Patents by Inventor Adam Cain

Adam Cain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10896257
    Abstract: In an embodiment, a secure boot method comprises writing a wrapped data encryption key (DEK) and a wrapped key encryption key (KEK) onto a label of a wrapped operating system image prior to uploading the wrapped operating system image to a virtual data center using one or more computing devices.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: January 19, 2021
    Assignee: VMware, Inc.
    Inventors: Jason A. Lango, Adam Cain, Nitin Bahadur, John K. Edwards, Kevin George, William McGovern, Andrew G. Tucker
  • Publication number: 20180373879
    Abstract: In an embodiment, a secure boot method comprises writing a wrapped data encryption key (DEK) and a wrapped key encryption key (KEK) onto a label of a wrapped operating system image prior to uploading the wrapped operating system image to a virtual data center using one or more computing devices.
    Type: Application
    Filed: March 23, 2018
    Publication date: December 27, 2018
    Inventors: Jason A. Lango, Adam Cain, Nitin Bahadur, John K. Edwards, Kevin George, William McGovern, Andrew G. Tucker
  • Patent number: 9953168
    Abstract: In an approach, a secure boot process includes two phases. In the first phase an on premises device generates a data encryption key (DEK) with which to encrypt an operating system image and a key encryption key (KEK) with which to wrap the DEK. The on-premises device then utilizes a key management service to wrap the KEK with an account root key and writes the wrapped DEK and wrapped KEK onto a label of the encrypted operating system image. The encrypted operating system image is then uploaded to a virtual data center and merged with an intermediary guest manager image. When the encrypted machine image is used to generate a virtual machine instance, the intermediary guest manager utilizes the key management service to unwrap the KEK. The unwrapped KEK is then used to unwrap the wrapped DEK which is then used to launch the encrypted guest operating system.
    Type: Grant
    Filed: June 26, 2017
    Date of Patent: April 24, 2018
    Assignee: Bracket Computing, Inc.
    Inventors: Jason A. Lango, Adam Cain, Nitin Bahadur, John K. Edwards, Kevin George, William McGovern, Andrew G. Tucker
  • Patent number: 7650409
    Abstract: Methods and devices are directed to authorizing a network device to a resource over a network. An access server determines based, in part, on an attribute of the network device associated with the attribute certificate, whether the network device may be authorized access to the resource over the network. The attribute may be associated with a capability granted to the network device, a condition to be satisfied for the attribute to be valid, and the like. The attribute may belong to a group of network devices, or one or more users accessing the network through the network device. In one embodiment, the attribute certificate may be provided based on an automated security scan of the network device. In another embodiment, the access server may make the attribute available to a network resource associated with the access server.
    Type: Grant
    Filed: April 12, 2004
    Date of Patent: January 19, 2010
    Assignee: Nokia Siemens Networks Oy
    Inventors: Adam Cain, Craig R. Watkins, Jeremey Barrett
  • Patent number: 7591017
    Abstract: Apparatus, system, method and computer program product for verifying the integrity of remote network devices that request access to network services and resources. Unintended computer programs such as viruses, worms, or Trojan horses, may compromise remote devices. The invention involves downloading verification software over the web into the web browser of a client for the purpose of performing checks to verify the integrity and security of the client's device or system. The results of such checks are returned over the web to be used in security decisions involving authentication and the grant of authorization to access services and resources.
    Type: Grant
    Filed: June 24, 2003
    Date of Patent: September 15, 2009
    Assignee: Nokia Inc.
    Inventors: Craig R. Watkins, Jeremey Barrett, Adam Cain, Brian Lichtenwalter, Daniel Myers, Steven Schall
  • Patent number: 7454614
    Abstract: Method and apparatus for fault tolerant TCP handshaking that includes a first node and a second node both connected in a network where the second node is one of at least two nodes in a cluster of nodes. The second node receives a first message from the first node where the first message includes a sequence number. The second node generates a fingerprint and replaces a portion of the sequence number with the fingerprint to form a cryptographic sequence number. The cryptographic sequence number is sent from the second node to the first node. A second message that includes the cryptographic sequence number is received from the first node at the second node. Any node in the cluster can verify that the cryptographic sequence number sent by the first node was created by one of the nodes in the cluster thereby providing fault tolerant TCP handshaking.
    Type: Grant
    Filed: March 25, 2002
    Date of Patent: November 18, 2008
    Assignee: Microsoft Corporation
    Inventors: Thomas Kroeger, David Kashtan, Adam Cain, Craig Watkins
  • Patent number: 7321970
    Abstract: Methods and systems are directed to authenticating a client over a network. The client generates a certificate and sends it to a server through a trusted mechanism. The server is configured to store the received certificate. When the client requests authentication over the network, it provides the certificate again, along with a parameter associated with a secure session. The server verifies the parameter associated with the secure session and determines if the certificate is substantially the same as the stored certificate. The server authenticates the client over the network, if the certificate is determined to be stored. In another embodiment, the client transmits the certificate that is generated by a third party Certificate Authority (CA) based, in part, on the client's public key.
    Type: Grant
    Filed: December 30, 2003
    Date of Patent: January 22, 2008
    Assignee: Nokia Siemens Networks Oy
    Inventors: Craig R. Watkins, Jeremey Barrett, Adam Cain
  • Patent number: 7305450
    Abstract: Method and apparatus for clustered Secure Sockets Layer (SSL) acceleration where two or more SSL relays are connected in a cluster. Information is transferred between a first node (typically, the client) and one of the SSL relays where the transferred information is related to communication between the first node and a second node (typically, the server). The state information of an SSL connection between the first node and the one SSL relay is clustered. The clustering includes sharing the state information between the one SSL relay and each of the one or more SSL relays. Any of the SSL relays can take over all connections of another of the clustered SSL relays therefore, providing no interruption in the communication should any of the SSL relays fail.
    Type: Grant
    Filed: March 7, 2002
    Date of Patent: December 4, 2007
    Assignee: Nokia Corporation
    Inventors: Eric Rescorla, Adam Cain, Brian Korver, Tom Kroeger, David Kashtan, Craig Watkins
  • Publication number: 20060005032
    Abstract: Method and devices are directed to managing access to a resource over a network. Upon receiving a request for access to the resource over the network, a resource controller determines a parameter associated with the request based on a query of the user and a scan of a client device associated with the request. The controller then applies an access control rule based, in part, on the parameter to determine a level of trust. Depending on the type of request, the resource controller may negotiate access to the resource with a resource server on behalf of the user and act as proxy in establishing the connection, if the request is permitted. A level of access to the resource may be determined based on the level of trust.
    Type: Application
    Filed: June 15, 2004
    Publication date: January 5, 2006
    Inventors: Adam Cain, Craig Watkins, Jeremey Barrett
  • Publication number: 20050228886
    Abstract: Methods and devices are directed to authorizing a network device to a resource over a network. An access server determines based, in part, on an attribute of the network device associated with the attribute certificate, whether the network device may be authorized access to the resource over the network. The attribute may be associated with a capability granted to the network device, a condition to be satisfied for the attribute to be valid, and the like. The attribute may belong to a group of network devices, or one or more users accessing the network through the network device. In one embodiment, the attribute certificate may be provided based on an automated security scan of the network device. In another embodiment, the access server may make the attribute available to a network resource associated with the access server.
    Type: Application
    Filed: April 12, 2004
    Publication date: October 13, 2005
    Applicant: Nokia, Inc.
    Inventors: Adam Cain, Craig Watkins, Jeremey Barrett
  • Publication number: 20050160161
    Abstract: Methods, devices, and systems are directed to managing a proxy request over a secure network using inherited security attributes. Proxy traffic, such as HTTP proxy traffic, is tunneled through a secure tunnel such that the proxy request inherits security attributes of the secure tunnel. The secure attributes may be employed to enable proxy access to a server, thereby extending a security property of the secure tunnel to the proxy connection tunneled through it. A secure tunnel service receives a proxy request from a client and modifies the proxy request to include the security attribute. In one embodiment, the security attribute is an identifier that enables a proxy service may employ to determine another security attribute. The proxy service is enabled to employ the security attribute, and the security attribute to determine if the client is authorized access to the server.
    Type: Application
    Filed: December 29, 2003
    Publication date: July 21, 2005
    Applicant: Nokia, Inc.
    Inventors: Jeremey Barrett, Craig Watkins, Adam Cain
  • Publication number: 20050149723
    Abstract: Methods and systems are directed to authenticating a client over a network. The client generates a certificate and sends it to a server through a trusted mechanism. The server is configured to store the received certificate. When the client requests authentication over the network, it provides the certificate again, along with a parameter associated with a secure session. The server verifies the parameter associated with the secure session and determines if the certificate is substantially the same as the stored certificate. The server authenticates the client over the network, if the certificate is determined to be stored. In another embodiment, the client transmits the certificate that is generated by a third party Certificate Authority (CA) based, in part, on the client's public key.
    Type: Application
    Filed: December 30, 2003
    Publication date: July 7, 2005
    Applicant: Nokia, Inc.
    Inventors: Craig Watkins, Jeremey Barrett, Adam Cain
  • Publication number: 20020161834
    Abstract: Method and apparatus for clustered Secure Sockets Layer (SSL) acceleration where two or more SSL relays are connected in a cluster. Information is transferred between a first node (typically, the client) and one of the SSL relays where the transferred information is related to communication between the first node and a second node (typically, the server). The state information of an SSL connection between the first node and the one SSL relay is clustered. The clustering includes sharing the state information between the one SSL relay and each of the one or more SSL relays. Any of the SSL relays can take over all connections of another of the clustered SSL relays therefore, providing no interruption in the communication should any of the SSL relays fail.
    Type: Application
    Filed: March 7, 2002
    Publication date: October 31, 2002
    Inventors: Eric Rescorla, Adam Cain, Brian Korver, Tom Kroeger, David Kashtan, Craig Watkins
  • Publication number: 20020157037
    Abstract: Method and apparatus for fault tolerant TCP handshaking that includes a first node and a second node both connected in a network where the second node is one of at least two nodes in a cluster of nodes. The second node receives a first message from the first node where the first message includes a sequence number. The second node generates a fingerprint and replaces a portion of the sequence number with the fingerprint to form a cryptographic sequence number. The cryptographic sequence number is sent from the second node to the first node. A second message that includes the cryptographic sequence number is received from the first node at the second node. Any node in the cluster can verify that the cryptographic sequence number sent by the first node was created by one of the nodes in the cluster thereby providing fault tolerant TCP handshaking.
    Type: Application
    Filed: March 25, 2002
    Publication date: October 24, 2002
    Inventors: Thomas Kroeger, David Kashtan, Adam Cain, Craig Watkins