Patents Assigned to RSA Security Inc.
-
Patent number: 7716484Abstract: In general, in one aspect, the invention relates to a method for accessing encrypted data by a client. The method includes receiving from the client by a server client information derived from a first secret wherein the client information is derived such that the server can not feasibly determine the first secret. The method also includes providing to the client by the server intermediate data, which is derived responsive to the received client information, a server secret, and possibly other information. The intermediate data is derived such that the client cannot feasibly determine the server secret. The method also includes authenticating the client by a device that stores encrypted secrets and is configured not to provide the encrypted secrets without authentication. After the authenticating step, the method also includes providing the encrypted secrets to the client. The encrypted secrets 5 are capable of being decrypted using a third secret that is derived from the intermediate data.Type: GrantFiled: March 9, 2001Date of Patent: May 11, 2010Assignee: RSA Security Inc.Inventor: Burton S. Kaliski, Jr.
-
Publication number: 20100095118Abstract: Cryptographic Key Management System facilitating secure access of data portions to corresponding groups of users. In an embodiment, corresponding group key (asymmetric key pair) is provided for each group, with the private key being stored in a secure format requiring the user credentials for decryption. In addition, a data key required to decrypt a data portion of interest is encrypted using the group public key. Thus, when a user attempts to access a data portion, the user credentials are used to decrypt the group private key, which is then used to decrypt the data key. The data key is then used to decrypt the data portion of interest.Type: ApplicationFiled: October 11, 2007Publication date: April 15, 2010Applicant: RSA Security Inc.Inventor: Anil Kumar Meka
-
Patent number: 7660902Abstract: A dynamic file access control and management system and method in accordance with the present invention may be a proxy file management system that includes one or more file system proxy servers that provide selective access and usage management to files available from one or more file systems or sources. The present invention may embody a secure transport protocol that tunnels distributed file systems, application independent usage controls connected to files on end-user computers, dynamically merging secondary content to a requested file, and applying bandwidth management to any of the foregoing. Embodied in the various implementations of the present invention is enhanced file security. Preferably, the proxy file management system is transparent to an end-user. A dynamic content management system may also be included that selectively adds content to requested files.Type: GrantFiled: November 20, 2001Date of Patent: February 9, 2010Assignee: RSA Security, Inc.Inventors: Todd D. Graham, Jonathan C. Hudson
-
Patent number: 7602904Abstract: A system provides an order-invariant fuzzy commitment scheme. In an exemplary embodiment, the scheme includes receiving a first set of elements and selecting a polynomial for encoding an item under the first set of elements to generate an order-invariant fuzzy commitment of the item. The system utilizes an error-correcting code for decommitting the item if a second set of elements has a specified level of overlap with the first set of elements.Type: GrantFiled: November 26, 2001Date of Patent: October 13, 2009Assignee: RSA Security, Inc.Inventors: Ari Juels, Madhu Sudan
-
Patent number: 7562222Abstract: A system and method communicates information from an entity that a registry can use to authenticate the entity to a user. If the registry authenticates the entity, it displays information that represents a shared secret between the registry and the user.Type: GrantFiled: March 23, 2005Date of Patent: July 14, 2009Assignee: RSA Security Inc.Inventors: Louis A Gasparini, William H Harris
-
Patent number: 7562221Abstract: A single sign-on technique allows multiple accesses to one or more applications or other resources using a proof-of-authentication module operating in conjunction with a standard authentication component. The application or other resource issues an authentication information request to the standard authentication component responsive to an access request from the user. The application or other resource receives, responsive to the authentication information request, a proof-of-authentication value from the standard authentication component, and authenticates the user based on the proof-of-authentication value. The standard authentication component interacts with the proof-of-authentication module to obtain the proof-of-authentication value. The proof-of-authentication module is configured to generate multiple proof-of-authentication values for authentication of respective access requests of the user.Type: GrantFiled: September 12, 2006Date of Patent: July 14, 2009Assignee: RSA Security Inc.Inventors: Magnus Nyström, Anders Rundgren, William M. Duane
-
