Patents by Inventor Kyle A. Stein
Kyle A. Stein has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8024392Abstract: A method, system, and apparatus for performing computations. In a method, arguments X and K are loaded into session memory, and X mod P and X mod Q are computed to give, respectively, XP and XQ. XP and XQ are exponentiated to compute, respectively, CP and CQ. CP and CQ are merged to compute C, which is then retrieved from the session memory. A system includes a computing device and at least one computational apparatus, wherein the computing device is configured to use the computational apparatus to perform accelerated computations. An apparatus includes a chaining controller and a plurality of computational devices. A first chaining subset of the plurality of computational devices includes at least two of the plurality of computational devices, and the chaining controller is configured to instruct the first chaining subset to operate as a first computational chain.Type: GrantFiled: May 9, 2007Date of Patent: September 20, 2011Assignee: nCipher Corporation LimitedInventors: Greg North, Scott Haban, Kyle Stein
-
Patent number: 7853014Abstract: A data encryption method performed with ring arithmetic operations using a residue number multiplication process wherein a first conversion to a first basis is done using a mixed radix system and a second conversion to a second basis is done using a mixed radix system. In some embodiments, a modulus C is be chosen of the form 2w?L, wherein C is a w-bit number and L is a low Hamming weight odd integer less than 2(w?1)/2. And in some of those embodiments, the residue mod C is calculated via several steps. P is split into 2 w-bit words H1 and L1. S1 is calculated as equal to L1+(H12x1)+(H12x2)+ . . . +(H12xk)+H1. S1 is split into two w-bit words H2 and L2. S2 is computed as being equal to L2+(H22x1)+(H22x2)+ . . . +(H22xk)+H2. S3 is computed as being equal to S2+(2x1+ . . . +2xk+1). And the residue is determined by comparing S3 to 2w. If S3<2w, then the residue equals S2. If S3?2w, then the residue equals S3?2w.Type: GrantFiled: February 27, 2007Date of Patent: December 14, 2010Assignee: nCipher Corporation LimitedInventors: George Robert Blakley, Rajat Datta, Oscar Mitchell, Kyle Stein
-
Publication number: 20090288998Abstract: A water separating fuel filter is provided with a sensor at its bottom portion which is not removable in a direction away from the housing structure of the filter mechanism. In other words, if the sensor is removable at all, it must be removed in a direction which requires the sensor to move through the cavity of the housing structure of the filter while preventing an internal end of the sensor from passing in a direction away from the cavity and through a portion of the wall of the housing structure through which the sensor extends during operation. This eliminates the likelihood of a sensor being inadvertently removed from the housing structure and not properly replaced prior to subsequent operation of a fuel system of an internal combustion engine. This, in turn, prevents the condition wherein an opening at the bottom portion of the fuel filter housing structure can allow liquid fuel to flow from the fuel system into the bilge of a watercraft.Type: ApplicationFiled: May 12, 2006Publication date: November 26, 2009Inventors: Matthew W. Jaeger, Kyle A. Stein
-
Publication number: 20090119358Abstract: A method, system, and apparatus for performing computations. In a method, arguments X and K are loaded into session memory, and X mod P and X mod Q are computed to give, respectively, XP and XQ. XP and XQ are exponentiated to compute, respectively, CP and CQ. CP and CQ are merged to compute C, which is then retrieved from the session memory. A system includes a computing device and at least one computational apparatus, wherein the computing device is configured to use the computational apparatus to perform accelerated computations. An apparatus includes a chaining controller and a plurality of computational devices. A first chaining subset of the plurality of computational devices includes at least two of the plurality of computational devices, and the chaining controller is configured to instruct the first chaining subset to operate as a first computational chain.Type: ApplicationFiled: May 9, 2007Publication date: May 7, 2009Inventors: Greg North, Scott Haban, Kyle Stein
-
Patent number: 7502468Abstract: A method and system for generating a cryptographically random number stream (100) is provided. A system includes a module (102) configured to provide at least two statistically random number streams (106) and (108) and an oscillator (104) operably coupled to the module (102). The oscillator (104) is configured to operate at a frequency which varies in response to physically unpredictable events and to select a current number from one of the at least two statistically random number streams (106) and (108) based on the oscillator's state. A process includes several steps. At least two statistically random number streams are provided (138). A current number is selected (140) from one of the at least two statistically random number streams based on the state of an oscillator operating at a frequency which varies in response to physically unpredictable events. The step of selecting (140) is repeated (142) to create the cryptographically random number stream.Type: GrantFiled: September 2, 2004Date of Patent: March 10, 2009Assignee: nCipher Corporation Ltd.Inventors: George Robert Blakley, Randall Findley, Richard Goble, Scott Herrington, Kyle Stein
-
