Patents by Inventor Jarred Adam Ligatti
Jarred Adam Ligatti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10367817Abstract: A system and method of authentication that avoids authentication challenges is described. In operation, an authenticator receives a first request to access a resource generated by a requestor and a participation message generated by a collaborator. The authenticator computing device then analyzes the first request and the participation message to determine whether the requestor requesting access to the resource should be granted access and grants the requestor access to the resource based upon the analysis of the first request to access a resource and the participation message.Type: GrantFiled: July 7, 2017Date of Patent: July 30, 2019Assignee: University of South FloridaInventor: Jarred Adam Ligatti
-
Publication number: 20180262505Abstract: A system and method of authentication that avoids authentication challenges is described. In operation, an authenticator receives a first request to access a resource generated by a requestor and a participation message generated by a collaborator. The authenticator computing device then analyzes the first request and the participation message to determine whether the requestor requesting access to the resource should be granted access and grants the requestor access to the resource based upon the analysis of the first request to access a resource and the participation message.Type: ApplicationFiled: July 7, 2017Publication date: September 13, 2018Applicant: University of South FloridaInventor: Jarred Adam Ligatti
-
Publication number: 20170257364Abstract: A system and method of authentication is described. In operation, an authenticator computing device receives a request to access a resource from a requesting user. In response to the request, the authenticator computing device generates and transmits an authentication vote query to one or more voting users, wherein the one or more voting users includes at least one user other than the user requesting access to the resources. The one or more voting users then respond by transmitting authentication votes to the authenticator. Alternatively, a proxy may be used to cast the authentication votes of the one or more voting users. The authenticator computing device then analyzes the authentication votes to determine whether the requesting user requesting access to the resource should be granted access and grants the requesting user access to the resource based upon the analysis of the authentication votes.Type: ApplicationFiled: May 18, 2017Publication date: September 7, 2017Applicant: University of South FloridaInventors: Jarred Adam Ligatti, Dmitry Goldgof
-
Patent number: 9659160Abstract: A system and method of authentication using an authenticator computing device and at least two registered user devices is described. In operation, the authenticator computing device receives a request to access a resource from one of a plurality of user devices registered to a user. The authenticator computing device generates an authentication challenge in response to the request and the authentication challenge is then transmitted to a subset of the plurality of user devices. One or more of the user devices then subsequently generates and transmits a response to the authentication challenge to the authenticator computing device. The authenticator computing device then determines whether the responses received from the one or more user devices in the subset constitutes a valid response and then grants one or more of the user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.Type: GrantFiled: April 22, 2015Date of Patent: May 23, 2017Assignee: University of South FloridaInventors: Jarred Adam Ligatti, Dmitry Goldgof, Cagri Cetin, Jean-Baptiste Subils
-
Patent number: 9531384Abstract: An adiabatic dynamic differential logic circuit is provided for mitigating a differential power analysis (DPA) attack on a secure integrated chip including a plurality of transistors configured to perform each of a plurality of two-input logical output calculations, wherein each of the two-input logical output calculations results in a minimal differential power of the logic circuit. In one embodiment, a high-performance adiabatic dynamic differential logic circuit is provided which is optimized for very high operating frequencies. In another embodiment, a body-biased adiabatic dynamic differential logic circuit is provided which utilizes transistor body biasing to improve the switching time and differential power of the design.Type: GrantFiled: December 1, 2015Date of Patent: December 27, 2016Assignee: University of South FloridaInventors: Matthew Morrison, Jarred Adam Ligatti, Nagarajan Ranganathan
-
Patent number: 9380058Abstract: A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user devices of an associated set of user devices, wherein each of the user devices is registered to at least one user requesting access to the resource registered to at least two users. The authenticator generates and transmits an authentication challenge in response to the request to a subset of the user devices. A user device subsequently generates and transmits a response to the authentication challenge to the authenticator. The authenticator determines whether the responses received from the one or more user devices constitutes a valid response and grants any one or more of the user devices of the associated set of user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.Type: GrantFiled: June 30, 2015Date of Patent: June 28, 2016Assignee: University of South FloridaInventors: Jarred Adam Ligatti, Dmitry Goldgof, Cagri Cetin, Jean-Baptiste Subils
-
Publication number: 20160180072Abstract: A system and method of authentication using an authenticator computing device and at least two registered user devices is described. In operation, the authenticator computing device receives a request to access a resource from one of a plurality of user devices registered to a user. The authenticator computing device generates an authentication challenge in response to the request and the authentication challenge is then transmitted to a subset of the plurality of user devices. One or more of the user devices then subsequently generates and transmits a response to the authentication challenge to the authenticator computing device. The authenticator computing device then determines whether the responses received from the one or more user devices in the subset constitutes a valid response and then grants one or more of the user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.Type: ApplicationFiled: April 22, 2015Publication date: June 23, 2016Applicant: University of South FloridaInventors: Jarred Adam Ligatti, Dmitry Goldgof, Cagri Cetin, Jean-Baptiste Subils
-
Publication number: 20160182500Abstract: A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user devices of an associated set of user devices, wherein each of the user devices is registered to at least one user requesting access to the resource registered to at least two users. The authenticator generates and transmits an authentication challenge in response to the request to a subset of the user devices. A user device subsequently generates and transmits a response to the authentication challenge to the authenticator. The authenticator determines whether the responses received from the one or more user devices constitutes a valid response and grants any one or more of the user devices of the associated set of user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.Type: ApplicationFiled: June 30, 2015Publication date: June 23, 2016Applicant: UNIVERSITY OF SOUTH FLORIDAInventors: Jarred Adam Ligatti, Dmitry Goldgof, Cagri Cetin, Jean-Baptiste Subils