Patents by Inventor Ismail Cem Paya

Ismail Cem Paya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160112396
    Abstract: A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of accounts. Various cryptographic primitives are used to manipulate passwords to generate verifiers. The verifiers are used with external hardware security modules (HSMs) to eliminate HSMs and intermediate steps between the HSM and login servers as potential breach points.
    Type: Application
    Filed: October 15, 2014
    Publication date: April 21, 2016
    Inventors: Ismail Cem Paya, Kevin Nguyen
  • Publication number: 20150113271
    Abstract: A re-programmable wireless cryptographic device can store data securely and use near field communication (NFC) to exchange functionality data and/or program code from a central server system through a mobile device. A user requests a new cryptographic device or a new device function via an application on the mobile device. The central server system transmits program code and a public key used to identify the cryptographic device to the mobile device, which functions as a pass-through conduit for the information, storing it until the devices are synced. A NFC communication channel is created, and the mobile device authenticates the cryptographic device by cross-referencing the public key received from the central server system with the public key transmitted by the cryptographic device once the communication channel is established. Upon authentication, the cryptographic device is synced with the mobile device, and the mobile device passes the program code to the cryptographic device.
    Type: Application
    Filed: October 23, 2013
    Publication date: April 23, 2015
    Applicant: GOOGLE INC.
    Inventors: Sarel Kobus Jooste, Shane Farmer, Ismail Cem Paya
  • Patent number: 9008616
    Abstract: Point of sale processing of multiple options is possible with a single tap of a contactless device. The user taps the contactless device in the device reader's radio frequency field. The device reader and the contactless device establish a secure communication channel. Once a secure communication channel is established, the device reader communicates the purchase to the contactless device. The contactless device presents value-added services available to the user. The contactless device communicates the user's selected value-added service(s) to the device reader, and the reader communicates the purchase price of the transaction. The contactless device communicates payment options to the user and then communicates the user-selected payment options to the device reader. The device reader communicates a digital receipt to the contactless device, and the secure communication is terminated.
    Type: Grant
    Filed: December 9, 2011
    Date of Patent: April 14, 2015
    Assignee: Google Inc.
    Inventors: Jonathan Wall, Rob von Behren, Ismail Cem Paya
  • Publication number: 20150073953
    Abstract: Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted.
    Type: Application
    Filed: November 12, 2014
    Publication date: March 12, 2015
    Inventors: Michael William Springer, Ismail Cem Paya, Margorzata Monika Lisowiec, Aneto Pablo Okonkwo, IV, Patrick Pui Wah Leung, Fan Jiang
  • Patent number: 8898088
    Abstract: Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: November 25, 2014
    Assignee: Google Inc.
    Inventors: Michael William Springer, Ismail Cem Paya, Malgorzata Monika Lisowiec, Aneto Pablo Okonkwo, Patrick Pui Wah Leung, Fan Jiang
  • Patent number: 8806199
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: August 12, 2014
    Assignee: Google Inc.
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya, Alexej Muehlberg, Hauke Meyn
  • Patent number: 8793508
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.
    Type: Grant
    Filed: December 17, 2012
    Date of Patent: July 29, 2014
    Assignee: Google Inc.
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya
  • Patent number: 8776199
    Abstract: Protecting a user against web spoofing in which the user confirms the authenticity of a web page prior to submitting sensitive information such as user credentials (e.g., a login name and password) via the web page. The web page provides the user with an identifiable piece of information representing a shared secret between the user and the server. The user confirms the correctness of the shared secret to ensure the legitimacy of the web page prior to disclosing any sensitive information via the web page.
    Type: Grant
    Filed: January 13, 2010
    Date of Patent: July 8, 2014
    Assignee: Microsoft Corporation
    Inventors: Ismail Cem Paya, Trevin Chow, Christopher N. Peterson
  • Patent number: 8706081
    Abstract: A method and system for packet inspection in a near field communication (NFC) controller for secure element (SE) protection are described. In a communication device, the NFC controller can receive filtering rules that correspond to security for an applet in the SE. The NFC controller can also receive a packet with commands or instructions for the SE. The NFC controller can inspect the contents of the packet based on the filtering rules and determine whether to communicate the packet to the SE. The packet filtering performed by the NFC controller can also be based on whether the packet was received through an interface with an operating system in the communication device or through an interface with an NFC antenna. The filtering rules can be removed or disabled when an update for the applet is received and installed in the SE.
    Type: Grant
    Filed: December 18, 2012
    Date of Patent: April 22, 2014
    Assignee: Google Inc.
    Inventors: Ismail Cem Paya, Shane Alexander Farmer, Robert Tsai
  • Publication number: 20140089196
    Abstract: Systems and methods can secure personal identification numbers associated with secure elements within mobile devices. A host application of the mobile device can receive a personal identification number (PIN) or user PIN from a user. The application can generate one or more random PIN components. The application can compute a PIN for the secure element based upon the user PIN and each of the one or more random components. The SE can be configured using the PIN computed for the secure element. Each of the one or more random components may be stored in one or more distinct, diverse locations. In addition to entering the correct user PIN, each of the one or more random components must be retrieved from the diverse locations in order to reconstruct the PIN for the secure element whenever performing a transaction using the secure element.
    Type: Application
    Filed: September 25, 2013
    Publication date: March 27, 2014
    Applicant: GOOGLE INC.
