Patents by Inventor William M. Duane
William M. Duane has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8850538Abstract: A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator algorithm and a validator, the method comprising generating a OTP at the token generator according to a variance technique; wherein the variance technique is selected from a set of variance techniques, receiving the OTP at a validator, determining, at the validator, the variance technique used by the token generator to generate the OTP, and determining whether to validate the OTP based on the OTP and variance technique.Type: GrantFiled: October 21, 2013Date of Patent: September 30, 2014Assignee: EMC CorporationInventors: Daniel Bailey Vernon, John G Brainard, William M Duane, Michael J O'Malley, Robert S Philpott
-
Patent number: 8756666Abstract: Authentication codes associated with an entity are generated. A stored secret associated with an entity is retrieved. At a first point in time, a first dynamic value associated with a first time interval is determined. A first authentication code based on the first dynamic value is determined. At a second point in time, a second dynamic value associated with a second time interval is determined. A second authentication code based on the second dynamic value is determined. The first and second authentication codes are derived from the stored secret and the amount of time between the first and second points in time is different from the length of the first time interval.Type: GrantFiled: September 30, 2008Date of Patent: June 17, 2014Assignee: EMC CorporationInventors: Eric A. Silva, William M. Duane
-
Patent number: 8751827Abstract: A method of securely operating a computerized system includes forming a connection to a user-removable physical security device (PSD) which is uniquely paired with the computerized system and which stories cryptographically secured data required for performing a protected function on the computerized system. The PSD may be realized as a USB or similar peripheral device containing security-related data and potentially security processing capability as well. The protected function could be decrypting of encrypted data encryption keys used to encrypt/decrypt user data for example. A user who has an established association with the PSD (e.g. by some preceding registration process) is authenticated, resulting in activation of the PSD on the computerized system. Upon such activation of the PSD, the computerized system engages in a security operation using the cryptographically secured data from the PSD to enable the protected function to be performed under control of the user on the computerized system.Type: GrantFiled: June 25, 2010Date of Patent: June 10, 2014Assignee: EMC CorporationInventors: William M. Duane, Robert W. Griffin, John S. Harwood, Gregory W. Lazar, Thomas E. Linnell
-
Patent number: 8683563Abstract: An improved technique for assessing the security status of a device on which a soft token is run collects device posture information from the device running the soft token and initiates transmission of the device posture information to a server to be used in assessing whether the device has been subjected to malicious activity. The device posture information may relate to the software status, hardware status, and/or environmental context of the device. In some examples, the device posture information is transmitted to the server directly. In other examples, the device posture information is transmitted to the server via auxiliary bits embedded in passcodes displayed to the user, which the user may read and transfer to the server as part of authentication requests. The server may apply the device posture information in a number of areas, including, for example, authentication management, risk assessment, and/or security analytics.Type: GrantFiled: March 30, 2012Date of Patent: March 25, 2014Assignee: EMC CorporationInventors: Marten van Dijk, Kevin D. Bowers, Samuel Curry, Sean P. Doyle, William M. Duane, Ari Juels, Michael J. O'Malley, Nikolaos Triandopoulos, Riaz Zolfonoon
-
Patent number: 8631486Abstract: A method is used in identity assurance. A process is executed that is used to verify a user identity. A description of the executed process is stored and is used to determine a level of trust.Type: GrantFiled: March 31, 2009Date of Patent: January 14, 2014Assignee: EMC CorporationInventors: Lawrence N. Friedman, Riaz Zolfonoon, William M. Duane
-
Patent number: 8566916Abstract: A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator algorithm and a validator, the method comprising generating a OTP at the token generator according to a variance technique; wherein the variance technique is selected from a set of variance techniques, receiving the OTP at a validator, determining, at the validator, the variance technique used by the token generator to generate the OTP, and determining whether to validate the OTP based on the OTP and variance technique.Type: GrantFiled: October 30, 2012Date of Patent: October 22, 2013Assignee: EMC CorporationInventors: Daniel Bailey Vernon, John G Brainard, William M Duane, Michael J O'Malley, Robert S Philpott
-
