Patents by Inventor Bodo Moller
Bodo Moller has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9148283Abstract: An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.Type: GrantFiled: October 30, 2013Date of Patent: September 29, 2015Assignee: Google Inc.Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel, Brian N. Bershad, David Erb
-
Patent number: 8650657Abstract: A resource in unencrypted form and a wrapped key are received in a request from an application server system and at a key server system. The wrapped key includes a resource encryption key and a user identifier that have been encrypted using a master key. The user identifier identifies a user that is permitted to use the resource encryption key to decrypt the resource. The request does not include the user identifier. The wrapped key is decrypted to access the resource encryption key. The resource in unencrypted form is encrypted into an encrypted resource with the resource encryption key. The encrypted resource is sent to the application server system.Type: GrantFiled: May 18, 2011Date of Patent: February 11, 2014Assignee: Google Inc.Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel
-
Patent number: 8607358Abstract: A seed value is received and a resource encryption key is generated from the seed value. The resource encryption key may be sent to an application server such that the application server system is able to encrypt a resource using the resource encryption key. Authentication credentials and a wrapped key are received and the wrapped key is decrypted to generate an unwrapped key that includes the resource identifier, the resource encryption key, and the user identifier in unencrypted form. The user identifier is accessed from the unwrapped key it is determined that the received authentication credentials correspond to the accessed user identifier. The resource encryption key is sent in unencrypted form to the application server system such that the application server system can decrypt the resource using the resource encryption key in unencrypted form.Type: GrantFiled: May 18, 2011Date of Patent: December 10, 2013Assignee: Google Inc.Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel
-
Patent number: 8601600Abstract: Authentication credentials are received at a key server system. A service associated with the wrapped key is identified. A master key is accessed based on the identified service, the master key being associated with the identified service. The wrapped key is decrypted to generate an unwrapped key that includes the resource identifier, the resource encryption key, and the user identifier in unencrypted form. The user identifier is identified accessed from the unwrapped key. The received authentication credentials are determined to correspond to the accessed user identifier. In response to determining that the received authentication credentials correspond to the accessed user identifier, the resource encryption key are sent in unecrypted to the application server system such that the application server system can decrypt the resource using the resource encryption key in unencrypted form.Type: GrantFiled: May 18, 2011Date of Patent: December 3, 2013Assignee: Google Inc.Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel
-
Patent number: 8601263Abstract: An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.Type: GrantFiled: May 18, 2011Date of Patent: December 3, 2013Assignee: Google Inc.Inventors: Umesh Shankar, Andrei Kulik, Bodo Moller, Sarvar Patel, Brian N. Bershad, David Erb
-
Patent number: 8027467Abstract: An elliptic curve multiplication method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.Type: GrantFiled: February 12, 2009Date of Patent: September 27, 2011Assignee: Wired Connections LLCInventors: Bodo Möller, Tsuyoshi Takagi
-
Patent number: 7555122Abstract: The method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.Type: GrantFiled: December 4, 2002Date of Patent: June 30, 2009Assignee: Wired Communications LLCInventors: Bodo Möller, Tsuyoshi Takagi
-
Publication number: 20090147948Abstract: An elliptic curve multiplication method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.Type: ApplicationFiled: February 12, 2009Publication date: June 11, 2009Applicant: Wired Connection LLCInventors: Bodo Moller, Tsuyoshi Takagi
-
Publication number: 20040114756Abstract: The method comprises three stages. In the first stage, randomly selected point representations are stored in variables. In the second stage, a right-to-left loop is executed that modifies the variable values in dependency of a multiplier. In the last stage, the result is calculated from the modified variable values.Type: ApplicationFiled: December 4, 2002Publication date: June 17, 2004Inventors: Bodo Moller, Tsuyoshi Takagi