Patents by Inventor Burton S. Kaliski, Jr.

Burton S. Kaliski, Jr. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140122476
    Abstract: A method, system, and computer-readable memory containing instructions include employing a tokenizing authority to obtain a tokenized query term that represents a query term, using the tokenized query term to perform a lookup against a tokenized term database, determining whether the tokenized query term exists in the database. The method, system, and computer-readable memory may further include returning an encryption or decryption key corresponding to an encrypted record of information associated with the query term and corresponding to the tokenized query term.
    Type: Application
    Filed: October 25, 2012
    Publication date: May 1, 2014
    Applicant: VERISIGN, INC.
    Inventor: Burton S. Kaliski, JR.
  • Patent number: 8607045
    Abstract: In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.
    Type: Grant
    Filed: September 11, 2006
    Date of Patent: December 10, 2013
    Assignee: EMC Corporation
    Inventors: Daniel Vernon Bailey, John G. Brainard, Burton S. Kaliski, Jr., Michael Szydlo
  • Publication number: 20130322622
    Abstract: In one aspect, a method comprises the steps of deriving a base point on an elliptic curve in a first processing device, generating authentication information in the first processing device utilizing the base point and a private key of the first processing device, and transmitting the authentication information from the first processing device to a second processing device. The base point on the elliptic curve may be derived, for example, by applying a one-way function to a current time value, or by computation based on a message to be signed.
    Type: Application
    Filed: August 7, 2013
    Publication date: December 5, 2013
    Applicant: EMC Corporation
    Inventors: Daniel Vernon Bailey, John G. Brainard, Ari Juels, Burton S. Kaliski, JR.
  • Patent number: 8495372
    Abstract: In one aspect, a first processing device, which may be an authentication token, establishes a shared key through a pairing protocol carried out between the first processing device and a second processing device. The pairing protocol also involves communication between the second processing device and an authentication server. As part of the pairing protocol, the first processing device sends identifying information to the second processing device, and the second processing device utilizes the identifying information to obtain the shared key from the authentication server. The first processing device encrypts authentication information utilizing the shared key, and transmits the encrypted authentication information from the first processing device to the second processing device. The second processing device utilizes the shared key to decrypt the encrypted authentication information.
    Type: Grant
    Filed: November 13, 2007
    Date of Patent: July 23, 2013
    Assignee: EMC Corporation
    Inventors: Daniel Vernon Bailey, John G. Brainard, Ari Juels, Burton S. Kaliski, Jr.
  • Patent number: 8413221
    Abstract: An authentication-delegating service implemented in an authentication server or other processing device is configured to receive a request from a relying party for delegated authentication information associated with a particular user, to determine a level of trust associated with the relying party, and to provide the delegated authentication information to the relying party if the relying party has a sufficient level of trust, so as to permit the relying party to authenticate the user based on the delegated authentication information. The delegated authentication information has the property that the user can be presently authenticated based on such information. The delegated authentication information may comprise, for example, at least one value derived from a one-time password or other authentication credential of the particular user.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: April 2, 2013
    Assignee: EMC Corporation
    Inventors: Burton S. Kaliski, Jr., Magnus Nyström
  • Patent number: 8381062
    Abstract: A proof of retrievability (POR) mechanism is applicable to a file for providing assurances of file possession to a requesting client by transmitting only a portion of the entire file. The client compares or examines validation values returned from predetermined validation segments of the file with previously computed validation attributes for assessing the existence of the file. Since the archive server does not have access to the validation function prior to the request, or challenge, from the client, the archive server cannot anticipate the validation values expected from the validation function. Further, since the validation segments from which the validation attributes, and hence the validation values were derived, are also unknown to the server, the server cannot anticipate which portions of the file will be employed for validation.
    Type: Grant
    Filed: May 5, 2008
    Date of Patent: February 19, 2013
    Assignee: EMC Corporation
    Inventors: Ari Juels, Burton S. Kaliski, Jr., Kevin D. Bowers, Alina M. Oprea
  • Publication number: 20130018944
    Abstract: An apparatus and a non-transitory computer-readable medium may perform a method for providing brand-driven URL keyword navigation. The method may comprise: receiving a user selection of an accepted third party; transmitting third party selection information to the accepted third party, the third party selection information being based on the user selection; and receiving brand-driven keyword data from the accepted third party in response to the transmission of the third party selection information, the brand-driven keyword data mapping a keyword to a particular URL.
