Patents Assigned to RSA Security Inc.
  • Patent number: 7298243
    Abstract: Methods and apparatus are disclosed for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with one or more of the devices. In accordance with an aspect of the invention, identifiers transmitted by the RFID devices are received by the reader. The system determines a classification of at least one of the received identifiers, and implements a privacy policy for data associated with one or more of the received identifiers based at least in part on the determined classification. For example, the given RFID device may be configurable into at least a first state indicative of a first classification, such as a private classification, and a second state indicative of a second classification, such as a public classification. The reader may alter a type of query that it issues based at least in part on the determined classification.
    Type: Grant
    Filed: August 10, 2004
    Date of Patent: November 20, 2007
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, John G. Brainard
  • Publication number: 20070256123
    Abstract: A system for detecting and preventing replay attacks includes a plurality of interconnected authentication servers, and one or more tokens for generating a one-time passcode and providing the one-time passcode to one of the authentication servers for authentication. The system includes an adjudicator function associated with each authentication server. The adjudicator evaluates a high water mark value associated with a token seeking authentication, allows authentication to proceed for the token if the high water mark evaluation indicates that the one-time passcode was not used in a previous authentication, and prevents authentication if the high water mark evaluation indicates that the one-time passcode was used in a previous authentication. The token is associated with a home authentication server that maintains a current high water mark of the token. The home authentication server validates the current high water mark on behalf of the adjudicator function evaluating the token for authentication.
    Type: Application
    Filed: December 1, 2006
    Publication date: November 1, 2007
    Applicant: RSA Security, Inc.
    Inventors: William Duane, Lawrence Friedman, Alexander Volanis
  • Publication number: 20070174614
    Abstract: A method of generating authentication seeds for a plurality of users, the method involving: based on a single master seed, generating a plurality of derivative seeds, each one for a corresponding different one of a plurality of users; and distributing the plurality of derivative seeds to a verifier for use in individually authenticating each of the plurality of users to that verifier, wherein generating each one of the plurality of derivative seeds involves mathematically combining the master seed and a unique identifier identifying the corresponding user.
    Type: Application
    Filed: February 17, 2006
    Publication date: July 26, 2007
    Applicant: RSA Security Inc.
    Inventors: William Duane, Jeffrey Hamel
  • Publication number: 20070124321
    Abstract: Methods and systems for storing secret information in a digital vault include obtaining from a user answers to a number of different questions, and identifying which subsets or combinations of the questions for which correct answers later provided by an entity will enable that entity to gain access to the secret information in the vault. The number of questions in each combination is less than the total number of questions, and at least one subset has at least two questions. For each subset, a corresponding string of answers is generated, the string is hashed, and the resulting hash value is combined with the digital secret. This hides the digital secret, which is then stored in the vault. Methods and systems for registering authentication material include storing a hashed string of answers for each combination, generating “multiple authenticators.
    Type: Application
    Filed: November 2, 2005
    Publication date: May 31, 2007
    Applicant: RSA Security Inc.
    Inventor: Michael Szydlo
  • Patent number: 7219368
    Abstract: Enrollment and authentication of a user based on a sequence of discrete graphical choices is described. A graphical interface presents various images and memory cues that a user may associate with their original graphical choices. Enrollment may require the input to have a security parameter value that meets or exceeds a threshold. An acceptable sequence of graphical choices is converted to a sequence of values and mapped to a sequence of codewords. Both a hash of the sequence of codewords and a sequence of offsets are stored for use in authenticating the user. An offset is the difference between a value and its corresponding codeword. Authentication requires the user to enter another sequence of discrete graphical choices that is approximately the same as original. The offsets are summed with the corresponding values before mapping to codewords. Authentication requires the sequence of codewords, or a hash thereof, to match.
    Type: Grant
    Filed: March 23, 2001
    Date of Patent: May 15, 2007
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, Niklas Frykholm
  • Patent number: 7197639
    Abstract: This invention relates to cryptographic communications methods and systems that protect a server from a connection depletion attack. Specifically, the invention presents a method for allocating a resource comprising the steps of receiving a resource allocation request from a client, imposing a computational task and a time limit for correct completion of the task upon the client, verifying that the task was performed correctly within the time limit, and allocating the resource if the task was correctly performed within the time limit.
    Type: Grant
    Filed: February 2, 2000
    Date of Patent: March 27, 2007
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, John Brainard
  • Publication number: 20060256961
    Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.
    Type: Application
    Filed: November 2, 2005
    Publication date: November 16, 2006
    Applicant: RSA Security Inc.
    Inventors: John Brainard, Burton Kaliski, Magnus Nystrom, Ronald Rivest
  • Patent number: 7111172
    Abstract: This invention relates to methods and apparatus for securely accessing and providing information including the use of a personal security device on a client where the client is subject to compromise.
    Type: Grant
    Filed: July 19, 1999
    Date of Patent: September 19, 2006
    Assignee: RSA Security Inc.
    Inventors: William Duane, Peter Röstin
  • Patent number: 7100049
    Abstract: A system and method allows a user to authenticate a web site, a web site to authenticate a user, or both. When a user requests a web page from the web site, customization information that is recognizable to the user is provided to allow the user to authenticate the web site. A signed, encrypted cookie stored on the user's system allows the web site to authenticate the user.
    Type: Grant
    Filed: May 9, 2003
    Date of Patent: August 29, 2006
    Assignee: RSA Security Inc.
