Patents by Inventor Diana K. Smetters

Diana K. Smetters has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20040268119
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: December 30, 2004
    Applicant: Palo Alto Research Center, Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Publication number: 20040266449
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: December 30, 2004
    Applicant: Palo Alto Research Center, Incorporated
    Inventors: Diana K. Smetters, Dirk Balfanz, Glenn E. Durfee, Rebecca E. Grinter, Paul J. Stewart, Hao-Chi Wong
  • Publication number: 20040236943
    Abstract: A system and method for implementing data transfer security mechanisms. The method includes a first component transferring a data type handler object to a second component. The second interface invokes an interface accessible through the date type handler object which includes instructions that are executed by the second component to implement a data transfer security mechanism. Further, the data type handler interface can be encrypted, include cryptographic keys, and/or include digital signatures.
    Type: Application
    Filed: May 21, 2003
    Publication date: November 25, 2004
    Applicant: Xerox Corporation
    Inventors: W. Keith Edwards, Mark W. Newman, Jana Z. Sedivy, Diana K. Smetters, Trevor Smith
  • Publication number: 20040215974
    Abstract: A method for establishing a secondary communication channel between at least two computing devices over a network medium through use of a primary channel connects a first computing device with a first telephonic unit and a second computing device with a second telephonic unit. If the two telephonic units are in communication with each other over a primary channel, and communication channels are established between the computing devices and their respective telephonic units, then the first computing device transmits its location information to the second computing device over the primary channel. A connection is then established between the second computing device and the first computing device over a secondary communication channel.
    Type: Application
    Filed: April 25, 2003
    Publication date: October 28, 2004
    Applicant: Palo Alto Research Center Incorporated
    Inventors: Kenneth W. Conley, Dirk Balfanz, Bryan A. Pendleton, Diana K. Smetters, Glenn E. Durfee
  • Patent number: 6754821
    Abstract: A system, method and article of manufacture are provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is sent to a server utilizing a network upon reaching a state in the application. The request includes a state key associated with the state. A reply is received from the server in response to the request. The reply includes an access key for providing the access if the state key is valid. According to another embodiment of the present invention, a method is provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is received from a client to a server utilizing a network. The state key is verified at the server. A reply is sent from the server in response to the request. The reply includes an access key for providing the access if the state key is verified.
    Type: Grant
    Filed: June 19, 2000
    Date of Patent: June 22, 2004
    Assignee: Xerox Corporation
    Inventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, Diana K. Smetters
  • Publication number: 20040107366
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: June 3, 2004
    Applicant: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Publication number: 20040098581
    Abstract: We present technology that allows layman computer users to simply create, provision, and maintain secured infrastructure—an instant PKI. This technology can be used in a wide variety of applications including wired and wireless networks, secure sensor networks (such as medical networks), emergency alert networks, as well as simply and automatically provisioning network devices whether secure or not.
    Type: Application
    Filed: September 5, 2003
    Publication date: May 20, 2004
    Applicant: Xerox Corporation
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul Joseph Stewart, Glenn E. Durfee, Rebecca E. Grinter, Hao-Chi Wong
  • Publication number: 20040054899
    Abstract: Authentication information is generated for a group where members within a group are able to communicate with each other, but a non-members is not able to participate in that communication. The authentication information provides the determination of whether the member belongs to the group.
    Type: Application
    Filed: August 30, 2002
    Publication date: March 18, 2004
    Applicant: XEROX CORPORATION
    Inventors: Dirk Balfanz, Diana K. Smetters, Paul S. Stewart, Daniel C. Swinehart
  • Publication number: 20030196087
    Abstract: A document server residing on a network behind a firewall provides secure access to documents or services residing thereon. A first user outside the firewall communicates with the document server over an established first secure session to generate a token in a database of tokens on the document server. The first user digitally signs the public key of a second user and an identifier of the token. The first user transmits a URL token to the second user that identifies the location of the document server and the token identifier. When the second user outside the firewall redeems the URL token at the document server, the document server and the second user establish a second secure session. The document server authenticates the URL token against the second secure session before providing the second user with access to the document or service.
    Type: Application
    Filed: April 16, 2002
    Publication date: October 16, 2003
    Applicant: Xerox Corporation
    Inventors: Mark Stringer, Elisabeth Soutloglou, Diana K. Smetters