Patents by Inventor Christopher A. Howell
Christopher A. Howell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9830089Abstract: Digital data sanitization is disclosed. An indication that a data sanitization process should be performed is received. The data sanitization process is performed. Performing the data sanitization process includes determining an amount of free space on a storage device. Performing the data sanitization process further includes performing a set of one or more write operations, where performing the write operations decreases the amount of free space on the storage of the device.Type: GrantFiled: June 24, 2014Date of Patent: November 28, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa, Thomas Michael Leavy
-
Patent number: 9805212Abstract: The present disclosure describes techniques for storing encrypted files in a secure file repository and transferring those encrypted files to one or more recipients. A user selects a file to upload to a secure file repository. A secure collaboration app on the user's device generates a first encryption key that is used to encrypt the file. The encrypted file is then uploaded to the secure file repository, which provides the secure collaboration app with a random file name and a location of the encrypted file. The secure collaboration app updates locally stored metadata of the first encrypted file. To securely transfer the file, the user generates a second encryption key, encrypts the metadata with the second encryption key, and transmits the encrypted metadata to one or more receivers. The one or more receivers decrypt the encrypted metadata and use the decrypted metadata to retrieve the file and decrypt it.Type: GrantFiled: December 15, 2016Date of Patent: October 31, 2017Assignee: Wickr Inc.Inventors: Christopher A. Howell, Thomas Michael Leavy, David A. Sugar, Dipakkumar R. Kasabwala, Ernest W. Grzybowski
-
Patent number: 9729315Abstract: A public/private key pair is generated on a client device for an application. A device identifier for the client device is generated. An application identifier for the application is generated on the client device. At least one of the public key, the device identifier, and the application identifier are transmitted to a server.Type: GrantFiled: July 2, 2015Date of Patent: August 8, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 9716714Abstract: A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.Type: GrantFiled: December 15, 2016Date of Patent: July 25, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Patent number: 9698976Abstract: A pool of public keys, having a pool size, is received from a first device. The pool size reflects a target number of keys to be included in the pool. One of the received public keys included in the pool of keys is designated as a reserve key. A public key is selected from the pool of received public keys for use in conjunction with encrypting a communication to the first device. The selecting includes preferentially selecting a public key that is not designated as a reserve key, if at least one such key is present in the pool in addition to the reserve key. The size of the pool can be dynamically adjusted.Type: GrantFiled: March 14, 2014Date of Patent: July 4, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell
-
Patent number: 9667417Abstract: A digital security bubble encapsulation is received from a sender. The encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, and an identifier associated with an intended recipient. The encrypted digital security bubble encapsulation is decrypted. The received identifier and a device identifier are compared. The encrypted first key is decrypted in response to a determination that the identifier received in the digital security bubble encapsulation matches the device identifier. The encrypted message is decrypted using the first key.Type: GrantFiled: July 2, 2015Date of Patent: May 30, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 9654288Abstract: The secure messaging app described herein allows a user to create a secure social feed in order to share content with just a few friends or thousands of recipients. The user encrypts their content and then publishes the encrypted content to the secure social feed. Accordingly, only authorized recipients can decrypt and view the content. Furthermore, the user may administer the secure social feed to manage the addition and/or removal of users from the secure social feed. Further, the user periodically updates the parameters of the secure social feed to manage users' access to the feed.Type: GrantFiled: December 10, 2015Date of Patent: May 16, 2017Assignee: Wickr Inc.Inventors: Christopher A. Howell, Thomas Michael Leavy
-
Patent number: 9602477Abstract: The present disclosure describes techniques for storing encrypted files in a secure file repository and transferring those encrypted files to one or more recipients. A user selects a file to upload to a secure file repository. A secure collaboration app on the user's device generates a first encryption key that is used to encrypt the file. The encrypted file is then uploaded to the secure file repository, which provides the secure collaboration app with a random file name and a location of the encrypted file. The secure collaboration app updates locally stored metadata of the first encrypted file. To securely transfer the file, the user generates a second encryption key, encrypts the metadata with the second encryption key, and transmits the encrypted metadata to one or more receivers. The one or more receivers decrypt the encrypted metadata and use the decrypted metadata to retrieve the file and decrypt it.Type: GrantFiled: June 22, 2016Date of Patent: March 21, 2017Assignee: Wickr Inc.Inventors: Ernest W. Grzybowski, Christopher A. Howell, Thomas Michael Leavy, David A. Sugar, Dipakkumar R. Kasabwala
-
Patent number: 9590958Abstract: The present disclosure describes techniques for storing encrypted files in a secure file repository and transferring those encrypted files to one or more recipients. A user selects a file to upload to a secure file repository. A secure collaboration app on the user's device generates a first encryption key that is used to encrypt the file. The encrypted file is then uploaded to the secure file repository, which provides the secure collaboration app with a random file name and a location of the encrypted file. The secure collaboration app updates locally stored metadata of the first encrypted file. To securely transfer the file, the user generates a second encryption key, encrypts the metadata with the second encryption key, and transmits the encrypted metadata to one or more receivers. The one or more receivers decrypt the encrypted metadata and use the decrypted metadata to retrieve the file and decrypt it.Type: GrantFiled: June 22, 2016Date of Patent: March 7, 2017Assignee: Wickr Inc.Inventors: Christopher A. Howell, Thomas Michael Leavy, David A. Sugar, Dipakkumar R. Kasabwala, Ernest W. Grzybowski
-
Patent number: 9584530Abstract: A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.Type: GrantFiled: June 24, 2015Date of Patent: February 28, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Patent number: 9584316Abstract: A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.Type: GrantFiled: January 8, 2015Date of Patent: February 28, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Publication number: 20170053248Abstract: Techniques for determining whether to allow access to a calendar invite and a meeting are disclosed. In this regard, a calendar invite and meeting message are received from a sender. A first time-to-live (TTL) value and a second TTL value associated with the calendar invite and meeting, respectively, are determined. A determination is made that the first and second TTL values have not been exceeded and, if they have not, allowing access to the calendar invite and the meeting. However, when the TTL values have been exceeded, denying access to the calendar invite and the meeting.Type: ApplicationFiled: September 30, 2015Publication date: February 23, 2017Inventors: Lauren Wakefield, Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Publication number: 20170046646Abstract: Techniques for determining whether to allow access to a calendar invite and a meeting are disclosed. In this regard, a calendar invite and meeting message are received from a sender. A first time-to-live (TTL) value and a second TTL value associated with the calendar invite and meeting, respectively, are determined. A determination is made that the first and second TTL values have not been exceeded and, if they have not, allowing access to the calendar invite and the meeting. However, when the TTL values have been exceeded, denying access to the calendar invite and the meeting.Type: ApplicationFiled: January 28, 2016Publication date: February 16, 2017Inventors: Lauren Wakefield, Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Publication number: 20160072785Abstract: A public/private key pair is generated on a client device for an application. A device identifier for the client device is generated. An application identifier for the application is generated on the client device. At least one of the public key, the device identifier, and the application identifier are transmitted to a server.Type: ApplicationFiled: July 2, 2015Publication date: March 10, 2016Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 8954726Abstract: A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.Type: GrantFiled: November 25, 2013Date of Patent: February 10, 2015Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 8625805Abstract: A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted with a public key received in response to the request. The encrypted message, the encrypted symmetric key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.Type: GrantFiled: July 15, 2013Date of Patent: January 7, 2014Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell