Changeflow GovPing Telecom & Technology Verifiable Cryptographic Obfuscation Methods Us...
Routine Notice Added Final

Verifiable Cryptographic Obfuscation Methods Using PUF and LPN Encryption

Favicon for changeflow.com USPTO Patent Applications - Networking (H04L)
Published
Detected
Email

Summary

The USPTO published patent application US20260100853A1 for verifiable cryptographic obfuscation methods using physically unclonable functions (PUF) and Learning Parity with Noise (LPN) encryption. The invention covers systems that verify obfuscation integrity by comparing corrected and corrupted PRG outputs via Hamming distance analysis. Technology companies and patent professionals should review for prior art and licensing implications.

What changed

The USPTO published patent application US20260100853A1 for methods and systems enabling verifiable cryptographic obfuscation. The invention describes an obfuscator system that receives obfuscated programs with embedded LPN-encrypted PRG inputs, uses PUF-generated error vectors, and verifies program integrity by computing Hamming distance between corrected and corrupted PRG outputs.

Technology companies developing cryptographic security systems, obfuscation tools, or blockchain/DRM applications should monitor this application for prior art implications. Patent applicants and IP professionals should assess whether this filing could affect freedom-to-operate for existing or planned cryptographic products. The filing date of October 7, 2024, establishes priority status for the disclosed verifiable obfuscation methods.

What to do next

  1. Monitor patent prosecution status for grant or office action
  2. Review for prior art relevance to cryptographic systems
  3. Evaluate potential licensing opportunities

Archived snapshot

Apr 10, 2026

GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.

← USPTO Patent Applications

VERIFIABLE CRYPTOGRAPHIC OBFUSCATION

Application US20260100853A1 Kind: A1 Apr 09, 2026

Inventors

Vipin Singh Sehrawat

Abstract

Methods, systems, and apparatus for verifiable cryptographic obfuscation. In one aspect, am obfuscator system receives an obfuscated program, a public seed and a secret seed, the public seed comprising a LPN encryption of a PRG input that is embedded in the obfuscated program, where the LPN encryption of the PRG input is generated using an error vector generated by physically unclonable function (PUF) included in the obfuscator system. The system computes a corrected PRG output obtained by evaluating the PRG on the LPN encryption of the PRG input using the public seed. The system predicts the error vector generated by the PUF and computes a corrupted PRG output obtained by evaluating the PRG on an LPN encryption of the PRG input and the predicted error vector. The system verifies the obfuscation of the program based on a Hamming distance between the corrected PRG output and the corrupted PRG output.

CPC Classifications

H04L 9/3278 H04L 9/30

Filing Date

2024-10-07

Application No.

18908221

View original document →

Get daily alerts for USPTO Patent Applications - Networking (H04L)

Daily digest delivered to your inbox.

Free. Unsubscribe anytime.

About this page

What is GovPing?

Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission

What's from the agency?

Source document text, dates, docket IDs, and authority are extracted directly from USPTO.

What's AI-generated?

The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.

Last updated

Classification

Agency
USPTO
Published
October 7th, 2024
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Minor
Document ID
US20260100853A1

Who this affects

Applies to
Technology companies Legal professionals
Industry sector
5112 Software & Technology
Activity scope
Patent examination Cryptographic systems Security verification
Geographic scope
United States US

Taxonomy

Primary area
Intellectual Property
Operational domain
Legal
Topics
Cybersecurity Data Privacy

Get alerts for this source

We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.

Free. Unsubscribe anytime.

You're subscribed!