Patent number: 8560837Abstract: A method, system, and program product for use in estimating clock offset in a security environment, the security environment comprising a token generator comprising a token generator clock and an Authenticator comprising an Authenticator clock, the method comprising recording a plurality of delta values; wherein each value of the plurality of delta values corresponds to a difference between the token generator clock and the Authenticator clock, wherein the token generator clock and the Authenticator clock are not communicatively coupled, and fitting the plurality of delta values to a function.Type: GrantFiled: June 30, 2010Date of Patent: October 15, 2013Assignee: EMC CorporationInventor: William M. Duane
-
Patent number: 8312519Abstract: A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator algorithm and a validator, the method comprising generating a OTP at the token generator according to a variance technique; wherein the variance technique is selected from a set of variance techniques, receiving the OTP at a validator, determining, at the validator, the variance technique used by the token generator to generate the OTP, and determining whether to validate the OTP based on the OTP and variance technique.Type: GrantFiled: September 30, 2010Date of Patent: November 13, 2012Inventors: Daniel V Bailey, John G. Brainard, William M. Duane, Michael J. O'Malley, Robert S. Phipott
-
Patent number: 8307210Abstract: A method for validating a cryptographic token includes (a) operating the cryptographic token to generate a pseudo-random number for authentication purposes by using a cryptographic seed uniquely associated with the cryptographic token, the cryptographic seed having been cryptographically generated using a precursor value, (b) receiving a first value from the cryptographic token, the first value being the pseudo-random number generated by the cryptographic token, (c) inputting the first value and the precursor value into a trusted computing platform, and (d) operating the trusted computing platform to generate a validation signal if the first value can be derived using a specified algorithm from the precursor value, but to generate a failure signal if the first value cannot be derived using the specified algorithm from the precursor value. Accompanying methods and apparatus are also provided.Type: GrantFiled: May 2, 2008Date of Patent: November 6, 2012Assignee: EMC CorporationInventor: William M. Duane
-
Patent number: 8059814Abstract: A technique carries out seed (or key) derivation within an electronic apparatus (e.g., a hand holdable electronic apparatus such as a token, an authentication server, etc.). The technique involves acquiring a stored representation of a derived seed, the stored representation of the derived seed resulting from an earlier-performed cryptographic operation based on a higher-level seed. The technique further involves (i) performing a current cryptographic operation based on a stored representation of the higher-level seed, the current cryptographic operation resulting in a current representation of the derived seed, and (ii) providing a corruption detection signal indicating whether the current representation of the derived seed matches the stored representation of the derived seed.Type: GrantFiled: September 28, 2007Date of Patent: November 15, 2011Assignee: EMC CorporationInventor: William M. Duane
-
Patent number: 8060750Abstract: A technique is utilized in the configuration and seeding of security tokens at third party facilities, particularly at facilities of a configuration agent, such that a token can be configured without the configuration agent having security-defeating knowledge about the token. Such a technique allows a third party to provision a token with a seed, but in such a way that the third party will not know, or be able to construct, the seed after the seed provisioning process is complete. The seed may include, by way of example, a symmetric key or other secret shared by two or more entities. In some arrangements, a method is used for secure seed provisioning. Data is derived from inherent randomness in a token or other authentication device. Based on the data, the token or other authentication device is provisioned with a seed.Type: GrantFiled: June 29, 2007Date of Patent: November 15, 2011Assignee: EMC CorporationInventors: William M. Duane, Eric A. Silva, Marco Ciaffi
-
Patent number: 8046596Abstract: An authentication device comprises a processor having a reset input, a trigger source coupled to the reset input of the processor, and interface circuitry for outputting codes generated by the processor. The trigger source may comprise, for example, a trigger button having an associated switch that when actuated supplies a reset to the reset input. The processor is configured to analyze a given reset applied to the reset input to determine if the reset is an inadvertent reset or a reset generated by the trigger source. The processor generates a code responsive to the reset if the reset is determined to be a reset generated by the trigger source. The code may be supplied to a host device which communicates the code to an authentication server for authentication.Type: GrantFiled: June 21, 2007Date of Patent: October 25, 2011Assignee: EMC CorporationInventors: Marco Ciaffi, Joseph Pirrotta, William M. Duane
-
Publication number: 20110246778Abstract: A method for providing a security mechanism for validating and executing a virtual machine image where the virtual machine image is obtained from an external source to run on an endpoint or host system. An electronic device storing validation data is connected to the host system, and the virtual machine image is validated with the validation data. The virtual machine image run on the host system if validated and/or decrypted. The electronic device can be a USB flash drive, and the electronic device can include a security processor with memory in addition to having a display, keypad, token, or any combination thereof. The validation data utilized may comprise a keyed hash or digital signature when validating the virtual machine image.Type: ApplicationFiled: March 31, 2010Publication date: October 6, 2011Applicant: EMC CORPORATIONInventor: WILLIAM M. DUANE
