Patents by Inventor Anthony Fascenda

Anthony Fascenda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9763067
    Abstract: Methods, apparatus, and systems for the enablement of sending and receiving encrypted messages over Long/Short Wave, Low, High, Very High, or Ultra High Frequency Radio (LSW/HFR) provide for an interconnect between short or other message transmission over LSW/HFR, and other terrestrial or satellite based digital communications systems.
    Type: Grant
    Filed: May 28, 2014
    Date of Patent: September 12, 2017
    Assignee: Protected Mobility, LLC
    Inventors: William J. Marlow, Robert Cichielo, Paul Benware, Anthony Fascenda, Emil Sturniolo
  • Patent number: 9565230
    Abstract: A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet.
    Type: Grant
    Filed: August 20, 2010
    Date of Patent: February 7, 2017
    Assignee: KOOLSPAN, INC.
    Inventors: Emil Sturniolo, Anthony Fascenda, Robert Cichielo, Paul Benware, William Supernor, Orville Pike
  • Publication number: 20160249189
    Abstract: Methods, apparatus, and systems for the enablement of sending and receiving encrypted messages over Long/Short Wave, Low, High, Very High, or Ultra High Frequency Radio (LSW/HFR) provide for an interconnect between short or other message transmission over LSW/HFR, and other terrestrial or satellite based digital communications systems.
    Type: Application
    Filed: May 28, 2014
    Publication date: August 25, 2016
    Applicant: Protected Mobility, LLC
    Inventors: William J. MARLOW, Robert CICHIELO, Paul BENWARE, Anthony FASCENDA, Emil STURNIOLO
  • Patent number: 9338005
    Abstract: Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided.
    Type: Grant
    Filed: July 31, 2009
    Date of Patent: May 10, 2016
    Assignee: KOOLSPAN, INC.
    Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Patent number: 9160719
    Abstract: Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications.
    Type: Grant
    Filed: July 22, 2013
    Date of Patent: October 13, 2015
    Assignee: PROTECTED MOBILITY, LLC
    Inventors: William J. Marlow, Robert Cichielo, Emil Sturniolo, Paul Benware, Anthony Fascenda
  • Publication number: 20140025952
    Abstract: Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications.
    Type: Application
    Filed: July 22, 2013
    Publication date: January 23, 2014
    Applicant: Protected Mobility, LLC
    Inventors: William J. MARLOW, Robert CICHIELO, Emil STURNIOLO, Paul BENWARE, Anthony FASCENDA
  • Patent number: 8548002
    Abstract: A method of processing a codec sample is provided. The method includes: removing from a first portion of the codec sample, a first number of first information bits. The first information bits are indicative of frame information associated with the codec sample. The method also includes inserting at the first portion of the codec sample from a second portion of the codec sample, a second number of data bits. The first number of the first information bits is greater than or equal to the second number of the data bits. The method also includes removing the second portion of the codec sample. The method may also include encrypting and decrypting the codec sample. In some embodiments, the codec sample is an adaptive multi-rate codec sample. In some embodiments, the adaptive multi-rate codec sample is a 5.15 mode adaptive multi-rate codec sample.
    Type: Grant
    Filed: February 8, 2008
    Date of Patent: October 1, 2013
    Assignee: Koolspan, Inc.
    Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Patent number: 8364978
    Abstract: A system for and method of registering devices an applications with cryptographic modules is presented. The system and method prevent devices and applications from operating in conjunction with cryptographic modules unless such devices and applications have previously been registered with the module.
    Type: Grant
    Filed: November 26, 2008
    Date of Patent: January 29, 2013
    Assignee: KOOLSPAN, Inc.
    Inventors: Anthony Fascenda, Emil Sturniolo
  • Publication number: 20110044453
    Abstract: A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet.
    Type: Application
    Filed: August 20, 2010
    Publication date: February 24, 2011
    Applicant: KOOLSPAN, Inc.
    Inventors: Emil Sturniolo, Anthony Fascenda, Robert Cichielo, Paul Benware
  • Publication number: 20100031063
    Abstract: Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided.
    Type: Application
    Filed: July 31, 2009
    Publication date: February 4, 2010
    Applicant: Koolspan, Inc.
    Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Publication number: 20090268902
    Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.
    Type: Application
    Filed: April 25, 2008
    Publication date: October 29, 2009
    Applicant: KOOLSPAN, Inc.
    Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Publication number: 20090204393
    Abstract: A method of processing a codec sample is provided. The method includes: removing from a first portion of the codec sample, a first number of first information bits. The first information bits are indicative of frame information associated with the codec sample. The method also includes inserting at the first portion of the codec sample from a second portion of the codec sample, a second number of data bits. The first number of the first information bits is greater than or equal to the second number of the data bits. The method also includes removing the second portion of the codec sample. The method may also include encrypting and decrypting the codec sample. In some embodiments, the codec sample is an adaptive multi-rate codec sample. In some embodiments, the adaptive multi-rate codec sample is a 5.15 mode adaptive multi-rate codec sample.
    Type: Application
    Filed: February 8, 2008
    Publication date: August 13, 2009
    Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Publication number: 20090172412
    Abstract: A system for and method of registering devices an applications with cryptographic modules is presented. The system and method prevent devices and applications from operating in conjunction with cryptographic modules unless such devices and applications have previously been registered with the module.
    Type: Application
    Filed: November 26, 2008
    Publication date: July 2, 2009
    Applicant: KOOLSPAN, Inc.
    Inventors: Anthony Fascenda, Emil Sturniolo
  • Publication number: 20090169013
    Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.
    Type: Application
    Filed: November 26, 2008
    Publication date: July 2, 2009
    Applicant: KOOLSPAN, Inc.
    Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Publication number: 20080104399
    Abstract: The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.
    Type: Application
    Filed: December 13, 2007
    Publication date: May 1, 2008
    Applicant: KOOLSPAN, Inc.
    Inventor: Anthony FASCENDA
  • Publication number: 20080052511
    Abstract: A system for and method of providing encrypted network communications is presented. The system and method involve creating encrypted frames used for secure communications between cooperating peers that are the same size as the original unencrypted frames. The system and method thus provide secure communications with essentially the same transmission characteristics as non-encrypted communications.
    Type: Application
    Filed: March 15, 2007
    Publication date: February 28, 2008
    Applicant: KOOLSPAN, INC.
    Inventors: Anthony Fascenda, James Gibbons
  • Publication number: 20050188194
    Abstract: The present invention provides a technique for automatically establishing efficient, remote, secure client connections to one or more locations using a smart card enabled client driver and a smart card enabled network edge device (“Subnet Box”) capable of establishing an end-to-end hardware encrypted tunnel between itself and the client. In an embodiment of the invention, a method of establishing a secure communications tunnel comprises the steps of: authenticating a remote client to a subnet box on a private network, wherein the remote client is connected to the subnet box via a public network, establishing a tunnel between the remote client and the subnet box, and encapsulating all traffic in the tunnel, wherein the tunnel is established only when a unique physical token is coupled to the remote device. The unique physical token comprises a smartcard and is configured to be inserted into a communications port of the remote device.
    Type: Application
    Filed: December 2, 2004
    Publication date: August 25, 2005
    Applicant: KOOLSPAN, Inc.
    Inventor: Anthony Fascenda
  • Publication number: 20050102509
    Abstract: The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token.
    Type: Application
    Filed: December 2, 2004
    Publication date: May 12, 2005
    Applicant: KOOLSPAN, Inc.
    Inventor: Anthony Fascenda
  • Publication number: 20050091483
    Abstract: The invention provides an external in-line device (“Subnet Box”) placed between a network and an access point to achieve secure Wi-Fi communications without needing to modify the access point. The Subnet Box comprises an embedded token and will authenticate users based on pre-stored access rights. In at least one embodiment of the invention, the Subnet Box comprises: a first communications port for intercepting data packets communicated to and from a wired communications network; a second communications port for intercepting data packets communicated to and from a wireless access point, wherein the wireless access point is an edge device of the wired communications network; a database comprising a number of serial numbers each associated with a client token and a secret cryptographic key; and a processor for determining whether a computing device having a client token can access the wired communications network via the wireless access point.
    Type: Application
    Filed: September 8, 2004
    Publication date: April 28, 2005
    Applicant: KOOLSPAN
    Inventor: Anthony Fascenda
  • Publication number: 20050074122
    Abstract: An authentication and mass subscriber management technique is provided by employing a key table derived as a subset of a larger key pool, a network edge device, and authentication tokens attached on both the network edge device and on a subscriber's computing device. The network edge device and subscriber's computing device are provided with secure, tamper-resistant network keys for encrypting all transactions across the wired/wireless segment between supplicant (subscriber) and authenticator (network edge device). In an embodiment of the invention, a secure, secret user key is shared between a number of subscribers based upon commonalities between serial numbers of those subscribers' tokens. In another embodiment of the invention, a unique session key is generated for each subscriber even though multiple subscribers connected to the same network connection point might have identical pre-stored secret keys.
    Type: Application
    Filed: October 15, 2004
    Publication date: April 7, 2005
    Applicant: KOOLSPAN, Inc.
    Inventor: Anthony Fascenda