Patents by Inventor Luther Martin

Luther Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11953146
    Abstract: A mounting structure has characteristics, properties, or features that provide stability for the accessories mounted or supported in relation thereto. The mounting structure may be in the form of a rigid or a semi-rigid composition, which may be formed at least in part by, or sufficiently covered or coated with, a material having a damping capacity, or an ability to isolate an accessory for a vessel, a slotted track supported in relation to the vessel, or a mounting arrangement supported in relation to the vessel or the slotted track. The mounting structure may be in the form of an extension arm for offsetting the accessory laterally, crosswise or transversely in relation to the vessel, slotted track, or mounting arrangement. The extension arm may include, or carry, a surface, that is configured to interlock with a surface of a mating structure, namely, a mounting arrangement and/or an accessory or accessory mount.
    Type: Grant
    Filed: February 22, 2022
    Date of Patent: April 9, 2024
    Assignee: YakAttack LLC
    Inventors: Luther Cifers, III, Daniel Anderson Newman, Joey Martin Pruitt, John Aubrey Hipsher
  • Patent number: 11809493
    Abstract: A non-tokenized string is received. For example, a non-tokenized string could be a credit card number. The non-tokenized string is partitioned into a plurality of non-tokenized substrings. For example, if the credit card number is 16 digits long, it may be partitioned into substrings that are three, six, and seven digits in length. The non-tokenized substrings are used as an index into a plurality of lookup tables. As a result of the indexing, a plurality of tokenized substrings are retrieved. The plurality of tokenized substrings are combined into a tokenized string. The tokenized string is used as a token that represents the credit card number without disclosing the actual credit card number. The reverse of the above process can also occur.
    Type: Grant
    Filed: January 19, 2021
    Date of Patent: November 7, 2023
    Assignee: Micro Focus LLC
    Inventors: Luther Martin, Timothy Roake
  • Publication number: 20230205925
    Abstract: A computing device includes a processor and a machine-readable storage storing instructions. The instructions are executable by the processor to: receive an input string including sensitive data to be encrypted; identify a first portion and a second portion of the input string, the first portion comprising the sensitive data; select, from a plurality of hash functions, a hash function based on the second portion; and generate a hash value of the first portion using the selected hash function.
    Type: Application
    Filed: March 6, 2023
    Publication date: June 29, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Timothy ROAKE, Luther Martin
  • Patent number: 11636224
    Abstract: A computing device includes a processor and a machine-readable storage storing instructions. The instructions are executable by the processor to: receive an input string including sensitive data to be encrypted; identify a first portion and a second portion of the input string, the first portion comprising the sensitive data; select, from a plurality of hash functions, a hash function based on the second portion; and generate a hash value of the first portion using the selected hash function.
    Type: Grant
    Filed: December 19, 2019
    Date of Patent: April 25, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Timothy Roake, Luther Martin
  • Publication number: 20220229869
    Abstract: A non-tokenized string is received. For example, a non-tokenized string could be a credit card number. The non-tokenized string is partitioned into a plurality of non-tokenized substrings. For example, if the credit card number is 16 digits long, it may be partitioned into substrings that are three, six, and seven digits in length. The non-tokenized substrings are used as an index into a plurality of lookup tables. As a result of the indexing, a plurality of tokenized substrings are retrieved. The plurality of tokenized substrings are combined into a tokenized string. The tokenized string is used as a token that represents the credit card number without disclosing the actual credit card number. The reverse of the above process can also occur.
    Type: Application
    Filed: January 19, 2021
    Publication date: July 21, 2022
    Inventors: Luther Martin, Timothy Roake
  • Patent number: 11146397
    Abstract: A technique includes encrypting plaintext to provide a set of projective coordinates that represents a point of an abelian variety curve and represents ciphertext. The technique includes encoding the projective coordinates with metadata, which is associated with the ciphertext.
    Type: Grant
    Filed: October 31, 2017
    Date of Patent: October 12, 2021
    Assignee: Micro Focus LLC
    Inventors: Luther Martin, Timothy Roake, Cheryl He
  • Patent number: 11138338
    Abstract: A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values. Determining the pseudonym includes encrypting the given value to provide a first encrypted value; encrypting an attribute that is associated with the given value to provide a second encrypted value; and generating the pseudonym value based on the first encrypted value and the second encrypted value.
    Type: Grant
    Filed: March 20, 2018
    Date of Patent: October 5, 2021
    Assignee: Micro Focus LLC
    Inventors: Timothy Roake, Luther Martin
  • Patent number: 11115216
    Abstract: A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.
    Type: Grant
    Filed: March 20, 2018
    Date of Patent: September 7, 2021
    Assignee: MICRO FOCUS LLC
    Inventors: Luther Martin, Timothy Roake
  • Patent number: 11106821
    Abstract: A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.
    Type: Grant
    Filed: March 20, 2018
    Date of Patent: August 31, 2021
    Assignee: Micro Focus LLC
    Inventors: Timothy Roake, Luther Martin
  • Publication number: 20210192072
    Abstract: A computing device includes a processor and a machine-readable storage storing instructions. The instructions are executable by the processor to: receive an input string including sensitive data to be encrypted; identify a first portion and a second portion of the input string, the first portion comprising the sensitive data; select, from a plurality of hash functions, a hash function based on the second portion; and generate a hash value of the first portion using the selected hash function.
