Patents by Inventor Frank Sudia

Frank Sudia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7085780
    Abstract: Techniques are provided for monitoring a database system. A set of data elements may be read from a database system into a device. The device may be external to the database system. From the device, a set of analysis operations are performed on the data elements in order to identify if any of the date elements satisfy a criteria for being considered potentially anomalous. A notification is signaled if potentially anomalous data is identified.
    Type: Grant
    Filed: February 24, 2003
    Date of Patent: August 1, 2006
    Assignee: IPLocks, Inc.
    Inventors: Akio Sakamoto, Amarnath Mukherjee, Frank Sudia, Seshan S. Raj
  • Publication number: 20050204129
    Abstract: A multi-step signing system and method uses multiple signing devices to affix a single signature which can be verified using a single public verification key. Each signing device posesses a share of the signature key and affixes a partial signature in response to authorization from a plurality of authorizing agents. In a serial embodiment, after a first partial signature has been affixed, a second signing device exponentiates the first partial signature. In a parallel embodiment, each signing device affixes a partial signature, and the plurality of partial signatures are multiplied together to form the final signature. Security of the system is enhanced by distributing capability to affix signatures among a plurality of signing devices and by distributing authority us affix a partial signature amond a plurality of authorizing agents.
    Type: Application
    Filed: April 12, 2005
    Publication date: September 15, 2005
    Inventors: Frank Sudia, Peter Freund, Stuart Huang
  • Publication number: 20050114653
    Abstract: A revocation notification system for a public key certificate and associated method are provided. At the time of issuance, a CA requests and receives from an independent revocation service provider entity a THV corresponding to an IRV under the sole control of said revocation service provider. It then embeds such THV into the public key certificate and digitally signs the public key certificate with a private key. An entity requests revocation from the revocation service provider. The revocation service provider ceases publication of valid PFI updates for the public key certificate.
    Type: Application
    Filed: September 24, 2004
    Publication date: May 26, 2005
    Inventor: Frank Sudia
  • Publication number: 20050114666
    Abstract: A method is provided for communicating authenticated information concerning a digital public key certificate. A hash-tree data structure is created containing a pre-defined list of possible information, such as authorizations, restrictions, privileges, or validity period notices. The list items may include text and coded values. Each list entry is prefixed with a different random data (blocker) value that is securely stored and infeasible to guess. Each list item is hashed to produce a leaf hash, the leaf hashes are combined to produce a hash tree, and the root node of said tree is embedded into a digital certificate or message that is signed using a private key. In response to a request for authenticated information concerning a digital public key certificate, the certificate authority releases the relevant list item, its blocker value, and other hash values sufficient to authenticate the list item using the root node embedded in the digital certificate.
    Type: Application
    Filed: September 24, 2004
    Publication date: May 26, 2005
    Inventor: Frank Sudia
  • Publication number: 20040024736
    Abstract: Techniques are provided for monitoring a database system. A set of data elements may be read from a database system into a device. The device may be external to the database system. From the device, a set of analysis operations are performed on the data elements in order to identify if any of the date elements satisfy a criteria for being considered potentially anomalous. A notification is signaled if potentially anomalous data is identified.
    Type: Application
    Filed: February 24, 2003
    Publication date: February 5, 2004
    Inventors: Akio Sakamoto, Amarnath Mukherjee, Frank Sudia, Seshan S. Raj