Patents by Inventor Kara Lynn Coppa
Kara Lynn Coppa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9906506Abstract: A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.Type: GrantFiled: June 20, 2017Date of Patent: February 27, 2018Assignee: Wickr Inc.Inventors: Christopher Howell, Robert Statica, Kara Lynn Coppa
-
Patent number: 9876772Abstract: A message having at least one intended recipient is encrypted using a first key. The first key is encrypted with a second key associated with the recipient. At least two of the encrypted message, the encrypted first key, and an identifier associated with the at least one recipient are encapsulated in a secure communication protocol encapsulation. The secure communication protocol encapsulation is transmitted to a server.Type: GrantFiled: July 2, 2015Date of Patent: January 23, 2018Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 9866591Abstract: A secure messaging platform for an enterprise environment is disclosed. The secure messaging platform enables users to exchange encrypted communications. Further, the secure messaging platform allows enterprise platforms to review the encrypted communications to ensure that they comply with company policies. Messages that comply with company policies may be provided to their intended recipients, while messages that fail to comply with company policies are not provided to their intended recipients. Additionally, the encrypted communications may be retained for a predetermined time.Type: GrantFiled: July 28, 2015Date of Patent: January 9, 2018Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Patent number: 9830089Abstract: Digital data sanitization is disclosed. An indication that a data sanitization process should be performed is received. The data sanitization process is performed. Performing the data sanitization process includes determining an amount of free space on a storage device. Performing the data sanitization process further includes performing a set of one or more write operations, where performing the write operations decreases the amount of free space on the storage of the device.Type: GrantFiled: June 24, 2014Date of Patent: November 28, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa, Thomas Michael Leavy
-
Patent number: 9729315Abstract: A public/private key pair is generated on a client device for an application. A device identifier for the client device is generated. An application identifier for the application is generated on the client device. At least one of the public key, the device identifier, and the application identifier are transmitted to a server.Type: GrantFiled: July 2, 2015Date of Patent: August 8, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 9716714Abstract: A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.Type: GrantFiled: December 15, 2016Date of Patent: July 25, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Patent number: 9667417Abstract: A digital security bubble encapsulation is received from a sender. The encrypted digital security bubble encapsulation includes an encrypted message, an encrypted first key, and an identifier associated with an intended recipient. The encrypted digital security bubble encapsulation is decrypted. The received identifier and a device identifier are compared. The encrypted first key is decrypted in response to a determination that the identifier received in the digital security bubble encapsulation matches the device identifier. The encrypted message is decrypted using the first key.Type: GrantFiled: July 2, 2015Date of Patent: May 30, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 9584316Abstract: A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.Type: GrantFiled: January 8, 2015Date of Patent: February 28, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 9584530Abstract: A variety of techniques for performing identity verification are disclosed. As one example, a verification request is received from a remote user. The verification request pertains to a cryptographic key. In response to receiving a confirmation from a local user of the local device, a verification process is initiated. A result of the verification process is transmitted to the remote user. As a second example, a verification request can be received at the local device, from a local user of the device. A verification process with respect to the local user is initiated, and a result of the verification process is transmitted to a remote user that is different from the local user.Type: GrantFiled: June 24, 2015Date of Patent: February 28, 2017Assignee: Wickr Inc.Inventors: Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Publication number: 20170053248Abstract: Techniques for determining whether to allow access to a calendar invite and a meeting are disclosed. In this regard, a calendar invite and meeting message are received from a sender. A first time-to-live (TTL) value and a second TTL value associated with the calendar invite and meeting, respectively, are determined. A determination is made that the first and second TTL values have not been exceeded and, if they have not, allowing access to the calendar invite and the meeting. However, when the TTL values have been exceeded, denying access to the calendar invite and the meeting.Type: ApplicationFiled: September 30, 2015Publication date: February 23, 2017Inventors: Lauren Wakefield, Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Publication number: 20170046646Abstract: Techniques for determining whether to allow access to a calendar invite and a meeting are disclosed. In this regard, a calendar invite and meeting message are received from a sender. A first time-to-live (TTL) value and a second TTL value associated with the calendar invite and meeting, respectively, are determined. A determination is made that the first and second TTL values have not been exceeded and, if they have not, allowing access to the calendar invite and the meeting. However, when the TTL values have been exceeded, denying access to the calendar invite and the meeting.Type: ApplicationFiled: January 28, 2016Publication date: February 16, 2017Inventors: Lauren Wakefield, Robert Statica, Christopher A. Howell, Kara Lynn Coppa
-
Publication number: 20160072785Abstract: A public/private key pair is generated on a client device for an application. A device identifier for the client device is generated. An application identifier for the application is generated on the client device. At least one of the public key, the device identifier, and the application identifier are transmitted to a server.Type: ApplicationFiled: July 2, 2015Publication date: March 10, 2016Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 8954726Abstract: A digital security bubble encapsulation is disclosed. A first key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a second key. The second key is encrypted using the first key. The encrypted message, the encrypted second key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.Type: GrantFiled: November 25, 2013Date of Patent: February 10, 2015Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell
-
Patent number: 8625805Abstract: A digital security bubble encapsulation is disclosed. A public key and a device identifier of at least one recipient is requested from a first server. A message containing one or more components is encrypted using a symmetric key. The symmetric key is encrypted with a public key received in response to the request. The encrypted message, the encrypted symmetric key, and the device identifier are encapsulated in a digital security bubble encapsulation. The digital security bubble encapsulation is transmitted to a second server.Type: GrantFiled: July 15, 2013Date of Patent: January 7, 2014Assignee: Wickr Inc.Inventors: Robert Statica, Kara Lynn Coppa, Christopher A. Howell