Patents Assigned to Voltage Security, Inc.
  • Patent number: 9773243
    Abstract: A system may include a point-of-sale system that gathers payment card track data from a payment card and a payment gateway that processes the track data to authorize purchase transactions. Discretionary data in a discretionary field of the track data may be compressed to create space that may be used to accommodate additional security data. The sensitive information may be moved to the discretionary field. The compressed discretionary data and the sensitive information may be encrypted using a structure preserving encryption algorithm and a managed encryption key. The managed encryption key or other additional security data may be added the discretionary field. Track data that has been modified in this way may be conveyed to the payment gateway for processing. The payment gateway may extract the key management data, decrypt the encrypted data, and reconstruct the original track data by decompressing the discretionary data and replacing the sensitive track data.
    Type: Grant
    Filed: February 15, 2012
    Date of Patent: September 26, 2017
    Assignee: Voltage Security, Inc.
    Inventor: Terence Spies
  • Patent number: 9749301
    Abstract: A system that supports cryptographic web services is provided. A program running on program computing equipment may call a local cryptographic function. A web services interface such as a simple object access protocol interface on the program computing equipment makes a corresponding remote cryptographic function call to a web services interface such as a simple object access protocol interface at a cryptographic web service over a communications network such as the internet. At the cryptographic web service, a cryptographic engine implements cryptographic operations such as encryption and decryption operations. After successful authentication of the calling program, the cryptographic engine produces results for the remotely cryptographic function and returns the results to the program over the communications network.
    Type: Grant
    Filed: September 4, 2015
    Date of Patent: August 29, 2017
    Assignee: Voltage Security, Inc.
    Inventors: Robert K. Vaterlaus, Matthew J. Pauker, Guido Appenzeller
  • Patent number: 9489521
    Abstract: Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application of a format preserving encryption cryptographic algorithm. Following each application of the format preserving cryptographic algorithm, the resulting version of the string may be analyzed to determine whether desired string constraints have been satisfied. If the string constraints have not been satisfied, further applications of the format preserving cryptographic algorithm may be performed. If the string constraints have been satisfied, the current version of the string may be used as an output for the cryptographic engine.
    Type: Grant
    Filed: January 16, 2015
    Date of Patent: November 8, 2016
    Assignee: Voltage Security, Inc.
    Inventors: Luther W. Martin, Terence Spies, Matthew J. Pauker
  • Patent number: 9355389
    Abstract: Online ordering systems allow a user to submit sensitive information such as payment card information to a merchant in encrypted form. A payment card processor server may be used to provide the user's web browser with code for an encryption function, a cryptographic key, and a key identifier. The web browser may encrypt the payment card information by executing the encryption function and using the key. The encrypted payment card information may be supplied to the merchant over the internet. A key identifier that identifies which cryptographic key was used in encrypting the payment card information may be provided to the merchant without providing the merchant with access to the key. The merchant can forward the encrypted payment card information to the credit card processor server with the key identifier. The processor server can use the key identifier to obtain the key and decrypt the payment card information for authorization.
    Type: Grant
    Filed: November 17, 2011
    Date of Patent: May 31, 2016
    Assignee: Voltage Security, Inc.
    Inventors: Matthew J. Pauker, Terence Spies
  • Patent number: 9208491
    Abstract: Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity.
    Type: Grant
    Filed: December 2, 2013
    Date of Patent: December 8, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Matthew J. Pauker
  • Patent number: 8996485
    Abstract: A user who is browsing the web may use a web site verification service to ascertain whether a web site that appears to be associated with a trusted entity is actually associated with that entity. The web site verification service retains the URL of an unauthenticated web site. The user types a text string naming the entity that the user believes should be associated with the web site into a text box. A database such as an internet search engine database or a database containing a list of trusted entities and their URLs may be queried using the user-supplied text string. The retained URL may be compared to the resulting list of URLs. If the retained URL does not match one of the URLs in the query results, the user may be warned that the web site does not appear to be associated with the trusted entity.
    Type: Grant
    Filed: March 21, 2005
    Date of Patent: March 31, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Sathvik Krishnamurthy, Guido Appenzeller, Matthew J. Pauker, Lucas C. Ryan, Terence Spies
  • Patent number: 8958562
    Abstract: Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity.
