Patents Assigned to Security First Corp.
-
Publication number: 20120173883Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.Type: ApplicationFiled: February 10, 2012Publication date: July 5, 2012Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport, Steven Winick
-
Publication number: 20120170750Abstract: A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated to a common interface format, and then executed remotely from the first interface. Return arguments may then be translated from the common interface format to a format compatible with the first interface and communicated securely to the first interface. The cryptographic keys may be used in connection with a secure data parser that secures data by randomly distributing data within a data set into two or more shares.Type: ApplicationFiled: February 23, 2012Publication date: July 5, 2012Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport
-
Publication number: 20120163592Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.Type: ApplicationFiled: March 5, 2012Publication date: June 28, 2012Applicant: Security First Corp.Inventors: Mihir Bellare, Phillip Rogaway
-
Publication number: 20120166815Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.Type: ApplicationFiled: February 10, 2012Publication date: June 28, 2012Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport, Steven Winick
-
Publication number: 20120159197Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.Type: ApplicationFiled: February 10, 2012Publication date: June 21, 2012Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport, Steven Winick
-
Patent number: 8155322Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.Type: GrantFiled: November 7, 2007Date of Patent: April 10, 2012Assignee: Security First Corp.Inventors: Mihir Bellare, Phillip Rogaway
-
Publication number: 20120072723Abstract: Systems and methods are provided for creating and using a sharable file-level key to secure data files. The sharable file-level key is generated based on a workgroup key associated with the data file, as well as unique information associated with the data file. The sharable file-level key may be used to encrypt and split data using a Secure Parser. Systems and methods are also provided for sharing data without replicating the data on the machine of the end user. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data that was encrypted and split. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data.Type: ApplicationFiled: September 20, 2011Publication date: March 22, 2012Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Gabriel D. Landau, Matthew Staker, William Yakamovich
-
Patent number: 8135134Abstract: A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated to a common interface format, and then executed remotely from the first interface. Return arguments may then be translated from the common interface format to a format compatible with the first interface and communicated securely to the first interface. The cryptographic keys may be used in connection with a secure data parser that secures data by randomly distributing data within a data set into two or more shares.Type: GrantFiled: September 12, 2008Date of Patent: March 13, 2012Assignee: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport
-
Publication number: 20110296440Abstract: Data processing and an accelerator system therefore are described. An embodiment relates generally to a data processing system. In such an embodiment, a bus and an accelerator are coupled to one another. The accelerator has an application function block. The application function block is to process data to provide processed data to storage. A network interface is coupled to obtain the processed data from the storage for transmission.Type: ApplicationFiled: May 27, 2011Publication date: December 1, 2011Applicant: Security First Corp.Inventors: Lawrence A. Laurich, Stephen Paul Sample, Michael H. Wang, Babu Rao Kandimalla, Rick L. Orsini, Mark S. O'Hare, Don Martin, Steven Mark Casselman
-
Publication number: 20110246817Abstract: Systems and methods for reading and writing a set of data using a journaling service are provided. The journaling service may be used to identify and record data storage operations associated with one or more shares of data stored in one or more share locations. The journaling service may use logs to record each of the read and write requests to the share locations. In some embodiments, the log may be a queue data structure that stores information associated with failed data storage operations. In some embodiments, the journaling service may leverage both memory and disk storage in order to maintain the journaling queue. In some embodiments, the journaling queue may maintain information associated with the state of each share location. In some embodiments, this information may be used by the journaling service to determine when to monitor and record information regarding data storage operations associated with the share locations.Type: ApplicationFiled: March 31, 2011Publication date: October 6, 2011Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare
-
Publication number: 20110246766Abstract: The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.Type: ApplicationFiled: March 31, 2011Publication date: October 6, 2011Applicant: Security First Corp.Inventors: Rick L. Orsini, Mark S. O'Hare
-
Publication number: 20110202755Abstract: Two approaches are provided for distributing trust among a set of certificate authorities. Both approaches are equally secure. In each approach, a secure data parser is integrated with any suitable encryption technology. Each approach may be used to secure data in motion. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels.Type: ApplicationFiled: November 24, 2010Publication date: August 18, 2011Applicant: Security First Corp.Inventors: RICK L. ORSINI, Mark S. O'Hare, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
-
Publication number: 20100299313Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security.Type: ApplicationFiled: May 19, 2010Publication date: November 25, 2010Applicant: Security First Corp.Inventors: RICK L. ORSINI, Mark S. O'Hare, Don Martin
-
Patent number: 6856383Abstract: A device for imaging a relief object without illuminating a platen is disclosed. The device includes a single electrode electroluminescent device, which may be inorganic or organic, and a current source. The current source is coupled to the single electrode of the electroluminescent device and to the relief object to be imaged. The valleys and ridges of the relief object couple current to the electroluminescent device at different magnitudes which causes the electroluminescent device to generate light at different intensities that correspond to the ridges and valleys of the relief object. The generated light forms an image of the relief object which may be focused by optical elements onto a sensor array for capture and image processing. In another embodiment of the invention, a one-to-one sensor array is located proximate the electroluminescent device to capture the image.Type: GrantFiled: September 5, 1997Date of Patent: February 15, 2005Assignee: Security First Corp.Inventors: Paul F. Vachris, Ronald S. Smith