Patents Assigned to Spyrus, Inc.
  • Patent number: 10673626
    Abstract: For an encryption-protected decentralized and replicated blockchain file storage system maintained and managed by a channel of peers, the invention creates the additional levels of trust that are needed for peer voter authentication and transaction proposal endorsement. The invention effectively excludes hostile agents from influencing or impersonating legitimate voter peers through the mathematical strength of the K-of-N mechanism based on secret sharing with cryptographic hashing. In a further embodiment an extension to nested signatures is disclosed to enforce signing order.
    Type: Grant
    Filed: December 31, 2018
    Date of Patent: June 2, 2020
    Assignee: SPYRUS, INC.
    Inventors: William Sandberg-Maitland, Burton George Tregub
  • Patent number: 10447486
    Abstract: A method by which a hardware security module can attest remotely to its measure of trust as determined by its security certifications and the Level of Assurance it can be relied on to support without the human witnessing elements that are currently used to validate this trust. In a further embodiment the Level of Assurance can be transported to a second hardware security module.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: October 15, 2019
    Assignee: SPYRUS, Inc.
    Inventors: Daniel Elvio Turissini, William Reid Carlisle, Burton George Tregub
  • Publication number: 20190305938
    Abstract: For an encryption-protected decentralized and replicated blockchain file storage system maintained and managed by a channel of peers, the invention creates the additional levels of trust that are needed for peer voter authentication and transaction proposal endorsement. The invention effectively excludes hostile agents from influencing or impersonating legitimate voter peers through the mathematical strength of the K-of-N mechanism based on secret sharing with cryptographic hashing. In a further embodiment an extension to nested signatures is disclosed to enforce signing order.
    Type: Application
    Filed: December 31, 2018
    Publication date: October 3, 2019
    Applicant: SPYRUS, Inc.
    Inventors: William Sandberg-Maitland, Burton George Tregub
  • Publication number: 20190028281
    Abstract: A method by which a hardware security module can attest remotely to its measure of trust as determined by its security certifications and the Level of Assurance it can be relied on to support without the human witnessing elements that are currently used to validate this trust. In a further embodiment the Level of Assurance can be transported to a second hardware security module.
    Type: Application
    Filed: July 19, 2018
    Publication date: January 24, 2019
    Applicant: SPYRUS, Inc.
    Inventors: Daniel Elvio Turissini, William Reid Carlisle, Burton George Tregub
  • Patent number: 9742561
    Abstract: A method for authentication of a computing device so that shares of a secret may be delivered, over a network that uses a communications protocol which does not require use of an address, and on which an authentication server is listening, comprising the steps of dividing the secret into a first share and a second share, or more; destroying the secret; transmitting the second share, together with a unique identifier, out of band to a pre-designated location; erasing the second share from the computing device; storing the first share at the computing device; broadcasting the unique identifier over the network; accepting a request over the network from an authentication server to initiate an authentication protocol; responding to the request; receiving the second share from the authentication server; and reconstructing the secret using the received second share and the stored first share.
    Type: Grant
    Filed: March 17, 2017
    Date of Patent: August 22, 2017
    Assignee: SPYRUS, INC.
    Inventors: Michael Perretta, Burton Tregub
  • Publication number: 20170195118
    Abstract: A method for authentication of a computing device so that shares of a secret may be delivered, over a network that uses a communications protocol which does not require use of an address, and on which an authentication server is listening, comprising the steps of dividing the secret into a first share and a second share, or more; destroying the secret; transmitting the second share, together with a unique identifier, out of band to a pre-designated location; erasing the second share from the computing device; storing the first share at the computing device; broadcasting the unique identifier over the network; accepting a request over the network from an authentication server to initiate an authentication protocol; responding to the request; receiving the second share from the authentication server; and reconstructing the secret using the received second share and the stored first share.
    Type: Application
    Filed: March 17, 2017
    Publication date: July 6, 2017
    Applicant: Spyrus, Inc.
    Inventors: Michael Perretta, Burton Tregub
  • Patent number: 9521123
    Abstract: A method for encryption and sealing of a plaintext file by hashing the plaintext file to produce a plaintext hash, encrypting the plaintext file to produce ciphertext, hashing the ciphertext to produce a ciphertext hash, hashing the plaintext hash and the ciphertext hash to produce a result hash, and sealing the ciphertext together with the result hash. This provides verification for non-repudiation and protects against undetected malware corrupting the plaintext or ciphertext files.
    Type: Grant
    Filed: April 28, 2015
    Date of Patent: December 13, 2016
    Assignee: Spyrus, Inc.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Burton George Tregub
  • Publication number: 20160205102
    Abstract: A method for secure remote authentication of a computing device over a network that uses a communications protocol which does not require use of an address, and on which one or more authentication servers are listening, comprising the steps of broadcasting a unique identifier over the network; accepting a request over the network from one of the one or more authorization servers to initiate an authentication protocol; responding to the request; receiving data necessary to complete a boot process; and completing a boot process using the received data.
    Type: Application
    Filed: January 8, 2016
    Publication date: July 14, 2016
    Applicant: Spyrus, Inc.
    Inventors: Michael Perretta, Burton Tregub
  • Publication number: 20160021068
    Abstract: A device and method for file encryption and decryption with a cryptographic processor reconstituting a file encryption key from a version of the key which has been shrouded with a network authorization code. This meets a need for restricted communication and data containment by limiting access to a pre-defined community-of-interest, so that no one outside of that community can decrypt encrypted content.
    Type: Application
    Filed: April 28, 2015
    Publication date: January 21, 2016
    Applicant: SPYRUS, INC.
    Inventors: Robert R. JUENEMAN, Duane J. LINSENBARDT, John N. YOUNG, William Reid CARLISLE, Burton George TREGUB
  • Publication number: 20160021109
    Abstract: A method for encryption and sealing of a plaintext file by hashing the plaintext file to produce a plaintext hash, encrypting the plaintext file to produce ciphertext, hashing the ciphertext to produce a ciphertext hash, hashing the plaintext hash and the ciphertext hash to produce a result hash, and sealing the ciphertext together with the result hash. This provides verification for non-repudiation and protects against undetected malware corrupting the plaintext or ciphertext files.
    Type: Application
    Filed: April 28, 2015
    Publication date: January 21, 2016
    Applicant: SPYRUS, INC.
    Inventors: Robert R. JUENEMAN, Duane J. LINSENBARDT, John N. YOUNG, William Reid CARLISLE, Burton George TREGUB
  • Patent number: 9049010
    Abstract: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.
    Type: Grant
    Filed: October 12, 2012
    Date of Patent: June 2, 2015
    Assignee: Spyrus, Inc.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Burton George Tregub
  • Publication number: 20130304939
    Abstract: An integrated circuit (IC) card interface device with multiple modes of operation allows communications with numerous IC cards, including smart cards. An interface device according to the present invention can be used several different ways, including: connected to a host device (such as a person computer); in a standalone configuration; and as a flexible platform upon which future applications can be based, since it can be easily reprogrammed and upgraded. Programming mode enables the host device or the smart card itself to update or upgrade the programs available within the interface device. When being updated or upgraded, the source of the programming can be from a host device or from the smart card, adding further flexibility to the use of such an interface device.
    Type: Application
    Filed: January 14, 2013
    Publication date: November 14, 2013
    Applicant: Spyrus, Inc.
    Inventors: Paul W. Chau, Kerry R. Matthew, Gerry W. Vandenengel
  • Publication number: 20130046993
    Abstract: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.
    Type: Application
    Filed: October 12, 2012
    Publication date: February 21, 2013
    Applicant: SPYRUS, INC.
    Inventor: SPYRUS, INC.
  • Patent number: 8009829
    Abstract: A method and system for deploying a suite of advanced cryptographic algorithms that includes: providing a legacy cryptographic interface that is associated with a legacy operating system and a legacy application, and supports a suite of legacy cryptographic algorithms; providing a suite of advanced cryptographic algorithms that includes one or more of an advanced asymmetric key algorithm, an advanced symmetric key algorithm, and/or an advanced hash function; providing an advanced cryptographic interface that is independent of the legacy operating system and the legacy application, backwards compatible with the legacy cryptographic interface, and capable of supporting the suite of advanced cryptographic algorithms; and transparently and automatically substituting the suite of advanced cryptographic algorithms for the legacy cryptographic algorithms through the invocation of the advanced cryptographic interface at the time of an initial performance of encrypting, hashing, digitally signing the hash of, decrypti
    Type: Grant
    Filed: October 25, 2007
    Date of Patent: August 30, 2011
    Assignee: Spyrus, Inc.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle
  • Publication number: 20100223403
    Abstract: An integrated circuit (IC) card interface device with multiple modes of operation allows communications with numerous IC cards, including smart cards. An interface device according to the present invention can be used several different ways, including: connected to a host device (such as a person computer); in a standalone configuration; and as a flexible platform upon which future applications can be based, since it can be easily reprogrammed and upgraded. The interface device can contain an application engine and an I/O module, providing a flexible architecture and allowing several different operating modes. In connected mode, the interface device can, for example, be connected to a PC to enable the use of smart cards in secure applications. In standalone mode, the interface device can provide information about smart cards with which it interfaces. Programming mode enables the host device or the smart card itself to update or upgrade the programs available within the interface device.
    Type: Application
    Filed: April 8, 2010
    Publication date: September 2, 2010
    Applicant: SPYRUS, INC.
    Inventors: Paul W. Chau, Kerry R. Matthew, Gerry W. Vandenengel
  • Patent number: 7757100
    Abstract: A method provides a protected region of a data storage device associated with a computational device, where data in the protected region is primarily protected by preventing access without proper access authorization. The method comprises the steps of providing, in an unprotected region of the data storage device, a first operating system and associated operating system data; monitoring operating system data accessed by the computational device until a predetermined functionality becomes available; storing, in the protected region, the monitored operating system data; providing, in the protected region, a second operating system; transferring control of the computational device from the first operating system to the second operating system; storing data in the protected region; and preventing access to the stored data in the protected region without access authorization.
    Type: Grant
    Filed: May 23, 2008
    Date of Patent: July 13, 2010
    Assignee: Spyrus, Inc.
    Inventors: Gregg D. Weissman, Hon Tran, Gregory W. Dalcher, Jay H. Hoffmeier, James E. Zmuda, Mark J. Sutherland, Michael T. Guttman
  • Publication number: 20080263363
    Abstract: A portable encryption device with logon access controlled by an encryption key, with an on board cryptographic processor for reconstituting the encryption key from a plurality of secrets generated by a secret sharing algorithm, optionally shrouded with external secrets using an invertible transform resistant to quantum computing attacks. Another embodiment provides file decryption controlled by a file encryption key, with the on board cryptographic processor reconstituting the file encryption key from a version of the file encryption key which has been shrouded with a network authorization code. A method for encryption of a plaintext file by hashing, compressing, and encrypting the plaintext file, hashing the ciphertext, hashing the plaintext hash and the ciphertext hash, and sealing the ciphertext together with the resulting hash. A portable encryption device for performing the method is also disclosed.
    Type: Application
    Filed: January 22, 2008
    Publication date: October 23, 2008
    Applicant: SPYRUS, INC.
    Inventors: Robert R. Jueneman, Duane J. Linsenbardt, John N. Young, William Reid Carlisle, Burton George Tregub
  • Publication number: 20080263371
    Abstract: A method provides a protected region of a data storage device associated with a computational device, where data in the protected region is primarily protected by preventing access without proper access authorization. The method comprises the steps of providing, in an unprotected region of the data storage device, a first operating system and associated operating system data; monitoring operating system data accessed by the computational device until a predetermined functionality becomes available; storing, in the protected region, the monitored operating system data; providing, in the protected region, a second operating system; transferring control of the computational device from the first operating system to the second operating system; storing data in the protected region; and preventing access to the stored data in the protected region without access authorization.
    Type: Application
    Filed: May 23, 2008
    Publication date: October 23, 2008
    Applicant: SPYRUS, INC.
    Inventors: Gregg D. Weissman, Hon Tran, Gregory W. Dalcher, Jay H. Hoffmeier, James E. Zmuda, Mark J. Sutherland, Michael T. Guttman
  • Publication number: 20080130895
    Abstract: A method and system for deploying a suite of advanced cryptographic algorithms that includes: providing a legacy cryptographic interface that is associated with a legacy operating system and a legacy application, and supports a suite of legacy cryptographic algorithms; providing a suite of advanced cryptographic algorithms that includes one or more of an advanced asymmetric key algorithm, an advanced symmetric key algorithm, and/or an advanced hash function; providing an advanced cryptographic interface that is independent of the legacy operating system and the legacy application, backwards compatible with the legacy cryptographic interface, and capable of supporting the suite of advanced cryptographic algorithms; and transparently and automatically substituting the suite of advanced cryptographic algorithms for the legacy cryptographic algorithms through the invocation of the advanced cryptographic interface at the time of an initial performance of encrypting, hashing, digitally signing the hash of, decrypti
    Type: Application
    Filed: October 25, 2007
    Publication date: June 5, 2008
    Applicant: SPYRUS, INC.
    Inventors: Robert R. JUENEMAN, Duane J. LINSENBARDT, John N. YOUNG, William Reid CARLISLE
  • Patent number: 7380140
    Abstract: The invention establishes a protected volume on a data storage device associated with a computational device by allowing an operating system of the computational device to boot up to a point (the volume conversion crossover point) at which predetermined functionality of the operating system becomes available, then establishing the protected volume. A copy of the operating system data (cleartext operating system data) that is accessed during boot up prior to the volume conversion crossover point (which can be known by monitoring and recording access to operating system data during boot-up) is stored in an unprotected region of the data storage device. A copy of the cleartext operating system data is also stored in the protected volume. After the protected volume is established, the computational device is reset, causing the operating system to boot up again.
    Type: Grant
    Filed: March 21, 2005
    Date of Patent: May 27, 2008
    Assignee: Spyrus, Inc.
    Inventors: Gregg D. Weissman, Hon Tran, Gregory W. Dalcher, Jay H. Hoffmeier, James E. Zmuda, Mark J. Sutherland, Michael T. Guttman