Patents Assigned to DIGITAL 14 LLC
-
Patent number: 11750389Abstract: A system, method, and computer program product are provided for implementing hardware backed symmetric operations for password based authentication. In operation, a system receives a request to access software utilizing password-based authentication. Further, the system receives a password for the password-based authentication. The system computes a hash utilizing the password and a hardware-based authenticator associated with hardware of the system utilizing hardware backed symmetric encryption. Moreover, the system verifies that the hash computed utilizing the password and the hardware-based authenticator is correct for accessing the software.Type: GrantFiled: September 24, 2021Date of Patent: September 5, 2023Assignee: DIGITAL 14 LLCInventors: Michael Matovsky, Ravi Singh, Alexander Sherkin
-
Patent number: 11606207Abstract: A system, method, and computer program product are provided for sending and receiving messages using a noisy cryptographic system. To send a message, N secret keys are negotiated using a noisy cryptographic system, where K secret keys are expected to be noiseless. A secret polynomial that includes the N secret keys is generated, and K points on the secret polynomial are derived. For each of the N secret keys, a secret key MAC key is derived and a secret key MAC is calculated using the derived secret key MAC key. A secret key MAC header is generated that includes an array of each of the secret key MACs and possibly a corresponding public key. Message integrity plaintext is generated that includes an encrypted message, the secret key MAC header, and an array of the K points on the secret polynomial. A final message that includes the message integrity plaintext is generated for being sent.Type: GrantFiled: January 4, 2022Date of Patent: March 14, 2023Assignee: DIGITAL 14 LLCInventors: Alexander Sherkin, Milap Sheth
-
Patent number: 11563584Abstract: Zero round trip secure communications are implemented based on noisy secrets with a polynomial secret sharing scheme. A sender identifies two negotiated noisy secrets associated with an encrypted message to send to a receiver system. The sender utilizes a first negotiated noisy secret for sub-key selection, and generates a secret polynomial using Shamir's polynomial-based secret sharing scheme with N positive integer points and a message key as a secret. The sender divides the first negotiated noisy secret into a plurality of sub-keys, and divides a second negotiated noisy secret into test blocks of a length equivalent to a length of a sub-key. The sender utilizes each of the plurality sub-keys for encrypting a corresponding test block along with one unique point of the secret polynomial. Moreover, the sender sends all encrypted test blocks and corresponding encrypted points of the secret polynomial to the receiver with the encrypted message.Type: GrantFiled: February 10, 2021Date of Patent: January 24, 2023Assignee: DIGITAL 14 LLCInventors: Serguei Velikevitch, Alexander Sherkin
-
Patent number: 11343096Abstract: A system, method, and computer program product are provided for performing hardware-backed password-based authentication. In operation, a system receives a request to access software utilizing password-based authentication. Further, the system receives a password for the password-based authentication. The system computes a hash utilizing the password and a hardware-based authenticator associated with hardware of the system. Moreover, the system verifies that the hash computed utilizing the password and the hardware-based authenticator is correct for accessing the software.Type: GrantFiled: March 13, 2019Date of Patent: May 24, 2022Assignee: DIGITAL 14 LLCInventors: Michael Matovsky, Ravi Singh, Alexander Sherkin
-
Patent number: 11271739Abstract: A system, method, and computer program product are provided for sending and receiving messages using a noisy cryptographic system. To send a message, N secret keys are negotiated using a noisy cryptographic system, where K secret keys are expected to be noiseless. A secret polynomial that includes the N secret keys is generated, and K points on the secret polynomial are derived. For each of the N secret keys, a secret key MAC key is derived and a secret key MAC is calculated using the derived secret key MAC key. A secret key MAC header is generated that includes an array of each of the secret key MACs and possibly a corresponding public key. Message integrity plaintext is generated that includes an encrypted message, the secret key MAC header, and an array of the K points on the secret polynomial. A final message that includes the message integrity plaintext is generated for being sent.Type: GrantFiled: June 25, 2020Date of Patent: March 8, 2022Assignee: DIGITAL 14 LLCInventors: Alexander Sherkin, Milap Sheth
-
Patent number: 11159325Abstract: A system, method, and computer program product are provided for implementing hardware backed symmetric operations for password based authentication. In operation, a system receives a request to access software utilizing password-based authentication. Further, the system receives a password for the password-based authentication. The system computes a hash utilizing the password and a hardware-based authenticator associated with hardware of the system utilizing hardware backed symmetric encryption. Moreover, the system verifies that the hash computed utilizing the password and the hardware-based authenticator is correct for accessing the software.Type: GrantFiled: March 13, 2019Date of Patent: October 26, 2021Assignee: DIGITAL 14 LLCInventors: Michael Matovsky, Ravi Singh, Alexander Sherkin
-
Patent number: 11044105Abstract: A system, method, and computer program product are provided for sensitive data recovery in high security systems. In operation, a client device receives a request by a user to initiate a data recovery process to recover data that is encrypted. The client device generates a new data recovery request key pair. The client device creates a data recovery request that includes a data recovery request public key. The client device signs the data recovery request using an identity private key that is associated with a certificate issued by a certification authority (CA). The client device sends the data recovery request to a server system storing the data. The server system accesses an offline data recovery subsystem (ODRS) storing a data recovery key pair to authenticate the user. The ODRS generates and stores a secret data recovery code. The client device receives the secret data recovery code that was communicated to the user.Type: GrantFiled: March 13, 2019Date of Patent: June 22, 2021Assignee: DIGITAL 14 LLCInventors: Michael Matovsky, Ravi Singh, Alexander Sherkin
-
Patent number: 10972283Abstract: A system, method, and computer program product are provided for implementing zero round trip secure communications based on a noisy secret. In operation, a sender system utilizes a randomly generated message key for encrypting a message to send to a receiver system. The sender system selects a plurality of different sub-keys from a negotiated noisy secret to encrypt the randomly generated message key. The sender system encrypts the message utilizing the randomly generated message key. The sender system sends the encrypted message, all encrypted message keys, and a message MAC that is calculated and added for every sub-key, to the receiver system such that the receiver system is able to perform a MAC-based verification to test sub-key validity of the plurality of different sub-keys.Type: GrantFiled: March 13, 2019Date of Patent: April 6, 2021Assignee: DIGITAL 14 LLCInventors: Serguei Velikevitch, Alexander Sherkin
-
Patent number: 10951415Abstract: Zero round trip secure communications is implemented based on noisy secrets with a polynomial secret sharing scheme. A sender identifies two negotiated noisy secrets associated with an encrypted message to send to a receiver system. The sender utilizes a first negotiated noisy secret for sub-key selection, and generates a secret polynomial using Shamir's polynomial-based secret sharing scheme with N positive integer points and a message key as a secret. The sender divides the first negotiated noisy secret into a plurality of sub-keys, and divides a second negotiated noisy secret into test blocks of a length equivalent to a length of a sub-key. The sender utilizes each of the plurality sub-keys for encrypting a corresponding test block along with one unique point of the secret polynomial. Moreover, the sender sends all encrypted test blocks and corresponding encrypted points of the secret polynomial to the receiver with the encrypted message.Type: GrantFiled: March 13, 2019Date of Patent: March 16, 2021Assignee: DIGITAL 14 LLCInventors: Serguei Velikevitch, Alexander Sherkin
-
Patent number: 10915484Abstract: A peripheral disconnection switch system and method are provided. The system comprises at least one peripheral connected to a processor, and a hardware switch connected to the at least one peripheral. The system is operable such that engaging the hardware switch disables the at least one peripheral.Type: GrantFiled: February 15, 2018Date of Patent: February 9, 2021Assignee: DIGITAL 14 LLCInventors: Jouni Tapio Nevalainen, Mika Petteri Annamaa, Jari Tapani Greus
-
Patent number: 10892891Abstract: Zero round trip secure communications is implemented based on two noisy secrets. A sender system: calculates a required number of sub-keys to have at least one noiseless sub-key; for each first negotiated secret sub-key, uses the sub-key to encrypt a first half of a message key and test bytes, and adds the encrypted first half of the message key and the encrypted test bytes to the encrypted message; for each second negotiated secret sub-key, uses the sub-key to encrypt a second half of the message key and the test bytes, and adds the encrypted second half of the message key and the encrypted test bytes to the encrypted message; and sends the encrypted message, message MAC information, encrypted first halves of the message key with associated encrypted test bytes, and encrypted second halves of the message key with associated encrypted test bytes to a receiver.Type: GrantFiled: March 13, 2019Date of Patent: January 12, 2021Assignee: DIGITAL 14 LLCInventors: Serguei Velikevitch, Alexander Sherkin
-
Patent number: 10862831Abstract: A system, method, and computer program product are provided for end-to-end security of centrally accessible group membership information. In use, membership information defining a user group in a messaging system is accessed from a central server, where the membership information includes (1) at least one change to members of the user group, and (2) for each change of the at least one change, a digital signature of a user that made the change. Additionally, a verification process on the membership information is performed, including: for each change of the at least one change, verifying the digital signature of the user that made the change. Further, members of the user group are determined, as a result of the verification process, and at least one action is performed in association with the members of the user group.Type: GrantFiled: August 3, 2017Date of Patent: December 8, 2020Assignee: DIGITAL 14 LLCInventors: Alexander Sherkin, Ravi Singh, Michael Matovsky
-
Patent number: 10862688Abstract: A system, method, and computer program product are provided for implementing zero round trip secure communications based on a noisy secret with a reduced message size. A receiver system receives from a sender system an encrypted message including encrypted message keys and a message MAC that is calculated and added for every sub-key. The receiver system determines if any one of the sub-keys is noiseless based on its corresponding message MAC. If none of the sub-keys are noiseless, the receiver system adjusts bits of the sub-keys until a sub-key with one noisy bit is found and corrected to form a noiseless sub-key. The noiseless sub-key is then processed to obtain a message key to decrypt the encrypted message.Type: GrantFiled: March 13, 2019Date of Patent: December 8, 2020Assignee: DIGITAL 14 LLCInventors: Serguei Velikevitch, Alexander Sherkin
-
Patent number: 10754968Abstract: An apparatus, computer program, and method are afforded for providing a peer-to-peer security protocol. In operation, a message is identified that is directed from a first peer device to a second peer device. Further, the message is copied, so that a copy of the message is caused to be sent to an auditing server.Type: GrantFiled: June 10, 2016Date of Patent: August 25, 2020Assignee: DIGITAL 14 LLCInventors: Alexander Sherkin, Ravi Singh, Michael Matovsky, Eugene Chin
-
Patent number: 10713205Abstract: A universal serial bus (USB) disconnection switch system, method, and computer program product are provided. In use, it is determined that a USB port integrated with a computing device is in electrical communication with at least one hardware component of the computing device via a data bus. Additionally, it is determined that a first predefined condition of the computing device is satisfied. Further, a switch is controlled to disconnect the data bus from the at least one hardware component of the computing device, based on the determination that the USB port is in electrical communication with the at least one hardware component via the data bus and the determination that the first predefined condition of the computing device is satisfied.Type: GrantFiled: February 15, 2018Date of Patent: July 14, 2020Assignee: DIGITAL 14 LLCInventor: Jouni Tapio Nevalainen
-
Patent number: 10637920Abstract: A system, method, and computer program product are provided for peer-to-peer event ordering using a two part event identifier. In use, a peer-to-peer communication channel is established by a first peer device with a second peer device. A current event identifier is initialized at the first peer device, and the second peer device initializes a different current event identifier at the second peer device. A plurality of events are communicated between the first peer device and the second peer device, where the events are each configured to include an event identifier that is the current event identifier of a sender of the event, and where the current event identifier includes two portions that are updated differently when sending and receiving events. Further, the events are ordered by the first peer device, using the event identifier included with each of the events.Type: GrantFiled: August 18, 2017Date of Patent: April 28, 2020Assignee: DIGITAL 14 LLCInventors: Alexander Sherkin, Michael Matovsky
-
Patent number: D985520Type: GrantFiled: August 10, 2021Date of Patent: May 9, 2023Assignee: DIGITAL 14 LLCInventor: Petri Montin