Patents by Inventor Burton S. Kaliski, Jr.
Burton S. Kaliski, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140122476Abstract: A method, system, and computer-readable memory containing instructions include employing a tokenizing authority to obtain a tokenized query term that represents a query term, using the tokenized query term to perform a lookup against a tokenized term database, determining whether the tokenized query term exists in the database. The method, system, and computer-readable memory may further include returning an encryption or decryption key corresponding to an encrypted record of information associated with the query term and corresponding to the tokenized query term.Type: ApplicationFiled: October 25, 2012Publication date: May 1, 2014Applicant: VERISIGN, INC.Inventor: Burton S. Kaliski, JR.
-
Patent number: 8607045Abstract: In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.Type: GrantFiled: September 11, 2006Date of Patent: December 10, 2013Assignee: EMC CorporationInventors: Daniel Vernon Bailey, John G. Brainard, Burton S. Kaliski, Jr., Michael Szydlo
-
Publication number: 20130322622Abstract: In one aspect, a method comprises the steps of deriving a base point on an elliptic curve in a first processing device, generating authentication information in the first processing device utilizing the base point and a private key of the first processing device, and transmitting the authentication information from the first processing device to a second processing device. The base point on the elliptic curve may be derived, for example, by applying a one-way function to a current time value, or by computation based on a message to be signed.Type: ApplicationFiled: August 7, 2013Publication date: December 5, 2013Applicant: EMC CorporationInventors: Daniel Vernon Bailey, John G. Brainard, Ari Juels, Burton S. Kaliski, JR.
-
Patent number: 8495372Abstract: In one aspect, a first processing device, which may be an authentication token, establishes a shared key through a pairing protocol carried out between the first processing device and a second processing device. The pairing protocol also involves communication between the second processing device and an authentication server. As part of the pairing protocol, the first processing device sends identifying information to the second processing device, and the second processing device utilizes the identifying information to obtain the shared key from the authentication server. The first processing device encrypts authentication information utilizing the shared key, and transmits the encrypted authentication information from the first processing device to the second processing device. The second processing device utilizes the shared key to decrypt the encrypted authentication information.Type: GrantFiled: November 13, 2007Date of Patent: July 23, 2013Assignee: EMC CorporationInventors: Daniel Vernon Bailey, John G. Brainard, Ari Juels, Burton S. Kaliski, Jr.
-
Patent number: 8413221Abstract: An authentication-delegating service implemented in an authentication server or other processing device is configured to receive a request from a relying party for delegated authentication information associated with a particular user, to determine a level of trust associated with the relying party, and to provide the delegated authentication information to the relying party if the relying party has a sufficient level of trust, so as to permit the relying party to authenticate the user based on the delegated authentication information. The delegated authentication information has the property that the user can be presently authenticated based on such information. The delegated authentication information may comprise, for example, at least one value derived from a one-time password or other authentication credential of the particular user.Type: GrantFiled: October 31, 2007Date of Patent: April 2, 2013Assignee: EMC CorporationInventors: Burton S. Kaliski, Jr., Magnus Nyström
-
Patent number: 8381062Abstract: A proof of retrievability (POR) mechanism is applicable to a file for providing assurances of file possession to a requesting client by transmitting only a portion of the entire file. The client compares or examines validation values returned from predetermined validation segments of the file with previously computed validation attributes for assessing the existence of the file. Since the archive server does not have access to the validation function prior to the request, or challenge, from the client, the archive server cannot anticipate the validation values expected from the validation function. Further, since the validation segments from which the validation attributes, and hence the validation values were derived, are also unknown to the server, the server cannot anticipate which portions of the file will be employed for validation.Type: GrantFiled: May 5, 2008Date of Patent: February 19, 2013Assignee: EMC CorporationInventors: Ari Juels, Burton S. Kaliski, Jr., Kevin D. Bowers, Alina M. Oprea
-
Publication number: 20130018944Abstract: An apparatus and a non-transitory computer-readable medium may perform a method for providing brand-driven URL keyword navigation. The method may comprise: receiving a user selection of an accepted third party; transmitting third party selection information to the accepted third party, the third party selection information being based on the user selection; and receiving brand-driven keyword data from the accepted third party in response to the transmission of the third party selection information, the brand-driven keyword data mapping a keyword to a particular URL.Type: ApplicationFiled: September 19, 2012Publication date: January 17, 2013Applicant: Finnegan & HendersonInventors: Karthik Shyamsunder, Daniel Schonfeld, Burton S. Kaliski, JR.
