Patents by Inventor Alex Nayshtut

Alex Nayshtut has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140281486
    Abstract: Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Inventors: Alex Nayshtut, Omer Ben-Shalom, Terry H. Yoshii
  • Patent number: 8832783
    Abstract: A system establishes secure communications between first and second electronic devices. The first device stores secured content to be accessed by second device based on identification information of the first device. The identification information of the first device may be manually input into the second device, and the second device may perform an initial pairing operation with the first device based on this manually entered information. The identification information stored from initial pairing may allow secure automatic pairing.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: September 9, 2014
    Assignee: Intel Corporation
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Edward V. Jimison, Avigdor Eldar, Adi Shaliv
  • Publication number: 20140096179
    Abstract: A system establishes secure communications between first and second electronic devices. The first device stores secured content to be accessed by second device based on identification information of the first device. The identification information of the first device may be manually input into the second device, and the second device may perform an initial pairing operation with the first device based on this manually entered information. The identification information stored from initial pairing may allow secure automatic pairing.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: OMER BEN-SHALOM, Alex Nayshtut, Edward V. Jimison, JR., Avigdor Eldar, Adi Shaliv
  • Publication number: 20140095887
    Abstract: In accordance with disclosed embodiments, there are provided methods, systems, and apparatuses for maintaining trusted time at a client computing device including, for example, executing a computer program within a client device; initiating a call from the computer program to a secure time service of the client device requesting a trusted time stamp; retrieving, via the secure time service of the client device, a protected time from protected clock hardware of the client device; generating, at the secure time service of the client device, the trusted time stamp by signing the protected time retrieved from the protected clock hardware of the client device; and returning the trusted time stamp to the computer program. Other related embodiments are disclosed.
    Type: Application
    Filed: September 29, 2012
    Publication date: April 3, 2014
    Inventors: Alex NAYSHTUT, Omer BEN-SHALOM, Abdul BAILEY, Adi SHALIV
  • Publication number: 20140094121
    Abstract: Systems and methods may provide for establishing an out-of-band (OOB) channel between a local wireless interface and a remote backend receiver, and receiving information from a peripheral device via the local wireless interface. Additionally, the information may be sent to the backend receiver via the OOB channel, wherein the OOB channel bypasses a local operating system. In one example, a secure Bluetooth stack is used to receive the information from the peripheral device.
    Type: Application
    Filed: September 28, 2012
    Publication date: April 3, 2014
    Inventors: Omer Ben-Shalom, Alex Nayshtut, Moshe Maor
  • Publication number: 20130339736
    Abstract: Systems, apparatus and methods for periodically validating the identity of two or more machines that have established a secure communication connection over a network. A client may initiate a secure communication session with a server by providing an identification certificate. Upon establishing a secure connection with the server, the client may periodically reaffirm its identity by sending a secure heartbeat message that includes a timestamp offset and a client identifier in order to keep the connection open. The server can require periodic receipt of the secure heartbeat message in order to maintain the secure communication session. The client identifier may include a code or value based on a unique physical attribute of the client. The timestamp offset may be calculated by the client based on a timestamp provided by the server.
    Type: Application
    Filed: June 19, 2012
    Publication date: December 19, 2013
    Inventors: Alex Nayshtut, Omer Ben-Shalom
  • Publication number: 20130339740
    Abstract: Disclosed herein is a certificate authority server configured to provide multi-factor digital certificates. A processor readable medium may include a plurality of instructions configured to enable a certificate authority server of a certificate authority, in response to execution of the instructions by a processor, to receive a request to provide a multi-factor digital security certificate by digitally signing a certificate request having a plurality of factors and a cryptographic key, wherein a first of the plurality of factors is an identifier of a device and a second of the plurality of factors is an identifier of a user of the device. The instructions are also configured to enable the certificate authority server to associate the cryptographic key with the plurality of factors and issue the digital security certificate based on the certificate request. Also disclosed is a method of using a multi-factor digital certificate as part of the authorization process to implicitly bind the plurality of factors.
    Type: Application
    Filed: March 8, 2012
    Publication date: December 19, 2013
    Inventors: Omer Ben-Shalom, Alex Nayshtut