Patents by Inventor Bodo Moller

Bodo Moller has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9148283
    Abstract: An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.
    Type: Grant
    Filed: October 30, 2013
    Date of Patent: September 29, 2015
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel, Brian N. Bershad, David Erb
  • Patent number: 8650657
    Abstract: A resource in unencrypted form and a wrapped key are received in a request from an application server system and at a key server system. The wrapped key includes a resource encryption key and a user identifier that have been encrypted using a master key. The user identifier identifies a user that is permitted to use the resource encryption key to decrypt the resource. The request does not include the user identifier. The wrapped key is decrypted to access the resource encryption key. The resource in unencrypted form is encrypted into an encrypted resource with the resource encryption key. The encrypted resource is sent to the application server system.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: February 11, 2014
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel
  • Patent number: 8607358
    Abstract: A seed value is received and a resource encryption key is generated from the seed value. The resource encryption key may be sent to an application server such that the application server system is able to encrypt a resource using the resource encryption key. Authentication credentials and a wrapped key are received and the wrapped key is decrypted to generate an unwrapped key that includes the resource identifier, the resource encryption key, and the user identifier in unencrypted form. The user identifier is accessed from the unwrapped key it is determined that the received authentication credentials correspond to the accessed user identifier. The resource encryption key is sent in unencrypted form to the application server system such that the application server system can decrypt the resource using the resource encryption key in unencrypted form.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: December 10, 2013
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel
  • Patent number: 8601600
    Abstract: Authentication credentials are received at a key server system. A service associated with the wrapped key is identified. A master key is accessed based on the identified service, the master key being associated with the identified service. The wrapped key is decrypted to generate an unwrapped key that includes the resource identifier, the resource encryption key, and the user identifier in unencrypted form. The user identifier is identified accessed from the unwrapped key. The received authentication credentials are determined to correspond to the accessed user identifier. In response to determining that the received authentication credentials correspond to the accessed user identifier, the resource encryption key are sent in unecrypted to the application server system such that the application server system can decrypt the resource using the resource encryption key in unencrypted form.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: December 3, 2013
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel
  • Patent number: 8601263
    Abstract: An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.
    Type: Grant
    Filed: May 18, 2011
    Date of Patent: December 3, 2013
    Assignee: Google Inc.
    Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel, Brian N. Bershad, David Erb
  • Patent number: 8027467
    Abstract: An elliptic curve multiplication method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.
    Type: Grant
    Filed: February 12, 2009
    Date of Patent: September 27, 2011
    Assignee: Wired Connections LLC
    Inventors: Bodo Möller, Tsuyoshi Takagi
  • Patent number: 7555122
    Abstract: The method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.
    Type: Grant
    Filed: December 4, 2002
    Date of Patent: June 30, 2009
    Assignee: Wired Communications LLC
    Inventors: Bodo Möller, Tsuyoshi Takagi
  • Publication number: 20090147948
    Abstract: An elliptic curve multiplication method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.
    Type: Application
    Filed: February 12, 2009
    Publication date: June 11, 2009
    Applicant: Wired Connection LLC
    Inventors: Bodo Moller, Tsuyoshi Takagi
  • Publication number: 20040114756
    Abstract: The method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.
    Type: Application
    Filed: December 4, 2002
    Publication date: June 17, 2004
    Inventors: Bodo Moller, Tsuyoshi Takagi