Patent number: 7532104Abstract: Cryptographic techniques are provided having a complexity level which permits their implementation in inexpensive radio frequency identification (RFID) tags or other RFID devices. In an RFID system comprising one or more RFID devices and at least one reader that communicates with the devices, a plurality of pseudonyms is associated with a given one of the RFID devices. The RFID device transmits different ones of the pseudonyms in response to different reader queries, and an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.Type: GrantFiled: February 19, 2004Date of Patent: May 12, 2009Assignee: RSA Security, Inc.Inventor: Ari Juels
-
Patent number: 7516492Abstract: In one embodiment, documents accessible via a designated public account are classified as public. In another embodiment, documents accessible according to a designated public access control list are classified as public. In some embodiments, all documents not classified as public are classified as private. Content in the public documents is linguistically analyzed, resulting in a set of keys for use in subsequent full and partial content matching. The keys and associated file names are stored in a public-content identification repository. Similarly, content in the private documents is linguistically analyzed, and the results are stored in a private-content identification repository. Subsequently, full and partial content matching is performed on monitored content according to information in the public and private repositories.Type: GrantFiled: September 24, 2004Date of Patent: April 7, 2009Assignee: RSA Security Inc.Inventors: James Donald Nisbet, James Christopher Wiese, David Alexander Reizes, Stephen Crosby Hoyt
-
Patent number: 7502467Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.Type: GrantFiled: November 2, 2005Date of Patent: March 10, 2009Assignee: RSA Security Inc.Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
-
Patent number: 7502933Abstract: A method and system for generating an authentication code that depends at least in part on a dynamic value that changes over time, an event state associated with the occurrence of an event, and a secret associated with an authentication device. By generating the authentication code responsive to an event state, an identity authentication code can be used to verify identity and to communicate event state information, and to do so in a secure manner.Type: GrantFiled: November 26, 2003Date of Patent: March 10, 2009Assignee: RSA Security Inc.Inventors: Markus Jakobsson, Ari Juels, Burton S. Kaliski, Jr.
-
Patent number: 7472093Abstract: A system and method for enabling use of detailed consumer profiles for the purposes of targeted information delivery while protecting these profiles from disclosure to information providers or hostile third parties are disclosed herein. Rather than gathering data about a consumer in order to decide which information to send her, an information provider makes use of a client-side executable software module called a negotiant function. The negotiant function acts as a client-side proxy to protect consumer data, and it also directs the targeting of information, requesting items of information from the information provider that are tailored to the profile provided by the consumer.Type: GrantFiled: March 8, 2001Date of Patent: December 30, 2008Assignee: RSA Security Inc.Inventor: Ari Juels
-
Patent number: 7461250Abstract: In an embodiment of a system and method according to the present invention, a chain of one or more certificates certifying a principal's public key is exchanged for a single substitute certificate. The substitute certificate is used as a replacement for the certificate chain. The substitute certificate is useful for authentication of the principal. In one embodiment, an authentication server exchanges the certificates. The substitute certificate is signed by the authentication server and used for authentication and communication with principals that have knowledge of and trust the authentication server. In one embodiment the substitute certificate also includes the principal's access information.Type: GrantFiled: July 22, 1999Date of Patent: December 2, 2008Assignee: RSA Security, Inc.Inventors: William M. Duane, Peter Röstin
-
Patent number: 7461399Abstract: A method of controlling access to resources on a smart card, the method involving: providing a list of n questions for presentation to the user, where n is an integer; receiving from the user answers to questions among the list of n questions; determining how many of the received answers are correct; and if a sufficient number of the n questions was answered correctly, granting access to the resources on the smart card.Type: GrantFiled: July 30, 2004Date of Patent: December 2, 2008Assignee: RSA Security Inc.Inventors: Ari Juels, Ryan Culbertson, Andrea Doherty, Darren Dupre, Norik Kocharyan
-