    Type: Application
    Filed: December 19, 2019
    Publication date: June 24, 2021
    Inventors: TImothy Roake, Luther Martin
  • Patent number: 10956610
    Abstract: A technique includes accessing data representing plaintext. The plaintext has a first string size. The technique includes using a table to retrieve data representing a token that corresponds to the plaintext. The table has an associated string lookup size smaller than the first string size.
    Type: Grant
    Filed: March 6, 2018
    Date of Patent: March 23, 2021
    Assignee: MICRO FOCUS LLC
    Inventors: Luther Martin, Timothy Roake
  • Patent number: 10892890
    Abstract: In some examples, with respect to hash offset based key version embedding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and hashed encrypted data may be generated by performing a hash operation on the encrypted data. Further, offset hashed encrypted data may be generated by embedding the key version into the hashed encrypted data, and the offset hashed encrypted data including the embedded key version may be stored.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: January 12, 2021
    Assignee: MICRO FOCUS LLC
    Inventors: Timothy Roake, Cheryl He, Luther Martin
  • Patent number: 10796006
    Abstract: In some examples, geographical track data obfuscation may include ascertaining geographical data points that include a first data point and subsequent data points. For each of the subsequent data points, a delta degree value may be determined as a difference between a subsequent data point and a corresponding previous data point. A first format preserving encryption (FPE) may be applied to encrypt longitude and latitude values of the first data point. A second FPE may be applied by applying a translation of a plurality of translations to encrypt each delta degree value. A total distance traveled, a total time, and/or a total elevation gain may be extracted from the encrypted first data point and the encrypted delta degree values.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: October 6, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Timothy Roake, Cheryl He, Luther Martin
  • Patent number: 10749674
    Abstract: In one example, a system for format preserving encryption utilizing a key version can include a processor, and a memory resource storing instructions executable by the processor to determine a quantity of significant bits for a value to be encrypted, mask the value to include the quantity of significant bits, perform format preserving encryption on the masked value to generate an encrypted value, and append a key version to the encrypted value.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: August 18, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Timothy Roake, Cheryl He, Luther Martin
  • Patent number: 10630470
    Abstract: In some examples, with respect to zone based key version encoding, data that is to be encrypted may be ascertained, and a key, including a key version, that is to be used to encrypt the ascertained data may be ascertained. Encrypted data may be generated by encrypting the ascertained data based on the ascertained key, and a zone representing the key version may be determined. Further, encrypted zoned data may be generated by applying the determined zone to the encrypted data to encode the key version, and the encrypted zoned data including the encoded key version may be stored.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: April 21, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Cheryl He, Timothy Roake, Luther Martin
  • Patent number: 10505714
    Abstract: In some examples, floating point cohort based encryption may include determining an exponent of a floating point cohort.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: December 10, 2019
    Assignee: MICRO FOCUS LLC
    Inventors: Cheryl He, Timothy Roake, Luther Martin
  • Patent number: 10467405
    Abstract: Format preserving encryption of floating point data is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to receive floating point data to be secured, where the floating point data comprises a sign bit, exponent bits and fraction bits. A format preserving encryption (FPE) is applied to the received data, where the FPE is applied separately to the sign bit, the exponent bits and the fraction bits to generate an encrypted floating point data comprising an encrypted sign bit, encrypted exponent bits and encrypted fraction bits. The encrypted floating point data is provided to a service provider as a secure representative of the received data.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: November 5, 2019
    Assignee: Micro Focus LLC
    Inventors: Luther Martin, Timothy Roake
  • Patent number: 10452564
    Abstract: Format preserving encryption of object code is disclosed. One example is a system including at least one processor and a memory storing instructions executable by the at least one processor to identify object code to be secured, where the object code comprises a list of instructions, each instruction comprising an opcode and zero or more parameters. A format preserving encryption (FPE) is applied to the received object code, where the FPE is applied separately to a sub-plurality of instructions in the list of instructions, to generate an encrypted object code comprising a sub-plurality of encrypted instructions. An encrypted object code is provided to a service provider, where the encrypted object code comprises the sub-plurality of encrypted instructions, and any unencrypted portions of the object code.
    Type: Grant
    Filed: April 25, 2017
    Date of Patent: October 22, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Luther Martin, Timothy Roake
  • Publication number: 20190294821
    Abstract: A technique includes accessing data that represents a plurality of values that are associated with a plurality of ranges. The technique includes determining a pseudonym value for a given value, where the given value is associated with a given range and determining the pseudonym includes encrypting the given value to provide the pseudonym value; controlling the encryption to cause the pseudonym value to be within the given range; and tweaking the encryption based on an attribute that is associated with the given value.
    Type: Application
    Filed: March 20, 2018
    Publication date: September 26, 2019
    Inventors: Timothy Roake, Luther Martin
  • Publication number: 20190296914
    Abstract: A technique includes converting a plurality of plaintext values to a corresponding plurality of pseudonym values. The conversion includes performing encryption of the plurality of plaintext values to provide a plurality of second values; perturbing the plurality of second values to provide the plurality of pseudonym values; and controlling the perturbing to cause an ordering of the plaintext values to be represented in the plurality of pseudonym values.
    Type: Application
    Filed: March 20, 2018
    Publication date: September 26, 2019
    Inventors: Luther Martin, Timothy Roake