Patents by Inventor Gary Schneir
Gary Schneir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240007280Abstract: Systems and methods are provided for creating, managing and implementing data encryption and key management in a software application through an application programming interface (API) via a SAAS-based API-based platform. A developer can quickly and easily build encryption into any application with an API accessed through an API-based platform that allows the developer to enter basic information about an application, generate encryption keys, download a client library and implement the encryption into the application based on the application information and encryption keys with only two calls to the API. The encryption is built into the software layer and the keys are managed remotely, providing security and simplicity for implementing and executing encryption.Type: ApplicationFiled: November 2, 2021Publication date: January 4, 2024Applicant: UBIQ Security, Inc.Inventors: Wias Issa, Eric Tobias, Gary Schneir, Samuel Walker Craig
-
Patent number: 11349656Abstract: A system for authenticated communications between devices, the system comprising: a plurality of devices comprising at least a first and second device; and one or more communication pathways configured to communicatively couple the first and second devices for data streaming of a data object; and the first device comprising a memory coupled to at least one processor, the first device configured to: generate a plurality of datasets corresponding to a plurality of data fragments constituting the data object, each dataset comprising encryption keys used to encrypt the corresponding data fragments, encrypt a first dataset of the plurality of datasets using a first dataset key derived based, in part, on a first encryption algorithm, and determine a second dataset key based, in part, on at least one of the first encryption algorithm and second encryption algorithm.Type: GrantFiled: March 7, 2019Date of Patent: May 31, 2022Assignee: UBIQ Security, Inc.Inventors: Eric Tobias, Anthony Iasi, Charles Kahle, Gary Schneir, John Tyner
-
Publication number: 20200272759Abstract: Systems and methods for generating a data map for retrieval of a data object. An example method includes: receiving an indication to generate a data entry for the data map, the data entry corresponding to a field identifier and a field value related to the field identifier; obfuscating the field identifier to generate a record locator associated with the data entry based, at least in part, on one or more variable storage parameters; and encrypting the field identifier and field value and storing the data entry in the data map as an encrypted field identifier and field value in association with the record locator.Type: ApplicationFiled: March 3, 2020Publication date: August 27, 2020Applicant: UBIQ SECURITY, INC.Inventors: Linda EIGNER, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Patent number: 10657283Abstract: A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and a second fragment associated with a second original record locator; obfuscating the first original record locator to generate a first obfuscated record locator and the second original record locator to generate a second obfuscated record locator; encrypting the first fragment using a first encryption key and the second fragment using a second encryption key; and storing, to at least a first of a plurality of storage locations, the first encrypted fragment with the corresponding first obfuscated record locator and the second encrypted fragment with the second obfuscated record locator.Type: GrantFiled: December 6, 2017Date of Patent: May 19, 2020Assignee: Ubiq Security, Inc.Inventors: Linda Eigner, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Patent number: 10657284Abstract: Systems and methods for retrieving a data object. An example method includes: receiving a query comprising a field identifier and a field value related to the field identifier; determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers; in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator; identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and decrypting and forwarding the one or more encrypted values as a response to the query.Type: GrantFiled: May 21, 2018Date of Patent: May 19, 2020Assignee: UBIQ SECURITY, INC.Inventors: Linda Eigner, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Patent number: 10579823Abstract: Systems and methods for generating a data map for retrieval of a data object. An example method includes: receiving an indication to generate a data entry for the data map, the data entry corresponding to a field identifier and a field value related to the field identifier; obfuscating the field identifier to generate a record locator associated with the data entry based, at least in part, on one or more variable storage parameters; and encrypting the field identifier and field value and storing the data entry in the data map as an encrypted field identifier and field value in association with the record locator.Type: GrantFiled: May 21, 2018Date of Patent: March 3, 2020Assignee: Ubiq Security, Inc.Inventors: Linda Eigner, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Patent number: 10572682Abstract: A method for storing a first data object includes: altering one or more original record locators corresponding to one or more fragments of a decomposed data object based on one or more variable storage parameters; applying an obfuscating function to the altered record locators for each fragment of the decomposed data object, the obfuscated function based at least in part on the one or more variable storage parameters; and storing, in at least one storage location, the obfuscated record locators with and the corresponding fragments.Type: GrantFiled: March 15, 2018Date of Patent: February 25, 2020Assignee: Ubiq Security, Inc.Inventors: Linda Eigner, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Publication number: 20190278930Abstract: Systems and