Patents by Inventor Daniel Richard

Daniel Richard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200366477
    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point Q on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point Q, wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and Q is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
    Type: Application
    Filed: July 24, 2020
    Publication date: November 19, 2020
    Applicant: Certicom Corp.
    Inventors: Daniel Richard L. BROWN, Scott Alexander VANSTONE
  • Publication number: 20200366483
    Abstract: Devices and methods of managing data stored within a container. The container may be associated with at least one registered user. The data within the container may be encrypted by a data encryption key (DEK). A computing device includes: a security module including a crypto-processor, a main processor, and memory. The memory stores instructions that, when executed, configure a processor to: authenticate a user based on a user secret associated with the container and generate a soft key based on the user secret. The instructions cause a crypto-processor to generate a secure generator output including a crypto key component and generate a hardened user key based on a key agreement protocol using the soft key and the crypto key component. The instructions cause a processor to construct an unencrypted DEK associated with the hardened user key and decrypt the subset of data using the unencrypted DEK.
    Type: Application
    Filed: May 16, 2019
    Publication date: November 19, 2020
    Applicant: BlackBerry Limited
    Inventors: Johnathan George WHITE, Daniel Richard L. BROWN
  • Patent number: 10838998
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for evaluating a tested sample of material. The system includes an application such as a LIMS comprising master keys derived from individual test result evaluations and potentially one or more key tags, and textual comments linked to master keys for later display and/or inclusion in customized reports. Master key branching using key tags, together with user refinement of comments linked thereto, results in improved comments with increased customization over time.
    Type: Grant
    Filed: March 31, 2018
    Date of Patent: November 17, 2020
    Assignee: Insight Services, Inc.
    Inventors: Daniel Richards, Alan Brunet, Matthew T. McMahon
  • Patent number: 10841092
    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.
    Type: Grant
    Filed: October 19, 2018
    Date of Patent: November 17, 2020
    Assignee: BlackBerry Limited
    Inventor: Daniel Richard L. Brown
  • Patent number: 10806503
    Abstract: A method of identifying gaps between electrophysiology (EP) ablation points may comprise: obtaining a plurality of ablation points recorded from a completed electrophysiology ablation procedure; digitally mapping the plurality of ablation points to an anatomical model corresponding to the completed electrophysiology ablation procedure; calculating ablation gap probability distributions for each of the plurality of ablation points based on ablation tolerance variables associated with each of the plurality of ablation points; and overlaying the ablation gap probability distributions on to the digitally mapped plurality of ablation points on the anatomical model. In this way, ablation gaps may be non-invasively identified prior to patient discharge, thereby allowing for further EP treatment to remove the ablation gaps while reducing readmission rates.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: October 20, 2020
    Assignee: General Electric Company
    Inventors: Adrian F. Warner, Daniel Richard Schneidewend
  • Patent number: 10805166
    Abstract: An enforcement mechanism on an operating system instance enforces a segmentation policy on a container. A configuration generation module executing in a host namespace of the operating system instance receives management instructions from a segmentation server for enforcing the segmentation policy on a container. The configuration generation module executes in the host namespace to configure a traffic control and monitoring module in a container namespace associated with the container. The traffic control and monitoring module in the container namespace controls and monitors communications to and from the container in accordance with its configuration. By executing a configuration generation module in the host namespace to configure traffic control and monitoring module in the container namespace, the enforcement mechanism beneficially enables robust and lightweight enforcement in a manner that is agnostic to different containerization protocols.
    Type: Grant
    Filed: September 24, 2019
    Date of Patent: October 13, 2020
    Assignee: Illumio, Inc.
    Inventors: Thomas Michael McCormick, Daniel Richard Cook, Rupesh Kumar Mishra, Matthew Kirby Glenn, Paul James Kirner, Mukesh Gupta, Juraj George Fandli
  • Publication number: 20200307843
    Abstract: A weigh-in-motion scale system for a linear synchronous motor conveyor and a method for weighing objects on a linear synchronous motor conveyor are described herein. In one embodiment, the weigh-in-motion scale system includes a support structure for supporting the following: a weigh cell, a section of a linear synchronous motor conveyor track, a vehicle for transporting an object, and an object; and a weigh cell on the support structure on which a section of a linear synchronous motor conveyor track rests directly or indirectly. In one embodiment, the method includes transporting a vehicle with an object thereon along a section of a linear synchronous motor conveyor track; and at a weighing station while the vehicle with the object thereon is being transported, weighing the section of a linear synchronous motor conveyor track, vehicle, and object to determine the weight of the object.
