Patents by Inventor Francisco Corella

Francisco Corella has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220263818
    Abstract: A method is provided for remote identification of a subject to a verifier using a third-party cryptographic credential. To create the credential, JavaScript code originating from the credential issuer generates a key pair using a cryptographic library, the Web Cryptography API or a FIDO2 authenticator, obtains from the issuer a disclosable portion of the credential containing the public key and subject attributes, and registers a service worker with the browser. To identify the subject, the verifier redirects a login request to a URL in the scope of the service worker, which intercepts the redirected request and dynamically generates a credential presentation page that sends the disclosable portion of the credential to the verifier and proves knowledge of the private key.
    Type: Application
    Filed: April 19, 2022
    Publication date: August 18, 2022
    Applicant: Pomian & Corella LLC
    Inventor: Francisco Corella
  • Patent number: 11329981
    Abstract: A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.
    Type: Grant
    Filed: January 4, 2020
    Date of Patent: May 10, 2022
    Assignee: POMIAN & CORELLA, LLC
    Inventors: Karen Pomian Lewison, Francisco Corella
  • Publication number: 20220103573
    Abstract: A method is provided for inspecting network traffic carried by a connection that is encrypted as specified by a network encryption protocol that provides forward secrecy. A server establishes a shared secret with a client as specified by the protocol, derives traffic secrets from the shared secret, and sends the traffic secret to a visibility middlebox. The visibility middlebox derives keying materials from the traffic secrets and uses the keying materials to decrypt the traffic.
    Type: Application
    Filed: September 26, 2021
    Publication date: March 31, 2022
    Applicant: Pomian & Corella LLC
    Inventor: Francisco Corella
  • Patent number: 11263638
    Abstract: A method is provided for cryptographically authenticating a cardholder in an online transaction by sending an authentication request to the issuing bank that is intercepted by a service worker and handled within the cardholder's computing device. The service worker signs a description of the transaction with a private key or forwards the request to a bank app that authenticates the cardholder biometrically in addition to signing the transaction.
    Type: Grant
    Filed: September 18, 2020
    Date of Patent: March 1, 2022
    Assignee: POMIAN & CORELLA, LLC
    Inventor: Francisco Corella
  • Publication number: 20210004805
    Abstract: A method is provided for cryptographically authenticating a cardholder in an online transaction by sending an authentication request to the issuing bank that is intercepted by a service worker and handled within the cardholder's computing device. The service worker signs a description of the transaction with a private key or forwards the request to a bank app that authenticates the cardholder biometrically in addition to signing the transaction.
    Type: Application
    Filed: September 18, 2020
    Publication date: January 7, 2021
    Applicant: Pomian & Corella LLC
    Inventor: Francisco Corella
  • Patent number: 10825025
    Abstract: A method is provided for cryptographically authenticating a cardholder in an online transaction by sending an authentication request to the issuing bank that is intercepted by a service worker and handled within the cardholder's computing device. The service worker signs a description of the transaction with a private key or forwards the request to a bank app that authenticates the cardholder biometrically in addition to signing the transaction.
    Type: Grant
    Filed: August 6, 2019
    Date of Patent: November 3, 2020
    Assignee: POMIAN & CORELLA, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Patent number: 10764067
    Abstract: An on-ledger certificate authority operates a node of a distributed ledger that controls a certificate issuance store and a certificate revocation store. When the certificate authority issues a certificate, the node issues a ledger transaction with an instruction to store a validation hash of the certificate in the issuance store, and when a certificate is revoked, a ledger transaction with an instruction to store the serial number of the certificate in the revocation store. As such transactions propagate throughout the ledger, the instructions are executed by on-ledger verifiers in their local replicas of the stores. An on-ledger verifier validates a certificate by verifying that its serial number is not in the revocation store while its validation hash is in the verifier's replica of the issuance store.