integrated circuits are provided herein. In one aspect, an integrated circuit comprises: a plurality of connection nodes comprising at least a first and second connection node; a secure IP block and a decrypt IP block coupled to the first and second connection nodes, respectively. The secure IP block is configured to: receive a data object via the first connection node, disassemble the data object into a plurality of data fragments, encrypt the plurality of data fragments, and send the plurality of encrypted data fragments to a plurality of storage locations. The decrypt IP block is configured to: receive an electrical signal indicative of a request to access a data object via the second connection node, retrieve a plurality of encrypted data fragments stored at a plurality of storage locations, decrypt the plurality of encrypted data fragments, and reassemble the decrypted data fragments into the data object.Type: ApplicationFiled: March 7, 2019Publication date: September 12, 2019Inventors: Eric TOBIAS, Anthony IASI, Charles KAHLE, Gary SCHNEIR, John TYNER, Stefano GIACONI
-
Publication number: 20190278931Abstract: Systems and methods for accessing a first data object are provided. In an aspect, the method comprises: receiving, by a server from a plurality of client devices, a plurality of requests to retrieve a first data object, each client device operated by a user of a plurality of users; generating a plurality of unique data objects based on the requested first data object, each unique data object associated with the first data object and associated with a user of the plurality of users; and for each client device of the plurality of client devices, providing the client device access to a respective unique data object of the plurality unique data objects based on a respective user corresponding to the client device and associated with the respective unique data object.Type: ApplicationFiled: March 7, 2019Publication date: September 12, 2019Inventors: Eric TOBIAS, Anthony IASI, Charles KAHLE, Gary SCHNEIR, John TYNER, Stefano GIACONI
-
Publication number: 20190280865Abstract: A system for authenticated communications between devices, the system comprising: a plurality of devices comprising at least a first and second device; and one or more communication pathways configured to communicatively couple the first and second devices for data streaming of a data object; and the first device comprising a memory coupled to at least one processor, the first device configured to: generate a plurality of datasets corresponding to a plurality of data fragments constituting the data object, each dataset comprising encryption keys used to encrypt the corresponding data fragments, encrypt a first dataset of the plurality of datasets using a first dataset key derived based, in part, on a first encryption algorithm, and determine a second dataset key based, in part, on at least one of the first encryption algorithm and second encryption algorithm.Type: ApplicationFiled: March 7, 2019Publication date: September 12, 2019Inventors: Eric TOBIAS, Anthony IASI, Charles KAHLE, Gary SCHNEIR, John TYNER
-
Publication number: 20190245837Abstract: A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform. The client device is configured to transmit a request to retrieve user data stored in the first data store. The secure key platform configured to: store user credentials and data store credentials in the second data store separate from the user data stored in the first data store; receive a request to retrieve user data; retrieve, from the second data store, user credentials of a user of the client device and data store credentials of the first data store in response to the request; use the user credentials of the user of the client device and data store credentials of the first data store to retrieve user data from the first data store; and provide the user data to the client device.Type: ApplicationFiled: April 16, 2019Publication date: August 8, 2019Inventors: Anthony IASI, Gary SCHNEIR, Charles KAHLE, Linda EIGNER, William EIGNER, Eric TOBIAS
-
Publication number: 20190205317Abstract: Systems and methods for storing, accessing and management a data object are provided. The systems comprise: a trusted file manager system comprising a plurality of data repositories corresponding to a plurality of storage locations configured to store encrypted data fragments; a secure server; and a client device comprising and an application running on the client device and one or more processors, the application communicatively coupled to the secure platform and the trusted file manager system.Type: ApplicationFiled: March 7, 2019Publication date: July 4, 2019Inventors: Eric TOBIAS, Anthony IASI, Charles KAHLE, Gary SCHNEIR, John TYNER
-
Patent number: 10298556Abstract: A system for storing and managing credentials and encryption keys includes a first data store, a second data store, a client device, and a secure key platform. The client device is configured to transmit a request to retrieve user data stored in the first data store. The secure key platform configured to: store user credentials and data store credentials in the second data store separate from the user data stored in the first data store; receive a request to retrieve user data; retrieve, from the second data store, user credentials of a user of the client device and data store credentials of the first data store in response to the request; use the user credentials of the user of the client device and data store credentials of the first data store to retrieve user data from the first data store; and provide the user data to the client device.Type: GrantFiled: January 20, 2017Date of Patent: May 21, 2019Assignee: FHOOSH, INC.Inventors: Anthony Iasi, Gary Schneir, Charles Kahle, Linda Eigner, William Eigner, Eric Tobias
-
