Patents by Inventor Darren Krahn

Darren Krahn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9736150
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: August 15, 2017
    Assignee: DataLocker Inc.
    Inventors: Darren Krahn, Laurence Hamid
  • Patent number: 9692599
    Abstract: Techniques for security module endorsement are provided. An example method includes receiving a generalized endorsement key at a security module, wherein the security module is associated with a computing device and wherein the generalized endorsement key is independent of characteristics of the computing device, automatically extending integrity measurements stored in one or more registers of the security module with information characterizing the computing device, wherein the integrity measurements are based on one or more software processes at the computing device, digitally signing the extended integrity measurements with a digital signature, and generating a specialized endorsement credential as a combination of the digitally signed extended integrity measurements, the digital signature and the generalized endorsement key, wherein the specialized endorsement credential is used to validate authenticity of the security module.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: June 27, 2017
    Assignee: Google Inc.
    Inventor: Darren Krahn
  • Patent number: 9391980
    Abstract: Systems and methods for enterprise platform verification are provided. In some aspects, a computing device includes a trusted platform module (TPM). The TPM includes an endorsement key (EK) physically embedded in the TPM. The TPM includes an attestation identity key (AIK), the AIK being used to verify that at least one TPM-protected key different from the EK and different from the AIK is generated at the TPM and is non-migratable. The TPM includes an enterprise machine key (EMK), the EMK being certified by the AIK, the EMK being uniquely associated with the client computing device, and the EMK being generated during enrollment of the client computing device with an enterprise and remaining active until a factory reset of the client computing device.
    Type: Grant
    Filed: November 11, 2013
    Date of Patent: July 12, 2016
    Assignee: Google Inc.
    Inventors: Darren Krahn, Sumit Gwalani, William Alexander Drewry
  • Patent number: 9118665
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Grant
    Filed: April 1, 2008
    Date of Patent: August 25, 2015
    Assignee: Imation Corp.
    Inventors: Darren Krahn, Laurence Hamid
  • Publication number: 20150215313
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Application
    Filed: April 10, 2015
    Publication date: July 30, 2015
    Inventors: Darren Krahn, Laurence Hamid
  • Patent number: 8924309
    Abstract: Electronic transactions employing prior art approaches of digital certificates and authentification are subject to attacks resulting in fraudulent transactions and abuse of identity information. Disclosed is a method of improving electronic security by establishing a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a predetermined portion of the request from the institution for a signature upon a personalized device that cannot be intercepted or manipulated by malware to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Grant
    Filed: August 6, 2008
    Date of Patent: December 30, 2014
    Assignee: Imation Corp.
    Inventors: Laurence Hamid, Darren Krahn
  • Patent number: 8850227
    Abstract: Aspects of the subject technology relate to systems, methods, and machine-readable media for performing a cryptographic operation. A system can be configured to submit a request, to a security device, for a decrypted user encryption key, wherein the security device is configured to decrypt the user encryption key by unbinding the user encryption key using a user authorization key. The system can receive, in response to the submitted request, the decrypted user encryption key and decrypt authorization data for a cryptographic key using the decrypted user encryption key. The system can submit a request for the security device to load the cryptographic key, wherein authorization data is used to authorize the request, and submit a request for the security device to perform a cryptographic operation using the loaded cryptographic key.
    Type: Grant
    Filed: September 5, 2012
    Date of Patent: September 30, 2014
    Assignee: Google Inc.
    Inventors: Darren Krahn, Sumit Gwalani
  • Patent number: 8380988
    Abstract: A set of commands is provided to a system for execution in order to modify a security related aspect of the system. The system executes the set of commands absent an intervening command being executed, for example by receiving a first command comprising a data portion, extracting a security rights modification command set comprising commands for initiating a secure session and for closing the secure session, and automatically executing the security rights modification command set with a processor, absent other security rights commands being executed. Initiating the secure session may comprise authentication, and the security rights modification command set may provide for security parameters modifiable only during a secure session.
    Type: Grant
    Filed: August 1, 2008
    Date of Patent: February 19, 2013
    Assignee: Imation Corp.
    Inventors: Darren Krahn, Laurence Hamid
  • Patent number: 8321353
    Abstract: A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Grant
    Filed: November 11, 2011
    Date of Patent: November 27, 2012
    Assignee: Imation Corp.
    Inventors: Laurence Hamid, Darren Krahn
  • Publication number: 20120060036
    Abstract: A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Application
    Filed: November 11, 2011
    Publication date: March 8, 2012
    Applicant: Imation Corp.
    Inventors: Laurence Hamid, Darren Krahn
  • Patent number: 8060447
    Abstract: A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Grant
    Filed: March 16, 2009
    Date of Patent: November 15, 2011
    Assignee: Imation Corp.
    Inventors: Laurence Hamid, Darren Krahn
  • Publication number: 20090235081
    Abstract: A method of improving electronic security establishes a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a first predetermined portion of a branded watermark, for instance an advertisement, provided from the institution in conjunction with the request, and a second predetermined portion of the branded watermark being provided upon a personalized device that cannot be intercepted or manipulated by malware, allowing the user to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Application
    Filed: March 16, 2009
    Publication date: September 17, 2009
    Applicant: MEMORY EXPERTS INTERNATIONAL INC.
    Inventors: Laurence HAMID, Darren KRAHN
  • Publication number: 20090049301
    Abstract: Electronic transactions employing prior art approaches of digital certificates and authentification are subject to attacks resulting in fraudulent transactions and abuse of identity information. Disclosed is a method of improving electronic security by establishing a secure trusted path between a user and an institution seeking an electronic signature to verify a transaction before any request for signature and completing electronic transaction activities occurs. The secure trusted path providing the user with a predetermined portion of the request from the institution for a signature upon a personalized device that cannot be intercepted or manipulated by malware to verify that the request as displayed upon the user's primary computing device is valid.
    Type: Application
    Filed: August 6, 2008
    Publication date: February 19, 2009
    Applicant: Memory Experts International Inc.
    Inventors: Laurence HAMID, Darren Krahn
  • Publication number: 20090044250
    Abstract: A set of commands is provided to a system for execution in order to modify a security related aspect of the system. The system executes the set of commands absent an intervening command being executed.
    Type: Application
    Filed: August 1, 2008
    Publication date: February 12, 2009
    Applicant: Memory Experts International Inc.
    Inventors: Darren KRAHN, Laurence Hamid
  • Publication number: 20080263352
    Abstract: A security protocol for use by computing devices communicating over an unsecured network is described. The security protocol makes use of secure data provided to a peripheral memory device from a server via a secure connection. When the peripheral memory device is coupled to a computing device that attempts to establish a secure connection to the server, the secure data is used to verify that the server is authentic. Similarly, the secure data assists the server in verifying that the request to access the server is not being made by a malicious third party.
    Type: Application
    Filed: April 1, 2008
    Publication date: October 23, 2008
    Applicant: Memory Experts International Inc.
    Inventors: Darren Krahn, Laurence Hamid