Patents by Inventor Anthony C. Fascenda

Anthony C. Fascenda has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10630656
    Abstract: A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet.
    Type: Grant
    Filed: December 23, 2016
    Date of Patent: April 21, 2020
    Assignee: KOOLSPAN, INC.
    Inventors: Emil Sturniolo, Anthony C. Fascenda, Robert Cichielo, Paul Benware, William Supernor, Orville Pike
  • Patent number: 10108810
    Abstract: The example non-limiting technology herein uses a Microsoft Office module or other application that automatically encrypts an Office document (Excel, PowerPoint, Word) or other software object and embeds the encrypted data within a “mule” or carrier file of the same type. On user's systems without the module installed, the “mule” file will open normally without exposing the embedded secret file. On systems with the module installed and properly authorized, the user will see the encrypted file open without seeing the “mule” file. This allows the secure transport of a file within a plaintext “mule” file.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: October 23, 2018
    Assignee: Global Integrity, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo
  • Patent number: 10110373
    Abstract: This technology manipulates both the plaintext and ciphertext before and after encryption respectively and prior to dissemination to recipients. The manipulation mitigates the possibility of discovery of the encryption key(s) and/or encryption parameters. Even if all of the encryption parameters are known and the encryption key is made available, considerable information would still need to be obtained to enable the recipient to be able to properly decrypt an encrypted message.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: October 23, 2018
    Assignee: Global Integrity, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo
  • Patent number: 10050943
    Abstract: This technology mitigates the vulnerabilities of parameter storage by calculating parameters dynamically rather than storing and using static parameters. This example non-limiting technology derives parameters “on-demand” from a subset of widely distributed parameters determined by a random string generated for each encrypted session. The subset of widely distributed parameters will be different each time a new subset is generated as the individual parameters are randomly selected. Thus the individual encrypted message (or document) will be encrypted differently using a different set of parameters each time. Some of these parameters bind the encrypted message to a specific user account and user device making the resulting encrypted message highly secure.
    Type: Grant
    Filed: February 16, 2016
    Date of Patent: August 14, 2018
    Assignee: Global Integrity, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo
  • Patent number: 9824239
    Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.
    Type: Grant
    Filed: September 22, 2014
    Date of Patent: November 21, 2017
    Assignee: KOOLSPAN, INC.
    Inventors: Anthony C. Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Publication number: 20170300720
    Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.
    Type: Application
    Filed: September 22, 2014
    Publication date: October 19, 2017
    Inventors: Anthony C. FASCENDA, Emil STURNIOLO, Robert CICHIELO, Paul BENWARE
  • Publication number: 20170237720
    Abstract: A system for and method of media encapsulation is presented. The method may include receiving, via an audio digitizer, a plurality of packets of data and compressing, via a codec, the plurality of packets of data. The method may also include queuing the plurality of packets of data in a queue and encrypting, via a filter, payloads of at least two of the plurality of packets of data in the queue into a single payload. The method further include transmitting the single payload in a single encrypted data packet.
    Type: Application
    Filed: December 23, 2016
    Publication date: August 17, 2017
    Inventors: Emil STURNIOLO, Anthony C. FASCENDA, Robert CICHIELO, Paul BENWARE, William SUPERNOR, Orville PIKE
  • Publication number: 20160239673
    Abstract: The example non-limiting technology herein uses a Microsoft Office module or other application that automatically encrypts an Office document (Excel, PowerPoint, Word) or other software object and embeds the encrypted data within a “mule” or carrier file of the same type. On user's systems without the module installed, the “mule” file will open normally without exposing the embedded secret file. On systems with the module installed and properly authorized, the user will see the encrypted file open without seeing the “mule” file. This allows the secure transport of a file within a plaintext “mule” file.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 18, 2016
    Inventors: Anthony C. FASCENDA, Emil STURNIOLO
  • Publication number: 20160241524
    Abstract: This technology mitigates the vulnerabilities of parameter storage by calculating parameters dynamically rather than storing and using static parameters. This example non-limiting technology derives parameters “on-demand” from a subset of widely distributed parameters determined by a random string generated for each encrypted session. The subset of widely distributed parameters will be different each time a new subset is generated as the individual parameters are randomly selected. Thus the individual encrypted message (or document) will be encrypted differently using a different set of parameters each time. Some of these parameters bind the encrypted message to a specific user account and user device making the resulting encrypted message highly secure.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 18, 2016
    Inventors: Anthony C. FASCENDA, Emil STURNIOLO
  • Publication number: 20160241387
    Abstract: This technology manipulates both the plaintext and ciphertext before and after encryption respectively and prior to dissemination to recipients. The manipulation mitigates the possibility of discovery of the encryption key(s) and/or encryption parameters. Even if all of the encryption parameters are known and the encryption key is made available, considerable information would still need to be obtained to enable the recipient to be able to properly decrypt an encrypted message.