    Type: Grant
    Filed: May 18, 2017
    Date of Patent: September 1, 2020
    Assignee: Pomian & Corella, LLC
    Inventors: Karen Pomian Lewison, Francisco Corella
  • Publication number: 20200153824
    Abstract: A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.
    Type: Application
    Filed: January 4, 2020
    Publication date: May 14, 2020
    Applicant: Pomian & Corella, LLC
    Inventors: Karen Pomian Lewison, Francisco Corella
  • Patent number: 10567377
    Abstract: A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.
    Type: Grant
    Filed: March 23, 2017
    Date of Patent: February 18, 2020
    Assignee: Pemian & Corella, LLC
    Inventors: Karen Pomian Lewison, Francisco Corella
  • Publication number: 20200043003
    Abstract: A method is provided for cryptographically authenticating a cardholder in an online transaction by sending an authentication request to the issuing bank that is intercepted by a service worker and handled within the cardholder's computing device. The service worker signs a description of the transaction with a private key or forwards the request to a bank app that authenticates the cardholder biometrically in addition to signing the transaction.
    Type: Application
    Filed: August 6, 2019
    Publication date: February 6, 2020
    Applicant: Pomian & Corella LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Patent number: 9887989
    Abstract: A method and system are provided for authenticating a user to an application back-end using a key pair and one or more bearer tokens such as a password, a biometric code, or a biometric key, while protecting the bearer tokens against back-end security breaches. In one embodiment, an application front-end authenticates the user by sending the bearer tokens and a public key to the application back-end, and demonstrating knowledge of a private key. The application back-end compares an authentication-phase tag derived from a joint hash of the public key and the bearer tokens against a registration-phase tag stored in a device record within a back-end database. The public key is not stored in the database, thereby depriving an adversary who breaches back-end security of information needed to test guesses of the bearer tokens.
    Type: Grant
    Filed: April 22, 2016
    Date of Patent: February 6, 2018
    Assignee: Pomian & Corella, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Publication number: 20170338967
    Abstract: An on-ledger certificate authority operates a node of a distributed ledger that controls a certificate issuance store and a certificate revocation store. When the certificate authority issues a certificate, the node issues a ledger transaction with an instruction to store a validation hash of the certificate in the issuance store, and when a certificate is revoked, a ledger transaction with an instruction to store the serial number of the certificate in the revocation store. As such transactions propagate throughout the ledger, the instructions are executed by on-ledger verifiers in their local replicas of the stores. An on-ledger verifier validates a certificate by verifying that its serial number is not in the revocation store while its validation hash is in the verifier's replica of the issuance store.
    Type: Application
    Filed: May 18, 2017
    Publication date: November 23, 2017
    Applicant: Pomian & Corella LLC
    Inventors: Karen Pomian Lewison, Francisco Corella
  • Publication number: 20170339138
    Abstract: A method and system are provided for multifactor identification of a subject over a network using a rich credential, with selective disclosure of attributes and selective presentation of verification factors. A credential presentation application negotiates with a verifying server to agree on attributes to be disclosed and verification factors to be presented, and removes unneeded attributes and verification data from the rich credential by pruning subtrees from a typed hash tree without invalidating a signature that covers the root label of the tree. The credential presentation application proves knowledge of a private key, and as agreed upon may prove knowledge of a password and may arrange for biometric presentation applications to present one or more biometric samples to the verifier, which performs presentation attack detection and verifies the samples against verification data in the rich credential.
    Type: Application
    Filed: March 23, 2017
    Publication date: November 23, 2017
    Applicant: Pomian & Corella LLC
    Inventors: Karen Pomian Lewison, Francisco Corella
  • Publication number: 20160269393
    Abstract: A method and system are provided for authenticating a user to an application back-end using a key pair and one or more bearer tokens such as a password, a biometric code, or a biometric key, while protecting the bearer tokens against back-end security breaches. In one embodiment, an application front-end authenticates the user by sending the bearer tokens and a public key to the application back-end, and demonstrating knowledge of a private key. The application back-end compares an authentication-phase tag derived from a joint hash of the public key and the bearer tokens against a registration-phase tag stored in a device record within a back-end database. The public key is not stored in the database, thereby depriving an adversary who breaches back-end security of information needed to test guesses of the bearer tokens.
