Patents by Inventor John Launchbury

John Launchbury has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8145900
    Abstract: This disclosure relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data stored at the physical location on the storage device indicated by the pointer. Preferably the only data accessible in an unencrypted form is contained in cells that are reachable from root-set crypto-pointers. Once the crypto-pointer associated with a particular memory cell is deleted, normally by overwriting or explicitly zeroing the crypto-pointer, the contents of the memory cell become inaccessible because the data stored at that cell is in encrypted form (cipher text) and the crypto-pointer that included the cryptographic key for decrypting the cipher text has been deleted from the system.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: March 27, 2012
    Assignee: Galois, Inc.
    Inventors: John Launchbury, Thomas Nordin
  • Publication number: 20070136607
    Abstract: This disclosure relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data stored at the physical location on the storage device indicated by the pointer. Preferably the only data accessible in an unencrypted form is contained in cells that are reachable from root-set crypto-pointers. Once the crypto-pointer associated with a particular memory cell is deleted, normally by overwriting or explicitly zeroing the crypto-pointer, the contents of the memory cell become inaccessible because the data stored at that cell is in encrypted form (cipher text) and the crypto-pointer that included the cryptographic key for decrypting the cipher text has been deleted from the system.
    Type: Application
    Filed: February 26, 2007
    Publication date: June 14, 2007
    Applicant: Galois Connections, Inc.
    Inventors: John Launchbury, Thomas Nordin
  • Patent number: 7227946
    Abstract: In a computing system, a method of operation comprises receiving a first permutation specification of a first permutation of a first plurality of inputs, receiving a first permutation modifier and receiving a first interaction specification of a first interaction between first permutation and the first permutation modifier. A second permutation specification of a second permutation of the first plurality of inputs is generated, the second permutation being a composite permutation of the first permutation and the permutation modifier, reflective of the first specified interaction between the first permutation and the first permutation modifier.
    Type: Grant
    Filed: April 16, 2004
    Date of Patent: June 5, 2007
    Assignees: Oregon Health & Science University, National Security Agency
    Inventors: John Launchbury, Thomas Nordin, Mark Tullsen, William Bradley Martin
  • Patent number: 7185205
    Abstract: The present invention relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data stored at the physical location on the storage device indicated by the pointer. Preferably the only data accessible in an unencrypted form is contained in cells that are reachable from root-set crypto-pointers. Once the crypto-pointer associated with a particular memory cell is deleted, normally by overwriting or explicitly zeroing the crypto-pointer, the contents of the memory cell become inaccessible because the data stored at that cell is in encrypted form (cipher text) and the crypto-pointer that included the cryptographic key for decrypting the cipher text has been deleted from the system.
    Type: Grant
    Filed: March 26, 2002
    Date of Patent: February 27, 2007
    Assignee: Galois Connections, Inc.
    Inventors: John Launchbury, Thomas Nordin
  • Publication number: 20050036608
    Abstract: In a computing system, a method of operation comprises receiving a first permutation specification of a first permutation of a first plurality of inputs, receiving a first permutation modifier and receiving a first interaction specification of a first interaction between first permutation and the first permutation modifier. A second permutation specification of a second permutation of the first plurality of inputs is generated, the second permutation being a composite permutation of the first permutation and the permutation modifier, reflective of the first specified interaction between the first permutation and the first permutation modifier.
    Type: Application
    Filed: April 16, 2004
    Publication date: February 17, 2005
    Inventors: John Launchbury, Thomas Nordin, Mark Tullsen, William Martin
  • Publication number: 20030037248
    Abstract: The present invention relates to pairing of a different cryptographic key with each pointer in a data structure to form a crypto-pointer. The cryptographic key is used to encrypt the contents of all data stored at the physical location on the storage device indicated by the pointer. Preferably the only data accessible in an unencrypted form is contained in cells that are reachable from root-set crypto-pointers. Once the crypto-pointer associated with a particular memory cell is deleted, normally by overwriting or explicitly zeroing the crypto-pointer, the contents of the memory cell become inaccessible because the data stored at that cell is in encrypted form (cipher text) and the crypto-pointer that included the cryptographic key for decrypting the cipher text has been deleted from the system.
    Type: Application
    Filed: March 26, 2002
    Publication date: February 20, 2003
    Inventors: John Launchbury, Thomas Nordin