 worldwide citation)

Transitions among schedulable entities executing in a computer system are tracked in computer hardware or in a virtual machine monitor. In one aspect, the schedulable entities are operating system processes and threads, virtual machines, and instruction streams executing on the hardware. In another ...


6
Don J Nguyen: Method and apparatus for providing multiple output voltages from a voltage regulator. Intel Corporation, Thomas R Lane, July 13, 1999: US05923545 (63 worldwide citation)

A voltage regulator illustrating one embodiment of the apparatus of the present invention is described. The voltage regulator includes an output stage for providing a primary output voltage on a primary output terminal and a secondary output voltage on a secondary output terminal, a switch for charg ...


7
Paul C Kocher, Joshua M Jaffe: Secure modular exponentiation with leak minimization for smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps et al, October 2, 2001: US06298442 (62 worldwide citation)

Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using “branchless” or fixed exe ...


8
Darrell D Boggs, Douglas M Carmean, Per H Hammarlund, Francis X McKeen, David J Sager, Ronak Singhal: Breaking replay dependency loops in a processor using a rescheduled replay queue. Intel Corporation, Thomas R Lane, December 27, 2005: US06981129 (62 worldwide citation)

Breaking replay dependency loops in a processor using a rescheduled replay queue. The processor comprises a replay queue to receive a plurality of instructions, and an execution unit to execute the plurality of instructions. A scheduler is coupled between the replay queue and the execution unit. The ...


9
Joshua M Jaffe, Paul C Kocher, Benjamin C Jun: Balanced cryptographic computational method and apparatus for leak minimizational in smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, January 21, 2003: US06510518 (60 worldwide citation)

Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcards and many ...


10
Rajesh S Madukkarumukumana, Ioannis Schoinas, Gilbert Neiger: Interrupt redirection for virtual partitioning. Intel Corporation, Thomas R Lane, May 22, 2007: US07222203 (37 worldwide citation)

The present disclosure relates to the handling of interrupts in a environment that utilizes virtual machines, and, more specifically, to the steering of interrupts between multiple logical processors running virtual machines.