    Type: Application
    Filed: April 22, 2016
    Publication date: September 15, 2016
    Applicant: Pomian & Corella LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Patent number: 9185111
    Abstract: A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device regenerates a credential containing a key pair from a PIN and a protocredential, and authenticates cryptographically to a verifier black-box in the back-end subsystem; then the verifier black-box sends an authentication token to the prover black-box as verifiable confirmation of the cryptographic authentication, the prover black-box sends the authentication token to an application front-end in the computing device, the application front-end sends the authentication token to an application back-end in the back-end subsystem, and the application back-end verifies the authentication token.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: November 10, 2015
    Assignee: Pomian & Corella, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Patent number: 9069854
    Abstract: A method of facilitating the browsing of a plurality of result sets by a user. The method includes displaying a plurality of queries on a computer display, each query having a corresponding result set, the plurality of queries thereby constituting a set of displayed queries, and displaying the result set of a selected displayed query in response to the user selecting the query from the set of displayed queries via a user interface procedure, while continuing to display the set of displayed queries so the user can subsequently select other queries from the set of displayed queries to thereby interleave browsing the result sets of the queries in the set of displayed queries.
    Type: Grant
    Filed: October 19, 2009
    Date of Patent: June 30, 2015
    Assignee: Pomian & Corella, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Publication number: 20150113283
    Abstract: A method of activating credentials that are stored encrypted while inactive. In one embodiment a decryption key is retrieved from a key storage service after the device authenticates to the service by sending a passcode and/or a biometric key, a public key and a signature computed with a private key, the service verifying the signature and comparing a hash of the public key and the passcode and/or biometric key to a reference hash.
    Type: Application
    Filed: January 1, 2015
    Publication date: April 23, 2015
    Applicant: POMIAN & CORELLA
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Publication number: 20140032906
    Abstract: A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device regenerates a credential containing a key pair from a PIN and a protocredential, and authenticates cryptographically to a verifier black-box in the back-end subsystem; then the verifier black-box sends an authentication token to the prover black-box as verifiable confirmation of the cryptographic authentication, the prover black-box sends the authentication token to an application front-end in the computing device, the application front-end sends the authentication token to an application back-end in the back-end subsystem, and the application back-end verifies the authentication token.
    Type: Application
    Filed: July 30, 2013
    Publication date: January 30, 2014
    Applicant: POMIAN & CORELLA, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Publication number: 20140006806
    Abstract: A method of protecting confidential data stored in a computing device. In one embodiment, data items are encrypted using content-encryption keys that are not present in the device while the device is locked. When a user unlocks the device, the content- encryption keys are computed using at least one externally stored key that is retrieved from a key storage service using a credential regenerated from a protocredential stored in the device and one or more secrets supplied by a user.
    Type: Application
    Filed: August 30, 2013
    Publication date: January 2, 2014
    Applicant: POMIAN & CORELLA, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison
  • Publication number: 20140006781
    Abstract: A method of authenticating a computing device to a back-end subsystem. In one embodiment a prover black-box in the computing device authenticates cryptographically to a verifier black-box in the back-end subsystem by proving possession of a cryptographic credential. The verifier black-box sends an authentication token to the prover black-box as verifiable confirmation of the cryptographic authentication. The prover black-box sends the authentication token to an application front-end in the computing device. The application front-end sends the authentication token to an application back-end in the back-end subsystem, and the application back-end verifies the authentication token.
    Type: Application
    Filed: June 24, 2013
    Publication date: January 2, 2014
    Applicant: Pomian & Corella, LLC
    Inventors: Francisco Corella, Karen Pomian Lewison