    Type: Application
    Filed: September 19, 2012
    Publication date: January 17, 2013
    Applicant: Finnegan & Henderson
    Inventors: Karthik Shyamsunder, Daniel Schonfeld, Burton S. Kaliski, JR.
  • Patent number: 7849323
    Abstract: A multimedia device or other type of processing device comprises a memory, a processor coupled to the memory, and playback circuitry coupled to the processor. In one aspect, the processor is operative to control the storage in the memory of at least one multimedia file containing a one-time password or other type of password, where the password is generated externally to the processing device, and to control the playback of the multimedia file via the playback circuitry to make the password apparent to or otherwise accessible to an associated user or other entity. The multimedia file may comprise, for example, an audio file, with the password being presented to the user in an audible form upon playback of the audio file. As another example, the multimedia file may comprise a video file, with the password being presented to the user in a visible form upon playback of the video file.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: December 7, 2010
    Assignee: EMC Corporation
    Inventors: John Field, Burton S. Kaliski, Jr., Magnus Nyström, James Townsend
  • Patent number: 7730518
    Abstract: Techniques are disclosed for partitioning of cryptographic functionality, such as authentication code verification or generation ability, so as to permit delegation of at least one of a number of distinct portions of the cryptographic functionality from a delegating device to at least one recipient device. The cryptographic functionality is characterizable as a graph comprising a plurality of nodes, and a given set of the nodes is associated with a corresponding one of the distinct portions of the cryptographic functionality. Information representative of one or more of the nodes is transmitted from the delegating device to the recipient device such that the recipient device is thereby configurable for authorized execution of a corresponding one of the distinct portions of the cryptographic functionality. Advantageously, the invention provides a particularly efficient mechanism for the provision of cryptographic functionality in accordance with a subscription model.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: June 1, 2010
    Assignee: EMC Corporation
    Inventors: Bjorn Markus Jakobsson, Burton S. Kaliski, Jr.
  • Patent number: 7725730
    Abstract: Secure authentication protocols, particularly well-suited for use in authenticating mobile communications devices having limited computational resources, are disclosed. In an illustrative embodiment, a network-based communication system includes a client device and at least two servers. First and second shares are generated from a first password associated with the client device, and stored in respective first and second servers. The client device submits additional information associated therewith to at least one of the first and second servers. Each of the first and second shares has the property that it is infeasible to determine solely therefrom correspondence of the additional information with the first password. The first and second servers then utilize the respective first and second shares to collectively determine said correspondence of the additional information with the first password.
    Type: Grant
    Filed: August 9, 2002
    Date of Patent: May 25, 2010
    Assignee: EMC Corporation
    Inventors: Ari Juels, Burton S. Kaliski, Jr.
  • Patent number: 7716484
    Abstract: In general, in one aspect, the invention relates to a method for accessing encrypted data by a client. The method includes receiving from the client by a server client information derived from a first secret wherein the client information is derived such that the server can not feasibly determine the first secret. The method also includes providing to the client by the server intermediate data, which is derived responsive to the received client information, a server secret, and possibly other information. The intermediate data is derived such that the client cannot feasibly determine the server secret. The method also includes authenticating the client by a device that stores encrypted secrets and is configured not to provide the encrypted secrets without authentication. After the authenticating step, the method also includes providing the encrypted secrets to the client. The encrypted secrets 5 are capable of being decrypted using a third secret that is derived from the intermediate data.
    Type: Grant
    Filed: March 9, 2001
    Date of Patent: May 11, 2010
    Assignee: RSA Security Inc.
    Inventor: Burton S. Kaliski, Jr.
  • Publication number: 20100100724
    Abstract: In general, in one aspect, the invention relates to a method for accessing encrypted data by a client. The method includes receiving from the client by a server client information derived from a first secret wherein the client information is derived such that the server can not feasibly determine the first secret The method also includes providing to the client by the server intermediate data, which is derived responsive to the received client information, a server secret, and possibly other information. The intermediate data is derived such that the client cannot feasibly determine the server secret. The method also includes authenticating the client by a device that stores encrypted secrets and is configured not to provide the encrypted secrets without authentication. After the authenticating step, the method also includes providing the encrypted secrets to the client. The encrypted secrets 5 are capable of being decrypted using a third secret that is derived from the intermediate data.
    Type: Application
    Filed: March 9, 2001
    Publication date: April 22, 2010
    Inventor: Burton S. Kaliski, JR.
