Patents by Inventor Dirk Balfanz

Dirk Balfanz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7376834
    Abstract: System and method for enabling arbitrary components to control communications without having or requiring prior knowledge of each other. The system includes a first component that creates controller objects and provides the objects to other components. The controller objects include instructions which when executed by the other components enable the components to generate user interfaces for controlling the first component. Further, the controller objects are encrypted and are used to authenticate the senders or receivers of the objects.
    Type: Grant
    Filed: July 18, 2003
    Date of Patent: May 20, 2008
    Assignee: Palo Alto Research Center Incorporated
    Inventors: W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, Trevor F. Smith, Diana Smetters, Dirk Balfanz, Paul Stewart
  • Publication number: 20070277240
    Abstract: One embodiment of the present invention provides a system that facilitates access to encrypted data on a computing device based on a security-posture of the computing device. During operation, the system assesses the security-posture of the computing device upon which the encrypted data is stored. If the assessed security-posture meets specified criteria, the system provides the computing device with a key which enables the computing device to access the encrypted data.
    Type: Application
    Filed: May 24, 2006
    Publication date: November 29, 2007
    Inventors: Glenn E. Durfee, Dirk Balfanz, Diana K. Smetters, Paul J. Stewart
  • Publication number: 20070266164
    Abstract: A method of accessing a data resource identifies the data resource, the data resource accessible through a first device and associated with a resource locator, the first device configured to provide access to the data resource responsive to possession of a whitelisted credential. The method includes receiving a second-device credential from a second device by a personal domain controller, the personal domain controller and the first device within a first trusted relationship and provides, by the personal domain controller, the second-device credential to the first device for whitelisting subject to the first trusted relationship. The method uses, by the second device, the second-device credential to access the data resource responsive to the resource locator.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Dirk Balfanz, Diana Smetters, Glenn Durfee, Trevor Smith
  • Publication number: 20070266410
    Abstract: A method of accessing a data resource identifies, by a personal domain controller, the data resource accessible by a first device and determines if there is a pause point for the data resource stored in the personal domain controller.
    Type: Application
    Filed: May 12, 2006
    Publication date: November 15, 2007
    Applicant: PALO ALTO RESEARCH CENTER INCORPORATED
    Inventors: DIRK BALFANZ, DIANA SMETTERS, GLENN DURFEE, TREVOR SMITH
  • Patent number: 7275156
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: September 25, 2007
    Assignee: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Publication number: 20070204149
    Abstract: Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.
    Type: Application
    Filed: February 26, 2007
    Publication date: August 30, 2007
    Inventors: Dirk Balfanz, Diana Smetters, Paul Stewart, Daniel Swinehart
  • Patent number: 7246374
    Abstract: Users can create multiple different desktops for themselves and easily switch between these desktops. These multiple desktops are “walled off” from one another, limiting the ability of processes and other subjects in one desktop from accessing objects, such as data files or other processes, in another desktop. According to one aspect, each time a process is launched it is associated with the desktop that it is launched in. Similarly, objects, such as data files or resources, are associated with the same desktop as the process that created them. The operating system allows a process to access only those objects that are either associated with the same desktop as the process or associated with no desktop.
    Type: Grant
    Filed: March 13, 2000
    Date of Patent: July 17, 2007
    Assignee: Microsoft Corporation
    Inventors: Daniel R. Simon, Dirk Balfanz
  • Publication number: 20070130617
    Abstract: One embodiment of the present invention provides a system for establishing temporary and permanent credentials for secure remote data access. The system includes a temporary smart card configured to provide a temporary credential for a first device, thereby providing the first device with temporary secure access to a remote data source when the temporary smart card is used with the first device. Additionally, the system includes an enrollment smart card configured to provide a permanent credential for a second device, thereby providing the second device with permanent secure access to the remote data source without presence of the enrollment smart card or the temporary smart card.
    Type: Application
    Filed: December 2, 2005
    Publication date: June 7, 2007
    Inventors: Glenn Durfee, Dirk Balfanz, Diana Smetters
  • Patent number: 7185199
    Abstract: Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.
    Type: Grant
    Filed: August 30, 2002
    Date of Patent: February 27, 2007
    Assignee: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul S. Stewart, Daniel C. Swinehart
  • Publication number: 20070019806
    Abstract: A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
    Type: Application
    Filed: September 28, 2006
    Publication date: January 25, 2007
    Inventors: Kenneth Conley, Dirk Balfanz, Bryan Pendleton, Diana Smetters, Glenn Durfee
  • Patent number: 7130998
    Abstract: One embodiment of the present invention provides a system that uses a portable security token (PST) to facilitate cross-certification between a first certification authority (CA) and a second CA, wherein the first CA and associated subscriber devices constitute a first public-key infrastructure (PKI) domain, and wherein the second CA and associated subscriber devices constitute a second PKI domain. During operation, the system uses the PST to transfer certification information between the first CA and the second CA, wherein the PST communicates with the first CA and the second CA through a location-limited communication channel. Next, the system uses the certification information to issue a cross-certificate to the first CA. Note that the cross-certificate is signed by the second CA.
    Type: Grant
    Filed: October 14, 2004
    Date of Patent: October 31, 2006
    Assignee: Palo Alto Research Center, Inc.
    Inventors: Dirk Balfanz, Glenn E. Durfee, Diana K. Smetters
  • Publication number: 20060174116
    Abstract: Pre-authentication information of devices is used to securely authenticate arbitrary peer-to-peer ad-hoc interactions. In one embodiment, public key cryptography is used in the main wireless link with location-limited channels being initially used to pre-authenticate devices. Use of public keys in the pre-authentication data allows for the broadening of types of media suitable for use as location-limited channels to include, for example, audio and infrared. Also, it allows a range of key exchange protocols which can be authenticated in this manner to include most public-key-based protocols. As a result, a large range of devices, protocols can be used in various applications. Further, an eavesdropper is forced to mount an active attack on the location-limited channel itself in order to access an ad-hoc exchange. However, this results in the discovery of the eavesdropper.
