Patents by Inventor Juan Garay
Juan Garay has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12137166Abstract: A method includes receiving, at a broker processor and from a prover processor, a user request, a user token, and a user cryptographic zero-knowledge proof associated with a user characteristic. The method also includes receiving, at the broker processor, from a service processor, and based on the user request, a requirements specification and the user token. The method also includes generating, via the broker processor, a broker cryptographic zero-knowledge proof based on the requirements specification and the user cryptographic zero-knowledge proof. The method also includes transmitting, via the broker processor and to the service processor, the broker cryptographic zero-knowledge proof to cause the service processor to fulfill the user request.Type: GrantFiled: October 12, 2023Date of Patent: November 5, 2024Assignee: Khosla Ventures LLCInventors: Ricardo Baeza-Yates, Juan Garay, Sebastián Pablo Acuña Keller, Andrés Felipe Villavicencio Theodoluz, Sebastián Andrés Gálvez Ortiz
-
Patent number: 10637652Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.Type: GrantFiled: May 20, 2019Date of Patent: April 28, 2020Assignee: Oath Inc.Inventors: Juan Garay, Payman Mohassel, David Gil
-
Patent number: 10461932Abstract: The present teaching relates to adjustable one-time password (OTP) setup, sign-in, and verification. In one example, a first length of a signature is determined. The signature has been used previously by a first user to initially sign in a second device. A second length that is different from the first length is determined. A signing key is generated based at least partially on the second length. A new signature having the second length is generated based on the signing key. The new signature is provided to a second user so that the second user can input at least a portion of the new signature into the second device for a subsequent sign in. The verification key is generated based at least partially on the new signature. The new signature input by the second user into the second device is transmitted from the second device to the third device.Type: GrantFiled: March 8, 2016Date of Patent: October 29, 2019Assignee: Oath Inc.Inventors: Payman Mohassel, Juan Garay, Xiong Fan
-
Publication number: 20190273608Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.Type: ApplicationFiled: May 20, 2019Publication date: September 5, 2019Inventors: Juan Garay, Payman Mohassel, David Gil
-
Patent number: 10333700Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.Type: GrantFiled: August 6, 2018Date of Patent: June 25, 2019Assignee: OATH INC.Inventors: Juan Garay, Payman Mohassel, David Gil
-
Publication number: 20180343112Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.Type: ApplicationFiled: August 6, 2018Publication date: November 29, 2018Inventors: Juan Garay, Payman Mohassel, David Gil
-
Patent number: 10069623Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.Type: GrantFiled: September 14, 2015Date of Patent: September 4, 2018Assignee: OATH INC.Inventors: Juan Garay, Payman Mohassel, David Gil
-
Publication number: 20170264436Abstract: The present teaching relates to adjustable one-time password (OTP) setup, sign-in, and verification. In one example, a first length of a signature is determined. The signature has been used previously by a first user to initially sign in a second device. A second length that is different from the first length is determined. A signing key is generated based at least partially on the second length. A new signature having the second length is generated based on the signing key. The new signature is provided to a second user so that the second user can input at least a portion of the new signature into the second device for a subsequent sign in. The verification key is generated based at least partially on the new signature. The new signature input by the second user into the second device is transmitted from the second device to the third device.Type: ApplicationFiled: March 8, 2016Publication date: September 14, 2017Inventors: Payman Mohassel, Juan Garay, Xiong Fan
-
Publication number: 20170078090Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.Type: ApplicationFiled: September 14, 2015Publication date: March 16, 2017Applicant: Yahoo! Inc.Inventors: Juan Garay, Payman Mohassel, David Gil
-
Patent number: 9003519Abstract: The present disclosure relates to verifying transactions using user devices. A client device used to complete a transaction with a server computer. The client device communicates with a user device such as a smart phone, laptop computer, or other computing device. The user device communicates with the client device and a verification server via the out-of-band communication channel. The verification server receives two or more copies of session data associated with the transaction occurring between the client device and the server computer. One copy of the session data is received from the server computer and another copy of the session data is provided by the user device. The two copies of the session data are compared by the verification server or by the user device, and mismatches are reported as suspected malicious software attacks.Type: GrantFiled: May 16, 2011Date of Patent: April 7, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Ilija Zeljkovic, Juan Garay
-
Publication number: 20120297476Abstract: The present disclosure relates to verifying transactions using user devices. A client device used to complete a transaction with a server computer. The client device communicates with a user device such as a smart phone, laptop computer, or other computing device. The user device communicates with the client device and a verification server via the out-of-band communication channel. The verification server receives two or more copies of session data associated with the transaction occurring between the client device and the server computer. One copy of the session data is received from the server computer and another copy of the session data is provided by the user device. The two copies of the session data are compared by the verification server or by the user device, and mismatches are reported as suspected malicious software attacks.Type: ApplicationFiled: May 16, 2011Publication date: November 22, 2012Inventors: Ilija Zeljkovic, Juan Garay
-
Publication number: 20110153503Abstract: An authorization device includes an input module, a key generator, and an output module. The input module receives a request to authorize a transaction between a mobile device and a merchant terminal. The key generator generates a key used for authorizing the transaction. The key relates only to the transaction. The output module transmits an authorization for the transaction that is based on a processing of the key.Type: ApplicationFiled: December 23, 2009Publication date: June 23, 2011Inventors: Charles Blewett, Megan Blewett, Juan Garay, Robert Haarde, Thomas Killian, Simon Urbanek
-
Publication number: 20060090209Abstract: A method and apparatus are disclosed for evaluating the security of at least one client. An executable program is executed by the client being evaluated. A result is received from the executable program and an evaluation of the result indicates whether the client has been corrupted. The executable program is one of a plurality of possible programs. The result may be evaluated based on an elapsed time between when the executable program is provided to the client and when the result is received. The executable program may include at least one function that writes to a memory of the client. A program blinding technique is also disclosed to generate executable programs.Type: ApplicationFiled: October 27, 2004Publication date: April 27, 2006Inventors: Juan Garay, Lorenz Huelsbergen
-
Publication number: 20050178387Abstract: A hyperbaric oxygen therapy system includes a pressure vessel containing a gas, an oxygen concentration measurement apparatus for monitoring the concentration of oxygen in the gas, an environmental control apparatus for controlling the temperature of the gas in the vessel, and a pressure/ventilation control apparatus for controlling the pressure of the gas in the vessel. The pressure vessel is capable of accommodating a patient. The oxygen concentration measurement apparatus includes an oxygen concentration analyzer and a plurality of gas lines connecting the oxygen analyzer to the pressure vessel. The pressure/ventilation control apparatus includes a pressure controlling valve, a pressure sensor, a ventilation valve, and a controller having a programmable pressure profile. The environmental control apparatus includes a scrubber, a heat exchanger and a blower located within the pressure vessel. A compressor for the system includes a compressor silencer.Type: ApplicationFiled: April 8, 2005Publication date: August 18, 2005Inventors: William Gurnee, Juan Garay
-
Publication number: 20050161039Abstract: A latching mechanism for a pressure chamber for hypobaric use is disclosed. The mechanism includes one or more pin modules positioned on a periphery of a door of the pressure chamber, the door being adapted to open into the chamber and abut a frame of the pressure chamber when the door is in a closed position. The mechanism further includes an actuator for selectively engaging or disengaging the pin with the frame. The pin module may include a pin adapted to be selectively positioned in an engaged or a disengaged position. The pin in the engaged position extends from the door to the frame of the pressure chamber, thereby preventing the door from opening into the chamber. The pin module includes a cylinder for actuating the pin. The cylinder may be a pneumatic cylinder operated with pneumatic pressure. The pneumatic cylinder of each of the pin modules may be centrally actuated.Type: ApplicationFiled: June 10, 2004Publication date: July 28, 2005Inventors: William Gurnee, Juan Garay
-
Publication number: 20050018847Abstract: A method and system for a fair exchange of user information over a network is disclosed. The method comprises the steps of: transmitting over the network the user information encoded in association with a hidden value selected as one of a plurality of values distributed in a sequence wherein a difference between adjacent ones of said values increases and decreases symmetrically about one of the values of a known order; transmitting over said network a first set of the values and a last value in the sequence, wherein the values in said first set have increasing differences between adjacent ones of the values; and transmitting, individually, and in response to receipt of the other user's values, the remaining values in said sequence.Type: ApplicationFiled: June 30, 2003Publication date: January 27, 2005Inventors: Juan Garay, Carl Pomerance