Patents by Inventor Louie GASPARINI

Louie GASPARINI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220345298
    Abstract: Systems and methods for handshaking, without a certificate authority, to provide at least post-quantum communications security over a computer network. The method generates an authentication tag, hashing, by an initiator, a concatenation of unique identifiers of the initiator and a recipient. The method also generates an encrypted text, symmetrically encrypting, by the initiator that is configured to use a shared secret, a concatenation of the authentication tag and the unique identifiers of the initiator and the recipient. The method further includes sending the encrypted text from the initiator to a server. The method also includes symmetrically decrypting, by the server that is configured to use the shared secret, the encrypted text. The method further includes authenticating, by the server, the encrypted text. The method also includes generating a session key and providing the session key from the server to the initiator.
    Type: Application
    Filed: January 24, 2022
    Publication date: October 27, 2022
    Inventors: Chris Cap, Barry Van Hooser, Sarah McCarthy, Louie Gasparini
  • Publication number: 20220052846
    Abstract: A computer-implemented method for escrowing secret data in a server of a client-server network, the client-server network comprising: a first client having at least one public and private client key pairs, at least one trusted client having at least one public and private trusted client key pairs, a server having a public and private server key pairs, a blockchain system comprising a plurality of nodes which are configured to store the public keys of the elements of the client-server network. It is also described a computer-implemented method for obtaining secret data of a server wherein the secret data is escrowed with the above computer-implemented method for escrowing secret data in a server. System, computer-readable mediums and computer programs, which are configured to implement or perform said computer-implemented methods, are also described.
    Type: Application
    Filed: October 29, 2021
    Publication date: February 17, 2022
    Inventors: Jesus Diaz Vico, Carlos Kuchkovsky Jimenez, Louie Gasparini
  • Patent number: 11212094
    Abstract: A computer-implemented method for escrowing secret data in a server of a client-server network, the client-server network comprising: a first client having at least one public and private client key pairs, at least one trusted client having at least one public and private trusted client key pairs, a server having a public and private server key pairs, a blockchain system comprising a plurality of nodes which are configured to store the public keys of the elements of the client-server network. It is also described a computer-implemented method for obtaining secret data of a server wherein the secret data is escrowed with the above computer-implemented method for escrowing secret data in a server. System, computer-readable mediums and computer programs, which are configured to implement or perform said computer-implemented methods, are also described.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: December 28, 2021
    Assignee: Banco Bilbao Vizcaya Argentaria, S.A.
    Inventors: Jesus Diaz Vico, Carlos Kuchkovsky Jimenez, Louie Gasparini
  • Publication number: 20200295934
    Abstract: A computer-implemented method for escrowing secret data in a server of a client-server network, the client-server network comprising: a first client having at least one public and private client key pairs, at least one trusted client having at least one public and private trusted client key pairs, a server having a public and private server key pairs, a blockchain system comprising a plurality of nodes which are configured to store the public keys of the elements of the client-server network. It is also described a computer-implemented method for obtaining secret data of a server wherein the secret data is escrowed with the above computer-implemented method for escrowing secret data in a server. System, computer-readable mediums and computer programs, which are configured to implement or perform said computer-implemented methods, are also described.
    Type: Application
    Filed: September 27, 2018
    Publication date: September 17, 2020
    Inventors: Jesus Diaz Vico, Carlos Kuchkovsky Jimenez, Louie Gasparini
  • Patent number: 9992215
    Abstract: A system for identifying a network intrusion includes four modules. The first module monitors network transmissions and creates a model of regular network activity. The second module receives the model of regular network activity and sets a threshold for irregular usage based on the model. The third module receives the threshold, compares a value of a candidate inter-nodal transmission of the network to the threshold, and identifies a potential intrusion when the value exceeds the threshold. The fourth module analyzes a transmission behavior of one or more nodes of the candidate inter-nodal transmission and identifies the network intrusion.
    Type: Grant
    Filed: October 2, 2014
    Date of Patent: June 5, 2018
    Assignee: Webroot Inc.
    Inventors: Hossein Eslambolchi, Louie Gasparini, Chandra Madhekar, William Wright
  • Publication number: 20160255104
    Abstract: A system for identifying a network intrusion includes four modules. The first module monitors network transmissions and creates a model of regular network activity. The second module receives the model of regular network activity and sets a threshold for irregular usage based on the model. The third module receives the threshold, compares a value of a candidate inter-nodal transmission of the network to the threshold, and identifies a potential intrusion when the value exceeds the threshold. The fourth module analyzes a transmission behavior of one or more nodes of the candidate inter-nodal transmission and identifies the network intrusion.
    Type: Application
    Filed: October 2, 2014
    Publication date: September 1, 2016
    Applicant: Cyberflow Analytics, Inc.
    Inventors: Hossein ESLAMBOLCHI, Louie GASPARINI, Chandra MADHEKAR, William WRIGHT