Patents Assigned to Security First Corp.
  • Publication number: 20120173883
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
    Type: Application
    Filed: February 10, 2012
    Publication date: July 5, 2012
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport, Steven Winick
  • Publication number: 20120170750
    Abstract: A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated to a common interface format, and then executed remotely from the first interface. Return arguments may then be translated from the common interface format to a format compatible with the first interface and communicated securely to the first interface. The cryptographic keys may be used in connection with a secure data parser that secures data by randomly distributing data within a data set into two or more shares.
    Type: Application
    Filed: February 23, 2012
    Publication date: July 5, 2012
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport
  • Publication number: 20120163592
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Application
    Filed: March 5, 2012
    Publication date: June 28, 2012
    Applicant: Security First Corp.
    Inventors: Mihir Bellare, Phillip Rogaway
  • Publication number: 20120166815
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
    Type: Application
    Filed: February 10, 2012
    Publication date: June 28, 2012
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport, Steven Winick
  • Publication number: 20120159197
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
    Type: Application
    Filed: February 10, 2012
    Publication date: June 21, 2012
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport, Steven Winick
  • Patent number: 8155322
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Grant
    Filed: November 7, 2007
    Date of Patent: April 10, 2012
    Assignee: Security First Corp.
    Inventors: Mihir Bellare, Phillip Rogaway
  • Publication number: 20120072723
    Abstract: Systems and methods are provided for creating and using a sharable file-level key to secure data files. The sharable file-level key is generated based on a workgroup key associated with the data file, as well as unique information associated with the data file. The sharable file-level key may be used to encrypt and split data using a Secure Parser. Systems and methods are also provided for sharing data without replicating the data on the machine of the end user. Data is encrypted and split across an external/consumer network and an enterprise/producer network. Access to the data is provided using a computing image generated by a server in the enterprise/producer network and then distributed to end users of the external/consumer network. This computing image may include preloaded files that provide pointers to the data that was encrypted and split. No access or replication of the data on the enterprise/producer network is needed in order for a user of the external/consumer network to access the data.
    Type: Application
    Filed: September 20, 2011
    Publication date: March 22, 2012
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare, Gabriel D. Landau, Matthew Staker, William Yakamovich
  • Patent number: 8135134
    Abstract: A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated to a common interface format, and then executed remotely from the first interface. Return arguments may then be translated from the common interface format to a format compatible with the first interface and communicated securely to the first interface. The cryptographic keys may be used in connection with a secure data parser that secures data by randomly distributing data within a data set into two or more shares.
    Type: Grant
    Filed: September 12, 2008
    Date of Patent: March 13, 2012
    Assignee: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare, Roger Davenport
  • Publication number: 20110296440
    Abstract: Data processing and an accelerator system therefore are described. An embodiment relates generally to a data processing system. In such an embodiment, a bus and an accelerator are coupled to one another. The accelerator has an application function block. The application function block is to process data to provide processed data to storage. A network interface is coupled to obtain the processed data from the storage for transmission.
    Type: Application
    Filed: May 27, 2011
    Publication date: December 1, 2011
    Applicant: Security First Corp.
    Inventors: Lawrence A. Laurich, Stephen Paul Sample, Michael H. Wang, Babu Rao Kandimalla, Rick L. Orsini, Mark S. O'Hare, Don Martin, Steven Mark Casselman
  • Publication number: 20110246817
    Abstract: Systems and methods for reading and writing a set of data using a journaling service are provided. The journaling service may be used to identify and record data storage operations associated with one or more shares of data stored in one or more share locations. The journaling service may use logs to record each of the read and write requests to the share locations. In some embodiments, the log may be a queue data structure that stores information associated with failed data storage operations. In some embodiments, the journaling service may leverage both memory and disk storage in order to maintain the journaling queue. In some embodiments, the journaling queue may maintain information associated with the state of each share location. In some embodiments, this information may be used by the journaling service to determine when to monitor and record information regarding data storage operations associated with the share locations.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 6, 2011
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare
  • Publication number: 20110246766
    Abstract: The systems and methods of the present invention provide a solution that makes data provably secure and accessible—addressing data security at the bit level—thereby eliminating the need for multiple perimeter hardware and software technologies. Data security is incorporated or weaved directly into the data at the bit level. The systems and methods of the present invention enable enterprise communities of interest to leverage a common enterprise infrastructure. Because security is already woven into the data, this common infrastructure can be used without compromising data security and access control. In some applications, data is authenticated, encrypted, and parsed or split into multiple shares prior to being sent to multiple locations, e.g., a private or public cloud. The data is hidden while in transit to the storage location, and is inaccessible to users who do not have the correct credentials for access.
    Type: Application
    Filed: March 31, 2011
    Publication date: October 6, 2011
    Applicant: Security First Corp.
    Inventors: Rick L. Orsini, Mark S. O'Hare
  • Publication number: 20110202755
    Abstract: Two approaches are provided for distributing trust among a set of certificate authorities. Both approaches are equally secure. In each approach, a secure data parser is integrated with any suitable encryption technology. Each approach may be used to secure data in motion. One approach provides methods and systems in which the secure data parser is used to distribute trust in a set of certificate authorities during initial negotiation (e.g., the key establishment phase) of a connection between two devices. Another approach of the present invention provides methods and systems in which the secure data parser is used to disperse packets of data into shares. A set of tunnels is established within a communication channel using a set of certificate authorities, keys developed during the establishment of the tunnels are used to encrypt shares of data for each of the tunnels, and the shares of data are transmitted through each of the tunnels.
    Type: Application
    Filed: November 24, 2010
    Publication date: August 18, 2011
    Applicant: Security First Corp.
    Inventors: RICK L. ORSINI, Mark S. O'Hare, Stephen C. Bono, Gabriel D. Landau, Seth James Nielson
  • Publication number: 20100299313
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security.
    Type: Application
    Filed: May 19, 2010
    Publication date: November 25, 2010
    Applicant: Security First Corp.
    Inventors: RICK L. ORSINI, Mark S. O'Hare, Don Martin
  • Patent number: 6856383
    Abstract: A device for imaging a relief object without illuminating a platen is disclosed. The device includes a single electrode electroluminescent device, which may be inorganic or organic, and a current source. The current source is coupled to the single electrode of the electroluminescent device and to the relief object to be imaged. The valleys and ridges of the relief object couple current to the electroluminescent device at different magnitudes which causes the electroluminescent device to generate light at different intensities that correspond to the ridges and valleys of the relief object. The generated light forms an image of the relief object which may be focused by optical elements onto a sensor array for capture and image processing. In another embodiment of the invention, a one-to-one sensor array is located proximate the electroluminescent device to capture the image.
    Type: Grant
    Filed: September 5, 1997
    Date of Patent: February 15, 2005
    Assignee: Security First Corp.
    Inventors: Paul F. Vachris, Ronald S. Smith