Publication number: 20070206784Abstract: A data encryption method performed with ring arithmetic operations using a residue number multiplication process wherein a first conversion to a first basis is done using a mixed radix system and a second conversion to a second basis is done using a mixed radix system. In some embodiments, a modulus C is be chosen of the form 2w?L, wherein C is a w-bit number and L is a low Hamming weight odd integer less than 2(w?1)/2. And in some of those embodiments, the residue mod C is calculated via several steps. P is split into 2 w-bit words H1 and L1. S1 is calculated as equal to L1+(H12x1)+(H12x2)+ . . . +(H12xk)+H1. S1 is split into two w-bit words H2 and L2. S2 is computed as being equal to L2+(H22x1)+(H22x2)+ . . . +(H22xk)+H2. S3 is computed as being equal to S2+(2x1+ . . . +2xk+1). And the residue is determined by comparing S3 to 2w. If S3<2w, then the residue equals S2. If S3?2w, then the residue equals S3?2w.Type: ApplicationFiled: February 27, 2007Publication date: September 6, 2007Inventors: George Blakley, Rajat Datta, Oscar Mitchell, Kyle Stein
-
Patent number: 7233970Abstract: A method, system, and apparatus for performing computations. In a method, arguments X and K are loaded into session memory, and X mod P and X mod Q are computed to give, respectively, XP and XQ. XP and XQ are exponentiated to compute, respectively, CP and CQ. CP and CQ are merged to compute C, which is then retrieved from the session memory. A system includes a computing device and at least one computational apparatus, wherein the computing device is configured to use the computational apparatus to perform accelerated computations. An apparatus includes a chaining controller and a plurality of computational devices. A first chaining subset of the plurality of computational devices includes at least two of the plurality of computational devices, and the chaining controller is configured to instruct the first chaining subset to operate as a first computational chain.Type: GrantFiled: February 16, 2002Date of Patent: June 19, 2007Assignee: Cipher Corporation LimitedInventors: Greg North, Scott Haban, Kyle Stein
-
Patent number: 7218734Abstract: A data encryption method performed with ring arithmetic operations wherein a modulus C is be chosen of the form 2w?L, wherein C is a w-bit number and L is a low Hamming weight odd integer less than 2(w?1)/2. And in some of those embodiments, the residue mod C is calculated via several steps. P is split into 2 w-bit words H1 and L1. S1 is calculated as equal to L1+(H12x1)+(H12x2)+ . . . +(H12xk)+H1. S1 is split into two w-bit words H2 and L2. S2 is computed as being equal to L2+(H22x1)+(H22x2)+ . . . +(H22xk)+H2. S3 is computed as being equal to S2+(2x1+ . . . +2xk+1). And the residue is determined by comparing S3 to 2w. If S3<2w, then the residue equals S2. If S3?2w, then the residue equals S3?2w.Type: GrantFiled: February 5, 2002Date of Patent: May 15, 2007Assignee: nCiper Corporation LimitedInventors: George Robert Blakely, Rajat Datta, Oscar Mitchell, Kyle Stein
-
Publication number: 20050110399Abstract: A method and system for generating a cryptographically random number stream (100) is provided. A system includes a module (102) configured to provide at least two statistically random number streams (106) and (108) and an oscillator (104) operably coupled to the module (102). The oscillator (104) is configured to operate at a frequency which varies in response to physically unpredictable events and to select a current number from one of the at least two statistically random number streams (106) and (108) based on the oscillator's state. A process includes several steps. At least two statistically random number streams are provided (138). A current number is selected (140) from one of the at least two statistically random number streams based on the state of an oscillator operating at a frequency which varies in response to physically unpredictable events. The step of selecting (140) is repeated (142) to create the cryptographically random number stream.Type: ApplicationFiled: September 2, 2004Publication date: May 26, 2005Inventors: George Blakley, Randall Findley, Richard Goble, Scott Herrington, Kyle Stein
-
Publication number: 20030072442Abstract: A method, software, and device for encrypting data, exchanging keys, and processing data that includes exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m, wherein G is a fleeting multiplicand base, E is an enduring cisponent, B is a recurring multiplier, R is an enduring factor, and m is a persistent modulus. E may be a fixed characteristic of the cisponentiator. E may also be a power of 2. R may be fixed. In one of many possible combinations, E is a fixed characteristic of the cisponentiator, while R is fixed. In that case also, E may be a power of 2. Modulus m may be fixed. In one of many possible combinations, E is a fixed characteristic of the cisponentiator, R is fixed, and m is fixed. As one of many alternatives, data may be encrypted using asymmetric encryption.Type: ApplicationFiled: September 30, 2002Publication date: April 17, 2003Inventors: George Robert Blakley, Rajat Datta, Oscar R. Mitchell, Kyle Stein
-
Publication number: 20030044004Abstract: A data encryption method performed with ring arithmetic operations using a residue number multiplication process wherein a first conversion to a first basis is done using a mixed radix system and a second conversion to a second basis is done using a mixed radix system. In some embodiments, a modulus C is be chosen of the form 2w−L, wherein C is a w-bit number and L is a low Hamming weight odd integer less than 2(w−1)/2. And in some of those embodiments, the residue mod C is calculated via several steps. P is split into 2 w-bit words H1 and L1. S1 is calculated as equal to L1+(H12x1)+(H12x2)+ . . . +(H12xk)+H1. S1 is split into two w-bit words H2 and L2. S2 is computed as being equal to L2+(H22x1)+(H22x2)+ . . . +(H22xk)+H2. S3 is computed as being equal to S2+(2x1+ . . . +2xk+1). And the residue is determined by comparing S3 to 2w. If S3<2w, then the residue equals S2. If S3>2w, then the residue equals S3−2w.Type: ApplicationFiled: February 5, 2002Publication date: March 6, 2003Inventors: George Robert Blakley, Rajat Datta, Oscar Mitchell, Kyle Stein
-
Publication number: 20020191450Abstract: A method, system, and apparatus for performing computations.Type: ApplicationFiled: February 16, 2002Publication date: December 19, 2002Inventors: Greg North, Scott Haban, Kyle Stein