Patents by Inventor Edward M. Scheidt

Edward M. Scheidt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180268386
    Abstract: A method of providing a cryptographic platform for exchanging information includes identifying a first information transaction stored within a blockchain sequence that provides a mathematically verifiable record of information transactions. The first information transaction includes a first information transaction identifier, associated with the first party such that the first information transaction identifier provides identification of the information transferred to the first party and stored within the blockchain, and a first information payload. The first information transaction is identified based on the first information transaction identifier, to provide a first information identifier that includes a hash of the first information payload.
    Type: Application
    Filed: September 13, 2017
    Publication date: September 20, 2018
    Inventors: C. Jay Wack, Edward M. Scheidt
  • Publication number: 20150039881
    Abstract: A process of triggering an Internet packet protocol against malware includes providing protocol trigger mechanisms configured to affect network access and data object access against malware, denial of service attacks, and distributed denial of service attacks, A multi-level security system is established with a cryptographically secure network channel, or another equivalent encrypted channel, and a second object of an encrypted document or data message that uses the secure network channel. The equivalent encrypted channel can be a Virtual Private Network tunnel (VPN) including MPPE/PPTP/CIPE/Open VPN, Secure Socket Layer (SSL), or IPSec tunnel.
    Type: Application
    Filed: August 5, 2014
    Publication date: February 5, 2015
    Applicant: TecSec Inc.
    Inventors: Edward M. Scheidt, C. Jay Wack, Ronald C. Parsons, Wai Tsang
  • Patent number: 8712046
    Abstract: A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value.
    Type: Grant
    Filed: July 9, 2012
    Date of Patent: April 29, 2014
    Assignee: TecSec Inc.
    Inventors: Edward M. Scheidt, C. Jay Wack
  • Publication number: 20130177152
    Abstract: A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value.
    Type: Application
    Filed: July 9, 2012
    Publication date: July 11, 2013
    Applicant: TECSEC, INC.
    Inventors: Edward M. Scheidt, C. Jay Wack
  • Patent number: 8308820
    Abstract: A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened., providing the only communicative coupling between the first microprocessor function and the second microprocessor function.
    Type: Grant
    Filed: March 16, 2011
    Date of Patent: November 13, 2012
    Assignee: TecSec, Inc.
    Inventors: Edward M Scheidt, C. Jay Wack, Wai Lin Tsang
  • Patent number: 8285991
    Abstract: An electronic signature device includes a processor, a memory, a user input device including a first biometric input device, and a device interface, all communicatively connected by at least one bus. A method of personalizing the electronic signature device to a user includes receiving a digitized biometric signature of the user via the first biometric input device. A cryptographic key is generated. A biometric electronic template is generated based on the digitized biometric signature. The cryptographic key and the biometric electronic template are stored in the memory.
    Type: Grant
    Filed: February 10, 2009
    Date of Patent: October 9, 2012
    Assignee: TecSec Inc.
    Inventor: Edward M. Scheidt
  • Publication number: 20120066511
    Abstract: A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened., providing the only communicative coupling between the first microprocessor function and the second microprocessor function.
    Type: Application
    Filed: March 16, 2011
    Publication date: March 15, 2012
    Applicant: TecSec, Inc.
    Inventors: Edward M. Scheidt, C.Jay Wack, Wai Lin Tsang
  • Publication number: 20120002805
    Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.
    Type: Application
    Filed: July 1, 2011
    Publication date: January 5, 2012
    Applicant: TECSEC, INC.
    Inventors: Edward M. Scheidt, C. Jay Wack
  • Patent number: 8083808
    Abstract: A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened, providing the only communicative coupling between the first microprocessor function and the second microprocessor function.
    Type: Grant
    Filed: July 12, 2007
    Date of Patent: December 27, 2011
    Assignee: TecSec, Inc.
    Inventors: Edward M. Scheidt, C. Jay Wack, Wai Lin Tsang
  • Patent number: 8077870
    Abstract: A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key splits are bound together to produce a first cryptographic key. A second cryptographic key is generated based on security requirements of the data object. The tagged data element is encrypted using the first cryptographic key. The data object encrypting using the second cryptographic key. At least one of the cryptographic key splits is based on the associated data tag.
    Type: Grant
    Filed: October 18, 2010
    Date of Patent: December 13, 2011
    Assignee: TecSec, Inc.
    Inventors: C. Jay Wack, Edward M. Scheidt, James L. Kolouch
  • Publication number: 20110178930
    Abstract: A silo system process includes providing a partner with a digitally-signed CKM authorization key by an issuer, thereby allowing the partner to create a silo of an agreed size on a storage medium. The owner of the storage medium provides a personal card for provisioning. The partner creates a silo on the personal card. The partner instantiates a silo and provisions the silo with partner-specific CKM keys. The partner notifies the issuer by that the silo has been created, thereby allowing the issuer to track creation of silos on each card for card management and billing purposes. The partner manages the silo by using the partner-specific keys.
    Type: Application
    Filed: October 6, 2008
    Publication date: July 21, 2011
    Inventors: Edward M. Scheidt, C. JAY Wack, Wai Tsang, Roger Butler, Ron Parsons
  • Patent number: 7974410
    Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.
    Type: Grant
    Filed: March 6, 2006
    Date of Patent: July 5, 2011
    Assignee: TecSec, Inc.
    Inventors: Edward M. Scheidt, C. Jay Wack
  • Publication number: 20110116628
    Abstract: A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key splits are bound together to produce a first cryptographic key. A second cryptographic key is generated based on security requirements of the data object. The tagged data element is encrypted using the first cryptographic key. The data object encrypting using the second cryptographic key. At least one of the cryptographic key splits is based on the associated data tag.
    Type: Application
    Filed: October 18, 2010
    Publication date: May 19, 2011
    Applicant: TECSEC, INC.
    Inventors: C. Jay Wack, Edward M. Scheidt, James L. Kolouch
  • Patent number: 7817800
    Abstract: A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
    Type: Grant
    Filed: June 22, 2006
    Date of Patent: October 19, 2010
    Assignee: TecSec, Inc.
    Inventors: C. Jay Wack, Edward M. Scheidt, James L. Kolouch
  • Publication number: 20100235924
    Abstract: A process of accessing and controlling medical information data by a Secure Process that includes two schemas—Medical Access Permission Schema (MAPS) information access system and encryption schema. In particular, the invention relates to a secure process for creating an access control and authentication methodology that identifies specific roles found in the medical field, applies these roles to content attributes, and binds those attributes to secret keys associated with an encryption schema.
    Type: Application
    Filed: March 26, 2010
    Publication date: September 16, 2010
    Inventors: Earl J. Bulot, Edward M. Scheidt
  • Publication number: 20100169651
    Abstract: An electronic signature device includes a processor, a memory, a user input device including a first biometric input device, and a device interface, all communicatively connected by at least one bus. A method of personalizing the electronic signature device to a user includes receiving a digitized biometric signature of the user via the first biometric input device. A cryptographic key is generated. A biometric electronic template is generated based on the digitized biometric signature. The cryptographic key and the biometric electronic template are stored in the memory.
    Type: Application
    Filed: February 10, 2009
    Publication date: July 1, 2010
    Inventor: Edward M. Scheidt
  • Patent number: 7738660
    Abstract: A cryptographic key split combiner includes a number of key split generators for generating cryptographic key splits from seed data, and a key split randomizer for randomizing the key splits to produce a cryptographic key. The key split generators can include a random split generator for generating random key splits, a token split generator for generating token key splits based on label data, a console split generator for generating console key splits based on maintenance data, a biometric split generator for generating biometric key splits based on biometric data, and a location split generator for generating location key splits based on location data. Label data can be read from storage, and can include user authorization data. A process for forming cryptographic keys includes randomizing or otherwise binding the splits to form the key.
    Type: Grant
    Filed: June 22, 2006
    Date of Patent: June 15, 2010
    Assignee: TecSec, Inc.
    Inventors: Edward M. Scheidt, C. Jay Wack
  • Publication number: 20090097657
    Abstract: A method of generating a constructive channel key includes providing an issuer with a card public key as the keying part of a CKM credential. An ephemeral key pair is computed by the issuer using pre-established enterprise domain parameters. A shared value for the ephemeral private key and the card public key is computed using D-H key agreement. The ephemeral private key is destroyed. The shared value is combined with a static key value. The static key value is split into four blocks. The first block is truncated to be used for a session encryption key. The second block is truncated to be used for a session MAC key. The third block is truncated to be used for a session key encryption key. The fourth block is truncated to be used for an initial IVEC.
    Type: Application
    Filed: October 6, 2008
    Publication date: April 16, 2009
    Inventors: Edward M. Scheidt, C. JAY Wack, Wai Tsang, Roger Butler, Ron Parsons
  • Patent number: 7490240
    Abstract: A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving document data corresponding to at least one selected portion of the document, binding the stored private signing key and the document data to create an electronic signature, and providing the electronic signature for a recipient.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: February 10, 2009
    Assignee: TecSec, Inc.
    Inventors: Edward M. Scheidt, James L. Kolouch, Ersin L. Domangue, Mark A. Odell, Wai Lin Tsang
  • Publication number: 20080310619
    Abstract: A process of encrypting an object having an associated object tag includes generating a cryptographic key by binding an organization split, a maintenance split, a random split, and at least one label split (710). A cryptographic algorithm is initialized with the cryptographic key, and the object is encrypted using the cryptographic algorithm (712) according to the object tag, to form an encrypted object. Combiner data is added to the encrypted object (711). The combiner data includes reference data, name data, a maintenance split or a maintenance level, and the random split (710). Alternatively, key splits are bound to generate a cryptographic key, and a cryptographic algorithm is initialized with the cryptographic key. The initialized cryptographic algorithm is applied to the object according to a cryptographic scheme determined by the object tag, to form an encrypted object. One of the key splits corresponds to a biometric measurement.
    Type: Application
    Filed: April 25, 2006
    Publication date: December 18, 2008
    Inventors: Edward M. Scheidt, James L. Kolouch