Patents by Inventor Jeffrey Seyfried

Jeffrey Seyfried has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230379138
    Abstract: A method includes receiving input data that includes a plurality of input parts, wherein the input data corresponds to a data schema, wherein the data schema includes a plurality of schema parts, wherein each schema part specifies a set of one or more possible values, and wherein each input part satisfies a respective schema part. The method further includes generating an intermediate numeric value that represents the input data, generating, using a format-preserving encryption algorithm, an encrypted numeric value based on the intermediate numeric value, determining a number of possible values that satisfy the data schema, determining whether the encrypted numeric value satisfies a threshold criterion based on the number of possible values that satisfy the data schema, and responsive to determining that the encrypted numeric value satisfies the threshold criterion, generating, based on the encrypted numeric value, output data that conforms to the data schema.
    Type: Application
    Filed: May 20, 2022
    Publication date: November 23, 2023
    Inventors: Xinyu Lin, Jethro Gideon Beekman, Jeffrey Seyfried
  • Patent number: 11349822
    Abstract: A request may be received from an application for a performance of an operation associated with a cryptographic key that is stored at a secure enclave. A plugin of the secure enclave may be identified from the request for performance of the operation. The operation associated with the cryptographic key may be performed by using the plugin of the secure enclave to generate an output within the secure enclave. The output generated within the secure enclave and based on the plugin may be provided to the application.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: May 31, 2022
    Assignee: Fortanix, Inc.
    Inventors: Anand Kashyap, Ambuj Kumar, Jethro Gideon Beekman, Jeffrey Seyfried
  • Patent number: 11159309
    Abstract: A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.
    Type: Grant
    Filed: December 20, 2018
    Date of Patent: October 26, 2021
    Assignee: Fortanix, Inc.
    Inventors: Jeffrey Seyfried, Jethro Gideon Beekman, Anand Kashyap
  • Publication number: 20200204357
    Abstract: A request to perform an operation with a cryptographic item may be received. A request for approval to perform the requested operation with the cryptographic item may be transmitted to a set of entities based on a policy associated with the cryptographic item. Indications of approval to perform the requested operation may be received from corresponding entities of the set of entities. A determination as to whether a number of the received indications of approval to perform the requested operation with the cryptographic item satisfies a threshold number may be made. In response to determining that the number of the received indications of approval from the corresponding entities of the set of entities satisfies the threshold number, the requested operation may be performed with the cryptographic item.
    Type: Application
    Filed: December 20, 2018
    Publication date: June 25, 2020
    Inventors: Jeffrey Seyfried, Jethro Gideon Beekman, Anand Kashyap
  • Patent number: 10686769
    Abstract: A first connection between a first network server and a second network server may be established where the first connection is based on a connection key stored at a secure location of the first network server. A request for one or more cryptographic keys may be transmitted from the first network server to the second network server. The first network server may receive the one or more cryptographic keys from the second network server over the first connection. The one or more cryptographic keys from the second server may be stored at the secure location of the first network server that is storing the connection key used to establish the first connection.
    Type: Grant
    Filed: August 7, 2017
    Date of Patent: June 16, 2020
    Assignee: FORTANIX, INC.
    Inventors: Anand Kashyap, Andrew Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman
  • Publication number: 20190158474
    Abstract: A request may be received from an application for a performance of an operation associated with a cryptographic key that is stored at a secure enclave. A plugin of the secure enclave may be identified from the request for performance of the operation. The operation associated with the cryptographic key may be performed by using the plugin of the secure enclave to generate an output within the secure enclave. The output generated within the secure enclave and based on the plugin may be provided to the application.
    Type: Application
    Filed: November 20, 2017
    Publication date: May 23, 2019
    Inventors: Anand Kashyap, Ambuj Kumar, Jethro Gideon Beekman, Jeffrey Seyfried
  • Publication number: 20190044929
    Abstract: A first connection between a first network server and a second network server may be established where the first connection is based on a connection key stored at a secure location of the first network server. A request for one or more cryptographic keys may be transmitted from the first network server to the second network server. The first network server may receive the one or more cryptographic keys from the second network server over the first connection. The one or more cryptographic keys from the second server may be stored at the secure location of the first network server that is storing the connection key used to establish the first connection.
    Type: Application
    Filed: August 7, 2017
    Publication date: February 7, 2019
    Inventors: Anand Kashyap, Andrew Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman