Patents by Inventor Iris Anshel

Iris Anshel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11658811
    Abstract: Systems and methods to produce shared secret data are generally described. In some examples, a first device may receive a first public key from a second device. The first device may produce a first public key based on the first public key of the second device. The respective private keys of each device may be associated with the first public keys of each device. Each device may produce a second public key based of respective private keys and the other devices first public key. Each device may transmit a second public key to the other device. The first device may produce the shared secret data based on its private key and the second public key of the second device. The second device may produce the shared secret data based on its private key and the second public key of the first device.
    Type: Grant
    Filed: January 10, 2022
    Date of Patent: May 23, 2023
    Assignee: VERIDIFY SECURITY INC.
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20220209941
    Abstract: Systems and methods to produce shared secret data are generally described. In some examples, a first device may receive a first public key from a second device. The first device may produce a first public key based on the first public key of the second device. The respective private keys of each device may be associated with the first public keys of each device. Each device may produce a second public key based of respective private keys and the other devices first public key. Each device may transmit a second public key to the other device. The first device may produce the shared secret data based on its private key and the second public key of the second device. The second device may produce the shared secret data based on its private key and the second public key of the first device.
    Type: Application
    Filed: January 10, 2022
    Publication date: June 30, 2022
    Applicant: VERIDIFY SECURITY INC.
    Inventors: Iris ANSHEL, Dorian GOLDFELD
  • Patent number: 11368312
    Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.
    Type: Grant
    Filed: November 22, 2019
    Date of Patent: June 21, 2022
    Assignee: VERIDIFY SECURITY INC.
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 11245516
    Abstract: Systems and methods to produce shared secret data are generally described. In some examples, a first device may receive a first public key from a second device. The first device may produce a first public key based on the first public key of the second device. The respective private keys of each device may be associated with the first public keys of each device. Each device may produce a second public key based of respective private keys and the other devices first public key. Each device may transmit a second public key to the other device. The first device may produce the shared secret data based on its private key and the second public key of the second device. The second device may produce the shared secret data based on its private key and the second public key of the first device.
    Type: Grant
    Filed: April 7, 2020
    Date of Patent: February 8, 2022
    Assignee: VERIDIFY SECURITY INC.
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20200344050
    Abstract: Systems and methods to produce shared secret data are generally described. In some examples, a first device may receive a first public key from a second device. The first device may produce a first public key based on the first public key of the second device. The respective private keys of each device may be associated with the first public keys of each device. Each device may produce a second public key based of respective private keys and the other devices first public key. Each device may transmit a second public key to the other device. The first device may produce the shared secret data based on its private key and the second public key of the second device. The second device may produce the shared secret data based on its private key and the second public key of the first device.
    Type: Application
    Filed: April 7, 2020
    Publication date: October 29, 2020
    Applicant: VERIDIFY SECURITY INC.
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 10700870
    Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.
    Type: Grant
    Filed: November 17, 2017
    Date of Patent: June 30, 2020
    Assignee: VERIDIFY SECURITY INC.
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20200092111
    Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.
    Type: Application
    Filed: November 22, 2019
    Publication date: March 19, 2020
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, DORIAN GOLDFELD
  • Patent number: 10523440
    Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.
    Type: Grant
    Filed: September 20, 2016
    Date of Patent: December 31, 2019
    Assignee: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 10505722
    Abstract: Systems and methods to produce cloaked keys and shared secret data are described. A first device may select a private key, for the first device, based on a first set of rewritten conjugates. The first device may receive a public key from a second device. The public key may be based on a private key of the second device. The private key of the second device may be based on a second set of rewritten conjugates. The first device may determine first and second cloaking elements based on the public key and the private key of the first device. The first device may produce a cloaked key based on the first and second cloaking elements, and the private key of the first device. The first device may produce shared secret data based on the private key of the first device and a second cloaked key from the second device.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: December 10, 2019
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 10459690
    Abstract: A side channel attack prevention system may use one or more of a function mutation generator, an element selector generator and/or a subword replacement module to produce a hardened result. The function mutation generator may evaluate a mutated function. The element selector generator may select a central group element in a group and insert that central group element within the group. The subword replacement module may identify a relation in a group and insert that relation in a random location of the group.
    Type: Grant
    Filed: January 12, 2018
    Date of Patent: October 29, 2019
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20190307790
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Application
    Filed: June 5, 2019
    Publication date: October 10, 2019
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, MICHAEL ANSHEL, DORIAN GOLDFELD
  • Publication number: 20190288848
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: May 22, 2019
    Publication date: September 19, 2019
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 10367640
    Abstract: Systems and methods for producing shared secret data are generally described. A first device may receive a public key from a second device. The public key may be based on a first secret element. The first device may generate a first ephemeral private key based on a second secret element, and may generate a second ephemeral private key based on a third secret element. The first device may generate a first element based on the public key and the first ephemeral private key, and may generate a second element based on the public key and the second ephemeral private key. The second element may relate to the shared secret data. The first device may generate a session public key based on the first element, the second secret element, and the third secret element. The shared secret data may be derivable, by the second device, from the session public key.
    Type: Grant
    Filed: May 3, 2017
    Date of Patent: July 30, 2019
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20190169810
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: February 8, 2019
    Publication date: June 6, 2019
    Applicant: Securerf Corporation
    Inventors: IRIS ANSHEL, Dorian Goldfeld
  • Publication number: 20180270047
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: May 18, 2018
    Publication date: September 20, 2018
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20180241566
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function. Further modules iteratively, corresponding to the number of blocks, apply the produced function to calculated monoid elements and the second monoid elements to produce a hash of the string.
    Type: Application
    Filed: April 26, 2018
    Publication date: August 23, 2018
    Inventors: IRIS ANSHEL, Dorian Goldfeld
  • Publication number: 20180139040
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Application
    Filed: December 21, 2017
    Publication date: May 17, 2018
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20180097633
    Abstract: Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, a private key to the cloaking element generator. The methods may comprise forwarding, by the processor, a group to the cloaking element generator. The methods may comprise forwarding, by the processor, a homomorphism to the cloaking element generator. The methods may comprise processing, by the cloaking element generator, the random number, the group, the private key, and the homomorphism to produce a cloaking element. The methods may comprise applying the cloaking element to transform the message into the final signature.
    Type: Application
    Filed: November 17, 2017
    Publication date: April 5, 2018
    Applicant: SECURERF CORPORATION
    Inventors: Iris Anshel, Dorian Goldfeld
  • Publication number: 20180071335
    Abstract: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so that these submonoids satisfy a special symmetry property determined by the function, a structure of the first and second monoids, and the action of the group. A multiplication of an element in the second monoid and an element in the first monoid is obtained by combining the group action and the monoid homomorphism. First and second users choose private keys which are sequences of elements in their respective submonoids. A first result is obtained by multiplying an identity element by the first element of the sequence in a respective submonoid.
    Type: Application
    Filed: September 13, 2017
    Publication date: March 15, 2018
    Applicant: SECURERF CORPORATION
    Inventors: IRIS ANSHEL, MICHAEL ANSHEL, DORIAN GOLDFELD
  • Publication number: 20180069705
    Abstract: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates an action of the initial monoid element on the first function producing a second function. A fourth module applies the second function to the first calculated monoid element and to a second of the second monoid elements producing a second calculated monoid element and evaluates the action of the first calculated monoid element on the first function producing a third function.
    Type: Application
    Filed: November 13, 2017
    Publication date: March 8, 2018
    Applicant: Securerf Corporation
    Inventors: Iris Anshel, Dorian Goldfeld