  • Patent number: 7502467
    Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.
    Type: Grant
    Filed: November 2, 2005
    Date of Patent: March 10, 2009
    Assignee: RSA Security Inc.
    Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
  • Patent number: 7502933
    Abstract: A method and system for generating an authentication code that depends at least in part on a dynamic value that changes over time, an event state associated with the occurrence of an event, and a secret associated with an authentication device. By generating the authentication code responsive to an event state, an identity authentication code can be used to verify identity and to communicate event state information, and to do so in a secure manner.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: March 10, 2009
    Assignee: RSA Security Inc.
    Inventors: Markus Jakobsson, Ari Juels, Burton S. Kaliski, Jr.
  • Publication number: 20080313719
    Abstract: An authentication-delegating service implemented in an authentication server or other processing device is configured to receive a request from a relying party for delegated authentication information associated with a particular user, to determine a level of trust associated with the relying party, and to provide the delegated authentication information to the relying party if the relying party has a sufficient level of trust, so as to permit the relying party to authenticate the user based on the delegated authentication information. The delegated authentication information has the property that the user can be presently authenticated based on such information. The delegated authentication information may comprise, for example, at least one value derived from a one-time password or other authentication credential of the particular user.
    Type: Application
    Filed: October 31, 2007
    Publication date: December 18, 2008
    Inventors: Burton S. Kaliski, JR., Magnus Nystrom
  • Patent number: 7363494
    Abstract: A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a personal identification number (PIN) and a verifier identifier can also be combined into the authentication code.
    Type: Grant
    Filed: December 4, 2001
    Date of Patent: April 22, 2008
    Assignee: RSA Security Inc.
    Inventors: John G. Brainard, Burton S. Kaliski, Jr., Ronald L. Rivest
  • Patent number: 6985583
    Abstract: In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation function. The server shares a verifier seed with one or more verifiers. The device, or an entity using the device, can authenticate with one of the verifiers using the appropriate verifier seed. In this way, the device and the verifier can share a secret, the verifier seed for that verifier, without that verifier knowing the master seed, or any other verifier seeds. Thus, the device need only store the one master seed, have access to the information necessary to correctly derive the appropriate seed, and have seed derivation capability. A verifier cannot compromise the master seed, because the verifier does not have access to the master seed.
    Type: Grant
    Filed: May 4, 1999
    Date of Patent: January 10, 2006
    Assignee: RSA Security Inc.
    Inventors: John G. Brainard, Burton S. Kaliski, Jr., Magnus Nyström, Ronald L. Rivest
  • Patent number: 6286022
    Abstract: The invention provides apparatus and methods for use in basis conversion involving a dual basis, such as a dual of a polynomial basis or dual of a normal basis. The invention in an illustrative embodiment includes basis generators for generating elements of a dual of a polynomial or a normal basis of a finite field GF(qm), where q is a prime number or power of a prime number and m is an integer greater than or equal to 2. The basis generators can be used in “import” basis conversion, such as converting a representation in an external basis to a representation in an internal dual of a polynomial basis or dual of a normal basis, as part of a generate-accumulate algorithm, or in “export” basis conversion, such as converting a representation in an internal dual of a polynomial basis or dual of a normal basis to a representation in an external basis, as part of a generate-evaluate algorithm.
    Type: Grant
    Filed: November 18, 1998
    Date of Patent: September 4, 2001
    Assignee: RSA Security Inc.
    Inventors: Burton S. Kaliski, Jr., Moses Liskov
  • Patent number: 6189098
    Abstract: A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a communications channel a message containing at least a part of a certificate encrypted with the server's public key or a secret session key. The server receives and processes the message to recover at least part of the certificate, verifies and accepts it as proof of the client's authenticity.
    Type: Grant
    Filed: March 16, 2000
    Date of Patent: February 13, 2001
    Assignee: RSA Security Inc.
    Inventor: Burton S. Kaliski, Jr.
  • Patent number: 6085320
    Abstract: A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a communications channel a message containing at least a part of a certificate encrypted with the server's public key or a secret session key. The server receives and processes the message to recover at least part of the certificate, verifies and accepts it as proof of the client's authenticity.
    Type: Grant
    Filed: April 21, 1997
    Date of Patent: July 4, 2000
    Assignee: RSA Security Inc.
    Inventor: Burton S. Kaliski, Jr.