    Type: Application
    Filed: February 16, 2016
    Publication date: August 18, 2016
    Inventors: Anthony C. FASCENDA, Emil STURNIOLO
  • Patent number: 9294915
    Abstract: The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.
    Type: Grant
    Filed: June 9, 2014
    Date of Patent: March 22, 2016
    Assignee: KOOLSPAN, INC.
    Inventor: Anthony C. Fascenda
  • Patent number: 9209969
    Abstract: A method of per-packet keying for encrypting and decrypting data transferred between two or more parties, each party having knowledge of a shared key that allows a per-packet key to differ for each packet is provided. Avoiding the use of a static session key during encryption offers several advantages over existing encryption methods. For example, rejecting packets received with duplicate sequence numbers, or sequence numbers that are beyond a specified deviation range mitigates Replay Attacks.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: December 8, 2015
    Assignee: KOOLSPAN, INC.
    Inventors: Anthony C. Fascenda, Emil Sturniolo
  • Patent number: 9008312
    Abstract: A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding the transfer of the key offers several advantages over existing encryption methods.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: April 14, 2015
    Assignee: Koolspan, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo
  • Publication number: 20140331051
    Abstract: The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.
    Type: Application
    Filed: June 9, 2014
    Publication date: November 6, 2014
    Inventor: Anthony C. FASCENDA
  • Patent number: 8842836
    Abstract: A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent individual involved in manufacturing the modules from compromising the security of the module. In particular, the modules are provisioned by an entity different from the manufacturer.
    Type: Grant
    Filed: November 26, 2008
    Date of Patent: September 23, 2014
    Assignee: Koolspan, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware
  • Patent number: 8769282
    Abstract: The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.
    Type: Grant
    Filed: September 25, 2012
    Date of Patent: July 1, 2014
    Assignee: Koolspan, Inc.
    Inventor: Anthony C. Fascenda
  • Patent number: 8635456
    Abstract: The present invention discloses a technique provisioning network cryptographic keys to a client when direct physical transfer is not feasible. In an embodiment of the invention, a client token generates a temporary key encrypted with a first secret key known only in a master token database and passes this on to an enterprise network token of a network to which service is requested. The enterprise network token then further encrypts the encrypted temporary key with a second secret key and passes that on to the master token database. Since the second secret key is also known by the master token database, the originally encrypted temporary key can be securely decoded only by a master token coupled to the master token database. The decrypted temporary key can then be re-encrypted with a key known only by the enterprise network token and the master token, and returned to the enterprise network token.
    Type: Grant
    Filed: September 24, 2010
    Date of Patent: January 21, 2014
    Assignee: Koolspan, Inc.
    Inventor: Anthony C. Fascenda
  • Patent number: 8555068
    Abstract: An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially manufactured to include end-to-end encryption functionality.
    Type: Grant
    Filed: December 5, 2007
    Date of Patent: October 8, 2013
    Assignee: Koolspan, Inc.
    Inventors: Anthony C. Fascenda, Emil Sturniolo, Paul Benware, Robert Cichielo
  • Patent number: 8515078
    Abstract: An authentication and mass subscriber management technique is provided by employing a key table derived as a subset of a larger key pool, a network edge device, and authentication tokens attached on both the network edge device and on a subscriber's computing device. The network edge device and subscriber's computing device are provided with secure, tamper-resistant network keys for encrypting all transactions across the wired/wireless segment between supplicant (subscriber) and authenticator (network edge device). In an embodiment of the invention, a secure, secret user key is shared between a number of subscribers based upon commonalities between serial numbers of those subscribers' tokens. In another embodiment of the invention, a unique session key is generated for each subscriber even though multiple subscribers connected to the same network connection point might have identical pre-stored secret keys.
    Type: Grant
    Filed: September 15, 2010
    Date of Patent: August 20, 2013
    Assignee: Koolspan, Inc.
    Inventor: Anthony C. Fascenda
  • Publication number: 20130031620
    Abstract: The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key and a common network receive cryptographic key used only during the authentication phase by all components on the LAN. Each client key further includes a secret cryptographic key unique to each client device. During authentication, two random numbers are generated per communications session and are known by both sides of the wireless channel. Only the random numbers are sent across the wireless channel and in each case these numbers are encrypted. A transposed cryptographic key is derived from the unique secret cryptographic key using the random numbers generated during authentication. Thus, both sides of the wireless channel know the transposed cryptographic key without it ever being transmitted between the two.
    Type: Application
    Filed: September 25, 2012
    Publication date: January 31, 2013
    Applicant: Koolspan, Inc.
    Inventor: Anthony C. FASCENDA