Patents by Inventor Edward M. Scheidt
Edward M. Scheidt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 6549623Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.Type: GrantFiled: February 4, 2002Date of Patent: April 15, 2003Assignee: TecSec, IncorporatedInventors: Edward M. Scheidt, C. Jay Wack
-
Patent number: 6542608Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.Type: GrantFiled: July 31, 2001Date of Patent: April 1, 2003Assignee: TecSec IncorporatedInventors: Edward M. Scheidt, C. Jay Wack
-
Publication number: 20030039358Abstract: A cryptographic key split combiner includes a number of key split generators for generating cryptographic key splits from seed data, and a key split randomizer for randomizing the key splits to produce a cryptographic key. The key split generators can include a random split generator for generating random key splits, a token split generator for generating token key splits based on label data, a console split generator for generating console key splits based on maintenance data, a biometric split generator for generating biometric key splits based on biometric data, and a location split generator for generating location key splits based on location data. Label data can be read from storage, and can include user authorization data. A process for forming cryptographic keys includes randomizing or otherwise binding the splits to form the key.Type: ApplicationFiled: May 16, 2002Publication date: February 27, 2003Inventors: Edward M. Scheidt, C. Jay Wack
-
Publication number: 20020184509Abstract: A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the user's access to the system if the user's identity is authenticated. More particularly, the method includes providing a modified data instance based on a second data instance, generating a key based on a first data instance, applying the key to the a modified data instance to generate a recovered data instance, interrogating the recovered data instance against the second data instance to generate an authentication value as a result of a correspondence evaluation, and granting or restricting the user's access to the system based at least in part on the validity of the authentication value.Type: ApplicationFiled: January 30, 2002Publication date: December 5, 2002Inventors: Edward M. Scheidt, Ersin Domangue
-
Patent number: 6490680Abstract: A process of encrypting an object includes applying a hash algorithm to the object, generating a random number, combining a first plurality of splits including the random number to form a working split, encrypting the object using the working split, combining a second plurality of splits not including the random number to form a value, encrypting the random number using the value, encrypting the hashed object according to a signature algorithm using a user private key, encrypting the hashed object according to a selected algorithm using the working split as a key, forming a header including information that can be used to decrypt the object, encrypting the header, and adding the encrypted header to the encrypted object. The pluralities of splits include a fixed split, a variable split, and a label split corresponding to a selected label. The header includes the encrypted random number, a label, and a digital signature.Type: GrantFiled: December 4, 1998Date of Patent: December 3, 2002Assignee: TecSec IncorporatedInventors: Edward M. Scheidt, Ersin L. Domangue
-
Publication number: 20020085711Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.Type: ApplicationFiled: July 31, 2001Publication date: July 4, 2002Inventors: Edward M. Scheidt, C. Jay Wack
-
Publication number: 20020080970Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.Type: ApplicationFiled: October 9, 2001Publication date: June 27, 2002Inventors: Edward M. Scheidt, C. Jay Wack
-
Publication number: 20020076045Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.Type: ApplicationFiled: July 31, 2001Publication date: June 20, 2002Inventors: Edward M. Scheidt, C. Jay Wack
-
Publication number: 20020071554Abstract: A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.Type: ApplicationFiled: July 31, 2001Publication date: June 13, 2002Inventors: Edward M. Scheidt, C. Jay Wack
-
Publication number: 20020062451Abstract: A process of checking the authorization and authenticity of an application provided by a user includes authenticating an application authentication file against a domain administrator's public membership key. An application executable is then hashed, and the application hash result is compared to an authentication hash contained in the application authentication file. At this point, services are denied to the application if the application hash and the authentication hash do not match. Configuration assignments in the application authentication file are decoded if the application hash and the authentication hash match. The decoded configuration assignments are compared to the user's configuration assignments. Services are provided to the application if the result of the decode is favorable. Services are denied to the application if the result of the decode is not favorable.Type: ApplicationFiled: May 16, 2001Publication date: May 23, 2002Inventors: Edward M. Scheidt, C. Jay Wack
-
Patent number: 6266417Abstract: A communication system, which includes an origination space, a communications channel, and a destination space associated with the origination space via the communications channel. The origination space includes an encryption engine for generating an output symbol Ot based on an input symbol It and means for receiving an encrypt key, an encrypt text/key relation, and the input symbol. The destination space includes a decryption engine for generating a decrypted symbol I′t based on the output symbol received from the origination space via the communications channel and means for receiving a decrypt key and a decrypt text/key relation. The encrypt text/key relation controls the encryption engine such that Ot=&agr;N(t)+&pgr;N[&agr;N−1(t)+&pgr;N−1[&agr;N−2(t)+ . . . +&pgr;2[&agr;1(t)+&pgr;1[It+&agr;0(t)]] . . . ]], mod W, where &agr;N, &agr;N−1, . . .Type: GrantFiled: February 17, 2000Date of Patent: July 24, 2001Assignee: TecSec, IncorporatedInventors: Edward M. Scheidt, C. Jay Wack
-
Patent number: 6075865Abstract: A communication system, which includes an origination space, a communications channel, and a destination space associated with the origination space via the communications channel. The origination space includes an encryption engine for generating an output symbol O.sub.t based on an input symbol I.sub.t and means for receiving an encrypt key, an encrypt text/key relation, and the input symbol. The destination space includes a decryption engine for generating a decrypted symbol I'.sub.t based on the output symbol received from the origination space via the communications channel and means for receiving a decrypt key and a decrypt text/key relation. The encrypt text/key relation controls the encryption engine such that O.sub.t =.alpha..sub.N (t)+.pi..sub.N [.alpha..sub.N-1 (t)+.pi..sub.N-1 [.alpha..sub.N-2 (t)+ . . . +.pi..sub.2 [.alpha..sub.1 (t)+.pi..sub.1 [I.sub.t +.alpha..sub.0 (t)]] . . . ]], mod W, where .alpha..sub.N, .alpha..sub.N-1, . . . , .alpha..sub.1, .alpha..sub.Type: GrantFiled: July 1, 1998Date of Patent: June 13, 2000Assignee: TecSec IncorporatedInventors: Edward M. Scheidt, C. Jay Wack
-
Patent number: 5432851Abstract: An access control system which uses a password token scheme for controlling user access to data within computer systems. The key component in the access control system is an optical token card that is capable of receiving optically encoded information directly from the CRT display of a standard personal computer and processing the information for use in identification and authentication procedures, cryptographic key management schemes, and administrative procedures such as maintaining audit trails. This design permits the use of much longer strings of challenge input data without the addition of peripheral readers to the system.Type: GrantFiled: October 21, 1993Date of Patent: July 11, 1995Assignee: TECSEC IncorporatedInventors: Edward M. Scheidt, Charles E. McCullough, C. Jay Wack