Patents Assigned to PACID TECHNOLOGIES, LLC
  • Patent number: 8959350
    Abstract: In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: February 17, 2015
    Assignee: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Patent number: 8934625
    Abstract: A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: January 13, 2015
    Assignee: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Publication number: 20140298019
    Abstract: A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.
    Type: Application
    Filed: June 18, 2014
    Publication date: October 2, 2014
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20140298036
    Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.
    Type: Application
    Filed: March 28, 2014
    Publication date: October 2, 2014
    Applicant: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Publication number: 20140236835
    Abstract: A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.
    Type: Application
    Filed: April 29, 2014
    Publication date: August 21, 2014
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Patent number: 8782408
    Abstract: A method for securing communication among members of a group. The method includes a first member obtaining a first secret. An n-bit generator executing on the first member generates a first message digest using the first secret. The first member extracts a first encryption solution and a second encryption solution, at least in part, from the first message digest, encrypts a first communication using the first encryption solution to obtain a first encrypted communication, and sends, to a second member of the group, the first encrypted communication. The first member further receives, from the second member, a second encrypted communication, and decrypts the second encrypted communication using the second encryption solution to obtain a second communication.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: July 15, 2014
    Assignee: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Publication number: 20140136418
    Abstract: A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.
    Type: Application
    Filed: January 17, 2014
    Publication date: May 15, 2014
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Patent number: 8726032
    Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: May 13, 2014
    Assignee: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Publication number: 20140006792
    Abstract: A method for securing communication between a plurality of members. The method includes a first member sending a first input to a second member, receiving a second input from the second member, and generating, by an n-bit generator, an initial message digest using the first input and the second input. Communications between the first member and the second member are encrypted using the initial message digest.
    Type: Application
    Filed: June 28, 2013
    Publication date: January 2, 2014
    Applicant: PACid TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20130262882
    Abstract: A method for generating an n-bit result includes a secured containment device (SCD) receiving a request to generate the n-bit result. The request includes an n-bit generator input and a master secret identifier. The request is sent from an application executing on a host system using an input/output (I/O) interface. The SCD disables all I/O interfaces on the SCD between the host system and the SCD. After disabling all the I/O interfaces on the SCD between the host system and the SCD, the SCD provides the n-bit generator input and the master secret identifier to a secured hardware token over a second I/O interface, receives the n-bit result from the secured hardware token over the second I/O interface, enables at least the first I/O interface after the n-bit result is generated, and provides, after enabling the first I/O interface, the n-bit result to the application using the first I/O interface.
    Type: Application
    Filed: May 29, 2013
    Publication date: October 3, 2013
    Applicant: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Patent number: 8539241
    Abstract: A method for securing communication between a plurality of members. The method includes a first member sending a first input to a second member, receiving a second input from the second member, and generating, by an n-bit generator, an initial message digest using the first input and the second input. Communications between the first member and the second member are encrypted using the initial message digest.
    Type: Grant
    Filed: March 25, 2010
    Date of Patent: September 17, 2013
    Assignee: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Patent number: 8479021
    Abstract: A method for generating an n-bit result includes a secured containment device (SCD) receiving a request to generate the n-bit result. The request includes an n-bit generator input and a master secret identifier. The request is sent from an application executing on a host system using an input/output (I/O) interface. The SCD disables all I/O interfaces on the SCD between the host system and the SCD. After disabling all the I/O interfaces on the SCD between the host system and the SCD, the SCD provides the n-bit generator input and the master secret identifier to a secured hardware token over a second I/O interface, receives the n-bit result from the secured hardware token over the second I/O interface, enables at least the first I/O interface after the n-bit result is generated, and provides, after enabling the first I/O interface, the n-bit result to the application using the first I/O interface.
    Type: Grant
    Filed: August 23, 2012
    Date of Patent: July 2, 2013
    Assignee: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Publication number: 20130086691
    Abstract: A method for generating an n-bit result includes a secured containment device (SCD) receiving a request to generate the n-bit result. The request includes an n-bit generator input and a master secret identifier. The request is sent from an application executing on a host system using an input/output (I/O) interface. The SCD disables all I/O interfaces on the SCD between the host system and the SCD. After disabling all the I/O interfaces on the SCD between the host system and the SCD, the SCD provides the n-bit generator input and the master secret identifier to a secured hardware token over a second I/O interface, receives the n-bit result from the secured hardware token over the second I/O interface, enables at least the first I/O interface after the n-bit result is generated, and provides, after enabling the first I/O interface, the n-bit result to the application using the first I/O interface.
    Type: Application
    Filed: August 23, 2012
    Publication date: April 4, 2013
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20130085944
    Abstract: A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.
    Type: Application
    Filed: August 23, 2012
    Publication date: April 4, 2013
    Applicant: PACid Technologies, LLC
    Inventor: Guy Fielder
  • Publication number: 20110314281
    Abstract: A method for securing communication among members of a group. The method includes a first member obtaining a first secret. An n-bit generator executing on the first member generates a first message digest using the first secret. The first member extracts a first encryption solution and a second encryption solution, at least in part, from the first message digest, encrypts a first communication using the first encryption solution to obtain a first encrypted communication, and sends, to a second member of the group, the first encrypted communication. The first member further receives, from the second member, a second encrypted communication, and decrypts the second encrypted communication using the second encryption solution to obtain a second communication.
    Type: Application
    Filed: March 25, 2010
    Publication date: December 22, 2011
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20110307699
    Abstract: In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.
    Type: Application
    Filed: March 25, 2010
    Publication date: December 15, 2011
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20110307707
    Abstract: A method for securing files. The method includes an n-bit generator, executing on a first member of a group, generating a message digest using a first secret and a file constant value. The file constant value describes a file. The member extracts an encryption solution from at least the message digest, encrypts the file using the encryption solution to create the encrypted file, and sends the encrypted file and the file constant value to a second member.
    Type: Application
    Filed: March 25, 2010
    Publication date: December 15, 2011
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20110307705
    Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.
    Type: Application
    Filed: March 25, 2010
    Publication date: December 15, 2011
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20110307706
    Abstract: A method for securing communication between a plurality of members. The method includes a first member sending a first input to a second member, receiving a second input from the second member, and generating, by an n-bit generator, an initial message digest using the first input and the second input. Communications between the first member and the second member are encrypted using the initial message digest.
    Type: Application
    Filed: March 25, 2010
    Publication date: December 15, 2011
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder
  • Publication number: 20100299529
    Abstract: A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication.
    Type: Application
    Filed: March 25, 2010
    Publication date: November 25, 2010
    Applicant: PACID TECHNOLOGIES, LLC
    Inventor: Guy Fielder