Patent number: 7454349Abstract: A system and method for generating on-demand voiceprints are presented wherein voiceprints are created on the fly using voice recordings and associated metadata specified by an application. The application requests a voiceprint and specifies a description of the data necessary to generate the voiceprint, including the appropriate voice recordings, the requisite verification engine and other parameters that should be utilized to generate the voiceprint. The specified voice recordings are accessed from storage and a voiceprint is produced using the designated speech engine and application-specified parameters.Type: GrantFiled: December 15, 2003Date of Patent: November 18, 2008Assignee: RSA Security Inc.Inventors: Remco Teunen, Karen Kaushansky
-
Patent number: 7404087Abstract: A system and method are provided for improving the accuracy of speaker authentication by combining the results of multiple verification sources using statistical modeling. A statistical classifier is built on top of the underlying verification sources. The classifier combines the multiple verification inputs with associated models of the respective verification technologies underlying the verification inputs. The classifier functions to classify a claimant as a true speaker or impostor based upon the verification inputs, the model or models and, potentially, additional information related to the context in which the classifier is being used.Type: GrantFiled: December 15, 2003Date of Patent: July 22, 2008Assignee: RSA Security Inc.Inventor: Remco Teunen
-
Patent number: 7363494Abstract: A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a personal identification number (PIN) and a verifier identifier can also be combined into the authentication code.Type: GrantFiled: December 4, 2001Date of Patent: April 22, 2008Assignee: RSA Security Inc.Inventors: John G. Brainard, Burton S. Kaliski, Jr., Ronald L. Rivest
-
Patent number: 7359507Abstract: Methods for regenerating a strong secret for a user, based on input of a weak secret, such as a password, are assisted by communications exchanges with a set of independent servers. Each server holds a distinct secret value (i.e., server secret data). The strong secret is a function of the user's weak secret and of the server secret data, and a would-be attacker cannot feasibly compute the strong secret without access to both the user's weak secret and the server secret data. Any attacker has only a limited opportunity to guess the weak secret, even if he has access to all messages transmitted in the generation and regeneration processes plus a subset (but not all) of the server secret data.Type: GrantFiled: March 12, 2001Date of Patent: April 15, 2008Assignee: RSA Security Inc.Inventor: Burton S. Kaliski
-
Patent number: 7356696Abstract: The bread pudding protocol of the present invention represents a novel use of proofs of work and is based upon the same principle as the dish from which it takes its name, namely, that of reuse to minimize waste. Whereas the traditional bread pudding recipe recycles stale bread, our bread pudding protocol recycles the “stale” computations in a POW to perform a separate and useful task, while also maintaining privacy in the task. In one advantageous embodiment of our bread pudding protocol, we consider the computationally intensive operation of minting coins in the MicroMint scheme of Rivest and Shamir and demonstrate how the minting operation can be partitioned into a collection of POWs, which are then used to shift the burden of the minting operation onto a large group of untrusted computational devices. Thus, the computational effort invested in the POWs is recycled to accomplish the minting operation.Type: GrantFiled: August 1, 2000Date of Patent: April 8, 2008Assignees: Lucent Technologies Inc., RSA Security Inc.Inventors: Bjorn Markus Jakobsson, Ari Juels
-
Patent number: 7346775Abstract: A system and method allows a user to authenticate a web site, a web site to authenticate a user, or both. When a user requests a web page from the web site, customization information that is recognizable to the user is provided to allow the user to authenticate the web site. A signed, encrypted cookie stored on the user's system allows the web site to authenticate the user.Type: GrantFiled: August 28, 2006Date of Patent: March 18, 2008Assignee: RSA Security Inc.Inventors: Louis A Gasparinl, Charles E Gotlieb
-
Publication number: 20080028447Abstract: A method of submitting information as part of an authentication operation includes generating a one time password that is intended for use in an authentication operation. The method further includes providing the one time password in a display field, wherein the display field is adapted to work in conjunction with a browser to submit the one time password in response to a request for the one time password. A method of controlling submission of identity information within an authentication system includes receiving a trust list from the authentication system. The trust list identifies entities that are authorized to receive the identity information. The method further includes receiving a request to submit the identity information to a candidate entity for an authentication operation, and providing the identity information to the candidate entity if the trust list indicates that the candidate entity is authorized to receive the identity information.Type: ApplicationFiled: February 12, 2007Publication date: January 31, 2008Applicant: RSA Security Inc.Inventors: Michael O'Malley, Gideon Ansell, Andrea Doherty, Aaron Kechley, Andrew Nanopoulos