Patents Assigned to Porticor Ltd.
  • Patent number: 9660805
    Abstract: The present invention discloses methods and devices for securing keys when key-management processes are subverted by an adversary. Methods include the steps of: upon receiving a creation request in the computing-environment, creating a secure key in at least one location in a computing environment by repetitively computing respective secure-key contributions: in at least one location; and in a set of N computing resources in the computing environment, wherein N is a non-negative integer; and applying the respective secure-key contributions to change a secure-key value, wherein: the respective secure-key contributions cannot be omitted or modified by at least one location; and the secure key is never revealed to the computing resources; thereby enabling the computing resources in the computing environment to ensure that the secure key is truly random; wherein at least one location is a region of memory located in a computing resource operationally connected to the computing-environment.
    Type: Grant
    Filed: May 13, 2015
    Date of Patent: May 23, 2017
    Assignee: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer, Alon Rosen
  • Patent number: 9660801
    Abstract: The present invention discloses methods and devices for key management in an as-a-service (aaS) context.
    Type: Grant
    Filed: June 23, 2015
    Date of Patent: May 23, 2017
    Assignee: Porticor Ltd.
    Inventor: Gilad Parann-Nissany
  • Patent number: 9380036
    Abstract: The present invention discloses methods and devices for securing keys for a non-secure computing-environment.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: June 28, 2016
    Assignee: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Patent number: 9380037
    Abstract: The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret.
    Type: Grant
    Filed: May 9, 2013
    Date of Patent: June 28, 2016
    Assignee: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Publication number: 20150143111
    Abstract: The present invention discloses methods and devices for securing keys for a non-secure computing-environment.
    Type: Application
    Filed: November 28, 2012
    Publication date: May 21, 2015
    Applicant: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer
  • Patent number: 8625802
    Abstract: The present invention discloses methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management.
    Type: Grant
    Filed: June 15, 2011
    Date of Patent: January 7, 2014
    Assignee: Porticor Ltd.
    Inventor: Gilad Parann-Nissany
  • Publication number: 20130247230
    Abstract: The present invention discloses methods for trusted protocols for a non-secure computing-environment. Methods include the steps of: upon request for determining that an untrusted computing resource is trustworthy, vouching for the untrusted resource as trustworthy by a trusted computing resource upon satisfying at least one criterion of: the trusted resource was directly involved in setting up and/or activating the untrusted resource; and/or has access to a database of identifying credentials and/or information which allow the trusted resource to verify that the untrusted resource is trustworthy; and concealing at least one secret that needs to be present on any computing resource, wherein at least one secret is concealed differently on each computing resource; and transmitting at least one secret from any computing resource to any other computing resource in a way that changes the step of concealing at least one secret without any computing resource knowing at least one secret.
    Type: Application
    Filed: May 9, 2013
    Publication date: September 19, 2013
    Applicant: Porticor Ltd.
    Inventors: Gilad Parann-Nissany, Yaron Sheffer