Publication number: 20190138621Abstract: A system for storing data with a virtual file system includes: means for receiving a file; means for disassembling the file into fragments; means for encrypting the fragments; means for mapping the fragments to different storage locations in the virtual file system; means for transmitting the encrypted file fragments to the different storage locations in the virtual file system; and means for storing the encrypted file fragments to the different storage locations in the virtual file system.Type: ApplicationFiled: November 7, 2017Publication date: May 9, 2019Inventors: Eric TOBIAS, William EIGNER, Linda EIGNER, Charles KAHLE, William BONNEY, Gary SCHNEIR, Anthony IASI, John TYNER
-
Publication number: 20180276408Abstract: Systems and methods for generating a data map for retrieval of a data object. An example method includes: receiving an indication to generate a data entry for the data map, the data entry corresponding to a field identifier and a field value related to the field identifier; obfuscating the field identifier to generate a record locator associated with the data entry based, at least in part, on one or more variable storage parameters; and encrypting the field identifier and field value and storing the data entry in the data map as an encrypted field identifier and field value in association with the record locator.Type: ApplicationFiled: May 21, 2018Publication date: September 27, 2018Inventors: Linda EIGNER, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Publication number: 20180276407Abstract: Systems and methods for retrieving a data object. An example method includes: receiving a query comprising a field identifier and a field value related to the field identifier; determining the field identifier corresponds to an entry of a data map, the data map comprising a plurality of entries generated in part based on a plurality of field identifiers; in response to the determination, obfuscating at least one of the field identifier, field value, and both the field identifier and the field value to generate a record locator; identifying one or more encrypted values within the data map based on the record locator, wherein the one or more encrypted values is associated with the entry having an corresponding record locator that matches the generated record locator; and decrypting and forwarding the one or more encrypted values as a response to the query.Type: ApplicationFiled: May 21, 2018Publication date: September 27, 2018Inventors: Linda EIGNER, William EIGNER, Anthony IASI, Charles KAHLE, Gary SCHNEIR, Eric TOBIAS
-
Publication number: 20180204023Abstract: A method for storing a first data object includes: altering one or more original record locators corresponding to one or more fragments of a decomposed data object based on one or more variable storage parameters; applying an obfuscating function to the altered record locators for each fragment of the decomposed data object, the obfuscated function based at least in part on the one or more variable storage parameters; and storing, in at least one storage location, the obfuscated record locators with and the corresponding fragments.Type: ApplicationFiled: March 15, 2018Publication date: July 19, 2018Inventors: Linda EIGNER, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Publication number: 20180107841Abstract: A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and a second fragment associated with a second original record locator; obfuscating the first original record locator to generate a first obfuscated record locator and the second original record locator to generate a second obfuscated record locator; encrypting the first fragment using a first encryption key and the second fragment using a second encryption key; and storing, to at least a first of a plurality of storage locations, the first encrypted fragment with the corresponding first obfuscated record locator and the second encrypted fragment with the second obfuscated record locator.Type: ApplicationFiled: December 6, 2017Publication date: April 19, 2018Inventors: Linda EIGNER, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Patent number: 9842227Abstract: A method for storing a first data object includes: decomposing the first data object into a first fragment associated with a first original record locator and a second fragment associated with a second original record locator; obfuscating the first original record locator to generate a first obfuscated record locator and the second original record locator to generate a second obfuscated record locator; encrypting the first fragment using a first encryption key and the second fragment using a second encryption key; and storing, to at least a first of a plurality of storage locations, the first encrypted fragment with the corresponding first obfuscated record locator and the second encrypted fragment with the second obfuscated record locator.Type: GrantFiled: September 23, 2015Date of Patent: December 12, 2017Assignee: Fhoosh, Inc.Inventors: Linda Eigner, William Eigner, Anthony Iasi, Charles Kahle, Gary Schneir, Eric Tobias
-
Publication number: 20170277773Abstract: A system for storing and managing credentials and encryption keys, includes: a first data store and a second data store; a client device configured to transmit a request to retrieve user data stored in the first data store; a secure key platform configured to: store user credentials and data store credentials in the second data store separate from the user data stored in the first data store; receive, from the client device, the request to retrieve user data stored in the first data store; retrieve, from the second data store, user credentials associated with a user of the client device and data store credentials associated with the first data store in response to the request to retrieve user data; use the user credentials of the user of the client device and data store credentials of the first data store to retrieve user data from the first data store; and provide the user data to the client device.Type: ApplicationFiled: June 13, 2017Publication date: September 28, 2017Applicant: FHOOSH, INC.Inventors: Anthony F. IASI, Gary Schneir, Charles KAHLE, Linda EIGNER, William EIGNER, Eric TOBIAS