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: February 17, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Matthew J. Pauker
  • Patent number: 8949625
    Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Encryption and decryption engines may include embedded-format-preserving encryption and decryption engines. Embedded-format-preserving encryption engines may be used to encrypt data strings and embed information in data strings. Information corresponding to a format-preserving encryption operation of a data string may be embedded in an associated data string. The associated data string may be encrypted before or after embedding the information in the associated data string. The embedded information may include key management data that corresponds to a managed encryption key that was used to encrypt the data string.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: February 3, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Philip Hillyer Smith, III
  • Patent number: 8948375
    Abstract: A data processing system is provided that includes applications, databases, encryption engines, and decryption engines. Encryption and decryption engines may be used to perform format-preserving encryption on data strings stored in a database. Applications may be used to embed information in data strings. Information may be embedded by using a character set that is larger than a character set being used by a data string. A data string may be converted into a larger character set, analogous to converting a number from a lower base to higher base. Such a conversion may shorten a data string, allowing information to be embedded as appended characters.
    Type: Grant
    Filed: May 5, 2009
    Date of Patent: February 3, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Steven D. Burnett, Terence Spies, Luther W. Martin, Robert K. Vaterlaus, Matthew J. Pauker
  • Patent number: 8938067
    Abstract: Format preserving encryption (FPE) cryptographic engines are provided for performing encryption and decryption on strings. A plaintext string may be converted to ciphertext by repeated application of a format preserving encryption cryptographic algorithm. Following each application of the format preserving cryptographic algorithm, the resulting version of the string may be analyzed to determine whether desired string constraints have been satisfied. If the string constraints have not been satisfied, further applications of the format preserving cryptographic algorithm may be performed. If the string constraints have been satisfied, the current version of the string may be used as an output for the cryptographic engine.
    Type: Grant
    Filed: October 30, 2009
    Date of Patent: January 20, 2015
    Assignee: Voltage Security, Inc.
    Inventors: Luther W. Martin, Terence Spies, Matthew J. Pauker
  • Patent number: 8855296
    Abstract: A data processing system is provided that includes format-preserving encryption and decryption engines. A string that contains characters has a specified format. The format defines a legal set of character values for each character position in the string. During encryption operations with the encryption engine, a string is processed to remove extraneous characters and to encode the string using an index. The processed string is encrypted using a format-preserving block cipher. The output of the block cipher is post-processed to produce an encrypted string having the same specified format as the original unencrypted string. During decryption operations, the decryption engine uses the format-preserving block cipher in reverse to transform the encrypted string into a decrypted string having the same format.
    Type: Grant
    Filed: December 13, 2010
    Date of Patent: October 7, 2014
    Assignee: Voltage Security, Inc.
    Inventors: Matthew J. Pauker, Terence Spies, Luther W. Martin
  • Publication number: 20140172597
    Abstract: A system may include a point-of-sale system that gathers payment card track data from a payment card and a payment card gateway that processes the track data to authorize purchase transactions. The point-of-sale system may remove sensitive data such as a portion of a primary account number from the track data and may compress the removed data. The compressed version of the data may be appended to a discretionary field in the track data. The discretionary field may be encrypted following insertion of the compressed data. Track data that has been modified in this way may be conveyed to the payment gateway for processing.
    Type: Application
    Filed: February 21, 2014
    Publication date: June 19, 2014
    Applicant: Voltage Security, Inc.
    Inventors: Terence Spies, Matthew J. Pauker, Jacob Green, Michael S. Leong, Richard T. Minner
  • Patent number: 8756289
    Abstract: Systems and methods are provided for using digital signatures to help distinguish legitimate email from known or trusted organizations from unsolicited email or forged email. Digital signatures may be used in an email body, mail header, or embedded links. The signatures may be verified by a recipient or internet service provider and may be used in conjunction with spam filtering applications.
    Type: Grant
    Filed: May 21, 2012
    Date of Patent: June 17, 2014
    Assignee: Voltage Security, Inc.
    Inventors: Guido Appenzeller, Timothy Y. Choi, Matthew J. Pauker
  • Patent number: 8737614
    Abstract: A system is provided in which document imaging equipment is used to acquire a document image from a printed document. The document image may be processed using an optical character recognition application implemented on the document imaging equipment. A user may supply identifier information. The identifier information may be used in constructing an identity-based-encryption (IBE) public key. Identity-based-encryption public parameter information and the IBE public key may be used in encrypting the document image. The IBE-encrypted document image may be stored in storage or sent to a recipient in a message. A user receiving the IBE-encrypted document image may obtain an IBE private key from a key server that is used in decrypting the IBE-encrypted document.