    Type: Application
    Filed: June 12, 2020
    Publication date: October 1, 2020
    Inventors: Christopher Robert Lyman, Michae Granitz, Daniel Richard Royce
  • Publication number: 20200304316
    Abstract: Methods, systems, and computer programs for using an implicit certificate are disclosed. In some aspects, a message and an implicit certificate are accessed. The implicit certificate is associated with an entity. A modified message is generated by combining the message with a value based on the implicit certificate. A digital signature can be generated based on the modified message and transmitted to a recipient. In some aspects, a digital signature from an entity and a message to be verified based on the digital signature are accessed. An implicit certificate associated with the entity is accessed. A modified message is generated by combining the message with a value based on the implicit certificate. The message is verified based on the digital signature and the modified message.
    Type: Application
    Filed: May 8, 2020
    Publication date: September 24, 2020
    Applicant: BlackBerry Limited
    Inventors: Gregory Marc ZAVERUCHA, David William KRAVITZ, Daniel Richard L. BROWN
  • Publication number: 20200278663
    Abstract: Methods for simultaneously producing different products on a single production line are disclosed. The method may be used to produce different fluent products and other types of products including assembled products. In some cases, the method includes providing a plurality of articles which are components of the products to be produced. The method further involves providing a track system and a plurality of vehicles for the articles. At least some of the vehicles may be independently routable around the track system. The method further includes simultaneously sending one article-loaded vehicle to a unit operation station where a step in the production of a product is performed and another article-loaded vehicle to a unit operation station where a step in the production of a different product is performed.
    Type: Application
    Filed: March 17, 2020
    Publication date: September 3, 2020
    Inventors: Ryan Andrew Burkhard, Nathan E. Moore, Elizabeth Marie Fikes, Daniel Richard Royce, Kyle Christopher Ballman
  • Patent number: 10756893
    Abstract: An elliptic curve random number generator avoids escrow keys by choosing a point on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The hash is then converted to a field element of the desired field, the field element regarded as the x-coordinate of a point on the elliptic curve and the x-coordinate is tested for validity on the desired elliptic curve. If valid, the x-coordinate is decompressed to the point , wherein the choice of which is the two points is also derived from the hash value. Intentional use of escrow keys can provide for back up functionality. The relationship between P and is used as an escrow key and stored by for a security domain. The administrator logs the output of the generator to reconstruct the random number with the escrow key.
    Type: Grant
    Filed: February 15, 2019
    Date of Patent: August 25, 2020
    Assignee: BlackBerry Limited
    Inventors: Daniel Richard L. Brown, Scott Alexander Vanstone
  • Publication number: 20200259650
    Abstract: Systems, methods, and software can be used to improve security of an authentication process in a cargo shipping system. In some aspect, an authentication request message is received at a sensor from a cargo tracking device. The authentication request message includes a key that the sensor will use to decrypt its encrypted public key/private key pair. In response to the authentication request message, the sensor sends an authentication response message to the cargo tracking device that is encrypted using a derived symmetric key. The cargo tracking device sends an authentication confirmation message to the sensor in response to the authentication response message.
    Type: Application
    Filed: February 8, 2019
    Publication date: August 13, 2020
    Applicant: BlackBerry Limited
    Inventors: Michael Peter MONTEMURRO, Daniel Richard L. BROWN
  • Patent number: 10737291
    Abstract: The present disclosure includes methods of forming air bearing surfaces having multi-tier structures using nanoimprint technology and/or 3D printing technology. In some embodiments, a single stage of milling can be used to transfer a multi-tier photoresist pattern into a substrate (e.g., an AlTiC substrate).
    Type: Grant
    Filed: August 9, 2018
    Date of Patent: August 11, 2020
    Assignee: Seagate Technology LLC
    Inventors: Daniel Richard Buettner, Andrew David Habermas, Daniel Sullivan, Joseph M. Stephan
  • Publication number: 20200228486
    Abstract: An enforcement module receives a DNS-based rule of a segmentation policy that controls access of a managed workload to workloads in a DNS domain in which the IP addresses of the workloads associated with a domain name are resolved by a DNS server. When the managed workload makes a connection request to the workload associated with the domain name, the enforcement module snoops on a DNS response from the DNS server to learn the IP address of the workload associated with the domain name. If a domain name of the DNS domain is in a whitelist of domain names permitted by the DNS-based rule, the enforcement module adds the learned IP address to a whitelist of IP addresses and configures a firewall associated with the managed workload to permit connections to the IP addresses in the whitelist.