-
Patent number: 7979707Abstract: Techniques for secure generation of a seed for use in performing one or more cryptographic operations, utilizing a seed generation protocol carried out by a seed generation client (110c) and a seed generation server (110s). The seed generation server (110s) provides a first string to the seed generation client (110c). The seed generation client (110c) generates a second string, encrypts the second string utilizing a key (216), and sends the encrypted second string to the seed generation server (110s). The seed generation client (110c) generates the seed as a function of at least the first string and the second string. The seed generation server (110s) decrypts the encrypted second string (222) and independently generates the seed as a function of at least the first string and the second string.Type: GrantFiled: July 9, 2004Date of Patent: July 12, 2011Assignee: EMC CorporationInventors: Peter Röstin, Magnus Nyström, William M. Duane
-
Patent number: 7562221Abstract: A single sign-on technique allows multiple accesses to one or more applications or other resources using a proof-of-authentication module operating in conjunction with a standard authentication component. The application or other resource issues an authentication information request to the standard authentication component responsive to an access request from the user. The application or other resource receives, responsive to the authentication information request, a proof-of-authentication value from the standard authentication component, and authenticates the user based on the proof-of-authentication value. The standard authentication component interacts with the proof-of-authentication module to obtain the proof-of-authentication value. The proof-of-authentication module is configured to generate multiple proof-of-authentication values for authentication of respective access requests of the user.Type: GrantFiled: September 12, 2006Date of Patent: July 14, 2009Assignee: RSA Security Inc.Inventors: Magnus Nyström, Anders Rundgren, William M. Duane
-
Publication number: 20090006858Abstract: A method is used for secure seed provisioning. Data is derived from inherent randomness in an authentication device. Based on the data, the authentication device is provisioned with a seed.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Inventors: William M. Duane, Eric A. Silva, Marco Ciaffi
-
Publication number: 20080320555Abstract: An authentication device comprises a processor having a reset input, a trigger source coupled to the reset input of the processor, and interface circuitry for outputting codes generated by the processor. The trigger source may comprise, for example, a trigger button having an associated switch that when actuated supplies a reset to the reset input. The processor is configured to analyze a given reset applied to the reset input to determine if the reset is an inadvertent reset or a reset generated by the trigger source. The processor generates a code responsive to the reset if the reset is determined to be a reset generated by the trigger source. The code may be supplied to a host device which communicates the code to an authentication server for authentication.Type: ApplicationFiled: June 21, 2007Publication date: December 25, 2008Inventors: Marco Ciaffi, Joseph Pirrotta, William M. Duane
-
Patent number: 7461250Abstract: In an embodiment of a system and method according to the present invention, a chain of one or more certificates certifying a principal's public key is exchanged for a single substitute certificate. The substitute certificate is used as a replacement for the certificate chain. The substitute certificate is useful for authentication of the principal. In one embodiment, an authentication server exchanges the certificates. The substitute certificate is signed by the authentication server and used for authentication and communication with principals that have knowledge of and trust the authentication server. In one embodiment the substitute certificate also includes the principal's access information.Type: GrantFiled: July 22, 1999Date of Patent: December 2, 2008Assignee: RSA Security, Inc.Inventors: William M. Duane, Peter Röstin
-
Publication number: 20080270791Abstract: Techniques are disclosed for performing operations in an authentication token or other cryptographic device in a system comprising an authentication server. In one aspect, a code generated by the authentication server is received in the cryptographic device. The code may have associated therewith information specifying at least one operation to be performed by the cryptographic device. The cryptographic device authenticates the code, and responsive to authentication of the code, performs the specified operation. If the code is not authenticated, the operation is not performed. The code may be determined as a function of a one-time password generated by the authentication server. The function may also take as an input an identifier of the operation to be performed.Type: ApplicationFiled: June 28, 2007Publication date: October 30, 2008Inventors: Magnus Nystrom, William M. Duane, James Townsend