    Type: Grant
    Filed: July 7, 2008
    Date of Patent: May 27, 2014
    Assignee: Voltage Security, Inc.
    Inventor: David M. Mulligan
  • Publication number: 20140089203
    Abstract: Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity.
    Type: Application
    Filed: December 2, 2013
    Publication date: March 27, 2014
    Applicant: VOLTAGE SECURITY, INC.
    Inventors: Terence Spies, Matthew J. Pauker
  • Publication number: 20140089204
    Abstract: Key requests in a data processing system may include identifiers such as user names, policy names, and application names. The identifiers may also include validity period information indicating when corresponding keys are valid. When fulfilling a key request, a key server may use identifier information from the key request in determining which key access policies to apply and may use the identifier in determining whether an applicable policy has been satisfied. When a key request is authorized, the key server may generate a key by applying a one-way function to a root secret and the identifier. Validity period information for use by a decryption engine may be embedded in data items that include redundant information. Application testing can be facilitated by populating a test database with data that has been encrypted using a format-preserving encryption algorithm. Parts of a data string may be selectively encrypted based on their sensitivity.
    Type: Application
    Filed: December 2, 2013
    Publication date: March 27, 2014
    Applicant: VOLTAGE SECURITY, INC.
    Inventors: Terence Spies, Matthew J. Pauker
  • Patent number: 8666823
    Abstract: A system may include a point-of-sale system that gathers payment card track data from a payment card and a payment card gateway that processes the track data to authorize purchase transactions. The point-of-sale system may remove sensitive data such as a portion of a primary account number from the track data and may compress the removed data. The compressed version of the data may be appended to a discretionary field in the track data. The discretionary field may be encrypted following insertion of the compressed data. Track data that has been modified in this way may be conveyed to the payment gateway for processing.
    Type: Grant
    Filed: April 1, 2011
    Date of Patent: March 4, 2014
    Assignee: Voltage Security, Inc.
    Inventors: Terence Spies, Matthew J. Pauker, Jacob Green, Michael S. Leong, Richard T. Minner
  • Publication number: 20140052642
    Abstract: Systems and methods are provided for securing payment card information. A user may present a payment card such as a credit card to point-of-sale equipment. The point-of-sale equipment may encrypt the payment card information. An encryption algorithm may be used that takes as inputs a first part of the payment card information, a tweak formed by a second part of the payment card information, and an encryption key. The encrypted payment card information may be conveyed to a gateway over a communications network. The gateway may identify which encryption algorithm was used in encrypting the payment card information and may re-encrypt the payment card information using a format preserving encryption algorithm. A network-based service may be used to remotely perform functions for the gateway.
    Type: Application
    Filed: October 22, 2013
    Publication date: February 20, 2014
    Applicant: Voltage Security, Inc.
    Inventors: Terence Spies, Matthew J. Pauker
  • Patent number: 8656177
    Abstract: A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient. A service name such as a universal resource locator based at least partly on the name of an organization may be associated with a local key server at the organization and a public key server external to the organization. Users at the organization may use the service name to access the local key server to obtain IBE public parameter information for performing message encryption and to obtain IBE private keys for message decryption. External to the organization, users may obtain IBE public parameter information and IBE private keys from the public key server using the same service name. The local key generator and the public key generator may maintain identical copies of the same IBE master secret.
    Type: Grant
    Filed: June 23, 2008
    Date of Patent: February 18, 2014
    Assignee: Voltage Security, Inc.
    Inventor: Ingrum O. Putz
  • Publication number: 20140046853
    Abstract: A token generating organization may include distributed tokenization systems for generating tokens corresponding to sensitive information. Sensitive information may include sensitive numbers such as social security numbers, credit card numbers or other private numbers. A tokenization system may include multiple physically distinct hardware platforms each having a tokenization server and a database. A tokenization server may run portions of a sensitive number through a predetermined number of rounds of a Feistel network. Each round of the Feistel network may include tokenizing portions of the sensitive number using a fractional token table stored an associated database and modifying the tokenized portions by reversibly adding portions of the sensitive number to the tokenized portions. The fractional token table may include partial sensitive numbers and corresponding partial tokens.
    Type: Application
    Filed: October 22, 2013
    Publication date: February 13, 2014
    Applicant: Voltage Security, Inc.
    Inventors: Terence Spies, Richard T. Minner