    Type: Application
    Filed: April 3, 2006
    Publication date: August 3, 2006
    Applicant: Xerox Corporation
    Inventors: Dirk Balfanz, Cristina Lopes, Diana Smetters, Paul Stewart, Hao-Chi Wong
  • Publication number: 20060129797
    Abstract: Systems and methods for establishing an authenticated and encrypted network connection in a boot protocol, and specifying the boot image to be loaded by a client, are disclosed. A hardware token or other portable medium, such as a USB drive or device, CD, mini-CD, or floppy diskette, is used to store authentication and/or identification information for a server. A client uses the information on the token to authenticate the network server upon initial connection to the network and request a boot image. Furthermore, the client and server may use the authentication information from the token to establish secure communications and mutually authenticate each other.
    Type: Application
    Filed: December 15, 2004
    Publication date: June 15, 2006
    Inventors: Glenn Durfee, Dirk Balfanz, Diana Kathryn Smetters, Paul Joseph Stewart
  • Publication number: 20060122936
    Abstract: When content publishers announce the availability of new content to one or more recipients, a content server automatically authorizes only those recipients of the announcement to have access to the new content. The authentication of clients is managed in an automated and user-friendly fashion. This may include instantaneous issuance of certificates, as well as quick revocation of certificates should they have been issued to the wrong individual. Quick revocation is facilitated by the fact that identities are associated with public keys in an online database where the association can quickly be undone, rather than in the certificates themselves as is traditionally the case.
    Type: Application
    Filed: December 6, 2004
    Publication date: June 8, 2006
    Inventor: Dirk Balfanz
  • Publication number: 20060085633
    Abstract: One embodiment of the present invention provides a system that uses a portable security token (PST) to facilitate cross-certification between a first certification authority (CA) and a second CA, wherein the first CA and associated subscriber devices constitute a first public-key infrastructure (PKI) domain, and wherein the second CA and associated subscriber devices constitute a second PKI domain. During operation, the system uses the PST to transfer certification information between the first CA and the second CA, wherein the PST communicates with the first CA and the second CA through a location-limited communication channel. Next, the system uses the certification information to issue a cross-certificate to the first CA. Note that the cross-certificate is signed by the second CA.
    Type: Application
    Filed: October 14, 2004
    Publication date: April 20, 2006
    Inventors: Dirk Balfanz, Glenn Durfee, Diana Smetters
  • Publication number: 20050287985
    Abstract: One embodiment of the present invention provides a system that uses a portable security token to facilitate public key certification for a target device in a network. During system operation, the portable security token is located in close physical proximity to the target device to allow the portable security token to communicate with the target device through a location-limited communication channel. During this communication, the portable security token receives an authenticator for the target device, and forms a ticket by digitally signing the authenticator with a key previously agreed upon by the portable security token and a certification authority (CA). Next, the portable security token sends the ticket to the target device, whereby the target device can subsequently present the ticket to the CA to prove that the target device is authorized to receive a credential from the CA.
    Type: Application
    Filed: June 24, 2004
    Publication date: December 29, 2005
    Inventors: Dirk Balfanz, Glenn Durfee, Diana Smetters
  • Publication number: 20050129240
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used to quickly establish a secure credential infrastructure that can be used to secure ad-hoc and/or dynamic command and control operations such are needed for Incident Command Systems or other emergency response systems that require simplicity and rapid deployment among disparate responder teams.
    Type: Application
    Filed: December 15, 2003
    Publication date: June 16, 2005
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Dirk Balfanz, Diana Smetters, Glenn Durfee, Rebecca Grinter, Paul Stewart
  • Publication number: 20050125669
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including enabling secure communications to components of a vehicle, and enabling secure communications between the vehicle and associated infrastructure.
    Type: Application
    Filed: April 30, 2004
    Publication date: June 9, 2005
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Paul Stewart, Diana Smetters, Rebecca Grinter, Dirk Balfanz, Glenn Durfee, Hao-Chi Wong
  • Publication number: 20050100166
    Abstract: A location-limited channel is implemented using physical exchanges of physical tokens. The physical tokens are implemented using writeable or re-writeable storage media. Location-limited channels, when used to implement pre-authentication protocols, provide demonstrative identification and authenticity. A group originator loads pre-authentication information and a network location from a communication device onto the location-limited physical token channel. The location-limited physical token channel is passed to another participant, who copies the originator's pre-authentication information and location onto that participant's communication device. That participant then adds that participant's own pre-authentication information and network location onto the location-limited physical token channel. This is repeated until the last participant passes the location-limited physical token channel back to the group originator.
    Type: Application
    Filed: November 10, 2003
    Publication date: May 12, 2005
    Applicant: PARC INC.
    Inventors: Diana Smetters, Kenneth Conley, Bryan Pendleton, Glenn Durfee, Steve Cousins, Dirk Balfanz, Hadar Shemtov
  • Publication number: 20050015595
    Abstract: System and method for enabling arbitrary components to control communications without having or requiring prior knowledge of each other. The system includes a first component that creates controller objects and provides the objects to other components. The controller objects include instructions which when executed by the other components enable the components to generate user interfaces for controlling the first component. Further, the controller objects are encrypted and are used to authenticate the senders or receivers of the objects.
    Type: Application
    Filed: July 18, 2003
    Publication date: January 20, 2005
    Inventors: W. Edwards, Mark Newman, Jana Sedivy, Trevor Smith, Diana Smetters, Dirk Balfanz, Paul Stewart