    Inventors: Louis A Gasparini, Charles E Gotlieb
  • Publication number: 20060174104
    Abstract: A method of allowing a user to authenticate to an authentication service while isolating information associated with the user from the authentication service includes generating a service user identifier (SUID) associated with an authentication code source, a subscribing site and an authentication service. The method includes creating an association of the SUID with the information associated with the user, and isolating the association within the subscribing site. The method includes providing an authentication code generated by the authentication code-generating device from the user to the subscribing site, and providing the authentication code along with the SUID and information identifying the subscribing site to the authentication service.
    Type: Application
    Filed: December 16, 2005
    Publication date: August 3, 2006
    Applicant: RSA Security Inc.
    Inventors: Mark Crichton, James Townsend
  • Publication number: 20060041759
    Abstract: A method of protecting a password being used to establish interaction between a user and an application includes detecting a request for the password from the application by receiving a notification from the user indicating the request. The method further includes combining the password with information identifying the application, so as to produce a protected password, and authenticating to the application using the protected password. The method may also include a mutual authentication capability between user and the application.
    Type: Application
    Filed: June 30, 2005
    Publication date: February 23, 2006
    Applicant: RSA Security, Inc.
    Inventors: Burton Kaliski, Magnus Nystrom
  • Publication number: 20060037073
    Abstract: A method of controlling access to resources on a smart card, the method involving: providing a list of n questions for presentation to the user, where n is an integer; receiving from the user answers to questions among the list of n questions; determining how many of the received answers are correct; and if a sufficient number of the n questions was answered correctly, granting access to the resources on the smart card.
    Type: Application
    Filed: July 30, 2004
    Publication date: February 16, 2006
    Applicant: RSA Security, Inc.
    Inventors: Ari Juels, Ryan Culbertson, Andrea Doherty, Darren Dupre, Norik Kocharyan
  • Patent number: 6985583
    Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.
    Type: Grant
    Filed: May 4, 1999
    Date of Patent: January 10, 2006
    Assignee: RSA Security Inc.
    Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
  • Patent number: 6970070
    Abstract: Techniques are disclosed for providing enhanced privacy in an RFID system comprising a plurality of RFID devices, each having an associated identifier, and at least one reader which communicates with one or more of the devices. A blocker device is operative to receive a communication directed from the reader to one or more of the RFID devices, and to generate, possibly based on information in the received communication, an output transmittable to the reader. The output simulates one or more responses from at least one of the RFID devices in a manner which prevents the reader from determining at least a portion of the identifier of at least one of the RFID devices. The blocker device may itself comprise one of the RFID devices. In an illustrative embodiment, the output generated by the blocker device interferes with the normal operation of a singulation algorithm implemented by the reader.
    Type: Grant
    Filed: September 29, 2003
    Date of Patent: November 29, 2005
    Assignee: RSA Security Inc.
    Inventors: Ari Juels, Ronald L. Rivest, Michael Szydlo
  • Patent number: 6813354
    Abstract: A highly efficient mix network for small numbers of inputs is provided. Four data messages would be a typical number of inputs. The structure of sorting/permutation networks is used to permute the input. This is done in a way that changes the position of pairs of items. A mix network is provided which is highly efficient on small input batches and is robust and private in the face of collusion by any minority set of mix servers. Additionally, the mix network method and apparatus has the feature of being publicly verifiable because the mixing method yields a transcript of results that can demonstrate to a third party that the mix proceeded correctly. An apparatus comprised of a plurality of mix servers is provided. Each mix server includes a randomizer network. Each randomizer network receives a plurality of input data messages and performs re-encryption and permutation operations on the plurality of input data messages to form a plurality of output data messages.
    Type: Grant
    Filed: March 9, 2000
    Date of Patent: November 2, 2004
    Assignees: Lucent Technologies Inc., RSA Security Inc.
    Inventors: Bjorn Markus Jakobsson, Ari Juels
  • Publication number: 20040172535
    Abstract: A method and system for generating an authentication code that depends at least in part on a dynamic value that changes over time, an event state associated with the occurrence of an event, and a secret associated with an authentication device. By generating the authentication code responsive to an event state, an identity authentication code can be used to verify identity and to communicate event state information, and to do so in a secure manner.
    Type: Application
    Filed: November 26, 2003
    Publication date: September 2, 2004
    Applicant: RSA Security Inc.
    Inventors: Markus Jakobsson, Ari Juels, Burton S. Kaliski
  • Patent number: D511983
    Type: Grant
    Filed: December 9, 2003
    Date of Patent: November 29, 2005
    Assignee: RSA Security Inc.
    Inventors: Edward W. Vipond, Kenneth M. Gehalo
  • Patent number: D516929
    Type: Grant
    Filed: December 9, 2003
    Date of Patent: March 14, 2006
    Assignee: RSA Security Inc.
    Inventors: Edward W. Vipond, Kenneth M. Gehalo
  • Patent number: D517440
    Type: Grant
    Filed: October 4, 2004
    Date of Patent: March 21, 2006
    Assignee: RSA Security Inc.
    Inventors: Kenneth M. Gehalo, Edward W. Vipond, Carolus Thijssen, William Wrightson
  • Patent number: D534448
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: January 2, 2007
    Assignee: RSA Security Inc.
    Inventors: Robert W. Shaffer, II, Edward W. Vipond