-
Patent number: 7849323Abstract: A multimedia device or other type of processing device comprises a memory, a processor coupled to the memory, and playback circuitry coupled to the processor. In one aspect, the processor is operative to control the storage in the memory of at least one multimedia file containing a one-time password or other type of password, where the password is generated externally to the processing device, and to control the playback of the multimedia file via the playback circuitry to make the password apparent to or otherwise accessible to an associated user or other entity. The multimedia file may comprise, for example, an audio file, with the password being presented to the user in an audible form upon playback of the audio file. As another example, the multimedia file may comprise a video file, with the password being presented to the user in a visible form upon playback of the video file.Type: GrantFiled: November 3, 2006Date of Patent: December 7, 2010Assignee: EMC CorporationInventors: John Field, Burton S. Kaliski, Jr., Magnus Nyström, James Townsend
-
Patent number: 7730518Abstract: Techniques are disclosed for partitioning of cryptographic functionality, such as authentication code verification or generation ability, so as to permit delegation of at least one of a number of distinct portions of the cryptographic functionality from a delegating device to at least one recipient device. The cryptographic functionality is characterizable as a graph comprising a plurality of nodes, and a given set of the nodes is associated with a corresponding one of the distinct portions of the cryptographic functionality. Information representative of one or more of the nodes is transmitted from the delegating device to the recipient device such that the recipient device is thereby configurable for authorized execution of a corresponding one of the distinct portions of the cryptographic functionality. Advantageously, the invention provides a particularly efficient mechanism for the provision of cryptographic functionality in accordance with a subscription model.Type: GrantFiled: July 31, 2003Date of Patent: June 1, 2010Assignee: EMC CorporationInventors: Bjorn Markus Jakobsson, Burton S. Kaliski, Jr.
-
Patent number: 7725730Abstract: Secure authentication protocols, particularly well-suited for use in authenticating mobile communications devices having limited computational resources, are disclosed. In an illustrative embodiment, a network-based communication system includes a client device and at least two servers. First and second shares are generated from a first password associated with the client device, and stored in respective first and second servers. The client device submits additional information associated therewith to at least one of the first and second servers. Each of the first and second shares has the property that it is infeasible to determine solely therefrom correspondence of the additional information with the first password. The first and second servers then utilize the respective first and second shares to collectively determine said correspondence of the additional information with the first password.Type: GrantFiled: August 9, 2002Date of Patent: May 25, 2010Assignee: EMC CorporationInventors: Ari Juels, Burton S. Kaliski, Jr.
-
Patent number: 7716484Abstract: In general, in one aspect, the invention relates to a method for accessing encrypted data by a client. The method includes receiving from the client by a server client information derived from a first secret wherein the client information is derived such that the server can not feasibly determine the first secret. The method also includes providing to the client by the server intermediate data, which is derived responsive to the received client information, a server secret, and possibly other information. The intermediate data is derived such that the client cannot feasibly determine the server secret. The method also includes authenticating the client by a device that stores encrypted secrets and is configured not to provide the encrypted secrets without authentication. After the authenticating step, the method also includes providing the encrypted secrets to the client. The encrypted secrets 5 are capable of being decrypted using a third secret that is derived from the intermediate data.Type: GrantFiled: March 9, 2001Date of Patent: May 11, 2010Assignee: RSA Security Inc.Inventor: Burton S. Kaliski, Jr.
