Patents by Inventor Alexander Usach

Alexander Usach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200153808
    Abstract: Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments of this mechanism use a trusted third-party topology, but only a single instance of a public-private key exchange is required for initialization. Embodiments of the system and methods are secure and any of the derived secret keys are completely renewable in untrusted environments without any reliance on asymmetric cryptography. The derived secrets exhibit zero knowledge attributes and the associated zero knowledge proofs are open and available for review. Embodiments of systems and methods can be implemented in a wide range of previously-deployed devices as well as integrated into a variety of new designs using minimal roots-of-trust.
    Type: Application
    Filed: January 10, 2020
    Publication date: May 14, 2020
    Inventors: William V. Oxford, Gerald E. Woodcock, Stephen E. Smith, Roderick Schultz, Marcos Portnoi, Stuart W. Juengst, Charles T. Schad, Michael K. Eneboe, Alexander Usach, Keith Evans
  • Patent number: 10567362
    Abstract: Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments of this mechanism use a trusted third-party topology, but only a single instance of a public-private key exchange is required for initialization. Embodiments of the system and methods are secure and any of the derived secret keys are completely renewable in untrusted environments without any reliance on asymmetric cryptography. The derived secrets exhibit zero knowledge attributes and the associated zero knowledge proofs are open and available for review. Embodiments of systems and methods can be implemented in a wide range of previously-deployed devices as well as integrated into a variety of new designs using minimal roots-of-trust.
    Type: Grant
    Filed: June 15, 2017
    Date of Patent: February 18, 2020
    Assignee: Rubicon Labs, Inc.
    Inventors: William V. Oxford, Gerald E. Woodcock, III, Stephen E. Smith, Roderick Schultz, Marcos Portnoi, Stuart W. Juengst, Charles T. Schad, Michael K. Eneboe, Alexander Usach, Keith Evans
  • Patent number: 10057224
    Abstract: Embodiments as described herein provide systems and methods for sharing secrets between a device and another entity. The shared secret may be generated on the device as a derivative of a secret value contained on the device itself in a manner that will not expose the secret key on the device and may be sent to the entity. The shared secret may also be stored on the device such that it can be used in future secure operations on the device. In this manner, a device may be registered with an external service such that a variety of functionality may be securely accomplished, including, for example, the generation of authorization codes for the device by the external service based on the shared secret or the symmetric encryption of data between the external service and the device using the shared secret.
    Type: Grant
    Filed: August 3, 2016
    Date of Patent: August 21, 2018
    Assignee: Rubicon Labs, Inc.
    Inventors: William V. Oxford, Roderick Schultz, Gerald E. Woodcock, Stephen E. Smith, Alexander Usach, Marcos Portnoi
  • Publication number: 20170366527
    Abstract: Embodiments of systems and methods disclosed herein include an embedded secret provisioning system that is based on a shared-derivative mechanism. Embodiments of this mechanism use a trusted third-party topology, but only a single instance of a public-private key exchange is required for initialization. Embodiments of the system and methods are secure and any of the derived secret keys are completely renewable in untrusted environments without any reliance on asymmetric cryptography. The derived secrets exhibit zero knowledge attributes and the associated zero knowledge proofs are open and available for review. Embodiments of systems and methods can be implemented in a wide range of previously-deployed devices as well as integrated into a variety of new designs using minimal roots-of-trust.
    Type: Application
    Filed: June 15, 2017
    Publication date: December 21, 2017
    Inventors: William V. Oxford, Gerald E. Woodcock, III, Stephen E. Smith, Roderick Schultz, Marcos Portnoi, Stuart W. Juengst, Charles T. Schad, Michael K. Eneboe, Alexander Usach, Keith Evans
  • Publication number: 20170041302
    Abstract: Embodiments as described herein provide systems and methods for sharing secrets between a device and another entity. The shared secret may be generated on the device as a derivative of a secret value contained on the device itself in a manner that will not expose the secret key on the device and may be sent to the entity. The shared secret may also be stored on the device such that it can be used in future secure operations on the device. In this manner, a device may be registered with an external service such that a variety of functionality may be securely accomplished, including, for example, the generation of authorization codes for the device by the external service based on the shared secret or the symmetric encryption of data between the external service and the device using the shared secret.
    Type: Application
    Filed: August 3, 2016
    Publication date: February 9, 2017
    Inventors: William V. Oxford, Roderick Schultz, Gerald E. Woodcock, III, Stephen E. Smith, Alexander Usach, Marcos Portnoi
  • Publication number: 20160352733
    Abstract: Embodiments of systems and methods disclosed herein include a distributed device activation mechanism involving a group of external entities without using asymmetric cryptography. Systems and methods include techniques for deriving a device secret using a hardware secret and authenticated unique input data provided to the device by one or more external entities. A hardware hash function uses the hardware secret as a key and the authenticated unique input data as input data to output the derived device secret. The derived device secret is written to a security register of the device to enter a new security layer.
    Type: Application
    Filed: May 27, 2016
    Publication date: December 1, 2016
    Inventors: William V. Oxford, Roderick Schultz, Gerald E. Woodcock, III, Stephen E. Smith, Alexander Usach, Marcos Portnoi
  • Publication number: 20110039575
    Abstract: A mobile device learns cell information for a serving cell and for neighbor cells. The learned cell information is communicated to a remote location server for locating base stations within the serving and/or neighbor cells. The learned cell information comprises cell signal strength information and/or other cell information such as cell identifiers (Cell-IDs) and Country Code (MCC). Received signal strength (RSS) on the serving cell and the neighbor cells are measured. Locations pertaining to the RSS measurements are determined. The mobile device location stamps the RSS measurements utilizing the determined locations to generate a neighbor cell report, which is utilized by a cellular communication network to prepare a handover operation whenever needed, and/or to build a local cell-learning database. A portion of the local cell-learning database is transmitted as cell data to the remote location server that collects cell data from a plurality of mobile devices.
    Type: Application
    Filed: April 9, 2010
    Publication date: February 17, 2011
    Inventors: Manuel Del Castillo, Steve Malkos, David Albert Lundgren, Vladimir Belov, Alexander Usach, Andrei Kosolobov, James William Lamance