Verifiable Cryptographic Obfuscation Patent Using Physically Unclonable Function
Summary
The USPTO published patent application US20260100854A1 for Vipin Singh Sehrawat's verifiable cryptographic obfuscation system using physically unclonable functions (PUFs). The patent covers methods for generating error vectors via PUF circuits to enable LPN encryption verification of PRG outputs using Hamming distance analysis.
What changed
The USPTO published patent application US20260100854A1 disclosing a system and method for verifiable cryptographic obfuscation using physically unclonable functions (PUFs). The invention enables obfuscator systems to receive obfuscated programs with embedded public and secret seeds, generate error vectors via PUF circuits, perform LPN encryption of PRG inputs, and verify obfuscation integrity through Hamming distance comparisons between corrected and corrupted PRG outputs.
Manufacturers of hardware security components and technology companies developing embedded systems should review this patent's claims for potential licensing implications or alternative design considerations to avoid infringement on the disclosed PUF-based cryptographic verification methods.
What to do next
- Monitor for patent grant confirmation
- Review claims for freedom-to-operate analysis
Archived snapshot
Apr 10, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
VERIFIABLE CRYPTOGRAPHIC OBFUSCATION
Application US20260100854A1 Kind: A1 Apr 09, 2026
Inventors
Vipin Singh Sehrawat
Abstract
Methods, systems, and apparatus for verifiable cryptographic obfuscation. In one aspect, am obfuscator system receives an obfuscated program, a public seed and a secret seed, the public seed comprising a LPN encryption of a PRG input that is embedded in the obfuscated program, where the LPN encryption of the PRG input is generated using an error vector generated by physically unclonable function (PUF) included in the obfuscator system. The system computes a corrected PRG output obtained by evaluating the PRG on the LPN encryption of the PRG input using the public seed. The system predicts the error vector generated by the PUF and computes a corrupted PRG output obtained by evaluating the PRG on an LPN encryption of the PRG input and the predicted error vector. The system verifies the obfuscation of the program based on a Hamming distance between the corrected PRG output and the corrupted PRG output.
CPC Classifications
H04L 9/3278 H04L 9/30
Filing Date
2025-11-18
Application No.
19393295
Related changes
Get daily alerts for USPTO Patent Applications - Networking (H04L)
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from USPTO.
The plain-English summary, classification, and "what to do next" steps are AI-generated from the original text. Cite the source document, not the AI analysis.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when USPTO Patent Applications - Networking (H04L) publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.