Patents by Inventor Ivan Bjerre Damgaard

Ivan Bjerre Damgaard has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10803194
    Abstract: A system and a method for managing confidential data in a cloud service is provided. The system comprises a cryptographic key service comprising two or more cryptographic key servers, Si, each being arranged to compute file encryption keys, kj, on the basis of information regarding data and using one or more cryptographic keys, Kj. The cryptographic keys, Kj, are secretly shared among the cryptographic key servers, Si, and none of the cryptographic key servers, Si, possesses knowledge of all of the cryptographic keys, Kj. A single point of trust at the cryptographic key service is avoided.
    Type: Grant
    Filed: June 10, 2019
    Date of Patent: October 13, 2020
    Assignee: SEPIOR ApS
    Inventors: Ivan Bjerre Damgård, Thomas Pelle Jakobsen, Jakob Illeborg Pagter
  • Publication number: 20190294811
    Abstract: A system and a method for managing confidential data in a cloud service is provided. The system comprises a cryptographic key service comprising two or more cryptographic key servers, Si, each being arranged to compute file encryption keys, kj, on the basis of information regarding data and using one or more cryptographic keys, Kj. The cryptographic keys, Kj, are secretly shared among the cryptographic key servers, Si, and none of the cryptographic key servers, Si, possesses knowledge of all of the cryptographic keys, Kj. A single point of trust at the cryptographic key service is avoided.
    Type: Application
    Filed: June 10, 2019
    Publication date: September 26, 2019
    Inventors: Ivan Bjerre Damgård, Thomas Pelle Jakobsen, Jakob Illeborg Pagter
  • Patent number: 10354084
    Abstract: A system and a method for managing confidential data in a cloud service is provided. The system comprises a cryptographic key service comprising two or more cryptographic key servers, Si, each being arranged to compute file encryption keys, kj, on the basis of information regarding data and using one or more cryptographic keys, Kj. The cryptographic keys, Kj, are secretly shared among the cryptographic key servers, Si, and none of the cryptographic key servers, Si, possesses knowledge of all of the cryptographic keys, Kj. A single point of trust at the cryptographic key service is avoided.
    Type: Grant
    Filed: October 21, 2014
    Date of Patent: July 16, 2019
    Assignee: SEPIOR ApS
    Inventors: Ivan Bjerre Damgård, Thomas Pelle Jakobsen, Jakob Illeborg Pagter
  • Publication number: 20160253515
    Abstract: A system and a method for managing confidential data in a cloud service is provided. The system comprises a cryptographic key service comprising two or more cryptographic key servers, Si, each being arranged to compute file encryption keys, kj, on the basis of information regarding data and using one or more cryptographic keys, Kj. The cryptographic keys, Kj, are secretly shared among the cryptographic key servers, Si, and none of the cryptographic key servers, Si, possesses knowledge of all of the cryptographic keys, Kj. A single point of trust at the cryptographic key service is avoided.
    Type: Application
    Filed: October 21, 2014
    Publication date: September 1, 2016
    Inventors: Ivan Bjerre Damgård, Thomas Pelle Jakobsen, Jakob Illeborg Pagter
  • Patent number: 8737608
    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: May 27, 2014
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Publication number: 20120163591
    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Application
    Filed: March 2, 2012
    Publication date: June 28, 2012
    Applicant: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 8155310
    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
    Type: Grant
    Filed: June 25, 2009
    Date of Patent: April 10, 2012
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 8077861
    Abstract: A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in the second segment. The transformed data is assembled from the first segment and the permuted groups of the second segment. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: December 13, 2011
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Publication number: 20090262943
    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
    Type: Application
    Filed: June 25, 2009
    Publication date: October 22, 2009
    Applicant: CMLA, INC.
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 7577250
    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: August 18, 2009
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 7564970
    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: July 21, 2009
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen