Patents by Inventor Adam Cain
Adam Cain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10896257Abstract: In an embodiment, a secure boot method comprises writing a wrapped data encryption key (DEK) and a wrapped key encryption key (KEK) onto a label of a wrapped operating system image prior to uploading the wrapped operating system image to a virtual data center using one or more computing devices.Type: GrantFiled: March 23, 2018Date of Patent: January 19, 2021Assignee: VMware, Inc.Inventors: Jason A. Lango, Adam Cain, Nitin Bahadur, John K. Edwards, Kevin George, William McGovern, Andrew G. Tucker
-
Publication number: 20180373879Abstract: In an embodiment, a secure boot method comprises writing a wrapped data encryption key (DEK) and a wrapped key encryption key (KEK) onto a label of a wrapped operating system image prior to uploading the wrapped operating system image to a virtual data center using one or more computing devices.Type: ApplicationFiled: March 23, 2018Publication date: December 27, 2018Inventors: Jason A. Lango, Adam Cain, Nitin Bahadur, John K. Edwards, Kevin George, William McGovern, Andrew G. Tucker
-
Patent number: 9953168Abstract: In an approach, a secure boot process includes two phases. In the first phase an on premises device generates a data encryption key (DEK) with which to encrypt an operating system image and a key encryption key (KEK) with which to wrap the DEK. The on-premises device then utilizes a key management service to wrap the KEK with an account root key and writes the wrapped DEK and wrapped KEK onto a label of the encrypted operating system image. The encrypted operating system image is then uploaded to a virtual data center and merged with an intermediary guest manager image. When the encrypted machine image is used to generate a virtual machine instance, the intermediary guest manager utilizes the key management service to unwrap the KEK. The unwrapped KEK is then used to unwrap the wrapped DEK which is then used to launch the encrypted guest operating system.Type: GrantFiled: June 26, 2017Date of Patent: April 24, 2018Assignee: Bracket Computing, Inc.Inventors: Jason A. Lango, Adam Cain, Nitin Bahadur, John K. Edwards, Kevin George, William McGovern, Andrew G. Tucker
-
Patent number: 7650409Abstract: Methods and devices are directed to authorizing a network device to a resource over a network. An access server determines based, in part, on an attribute of the network device associated with the attribute certificate, whether the network device may be authorized access to the resource over the network. The attribute may be associated with a capability granted to the network device, a condition to be satisfied for the attribute to be valid, and the like. The attribute may belong to a group of network devices, or one or more users accessing the network through the network device. In one embodiment, the attribute certificate may be provided based on an automated security scan of the network device. In another embodiment, the access server may make the attribute available to a network resource associated with the access server.Type: GrantFiled: April 12, 2004Date of Patent: January 19, 2010Assignee: Nokia Siemens Networks OyInventors: Adam Cain, Craig R. Watkins, Jeremey Barrett
-
Patent number: 7591017Abstract: Apparatus, system, method and computer program product for verifying the integrity of remote network devices that request access to network services and resources. Unintended computer programs such as viruses, worms, or Trojan horses, may compromise remote devices. The invention involves downloading verification software over the web into the web browser of a client for the purpose of performing checks to verify the integrity and security of the client's device or system. The results of such checks are returned over the web to be used in security decisions involving authentication and the grant of authorization to access services and resources.Type: GrantFiled: June 24, 2003Date of Patent: September 15, 2009Assignee: Nokia Inc.Inventors: Craig R. Watkins, Jeremey Barrett, Adam Cain, Brian Lichtenwalter, Daniel Myers, Steven Schall
-
Patent number: 7454614Abstract: Method and apparatus for fault tolerant TCP handshaking that includes a first node and a second node both connected in a network where the second node is one of at least two nodes in a cluster of nodes. The second node receives a first message from the first node where the first message includes a sequence number. The second node generates a fingerprint and replaces a portion of the sequence number with the fingerprint to form a cryptographic sequence number. The cryptographic sequence number is sent from the second node to the first node. A second message that includes the cryptographic sequence number is received from the first node at the second node. Any node in the cluster can verify that the cryptographic sequence number sent by the first node was created by one of the nodes in the cluster thereby providing fault tolerant TCP handshaking.Type: GrantFiled: March 25, 2002Date of Patent: November 18, 2008Assignee: Microsoft CorporationInventors: Thomas Kroeger, David Kashtan, Adam Cain, Craig Watkins
-
Patent number: 7321970Abstract: Methods and systems are directed to authenticating a client over a network. The client generates a certificate and sends it to a server through a trusted mechanism. The server is configured to store the received certificate. When the client requests authentication over the network, it provides the certificate again, along with a parameter associated with a secure session. The server verifies the parameter associated with the secure session and determines if the certificate is substantially the same as the stored certificate. The server authenticates the client over the network, if the certificate is determined to be stored. In another embodiment, the client transmits the certificate that is generated by a third party Certificate Authority (CA) based, in part, on the client's public key.Type: GrantFiled: December 30, 2003Date of Patent: January 22, 2008Assignee: Nokia Siemens Networks OyInventors: Craig R. Watkins, Jeremey Barrett, Adam Cain
-
Patent number: 7305450Abstract: Method and apparatus for clustered Secure Sockets Layer (SSL) acceleration where two or more SSL relays are connected in a cluster. Information is transferred between a first node (typically, the client) and one of the SSL relays where the transferred information is related to communication between the first node and a second node (typically, the server). The state information of an SSL connection between the first node and the one SSL relay is clustered. The clustering includes sharing the state information between the one SSL relay and each of the one or more SSL relays. Any of the SSL relays can take over all connections of another of the clustered SSL relays therefore, providing no interruption in the communication should any of the SSL relays fail.Type: GrantFiled: March 7, 2002Date of Patent: December 4, 2007Assignee: Nokia CorporationInventors: Eric Rescorla, Adam Cain, Brian Korver, Tom Kroeger, David Kashtan, Craig Watkins
-
Publication number: 20060005032Abstract: Method and devices are directed to managing access to a resource over a network. Upon receiving a request for access to the resource over the network, a resource controller determines a parameter associated with the request based on a query of the user and a scan of a client device associated with the request. The controller then applies an access control rule based, in part, on the parameter to determine a level of trust. Depending on the type of request, the resource controller may negotiate access to the resource with a resource server on behalf of the user and act as proxy in establishing the connection, if the request is permitted. A level of access to the resource may be determined based on the level of trust.Type: ApplicationFiled: June 15, 2004Publication date: January 5, 2006Inventors: Adam Cain, Craig Watkins, Jeremey Barrett
-
Publication number: 20050228886Abstract: Methods and devices are directed to authorizing a network device to a resource over a network. An access server determines based, in part, on an attribute of the network device associated with the attribute certificate, whether the network device may be authorized access to the resource over the network. The attribute may be associated with a capability granted to the network device, a condition to be satisfied for the attribute to be valid, and the like. The attribute may belong to a group of network devices, or one or more users accessing the network through the network device. In one embodiment, the attribute certificate may be provided based on an automated security scan of the network device. In another embodiment, the access server may make the attribute available to a network resource associated with the access server.Type: ApplicationFiled: April 12, 2004Publication date: October 13, 2005Applicant: Nokia, Inc.Inventors: Adam Cain, Craig Watkins, Jeremey Barrett
-
Publication number: 20050160161Abstract: Methods, devices, and systems are directed to managing a proxy request over a secure network using inherited security attributes. Proxy traffic, such as HTTP proxy traffic, is tunneled through a secure tunnel such that the proxy request inherits security attributes of the secure tunnel. The secure attributes may be employed to enable proxy access to a server, thereby extending a security property of the secure tunnel to the proxy connection tunneled through it. A secure tunnel service receives a proxy request from a client and modifies the proxy request to include the security attribute. In one embodiment, the security attribute is an identifier that enables a proxy service may employ to determine another security attribute. The proxy service is enabled to employ the security attribute, and the security attribute to determine if the client is authorized access to the server.Type: ApplicationFiled: December 29, 2003Publication date: July 21, 2005Applicant: Nokia, Inc.Inventors: Jeremey Barrett, Craig Watkins, Adam Cain
-
Publication number: 20050149723Abstract: Methods and systems are directed to authenticating a client over a network. The client generates a certificate and sends it to a server through a trusted mechanism. The server is configured to store the received certificate. When the client requests authentication over the network, it provides the certificate again, along with a parameter associated with a secure session. The server verifies the parameter associated with the secure session and determines if the certificate is substantially the same as the stored certificate. The server authenticates the client over the network, if the certificate is determined to be stored. In another embodiment, the client transmits the certificate that is generated by a third party Certificate Authority (CA) based, in part, on the client's public key.Type: ApplicationFiled: December 30, 2003Publication date: July 7, 2005Applicant: Nokia, Inc.Inventors: Craig Watkins, Jeremey Barrett, Adam Cain
-
Publication number: 20020161834Abstract: Method and apparatus for clustered Secure Sockets Layer (SSL) acceleration where two or more SSL relays are connected in a cluster. Information is transferred between a first node (typically, the client) and one of the SSL relays where the transferred information is related to communication between the first node and a second node (typically, the server). The state information of an SSL connection between the first node and the one SSL relay is clustered. The clustering includes sharing the state information between the one SSL relay and each of the one or more SSL relays. Any of the SSL relays can take over all connections of another of the clustered SSL relays therefore, providing no interruption in the communication should any of the SSL relays fail.Type: ApplicationFiled: March 7, 2002Publication date: October 31, 2002Inventors: Eric Rescorla, Adam Cain, Brian Korver, Tom Kroeger, David Kashtan, Craig Watkins
-
Publication number: 20020157037Abstract: Method and apparatus for fault tolerant TCP handshaking that includes a first node and a second node both connected in a network where the second node is one of at least two nodes in a cluster of nodes. The second node receives a first message from the first node where the first message includes a sequence number. The second node generates a fingerprint and replaces a portion of the sequence number with the fingerprint to form a cryptographic sequence number. The cryptographic sequence number is sent from the second node to the first node. A second message that includes the cryptographic sequence number is received from the first node at the second node. Any node in the cluster can verify that the cryptographic sequence number sent by the first node was created by one of the nodes in the cluster thereby providing fault tolerant TCP handshaking.Type: ApplicationFiled: March 25, 2002Publication date: October 24, 2002Inventors: Thomas Kroeger, David Kashtan, Adam Cain, Craig Watkins