-
Publication number: 20100100724Abstract: In general, in one aspect, the invention relates to a method for accessing encrypted data by a client. The method includes receiving from the client by a server client information derived from a first secret wherein the client information is derived such that the server can not feasibly determine the first secret The method also includes providing to the client by the server intermediate data, which is derived responsive to the received client information, a server secret, and possibly other information. The intermediate data is derived such that the client cannot feasibly determine the server secret. The method also includes authenticating the client by a device that stores encrypted secrets and is configured not to provide the encrypted secrets without authentication. After the authenticating step, the method also includes providing the encrypted secrets to the client. The encrypted secrets 5 are capable of being decrypted using a third secret that is derived from the intermediate data.Type: ApplicationFiled: March 9, 2001Publication date: April 22, 2010Inventor: Burton S. Kaliski, JR.
-
Patent number: 7502467Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.Type: GrantFiled: November 2, 2005Date of Patent: March 10, 2009Assignee: RSA Security Inc.Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
-
Patent number: 7502933Abstract: A method and system for generating an authentication code that depends at least in part on a dynamic value that changes over time, an event state associated with the occurrence of an event, and a secret associated with an authentication device. By generating the authentication code responsive to an event state, an identity authentication code can be used to verify identity and to communicate event state information, and to do so in a secure manner.Type: GrantFiled: November 26, 2003Date of Patent: March 10, 2009Assignee: RSA Security Inc.Inventors: Markus Jakobsson, Ari Juels, Burton S. Kaliski, Jr.
-
Publication number: 20080313719Abstract: An authentication-delegating service implemented in an authentication server or other processing device is configured to receive a request from a relying party for delegated authentication information associated with a particular user, to determine a level of trust associated with the relying party, and to provide the delegated authentication information to the relying party if the relying party has a sufficient level of trust, so as to permit the relying party to authenticate the user based on the delegated authentication information. The delegated authentication information has the property that the user can be presently authenticated based on such information. The delegated authentication information may comprise, for example, at least one value derived from a one-time password or other authentication credential of the particular user.Type: ApplicationFiled: October 31, 2007Publication date: December 18, 2008Inventors: Burton S. Kaliski, JR., Magnus Nystrom
-
Patent number: 7363494Abstract: A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a personal identification number (PIN) and a verifier identifier can also be combined into the authentication code.Type: GrantFiled: December 4, 2001Date of Patent: April 22, 2008Assignee: RSA Security Inc.Inventors: John G. Brainard, Burton S. Kaliski, Jr., Ronald L. Rivest
-
Patent number: 6985583Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.Type: GrantFiled: May 4, 1999Date of Patent: January 10, 2006Assignee: RSA Security Inc.Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
-
Patent number: 6286022Abstract: The invention provides apparatus and methods for use in basis conversion involving a dual basis, such as a dual of a polynomial basis or dual of a normal basis. The invention in an illustrative embodiment includes basis generators for generating elements of a dual of a polynomial or a normal basis of a finite field GF(qm), where q is a prime number or power of a prime number and m is an integer greater than or equal to 2. The basis generators can be used in “import” basis conversion, such as converting a representation in an external basis to a representation in an internal dual of a polynomial basis or dual of a normal basis, as part of a generate-accumulate algorithm, or in “export” basis conversion, such as converting a representation in an internal dual of a polynomial basis or dual of a normal basis to a representation in an external basis, as part of a generate-evaluate algorithm.Type: GrantFiled: November 18, 1998Date of Patent: September 4, 2001Assignee: RSA Security Inc.Inventors: Burton S. Kaliski, Jr., Moses Liskov
-
Patent number: 6189098Abstract: A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a communications channel a message containing at least a part of a certificate encrypted with the server's public key or a secret session key. The server receives and processes the message to recover at least part of the certificate, verifies and accepts it as proof of the client's authenticity.Type: GrantFiled: March 16, 2000Date of Patent: February 13, 2001Assignee: RSA Security Inc.Inventor: Burton S. Kaliski, Jr.
-
Patent number: 6085320Abstract: A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a communications channel a message containing at least a part of a certificate encrypted with the server's public key or a secret session key. The server receives and processes the message to recover at least part of the certificate, verifies and accepts it as proof of the client's authenticity.Type: GrantFiled: April 21, 1997Date of Patent: July 4, 2000Assignee: RSA Security Inc.Inventor: Burton S. Kaliski, Jr.