Patents by Inventor Michael Szydlo

Michael Szydlo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8607045
    Abstract: In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.
    Type: Grant
    Filed: September 11, 2006
    Date of Patent: December 10, 2013
    Assignee: EMC Corporation
    Inventors: Daniel Vernon Bailey, John G. Brainard, Burton S. Kaliski, Jr., Michael Szydlo
  • Patent number: 8438617
    Abstract: An authentication server authenticates a first user, and generates a voucher code that is provided to the authenticated first user. The first user may provide the voucher code to a second user, responsive to a request by the second user for the first user to vouch for the second user, to thereby allow the second user to be authenticated. The authentication server receives the voucher code from the second user, and authenticates the second user based on the voucher code. The authenticated second user may be provided with a temporary password or other type of code utilizable for at least one additional authentication.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: May 7, 2013
    Assignee: EMC Corporation
    Inventors: John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo
  • Patent number: 7739733
    Abstract: Methods and systems for storing secret information in a digital vault include obtaining from a user answers to a number of different questions, and identifying which subsets or combinations of the questions for which correct answers later provided by an entity will enable that entity to gain access to the secret information in the vault. The number of questions in each combination is less than the total number of questions, and at least one subset has at least two questions. For each subset, a corresponding string of answers is generated, the string is hashed, and the resulting hash value is combined with the digital secret. This hides the digital secret, which is then stored in the vault. Methods and systems for registering authentication material include storing a hashed string of answers for each combination, generating “multiple authenticators.
    Type: Grant
    Filed: November 2, 2005
    Date of Patent: June 15, 2010
    Assignee: EMC Corporation
    Inventor: Michael Szydlo
  • Publication number: 20090113530
    Abstract: An authentication server authenticates a first user, and generates a voucher code that is provided to the authenticated first user. The first user may provide the voucher code to a second user, responsive to a request by the second user for the first user to vouch for the second user, to thereby allow the second user to be authenticated. The authentication server receives the voucher code from the second user, and authenticates the second user based on the voucher code. The authenticated second user may be provided with a temporary password or other type of code utilizable for at least one additional authentication.
    Type: Application
    Filed: October 29, 2007
    Publication date: April 30, 2009
    Inventors: John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo
  • Publication number: 20070124321
    Abstract: Methods and systems for storing secret information in a digital vault include obtaining from a user answers to a number of different questions, and identifying which subsets or combinations of the questions for which correct answers later provided by an entity will enable that entity to gain access to the secret information in the vault. The number of questions in each combination is less than the total number of questions, and at least one subset has at least two questions. For each subset, a corresponding string of answers is generated, the string is hashed, and the resulting hash value is combined with the digital secret. This hides the digital secret, which is then stored in the vault. Methods and systems for registering authentication material include storing a hashed string of answers for each combination, generating “multiple authenticators.
    Type: Application
    Filed: November 2, 2005
    Publication date: May 31, 2007
    Applicant: RSA Security Inc.
    Inventor: Michael Szydlo
  • Publication number: 20070061566
    Abstract: In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.
    Type: Application
    Filed: September 11, 2006
    Publication date: March 15, 2007
    Inventors: Daniel Bailey, John Brainard, Burton Kaliski, Michael Szydlo
  • Publication number: 20060190378
    Abstract: In accordance with a preferred embodiment of the invention, there is disclosed a process for verifiably communicating risk characteristics of an investment portfolio to an investor without disclosing the exact composition of the portfolio comprising: A procedure for the investment manager to describe acceptable characteristics of an investment portfolio within the portfolio's prospectus, An algorithm and procedure for the investment manager to cryptographically commit to portfolio contents without disclosing the exact composition, An algorithm and procedure to calculate the risk statistics concerning the limitations specified in the prospectus concerning the acceptable configurations of assets holdings without disclosing the exact composition, An algorithm and procedure employing cryptographic means to prove that each such statistic is within the numerical range specified in the prospectus, An algorithm and procedure to check the validity of proofs claiming that each statistic is within a particular range, an
    Type: Application
    Filed: February 23, 2006
    Publication date: August 24, 2006
    Inventor: Michael Szydlo
  • Patent number: 6970070
    Abstract: Techniques are disclosed for providing enhanced privacy in an RFID system comprising a plurality of RFID devices, each having an associated identifier, and at least one reader which communicates with one or more of the devices. A blocker device is operative to receive a communication directed from the reader to one or more of the RFID devices, and to generate, possibly based on information in the received communication, an output transmittable to the reader. The output simulates one or more responses from at least one of the RFID devices in a manner which prevents the reader from determining at least a portion of the identifier of at least one of the RFID devices. The blocker device may itself comprise one of the RFID devices. In an illustrative embodiment, the output generated by the blocker device interferes with the normal operation of a singulation algorithm implemented by the reader.
    Type: Grant
    Filed: September 29, 2003
    Date of Patent: November 29, 2005
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, Ronald L. Rivest, Michael Szydlo
  • Publication number: 20040223481
    Abstract: Techniques are disclosed for providing enhanced privacy in an RFID system comprising a plurality of RFID devices, each having an associated identifier, and at least one reader which communicates with one or more of the devices. A blocker device is operative to receive a communication directed from the reader to one or more of the RFID devices, and to generate, possibly based on information in the received communication, an output transmittable to the reader. The output simulates one or more responses from at least one of the RFID devices in a manner which prevents the reader from determining at least a portion of the identifier of at least one of the RFID devices. The blocker device may itself comprise one of the RFID devices. In an illustrative embodiment, the output generated by the blocker device interferes with the normal operation of a singulation algorithm implemented by the reader.
    Type: Application
    Filed: September 29, 2003
    Publication date: November 11, 2004
    Inventors: Ari Juels, Ronald L. Rivest, Michael Szydlo