Patents Assigned to RSA Security Inc.
  • Patent number: 7716484
    Abstract: In general, in one aspect, the invention relates to a method for accessing encrypted data by a client. The method includes receiving from the client by a server client information derived from a first secret wherein the client information is derived such that the server can not feasibly determine the first secret. The method also includes providing to the client by the server intermediate data, which is derived responsive to the received client information, a server secret, and possibly other information. The intermediate data is derived such that the client cannot feasibly determine the server secret. The method also includes authenticating the client by a device that stores encrypted secrets and is configured not to provide the encrypted secrets without authentication. After the authenticating step, the method also includes providing the encrypted secrets to the client. The encrypted secrets 5 are capable of being decrypted using a third secret that is derived from the intermediate data.
    Type: Grant
    Filed: March 9, 2001
    Date of Patent: May 11, 2010
    Assignee: RSA Security Inc.
    Inventor: Burton S. Kaliski, Jr.
  • Publication number: 20100095118
    Abstract: Cryptographic Key Management System facilitating secure access of data portions to corresponding groups of users. In an embodiment, corresponding group key (asymmetric key pair) is provided for each group, with the private key being stored in a secure format requiring the user credentials for decryption. In addition, a data key required to decrypt a data portion of interest is encrypted using the group public key. Thus, when a user attempts to access a data portion, the user credentials are used to decrypt the group private key, which is then used to decrypt the data key. The data key is then used to decrypt the data portion of interest.
    Type: Application
    Filed: October 11, 2007
    Publication date: April 15, 2010
    Applicant: RSA Security Inc.
    Inventor: Anil Kumar Meka
  • Patent number: 7660902
    Abstract: A dynamic file access control and management system and method in accordance with the present invention may be a proxy file management system that includes one or more file system proxy servers that provide selective access and usage management to files available from one or more file systems or sources. The present invention may embody a secure transport protocol that tunnels distributed file systems, application independent usage controls connected to files on end-user computers, dynamically merging secondary content to a requested file, and applying bandwidth management to any of the foregoing. Embodied in the various implementations of the present invention is enhanced file security. Preferably, the proxy file management system is transparent to an end-user. A dynamic content management system may also be included that selectively adds content to requested files.
    Type: Grant
    Filed: November 20, 2001
    Date of Patent: February 9, 2010
    Assignee: RSA Security, Inc.
    Inventors: Todd D. Graham, Jonathan C. Hudson
  • Patent number: 7602904
    Abstract: A system provides an order-invariant fuzzy commitment scheme. In an exemplary embodiment, the scheme includes receiving a first set of elements and selecting a polynomial for encoding an item under the first set of elements to generate an order-invariant fuzzy commitment of the item. The system utilizes an error-correcting code for decommitting the item if a second set of elements has a specified level of overlap with the first set of elements.
    Type: Grant
    Filed: November 26, 2001
    Date of Patent: October 13, 2009
    Assignee: RSA Security, Inc.
    Inventors: Ari Juels, Madhu Sudan
  • Patent number: 7562221
    Abstract: A single sign-on technique allows multiple accesses to one or more applications or other resources using a proof-of-authentication module operating in conjunction with a standard authentication component. The application or other resource issues an authentication information request to the standard authentication component responsive to an access request from the user. The application or other resource receives, responsive to the authentication information request, a proof-of-authentication value from the standard authentication component, and authenticates the user based on the proof-of-authentication value. The standard authentication component interacts with the proof-of-authentication module to obtain the proof-of-authentication value. The proof-of-authentication module is configured to generate multiple proof-of-authentication values for authentication of respective access requests of the user.
    Type: Grant
    Filed: September 12, 2006
    Date of Patent: July 14, 2009
    Assignee: RSA Security Inc.
    Inventors: Magnus Nyström, Anders Rundgren, William M. Duane
  • Patent number: 7562222
    Abstract: A system and method communicates information from an entity that a registry can use to authenticate the entity to a user. If the registry authenticates the entity, it displays information that represents a shared secret between the registry and the user.
    Type: Grant
    Filed: March 23, 2005
    Date of Patent: July 14, 2009
    Assignee: RSA Security Inc.
