Patents by Inventor Guy Fielder
Guy Fielder has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9411972Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.Type: GrantFiled: September 22, 2015Date of Patent: August 9, 2016Assignee: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Patent number: 9407610Abstract: A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.Type: GrantFiled: June 18, 2014Date of Patent: August 2, 2016Assignee: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Publication number: 20160048692Abstract: A token includes an interface for communicating with a host, a processor communicably coupled to the interface, and to a persistent storage unit. The processor receives, via the interface, a command from the host; determines whether the command is valid for the token and, if not, returns a result to the host indicating the command is not valid; otherwise, if the command is determined to be valid for the token, performs the command and return a result of performing the command to the host. The command is one of: a command to activate the token, a command to begin authentication, a command to authenticate the host, a command to generate an encryption key, and a command to change a token activation code (TAC) stored by the token, said TAC for use in activating the token.Type: ApplicationFiled: October 27, 2015Publication date: February 18, 2016Inventor: Guy Fielder
-
Publication number: 20160012243Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.Type: ApplicationFiled: September 22, 2015Publication date: January 14, 2016Inventor: Guy Fielder
-
Patent number: 9203836Abstract: In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.Type: GrantFiled: January 13, 2015Date of Patent: December 1, 2015Assignee: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Patent number: 9172533Abstract: A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication.Type: GrantFiled: December 4, 2014Date of Patent: October 27, 2015Assignee: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Publication number: 20150302218Abstract: A method for hiding a file. The method includes receiving the file to hide, wherein the file comprises file metadata, and file content, obtaining the file metadata from the file, generating a message digest using at least a portion of the file metadata, extracting, from the message digest, a derived file name and a file encryption key. The method further includes encrypting, using the file encryption key, the file to obtain encrypted file content, associating the encrypted file content with the derived file name and decoy file metadata to obtain an encrypted file, and storing the encrypted file in a file directory.Type: ApplicationFiled: June 5, 2014Publication date: October 22, 2015Inventor: Guy Fielder
-
Publication number: 20150302148Abstract: A method for securing electronic health records (EHRs). The method includes receiving an EHR for a patient, obtaining patient metadata for the patient, generating a message digest using at least a portion of the patient metadata, extracting from the message digest a derived file name and a file encryption key, encrypting using the file encryption key the EHR to obtain encrypted file content, associating the encrypted file content with the derived file name and decoy file metadata to obtain an encrypted HER, and storing the encrypted EHR in a file directory.Type: ApplicationFiled: August 12, 2014Publication date: October 22, 2015Inventor: Guy Fielder
-
Patent number: 9165153Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.Type: GrantFiled: March 28, 2014Date of Patent: October 20, 2015Assignee: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Publication number: 20150264018Abstract: A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication.Type: ApplicationFiled: December 4, 2014Publication date: September 17, 2015Applicant: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Publication number: 20150188901Abstract: A method for obtaining a secure communication session includes a first member computing device receiving, via a first communication channel, a first input from a second member computing device, sending, via a second communication channel, a second input to the second member computing device, and receiving, via the first communication channel, the second input from the second member computing device. The secure communication session is initiated based on the first input and second input.Type: ApplicationFiled: March 10, 2015Publication date: July 2, 2015Applicant: PACid Technologies, LLCInventor: Guy Fielder
-
Publication number: 20150143489Abstract: In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.Type: ApplicationFiled: January 13, 2015Publication date: May 21, 2015Applicant: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Patent number: 9009484Abstract: A method for securing communication between a plurality of members. The method includes a first member sending a first input to a second member, receiving a second input from the second member, and generating, by an n-bit generator, an initial message digest using the first input and the second input. Communications between the first member and the second member are encrypted using the initial message digest.Type: GrantFiled: June 28, 2013Date of Patent: April 14, 2015Assignee: PACid Technologies, LLCInventor: Guy Fielder
-
Patent number: 8959350Abstract: In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.Type: GrantFiled: March 25, 2010Date of Patent: February 17, 2015Assignee: PACid Technologies, LLCInventor: Guy Fielder
-
Patent number: 8934625Abstract: A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication.Type: GrantFiled: March 25, 2010Date of Patent: January 13, 2015Assignee: PACid Technologies, LLCInventor: Guy Fielder
-
Publication number: 20140298036Abstract: A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory.Type: ApplicationFiled: March 28, 2014Publication date: October 2, 2014Applicant: PACid Technologies, LLCInventor: Guy Fielder
-
Publication number: 20140298019Abstract: A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member.Type: ApplicationFiled: June 18, 2014Publication date: October 2, 2014Applicant: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Publication number: 20140236835Abstract: A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.Type: ApplicationFiled: April 29, 2014Publication date: August 21, 2014Applicant: PACID TECHNOLOGIES, LLCInventor: Guy Fielder
-
Patent number: 8782408Abstract: A method for securing communication among members of a group. The method includes a first member obtaining a first secret. An n-bit generator executing on the first member generates a first message digest using the first secret. The first member extracts a first encryption solution and a second encryption solution, at least in part, from the first message digest, encrypts a first communication using the first encryption solution to obtain a first encrypted communication, and sends, to a second member of the group, the first encrypted communication. The first member further receives, from the second member, a second encrypted communication, and decrypts the second encrypted communication using the second encryption solution to obtain a second communication.Type: GrantFiled: March 25, 2010Date of Patent: July 15, 2014Assignee: PACid Technologies, LLCInventor: Guy Fielder
-
Publication number: 20140136418Abstract: A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret.Type: ApplicationFiled: January 17, 2014Publication date: May 15, 2014Applicant: PACID TECHNOLOGIES, LLCInventor: Guy Fielder