    Inventors: Ismail Cem Paya, Robert Lieh-Yuan Tsai
  • Publication number: 20140059354
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Application
    Filed: October 31, 2013
    Publication date: February 27, 2014
    Applicant: Microsoft Corporation
    Inventors: Wei Jiang, Adam Back, John D. Whited, Yordan I. Rouskov, Ismail Cem Paya, Wei-Quiang Michael Guo
  • Patent number: 8626929
    Abstract: Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers.
    Type: Grant
    Filed: February 14, 2011
    Date of Patent: January 7, 2014
    Assignee: Microsoft Corporation
    Inventors: Wei Jiang, Ismail Cem Paya, John D. Whited, Wei-Quiang Michael Guo, Yordan Rouskov, Adam Back
  • Patent number: 8621168
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element.
    Type: Grant
    Filed: September 26, 2011
    Date of Patent: December 31, 2013
    Assignee: Google Inc.
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya, Alexej Muehlberg, Hauke Meyn
  • Patent number: 8621592
    Abstract: An authentication ticket is validated to ensure authenticated communications between a client and an online service provider. In an embodiment an authentication request is received from a user agent associated with the client and the authentication request includes a set of identification information and a set of authentication information. Additionally, it is determined that the set of identification information and the set of authentication information are associated with a user and an authentication ticket is created including a user identification and an authentication, indicating to the online service provider that the user is authenticated to access one or more online services. Further, a validation token is embedded into the authentication ticket that provides enhanced verification that the access provided by the online service provider is authenticated.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: December 31, 2013
    Assignee: Microsoft Corporation
    Inventors: Josh D. Benaloh, Ismail Cem Paya
  • Patent number: 8560861
    Abstract: A permission level associated with an associate's web access is identified. A relationship ticket is obtained from an authentication server and a request is generated to set the identified permission level. The request and the relationship ticket are sent to a Web server and a success code is received from the Web server if the requested permission level is established.
    Type: Grant
    Filed: September 12, 2008
    Date of Patent: October 15, 2013
    Assignee: Microsoft Corporation
    Inventors: Baskaran Dharmarajan, Ismail Cem Paya, Ashvin J Mathew
  • Patent number: 8532620
    Abstract: A method for performing user security operations using a mobile communications device includes, storing at least one security credential for a user in the mobile communications device, receiving a request from a client computer to perform an action requiring the stored at least one security credential, wherein the request includes information regarding a service application for which the action is requested, determining a response to the request based upon at least one user configured personal security preference at the mobile communications device, and transmitting the determined response to the client computer. Corresponding system and computer program products are also described.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: September 10, 2013
    Assignee: Google Inc.
    Inventors: Ismail Cem Paya, Marcel Mordechai Moti Yung
  • Publication number: 20130226791
    Abstract: Preventing fraud during an offline transaction by encoding a randomly-generated card verification code onto a smart card. The verification code is transmitted to a contactless device during each transaction, wherein it is cross-referenced with the account number to ensure presence of the card. Also, every transaction record is signed by an access key resident on the contactless device and certified by a signing key resident on a remote system. Funds may be deposited onto the card when the contactless device creates a deposit request, signs the request using an access key and transmits it to the remote system, which in turn processes the request and certifies it with a signing key. Funds may be withdrawn when the contactless device creates a withdrawal record and signs it using an access key. The remote system verifies the signatures and certifies the records using a signing key when the records are later transmitted.
    Type: Application
    Filed: February 29, 2012
    Publication date: August 29, 2013
    Applicant: GOOGLE Inc.
    Inventors: Michael William Springer, Ismail Cem PAYA, Malgorzata Monika LISOWIEC, Aneto Pablo OKONKWO, Patrick Pui Wah LEUNG, Fan JIANG
  • Publication number: 20130121493
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.
    Type: Application
    Filed: December 17, 2012
    Publication date: May 16, 2013
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya
  • Publication number: 20130111207
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for partitioning the namespace of a secure element in contactless smart card devices and for writing application data in the secure element using requests from a software application outside the secure element. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. A control software application resident in the same or a different secure element provides access types and access bits, for each access memory block of the secure element namespace, thereby portioning the namespace into different access types. Further, a software application outside the secure element manages the control software application by passing commands using a secure channel to the secure element, thereby enabling an end-user of the contactless smart card device or a remote computer to control the partitioning and use of software applications within the secure element.
    Type: Application
    Filed: November 27, 2012
    Publication date: May 2, 2013
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya, Alexej Muehlberg, Hauke Meyn
  • Patent number: 8352749
    Abstract: Systems, methods, computer programs, and devices are disclosed herein for deploying a local trusted service manager within a secure element of a contactless smart card device. The secure element is a component of a contactless smart card incorporated into a contactless smart card device. An asymmetric cryptography algorithm is used to generate public-private key pairs. The private keys are stored in the secure element and are accessible by a trusted service manager (TSM) software application or a control software application in the secure element. A non-TSM computer with access to the public key encrypts and then transmits encrypted application data or software applications to the secure element, where the TSM software application decrypts and installs the software application to the secure element for transaction purposes.
    Type: Grant
    Filed: September 17, 2011
    Date of Patent: January 8, 2013
    Assignee: Google Inc.
    Inventors: Rob von Behren, Jonathan Wall, Ismail Cem Paya