Patents by Inventor Ernest F. Brickell
Ernest F. Brickell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9043604Abstract: Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform.Type: GrantFiled: September 5, 2013Date of Patent: May 26, 2015Assignee: Intel CorporationInventors: Ernest F. Brickell, Shay Gueron, Jiangtao Li, Carlos V. Rozas, Daniel Nemiroff, Vincent R. Scarlata, Uday R. Savagaonkar, Simon P. Johnson
-
Patent number: 8924728Abstract: A method and apparatus for establishing a secure session with a device without exposing privacy-sensitive information are described. In one embodiment, the method includes the authentication of a digitally signed message received from a hardware device. In one embodiment, a digital signature, created by a private signature key of the hardware device, is authenticated according to a public key of an issuer without disclosure of an identity of the hardware device. The digital signature is a signature of an ephemeral DH public key, which the verifier is now assured comes from a trusted device. An encrypted and authenticated session (“secure session”) is established with the authenticated hardware device according to a key exchange using this signed ephemeral DH public key. Other embodiments are described and claimed.Type: GrantFiled: November 30, 2004Date of Patent: December 30, 2014Assignee: Intel CorporationInventor: Ernest F. Brickell
-
Patent number: 8799656Abstract: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The device remains anonymous to the remote entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).Type: GrantFiled: October 27, 2010Date of Patent: August 5, 2014Assignee: Intel CorporationInventors: Ernest F. Brickell, Jiangtao Li, Jesse Walker
-
Publication number: 20140089659Abstract: Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform.Type: ApplicationFiled: September 5, 2013Publication date: March 27, 2014Inventors: Ernest F. Brickell, Shay Gueron, Jiangtao Li, Carlos V. Rozas, Daniel Nemiroff, Vincent R. Scarlata, Uday R. Savagaonkar, Simon P. Johnson
-
Patent number: 8595505Abstract: A method and apparatus for direct anonymous attestation from bilinear maps. In one embodiment, the method includes the creation of a public/private key pair for a trusted membership group defined by an issuer; and assigning a unique secret signature key to at least one member device of the trusted membership group defined by the issuer. In one embodiment, using the assigned signature key, a member may assign a message received as an authentication request to prove membership within a trusted membership group. In one embodiment, a group digital signature of the member is verified using a public key of the trusted membership group. Accordingly, a verifier of the digital signature is able to authenticate that the member is an actual member of the trusted membership group without requiring of the disclosure of a unique identification information of the member or a private member key to maintain anonymity of trusted member devices. Other embodiments are described and claimed.Type: GrantFiled: September 28, 2011Date of Patent: November 26, 2013Assignee: Intel CorporationInventors: Ernest F. Brickell, Jiangtao Li
-
Patent number: 8468356Abstract: Methods and apparatus to provide a tamper-resistant environment for software are described. In some embodiments, procedures for verifying whether a software container is utilizing protected memory and is associated with a specific platform are described. Other embodiments are also described.Type: GrantFiled: June 30, 2008Date of Patent: June 18, 2013Assignee: Intel CorporationInventors: Ravi L. Sahita, Uday R. Savagaonkar, Vedvyas Shanbhogue, Ernest F. Brickell
-
Publication number: 20120137137Abstract: Keying materials used for providing security in a platform are securely provisioned both online and offline to devices in a remote platform. The secure provisioning of the keying materials is based on a revision of firmware installed in the platform.Type: ApplicationFiled: November 30, 2010Publication date: May 31, 2012Inventors: Ernest F. Brickell, Shay Gueron, Jiangtao Li, Carlos V. Rozas, Daniel Nemiroff, Vincent R. Scarlata, Uday R. Savagaonkar, Simon P. Johnson
-
Publication number: 20120023334Abstract: Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The device remains anonymous to the remote entity after performing the authentication. The method also includes establishing a mutually shared session key for use in secure communication, wherein the initiating and the establishing are in conjunction with direct anonymous attestation (DAA).Type: ApplicationFiled: October 27, 2010Publication date: January 26, 2012Inventors: Ernest F. Brickell, Jiangtao Li, Jesse Walker
-
Patent number: 8078876Abstract: A method and apparatus for direct anonymous attestation from bilinear maps. In one embodiment, the method includes the creation of a public/private key pair for a trusted membership group defined by an issuer; and assigning a unique secret signature key to at least one member device of the trusted membership group defined by the issuer. In one embodiment, using the assigned signature key, a member may assign a message received as an authentication request to prove membership within a trusted membership group. In one embodiment, a group digital signature of the member is verified using a public key of the trusted membership group. Accordingly, a verifier of the digital signature is able to authenticate that the member is an actual member of the trusted membership group without requiring of the disclosure of a unique identification information of the member or a private member key to maintain anonymity of trusted member devices. Other embodiments are described and claimed.Type: GrantFiled: July 17, 2007Date of Patent: December 13, 2011Assignee: Intel CorporationInventors: Ernest F. Brickell, Jiangtao Li