    Inventors: Louis A Gasparini, William H Harris
  • Patent number: 7532104
    Abstract: Cryptographic techniques are provided having a complexity level which permits their implementation in inexpensive radio frequency identification (RFID) tags or other RFID devices. In an RFID system comprising one or more RFID devices and at least one reader that communicates with the devices, a plurality of pseudonyms is associated with a given one of the RFID devices. The RFID device transmits different ones of the pseudonyms in response to different reader queries, and an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.
    Type: Grant
    Filed: February 19, 2004
    Date of Patent: May 12, 2009
    Assignee: RSA Security, Inc.
    Inventor: Ari Juels
  • Patent number: 7516492
    Abstract: In one embodiment, documents accessible via a designated public account are classified as public. In another embodiment, documents accessible according to a designated public access control list are classified as public. In some embodiments, all documents not classified as public are classified as private. Content in the public documents is linguistically analyzed, resulting in a set of keys for use in subsequent full and partial content matching. The keys and associated file names are stored in a public-content identification repository. Similarly, content in the private documents is linguistically analyzed, and the results are stored in a private-content identification repository. Subsequently, full and partial content matching is performed on monitored content according to information in the public and private repositories.
    Type: Grant
    Filed: September 24, 2004
    Date of Patent: April 7, 2009
    Assignee: RSA Security Inc.
    Inventors: James Donald Nisbet, James Christopher Wiese, David Alexander Reizes, Stephen Crosby Hoyt
  • Patent number: 7502933
    Abstract: A method and system for generating an authentication code that depends at least in part on a dynamic value that changes over time, an event state associated with the occurrence of an event, and a secret associated with an authentication device. By generating the authentication code responsive to an event state, an identity authentication code can be used to verify identity and to communicate event state information, and to do so in a secure manner.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: March 10, 2009
    Assignee: RSA Security Inc.
    Inventors: Markus Jakobsson, Ari Juels, Burton S. Kaliski, Jr.
  • Patent number: 7502467
    Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.
    Type: Grant
    Filed: November 2, 2005
    Date of Patent: March 10, 2009
    Assignee: RSA Security Inc.
    Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
  • Patent number: 7472093
    Abstract: A system and method for enabling use of detailed consumer profiles for the purposes of targeted information delivery while protecting these profiles from disclosure to information providers or hostile third parties are disclosed herein. Rather than gathering data about a consumer in order to decide which information to send her, an information provider makes use of a client-side executable software module called a negotiant function. The negotiant function acts as a client-side proxy to protect consumer data, and it also directs the targeting of information, requesting items of information from the information provider that are tailored to the profile provided by the consumer.
    Type: Grant
    Filed: March 8, 2001
    Date of Patent: December 30, 2008
    Assignee: RSA Security Inc.
    Inventor: Ari Juels
  • Patent number: 7461399
    Abstract: A method of controlling access to resources on a smart card, the method involving: providing a list of n questions for presentation to the user, where n is an integer; receiving from the user answers to questions among the list of n questions; determining how many of the received answers are correct; and if a sufficient number of the n questions was answered correctly, granting access to the resources on the smart card.
    Type: Grant
    Filed: July 30, 2004
    Date of Patent: December 2, 2008
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, Ryan Culbertson, Andrea Doherty, Darren Dupre, Norik Kocharyan
  • Patent number: 7461250
    Abstract: In an embodiment of a system and method according to the present invention, a chain of one or more certificates certifying a principal's public key is exchanged for a single substitute certificate. The substitute certificate is used as a replacement for the certificate chain. The substitute certificate is useful for authentication of the principal. In one embodiment, an authentication server exchanges the certificates. The substitute certificate is signed by the authentication server and used for authentication and communication with principals that have knowledge of and trust the authentication server. In one embodiment the substitute certificate also includes the principal's access information.
    Type: Grant
    Filed: July 22, 1999
    Date of Patent: December 2, 2008
    Assignee: RSA Security, Inc.
    Inventors: William M. Duane, Peter Röstin
  • Patent number: 7454349
    Abstract: A system and method for generating on-demand voiceprints are presented wherein voiceprints are created on the fly using voice recordings and associated metadata specified by an application. The application requests a voiceprint and specifies a description of the data necessary to generate the voiceprint, including the appropriate voice recordings, the requisite verification engine and other parameters that should be utilized to generate the voiceprint. The specified voice recordings are accessed from storage and a voiceprint is produced using the designated speech engine and application-specified parameters.
