Patents by Inventor Chet Birger

Chet Birger has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9866375
    Abstract: A key manager provides a way to separate out the management of encryption keys and policies from application domains. The key manager may create cipher objects that may be used by the domains to perform encryption or decryption, without exposing the keys or encryption/decryption algorithms to the domains. A master key managed by the key manager may be used to encrypt and decrypt the domain keys that are stored under the control of the key manager. The key manager supports the rekeying of both the master key and the domain keys based on policy. Multiple versions of domain keys may be supported, allowing domains to access data encrypted with a previous version of a domain key after a rekeying.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: January 9, 2018
    Assignee: BladeLogic, Inc.
    Inventors: Paul A. Reilly, Chet Birger, Denis Knjazihhin
  • Patent number: 9489499
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: November 8, 2016
    Assignee: BLADELOGIC, INC.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David A. Solin, Carl Adams
  • Publication number: 20150172046
    Abstract: A key manager provides a way to separate out the management of encryption keys and policies from application domains. The key manager may create cipher objects that may be used by the domains to perform encryption or decryption, without exposing the keys or encryption/decryption algorithms to the domains. A master key managed by the key manager may be used to encrypt and decrypt the domain keys that are stored under the control of the key manager. The key manager supports the rekeying of both the master key and the domain keys based on policy. Multiple versions of domain keys may be supported, allowing domains to access data encrypted with a previous version of a domain key after a rekeying.
    Type: Application
    Filed: March 2, 2015
    Publication date: June 18, 2015
    Inventors: Paul A. REILLY, Chet BIRGER, Denis KNJAZIHHIN
  • Patent number: 8971535
    Abstract: A key manager provides a way to separate out the management of encryption keys and policies from application domains. The key manager may create cipher objects that may be used by the domains to perform encryption or decryption, without exposing the keys or encryption/decryption algorithms to the domains. A master key managed by the key manager may be used to encrypt and decrypt the domain keys that are stored under the control of the key manager. The key manager supports the rekeying of both the master key and the domain keys based on policy. Multiple versions of domain keys may be supported, allowing domains to access data encrypted with a previous version of a domain key after a rekeying.
    Type: Grant
    Filed: May 27, 2010
    Date of Patent: March 3, 2015
    Assignee: Bladelogic, Inc.
    Inventors: Paul A. Reilly, Chet Birger, Denis Knjazihhin
  • Publication number: 20140237560
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Application
    Filed: April 30, 2014
    Publication date: August 21, 2014
    Applicant: BLADELOGIC, INC.
    Inventors: Denis KNJAZIHHIN, Paul A. REILLY, Chet BIRGER, David A. SOLIN, Carl ADAMS
  • Patent number: 8752137
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Grant
    Filed: May 28, 2010
    Date of Patent: June 10, 2014
    Assignee: Bladelogic, Inc.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Allen Solin, Carl Adams
  • Publication number: 20110293096
    Abstract: A key manager provides a way to separate out the management of encryption keys and policies from application domains. The key manager may create cipher objects that may be used by the domains to perform encryption or decryption, without exposing the keys or encryption/decryption algorithms to the domains. A master key managed by the key manager may be used to encrypt and decrypt the domain keys that are stored under the control of the key manager. The key manager supports the rekeying of both the master key and the domain keys based on policy. Multiple versions of domain keys may be supported, allowing domains to access data encrypted with a previous version of a domain key after a rekeying.
    Type: Application
    Filed: May 27, 2010
    Publication date: December 1, 2011
    Applicant: BladeLogic, Inc.
    Inventors: Paul A. Reilly, Chet Birger, Denis Knjazihhin
  • Publication number: 20110296499
    Abstract: Systems and methods for stateless system management are described. Examples include a method wherein a user sends the management system a request to act upon a managed system. The management system determines whether the user is authorized for the requested action. Upon authorization, the management system looks up an automation principal, which is a security principal native to the managed system. The management system retrieves connecting credentials for the automation principal, and connects to the managed system using the retrieved credentials. Once the managed system is connected, the management system performs the requested action on the managed system, and sends the result back to the user.
    Type: Application
    Filed: May 28, 2010
    Publication date: December 1, 2011
    Applicant: BladeLogic, Inc.
    Inventors: Denis Knjazihhin, Paul A. Reilly, Chet Birger, David Solin, Carl Adams
  • Patent number: 7962655
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. The identity-based communications layer is situated between a network layer and an application layer and transmits a message between two devices identified by a global address. The global address specifies a protocol, a network, and an address meaningful for the combination of the protocol and the network.
    Type: Grant
    Filed: February 25, 2003
    Date of Patent: June 14, 2011
    Assignee: Oracle International Corporation
    Inventors: Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Patent number: 7958226
    Abstract: A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.
    Type: Grant
    Filed: February 15, 2006
    Date of Patent: June 7, 2011
    Assignee: Oracle International Corporation
    Inventors: Linda Bernardi, Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Patent number: 7805606
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device.
    Type: Grant
    Filed: February 25, 2003
    Date of Patent: September 28, 2010
    Assignee: BEA Systems, Inc.
    Inventors: Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Publication number: 20090007234
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device.
    Type: Application
    Filed: December 6, 2006
    Publication date: January 1, 2009
    Applicant: ConnecTerra, Inc.
    Inventors: Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Publication number: 20090007217
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device.
    Type: Application
    Filed: December 6, 2006
    Publication date: January 1, 2009
    Applicant: ConnecTerra, Inc., a Washington corporation
    Inventors: Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Publication number: 20090006840
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. The identity-based communications layer is situated between a network layer and an application layer and transmits a message between two devices identified by a global address. The global address specifies a protocol, a network, and an address meaningful for the combination of the protocol and the network.
    Type: Application
    Filed: February 25, 2003
    Publication date: January 1, 2009
    Inventors: Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Publication number: 20090006850
    Abstract: A computer architecture for enterprise device applications provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. A communications session is established between two devices using an authentication service that authenticates the device that is initiating the establishment of the communications session with another device. After authenticating the initiating device, the authentication service provides to the initiating device the network address of the other device and an authentication credential for use in the communications session between the initiating device and the other device.
    Type: Application
    Filed: February 25, 2003
    Publication date: January 1, 2009
    Inventors: Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Publication number: 20080301298
    Abstract: A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.
    Type: Application
    Filed: February 25, 2003
    Publication date: December 4, 2008
    Inventors: Linda Bernardi, Chet Birger, David C. Douglas, Steven Rosenthal, Kenneth R. Traub
  • Publication number: 20060184681
    Abstract: A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.
    Type: Application
    Filed: February 15, 2006
    Publication date: August 17, 2006
    Applicant: BEA Systems, Inc.
    Inventors: Linda Bernardi, Chet Birger, David Douglas, Steven Rosenthal, Kenneth Traub
  • Publication number: 20060174037
    Abstract: A computer architecture for enterprise device applications that provides a real-time, bi-directional communication layer for device communication. An identity-based communications layer provides for secure, end-to-end telemetry and control communications by enabling mutual authentication and encryption between the devices and the enterprise. A unique identity is assigned to each device, user and application to provide security services. The unique identity is independent of a network-address. Security information and a network address may be associated with the unique identity.
    Type: Application
    Filed: February 15, 2006
    Publication date: August 3, 2006
    Applicant: BEA Systems, Inc.
    Inventors: Linda Bernardi, Chet Birger, David Douglas, Steven Rosenthal, Kenneth Traub