-
Patent number: 7962752Abstract: Providing trusted time in a computing platform, while still supporting privacy, may be accomplished by having a trusted time device provide the trusted time to an application executing on the computing platform. The trusted time device may be reset by determining if a value in a trusted time random number register has been set, and if not, waiting a period of time, generating a new random number, and storing the new random number in the trusted time random number register. The trusted time random number register is set to zero whenever electrical power is first applied to the trusted time device upon power up of the computing platform, and whenever a battery powering the trusted time device is removed and reconnected. By keeping the size of the trusted time random number register relatively small, and waiting the specified period of time, attacks on the computing platform to determine the trusted time may be minimized, while deterring the computing platform from being uniquely identified.Type: GrantFiled: September 23, 2005Date of Patent: June 14, 2011Assignee: Intel CorporationInventors: Ernest F. Brickell, Clifford D. Hall
-
Patent number: 7844614Abstract: In some embodiments, a method and apparatus for enhanced revocation of direct proof and direct anonymous attestation are described. In one embodiment a trusted hardware device verifies that membership of the device within a trusted membership group is not revoked according to a revocation list received with a challenge request from a verifier. Once such verification is performed, the device convinces the verifier of possessing cryptographic information without revealing unique, device identification information of the trusted hardware device or the cryptographic information. In one embodiment, the trusted hardware device computes a digital signature on a message received with the challenge request to the verifier if membership of the anonymous hardware device within a trusted membership group is verified. In one embodiment, the verifier authenticates the digital signature according to a public key of the trusted membership group to enable a trusted member device to remain anonymous to the verifier.Type: GrantFiled: November 30, 2007Date of Patent: November 30, 2010Assignee: Intel CorporationInventors: Ernest F. Brickell, Jiangtao Li
-
Publication number: 20100169650Abstract: A storage minimization technique for direct anonymous attestation (DAA) keys is presented. In one embodiment, the method includes deriving a random portion of a (DAA) private key from a device's fuse key, computing a point on an elliptical curve from the derived random portion and a master private key, and storing only one coordinate of the point in fuses within the device. Other embodiments are described and claimed.Type: ApplicationFiled: December 31, 2008Publication date: July 1, 2010Inventors: Ernest F. Brickell, Jiangtao Li
-
Publication number: 20090323941Abstract: Methods and apparatus to provide a tamper-resistant environment for software are described. In some embodiments, procedures for verifying whether a software container is utilizing protected memory and is associated with a specific platform are described. Other embodiments are also described.Type: ApplicationFiled: June 30, 2008Publication date: December 31, 2009Inventors: Ravi L. Sahita, Uday R. Savagaonkar, Vedvyas Shanbhogue, Ernest F. Brickell
-
Patent number: 7490070Abstract: In some embodiments, a method and apparatus for proving the denial of a direct proof signature are described. In one embodiment, a trusted hardware device convinces a verifier that the trusted hardware device possesses cryptographic information without revealing unique, device identification information of the trusted hardware device or the cryptographic information. Once the verifier is convinced that the hardware device possesses the cryptographic information, the verifier may issue a denial of signature request to the trusted hardware device, including at least one compromised direct proof signature. In response, the trusted hardware device issues a denial of the compromised direct proof signature by proving to the verifier that a cryptographic key held by the trusted hardware device was not used to form the at least one compromised direct proof signature. Other embodiments are described and claims.Type: GrantFiled: June 10, 2004Date of Patent: February 10, 2009Assignee: Intel CorporationInventor: Ernest F. Brickell
-