    Type: Application
    Filed: January 15, 2019
    Publication date: July 16, 2020
    Inventors: Jaehong Park, Mukesh Gupta, Paul James Kirner, Anish Vinodkumar Desai, Daniel Richard Cook
  • Publication number: 20200228328
    Abstract: A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
    Type: Application
    Filed: March 31, 2020
    Publication date: July 16, 2020
    Inventor: Daniel Richard L. BROWN
  • Patent number: 10710757
    Abstract: A weigh-in-motion scale system for a linear synchronous motor conveyor and a method for weighing objects on a linear synchronous motor conveyor are described herein. In one embodiment, the weigh-in-motion scale system includes a support structure for supporting the following: a weigh cell, a section of a linear synchronous motor conveyor track, a vehicle for transporting an object, and an object; and a weigh cell on the support structure on which a section of a linear synchronous motor conveyor track rests directly or indirectly. In one embodiment, the method includes transporting a vehicle with an object thereon along a section of a linear synchronous motor conveyor track; and at a weighing station while the vehicle with the object thereon is being transported, weighing the section of a linear synchronous motor conveyor track, vehicle, and object to determine the weight of the object.
    Type: Grant
    Filed: September 8, 2017
    Date of Patent: July 14, 2020
    Assignee: The Procter & Gamble Company
    Inventors: Christopher Robert Lyman, Michael Granitz, Daniel Richard Royce
  • Publication number: 20200220845
    Abstract: An enforcement module receives management instructions from a segmentation server for enforcing a segmentation policy. The management instructions include one or more rules specifying one or more groups of workloads that a workload executing on the operating system instance is permitted to communicate with according to certain communication constraints, and membership information specifying workload identifiers for workloads in each of the groups. An optimization module processes the management instructions to reduce the number of rules and the number of workload groups to which the rules apply, thereby simplifying the firewall configuration. The enforcement module then configures a firewall according to the optimized rules to enforce the segmentation policy. The optimization process beneficially improves performance of the firewall and thereby enables more efficient enforcement of the segmentation policy utilizing fewer computing resources.
    Type: Application
    Filed: January 3, 2019
    Publication date: July 9, 2020
    Inventors: Daniel Richard Cook, Anish Vinodkumar Desai
  • Publication number: 20200195611
    Abstract: A segmentation firewall executing on a host enforces a segmentation policy. In a co-existence mode, the segmentation firewall operates in co-existence with a system firewall that enforces a security policy. The segmentation firewall is configured to either drop packets that do not match any permissive rule or pass packets that match a permissive rule to the system firewall to enable the system firewall to determine whether to drop or accept the passed packets. To enable efficient operation of the segmentation firewall when operating in co-existence with the system firewall, the segmentation firewall may include a plurality of rule chains and may be configured to exit a chain and bypass remaining rule chains upon an input packet matching a permissive rule of the segmentation policy.
    Type: Application
    Filed: December 18, 2018
    Publication date: June 18, 2020
    Inventors: Daniel Richard Cook, Anish Vinodkumar Desai, Thomas Michael McCormick
  • Publication number: 20200186345
    Abstract: A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q?1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd?48.
    Type: Application
    Filed: October 19, 2018
    Publication date: June 11, 2020
    Inventor: Daniel Richard L. BROWN
  • Publication number: 20200173116
    Abstract: A portable railroad spike remover comprises an extractor that is shaped to engage and secure a railroad spike previously installed into a rail tie. A drive shaft is connected to the extractor such that as the drive shaft is rotated, the extractor is vertically raised and lowered within a main column. The extractor may have an opening extending through at least one side to engage the railroad spike.
    Type: Application
    Filed: February 6, 2020
    Publication date: June 4, 2020
    Inventors: Timothy J. Benjamin, Kristopher Andre Alonzo, Mir Mohamed Atiqullah, Trevor Lee-Michael Barnby, Samuel Horace Gantt, Jonathan Hawkins, Alexander Hood, Timothy K. Lawler, Laura Ann Ruhala, Daniel Richard Scott, Zachary Tonsmeire, Kyle D. Wise
  • Publication number: 20200173117
    Abstract: A portable railroad spike remover comprises an extractor that is shaped to engage and secure a railroad spike previously installed into a rail tie. A drive shaft is connected to the extractor such that as the drive shaft is rotated, the extractor is vertically raised and lowered within a main column. The extractor may have an opening extending through at least one side to engage the railroad spike.
    Type: Application
    Filed: February 6, 2020
    Publication date: June 4, 2020
    Inventors: Timothy J. Benjamin, Kristopher Andre Alonzo, Mir Mohamed Atiqullah, Trevor Lee-Michael Barnby, Samuel Horace Gantt, Jonathan Hawkins, Alexander Hood, Timothy K. Lawler, Laura Ann Ruhala, Daniel Richard Scott, Zachary Tonsmeire, Kyle D. Wise