Patents by Inventor Dorian Goldfeld

Dorian Goldfeld has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180013554
    Abstract: Systems and methods to produce cloaked keys and shared secret data are described. A first device may select a private key, for the first device, based on a first set of rewritten conjugates. The first device may receive a public key from a second device. The public key may be based on a private key of the second device. The private key of the second device may be based on a second set of rewritten conjugates. The first device may determine first and second cloaking elements based on the public key and the private key of the first device. The first device may produce a cloaked key based on the first and second cloaking elements, and the private key of the first device. The first device may produce shared secret data based on the private key of the first device and a second cloaked key from the second device.
    Type: Application
    Filed: June 29, 2017
    Publication date: January 11, 2018
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Publication number: 20170359166
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: August 28, 2017
    Publication date: December 14, 2017
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20170324548
    Abstract: Systems and methods for producing shared secret data are generally described. A first device may receive a public key from a second device. The public key may be based on a first secret element. The first device may generate a first ephemeral private key based on a second secret element, and may generate a second ephemeral private key based on a third secret element. The first device may generate a first element based on the public key and the first ephemeral private key, and may generate a second element based on the public key and the second ephemeral private key. The second element may relate to the shared secret data. The first device may generate a session public key based on the first element, the second secret element, and the third secret element. The shared secret data may be derivable, by the second device, from the session public key.
    Type: Application
    Filed: May 3, 2017
    Publication date: November 9, 2017
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20170257218
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: May 19, 2017
    Publication date: September 7, 2017
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20170180124
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Application
    Filed: March 7, 2017
    Publication date: June 22, 2017
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, Michael Anshel, Dorian Goldfeld
  • Publication number: 20170085387
    Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.
    Type: Application
    Filed: September 20, 2016
    Publication date: March 23, 2017
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Publication number: 20170033929
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: October 13, 2016
    Publication date: February 2, 2017
    Applicant: Securerf Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20160294547
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: June 9, 2016
    Publication date: October 6, 2016
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Publication number: 20160294546
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: June 7, 2016
    Publication date: October 6, 2016
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Publication number: 20160294552
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Application
    Filed: June 10, 2016
    Publication date: October 6, 2016
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, MICHAEL ANSHEL, DORIAN GOLDFELD
  • Publication number: 20160149706
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: January 27, 2016
    Publication date: May 26, 2016
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Publication number: 20150318989
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Application
    Filed: June 15, 2015
    Publication date: November 5, 2015
    Inventors: Iris Anshel, Michael Anshel, Dorian Goldfeld
  • Publication number: 20150280908
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: June 15, 2015
    Publication date: October 1, 2015
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Patent number: 9071408
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Grant
    Filed: February 9, 2012
    Date of Patent: June 30, 2015
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 9071427
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Grant
    Filed: January 30, 2014
    Date of Patent: June 30, 2015
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Michael Anshel, Dorian Goldfeld
  • Publication number: 20150131795
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: January 26, 2015
    Publication date: May 14, 2015
    Applicant: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 8972715
    Abstract: A first module divides a string into blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Grant
    Filed: July 13, 2012
    Date of Patent: March 3, 2015
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20140198914
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Application
    Filed: January 30, 2014
    Publication date: July 17, 2014
    Applicant: SecureRF Corporation
    Inventors: IRIS ANSHEL, Michael Anshel, Dorian Goldfeld
  • Publication number: 20140019747
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: July 13, 2012
    Publication date: January 16, 2014
    Applicant: SecureRF Corp.
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20130208887
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: February 9, 2012
    Publication date: August 15, 2013
    Inventors: IRIS ANSHEL, Dorian Goldfeld