Publication number: 20080307223Abstract: In some embodiments, a method and apparatus for issuer based revocation of direct proof and direct anonymous attestation are described. In one embodiment, a trusted hardware device convinces a verifier that the trusted hardware device possesses cryptographic information without revealing unique, device identification information of the trusted hardware device or the cryptographic information. Once the verifier is convinced that the hardware device possesses the cryptographic information, the verifier may issue a denial of revocation request to the trusted hardware device, including a base value BI and a plurality of revoked pseudonyms (K1, . . . , Kn) used for a plurality of suspect member keys during join procedures with an issuer. In response, the trusted hardware device issues a group denial revocation to prove that a private member key F does not match any one of a plurality of unknown, suspect keys F1 . . .Type: ApplicationFiled: November 30, 2007Publication date: December 11, 2008Inventors: Ernest F. Brickell, Jiangtao Li
-
Publication number: 20080270786Abstract: A method and apparatus for direct anonymous attestation from bilinear maps. In one embodiment, the method includes the creation of a public/private key pair for a trusted membership group defined by an issuer; and assigning a unique secret signature key to at least one member device of the trusted membership group defined by the issuer. In one embodiment, using the assigned signature key, a member may assign a message received as an authentication request to prove membership within a trusted membership group. In one embodiment, a group digital signature of the member is verified using a public key of the trusted membership group. Accordingly, a verifier of the digital signature is able to authenticate that the member is an actual member of the trusted membership group without requiring of the disclosure of a unique identification information of the member or a private member key to maintain anonymity of trusted member devices. Other embodiments are described and claimed.Type: ApplicationFiled: July 17, 2007Publication date: October 30, 2008Inventors: Ernest F. Brickell, Jiangtao Li
-
Publication number: 20080270790Abstract: In some embodiments, a method and apparatus for enhanced revocation of direct proof and direct anonymous attestation are described. In one embodiment a trusted hardware device verifies that membership of the device within a trusted membership group is not revoked according to a revocation list received with a challenge request from a verifier. Once such verification is performed, the device convinces the verifier of possessing cryptographic information without revealing unique, device identification information of the trusted hardware device or the cryptographic information. In one embodiment, the trusted hardware device computes a digital signature on a message received with the challenge request to the verifier if membership of the anonymous hardware device within a trusted membership group is verified. In one embodiment, the verifier authenticates the digital signature according to a public key of the trusted membership group to enable a trusted member device to remain anonymous to the verifier.Type: ApplicationFiled: November 30, 2007Publication date: October 30, 2008Inventors: Ernest F. Brickell, Jiangtao Li
-
Publication number: 20020087890Abstract: A method is presented that includes receiving input data. The method also includes determining if a salt value exists and generating a salt value and storing the salt value in a table entry if the salt value does not exist. The method further provides for retrieving the salt value from the table entry if the salt value exists and generating a hash from the salt value and the input data. The method also provides for generating a password from the hash and returning the password to an application to gain entry to the application. Also presented is a program storage device readable by a machine including instructions that cause the machine to perform similar to the method above.Type: ApplicationFiled: December 29, 2000Publication date: July 4, 2002Inventors: Keen W. Chan, Ernest F. Brickell
-
Patent number: 6411716Abstract: A multi-step digital signature system and method is provided having a distributed root certifying authority 20. Messages received at the root certifying authority 20 are distributed to root certifying authority members 22-30 who attach partial signatures to the message using root key fragments. In the system and method provided, the system adapts to system events such as the addition or removal of key fragment holders, the need to modify key fragments, etc., by changing key fragments.Type: GrantFiled: December 23, 1998Date of Patent: June 25, 2002Assignee: Certco, Inc.Inventor: Ernest F. Brickell
-
Patent number: 5995625Abstract: A method of unwrapping wrapped digital data that is unusable while wrapped, includes obtaining an acceptance phrase from a user; deriving a cryptographic key from the acceptance phrase; and unwrapping the package of digital data using the derived cryptographic key. The acceptance phrase is a phrase entered by a user in response to information provided to the user. The information and the acceptance phrase can be in any appropriate language. The digital data includes, alone or in combination, any of: software, a cryptographic key, an identifying certificate, an authorizing certificate, a data element or field of an identifying or authorizing certificate, a data file representing an images, data representing text, numbers, audio, and video.Type: GrantFiled: March 24, 1997Date of Patent: November 30, 1999Assignee: Certco, LLCInventors: Frank W. Sudia, Alan Asay, Ernest F. Brickell, Richard Ankney, Peter C. Freund, Marcel M. Yung, David W. Kravitz