Patents by Inventor Anthony Fascenda
Anthony Fascenda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9763067Abstract: Methods, apparatus, and systems for the enablement of sending and receiving encrypted messages over Long/Short Wave, Low, High, Very High, or Ultra High Frequency Radio (LSW/HFR) provide for an interconnect between short or other message transmission over LSW/HFR, and other terrestrial or satellite based digital communications systems.Type: GrantFiled: May 28, 2014Date of Patent: September 12, 2017Assignee: Protected Mobility, LLCInventors: William J. Marlow, Robert Cichielo, Paul Benware, Anthony Fascenda, Emil Sturniolo
-
Patent number: 9565230Abstract: A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet.Type: GrantFiled: August 20, 2010Date of Patent: February 7, 2017Assignee: KOOLSPAN, INC.Inventors: Emil Sturniolo, Anthony Fascenda, Robert Cichielo, Paul Benware, William Supernor, Orville Pike
-
Publication number: 20160249189Abstract: Methods, apparatus, and systems for the enablement of sending and receiving encrypted messages over Long/Short Wave, Low, High, Very High, or Ultra High Frequency Radio (LSW/HFR) provide for an interconnect between short or other message transmission over LSW/HFR, and other terrestrial or satellite based digital communications systems.Type: ApplicationFiled: May 28, 2014Publication date: August 25, 2016Applicant: Protected Mobility, LLCInventors: William J. MARLOW, Robert CICHIELO, Paul BENWARE, Anthony FASCENDA, Emil STURNIOLO
-
Patent number: 9338005Abstract: Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided.Type: GrantFiled: July 31, 2009Date of Patent: May 10, 2016Assignee: KOOLSPAN, INC.Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
-
Patent number: 9160719Abstract: Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications.Type: GrantFiled: July 22, 2013Date of Patent: October 13, 2015Assignee: PROTECTED MOBILITY, LLCInventors: William J. Marlow, Robert Cichielo, Emil Sturniolo, Paul Benware, Anthony Fascenda
-
Publication number: 20140025952Abstract: Encrypted communications is made to appear to be normal text so as to avoid undue attention to either the sender or recipient. Information can be hidden or embedded in innocuous documents using steganography wherein the information is masked within a larger document. Other approaches would translate the ciphertext into a form of normal looking text that would in effect be gibberish but would use normal words in at least one native language. There are many tradeoffs and benefits to be considered when attempting any form of encrypted communications.Type: ApplicationFiled: July 22, 2013Publication date: January 23, 2014Applicant: Protected Mobility, LLCInventors: William J. MARLOW, Robert CICHIELO, Emil STURNIOLO, Paul BENWARE, Anthony FASCENDA
-
Patent number: 8548002Abstract: A method of processing a codec sample is provided. The method includes: removing from a first portion of the codec sample, a first number of first information bits. The first information bits are indicative of frame information associated with the codec sample. The method also includes inserting at the first portion of the codec sample from a second portion of the codec sample, a second number of data bits. The first number of the first information bits is greater than or equal to the second number of the data bits. The method also includes removing the second portion of the codec sample. The method may also include encrypting and decrypting the codec sample. In some embodiments, the codec sample is an adaptive multi-rate codec sample. In some embodiments, the adaptive multi-rate codec sample is a 5.15 mode adaptive multi-rate codec sample.Type: GrantFiled: February 8, 2008Date of Patent: October 1, 2013Assignee: Koolspan, Inc.Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
-
Patent number: 8364978Abstract: A system for and method of registering devices an applications with cryptographic modules is presented. The system and method prevent devices and applications from operating in conjunction with cryptographic modules unless such devices and applications have previously been registered with the module.Type: GrantFiled: November 26, 2008Date of Patent: January 29, 2013Assignee: KOOLSPAN, Inc.Inventors: Anthony Fascenda, Emil Sturniolo
-
Publication number: 20110044453Abstract: A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet.Type: ApplicationFiled: August 20, 2010Publication date: February 24, 2011Applicant: KOOLSPAN, Inc.Inventors: Emil Sturniolo, Anthony Fascenda, Robert Cichielo, Paul Benware
-
Publication number: 20100031063Abstract: Systems and methods for registering a module for backup, backing up a module, and restoring a backed up module are provided.Type: ApplicationFiled: July 31, 2009Publication date: February 4, 2010Applicant: Koolspan, Inc.Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
-
Publication number: 20090268902Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.Type: ApplicationFiled: April 25, 2008Publication date: October 29, 2009Applicant: KOOLSPAN, Inc.Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
-
Publication number: 20090204393Abstract: A method of processing a codec sample is provided. The method includes: removing from a first portion of the codec sample, a first number of first information bits. The first information bits are indicative of frame information associated with the codec sample. The method also includes inserting at the first portion of the codec sample from a second portion of the codec sample, a second number of data bits. The first number of the first information bits is greater than or equal to the second number of the data bits. The method also includes removing the second portion of the codec sample. The method may also include encrypting and decrypting the codec sample. In some embodiments, the codec sample is an adaptive multi-rate codec sample. In some embodiments, the adaptive multi-rate codec sample is a 5.15 mode adaptive multi-rate codec sample.Type: ApplicationFiled: February 8, 2008Publication date: August 13, 2009Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
-
Publication number: 20090172412Abstract: A system for and method of registering devices an applications with cryptographic modules is presented. The system and method prevent devices and applications from operating in conjunction with cryptographic modules unless such devices and applications have previously been registered with the module.Type: ApplicationFiled: November 26, 2008Publication date: July 2, 2009Applicant: KOOLSPAN, Inc.Inventors: Anthony Fascenda, Emil Sturniolo
-
Publication number: 20090169013Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.Type: ApplicationFiled: November 26, 2008Publication date: July 2, 2009Applicant: KOOLSPAN, Inc.Inventors: Anthony Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
-
Publication number: 20080104399Abstract: The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.Type: ApplicationFiled: December 13, 2007Publication date: May 1, 2008Applicant: KOOLSPAN, Inc.Inventor: Anthony FASCENDA
-
Publication number: 20080052511Abstract: A system for and method of providing encrypted network communications is presented. The system and method involve creating encrypted frames used for secure communications between cooperating peers that are the same size as the original unencrypted frames. The system and method thus provide secure communications with essentially the same transmission characteristics as non-encrypted communications.Type: ApplicationFiled: March 15, 2007Publication date: February 28, 2008Applicant: KOOLSPAN, INC.Inventors: Anthony Fascenda, James Gibbons
-
Publication number: 20050188194Abstract: The present invention provides a technique for automatically establishing efficient, remote, secure client connections to one or more locations using a smart card enabled client driver and a smart card enabled network edge device (“Subnet Box”) capable of establishing an end-to-end hardware encrypted tunnel between itself and the client. In an embodiment of the invention, a method of establishing a secure communications tunnel comprises the steps of: authenticating a remote client to a subnet box on a private network, wherein the remote client is connected to the subnet box via a public network, establishing a tunnel between the remote client and the subnet box, and encapsulating all traffic in the tunnel, wherein the tunnel is established only when a unique physical token is coupled to the remote device. The unique physical token comprises a smartcard and is configured to be inserted into a communications port of the remote device.Type: ApplicationFiled: December 2, 2004Publication date: August 25, 2005Applicant: KOOLSPAN, Inc.Inventor: Anthony Fascenda
-
Publication number: 20050102509Abstract: The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token.Type: ApplicationFiled: December 2, 2004Publication date: May 12, 2005Applicant: KOOLSPAN, Inc.Inventor: Anthony Fascenda
-
Publication number: 20050091483Abstract: The invention provides an external in-line device (“Subnet Box”) placed between a network and an access point to achieve secure Wi-Fi communications without needing to modify the access point. The Subnet Box comprises an embedded token and will authenticate users based on pre-stored access rights. In at least one embodiment of the invention, the Subnet Box comprises: a first communications port for intercepting data packets communicated to and from a wired communications network; a second communications port for intercepting data packets communicated to and from a wireless access point, wherein the wireless access point is an edge device of the wired communications network; a database comprising a number of serial numbers each associated with a client token and a secret cryptographic key; and a processor for determining whether a computing device having a client token can access the wired communications network via the wireless access point.Type: ApplicationFiled: September 8, 2004Publication date: April 28, 2005Applicant: KOOLSPANInventor: Anthony Fascenda
-
Publication number: 20050074122Abstract: An authentication and mass subscriber management technique is provided by employing a key table derived as a subset of a larger key pool, a network edge device, and authentication tokens attached on both the network edge device and on a subscriber's computing device. The network edge device and subscriber's computing device are provided with secure, tamper-resistant network keys for encrypting all transactions across the wired/wireless segment between supplicant (subscriber) and authenticator (network edge device). In an embodiment of the invention, a secure, secret user key is shared between a number of subscribers based upon commonalities between serial numbers of those subscribers' tokens. In another embodiment of the invention, a unique session key is generated for each subscriber even though multiple subscribers connected to the same network connection point might have identical pre-stored secret keys.Type: ApplicationFiled: October 15, 2004Publication date: April 7, 2005Applicant: KOOLSPAN, Inc.Inventor: Anthony Fascenda