    Type: Grant
    Filed: December 15, 2003
    Date of Patent: November 18, 2008
    Assignee: RSA Security Inc.
    Inventors: Remco Teunen, Karen Kaushansky
  • Patent number: 7404087
    Abstract: A system and method are provided for improving the accuracy of speaker authentication by combining the results of multiple verification sources using statistical modeling. A statistical classifier is built on top of the underlying verification sources. The classifier combines the multiple verification inputs with associated models of the respective verification technologies underlying the verification inputs. The classifier functions to classify a claimant as a true speaker or impostor based upon the verification inputs, the model or models and, potentially, additional information related to the context in which the classifier is being used.
    Type: Grant
    Filed: December 15, 2003
    Date of Patent: July 22, 2008
    Assignee: RSA Security Inc.
    Inventor: Remco Teunen
  • Patent number: 7363494
    Abstract: A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a personal identification number (PIN) and a verifier identifier can also be combined into the authentication code.
    Type: Grant
    Filed: December 4, 2001
    Date of Patent: April 22, 2008
    Assignee: RSA Security Inc.
    Inventors: John G. Brainard, Burton S. Kaliski, Jr., Ronald L. Rivest
  • Patent number: 7359507
    Abstract: Methods for regenerating a strong secret for a user, based on input of a weak secret, such as a password, are assisted by communications exchanges with a set of independent servers. Each server holds a distinct secret value (i.e., server secret data). The strong secret is a function of the user's weak secret and of the server secret data, and a would-be attacker cannot feasibly compute the strong secret without access to both the user's weak secret and the server secret data. Any attacker has only a limited opportunity to guess the weak secret, even if he has access to all messages transmitted in the generation and regeneration processes plus a subset (but not all) of the server secret data.
    Type: Grant
    Filed: March 12, 2001
    Date of Patent: April 15, 2008
    Assignee: RSA Security Inc.
    Inventor: Burton S. Kaliski
  • Patent number: 7356696
    Abstract: The bread pudding protocol of the present invention represents a novel use of proofs of work and is based upon the same principle as the dish from which it takes its name, namely, that of reuse to minimize waste. Whereas the traditional bread pudding recipe recycles stale bread, our bread pudding protocol recycles the “stale” computations in a POW to perform a separate and useful task, while also maintaining privacy in the task. In one advantageous embodiment of our bread pudding protocol, we consider the computationally intensive operation of minting coins in the MicroMint scheme of Rivest and Shamir and demonstrate how the minting operation can be partitioned into a collection of POWs, which are then used to shift the burden of the minting operation onto a large group of untrusted computational devices. Thus, the computational effort invested in the POWs is recycled to accomplish the minting operation.
    Type: Grant
    Filed: August 1, 2000
    Date of Patent: April 8, 2008
    Assignees: Lucent Technologies Inc., RSA Security Inc.
    Inventors: Bjorn Markus Jakobsson, Ari Juels
  • Patent number: 7346775
    Abstract: A system and method allows a user to authenticate a web site, a web site to authenticate a user, or both. When a user requests a web page from the web site, customization information that is recognizable to the user is provided to allow the user to authenticate the web site. A signed, encrypted cookie stored on the user's system allows the web site to authenticate the user.
    Type: Grant
    Filed: August 28, 2006
    Date of Patent: March 18, 2008
    Assignee: RSA Security Inc.
    Inventors: Louis A Gasparinl, Charles E Gotlieb
  • Publication number: 20080028447
    Abstract: A method of submitting information as part of an authentication operation includes generating a one time password that is intended for use in an authentication operation. The method further includes providing the one time password in a display field, wherein the display field is adapted to work in conjunction with a browser to submit the one time password in response to a request for the one time password. A method of controlling submission of identity information within an authentication system includes receiving a trust list from the authentication system. The trust list identifies entities that are authorized to receive the identity information. The method further includes receiving a request to submit the identity information to a candidate entity for an authentication operation, and providing the identity information to the candidate entity if the trust list indicates that the candidate entity is authorized to receive the identity information.
    Type: Application
    Filed: February 12, 2007
    Publication date: January 31, 2008
    Applicant: RSA Security Inc.
    Inventors: Michael O'Malley, Gideon Ansell, Andrea Doherty, Aaron Kechley, Andrew Nanopoulos