Patents by Inventor Mark D. Seaborn

Mark D. Seaborn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190296896
    Abstract: A computing device includes an interface configured to interface and communicate with a communication system, a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory that is configured to execute the operational instructions to perform various operations. The computing device processes an input value associated with a key based on a blinding key in accordance with an Oblivious Pseudorandom Function (OPRF) blinding operation to generate a blinded value and transmits it to another computing device (e.g., that is associated with a Key Management System (KMS) service). The computing device then receives a blinded key that is based on processing of the blinded value based on an OPRF using an OPRF secret. The computing device processes the blinded key based on the blinding key in accordance with the OPRF unblinding operation to generate the key (e.g., to be used for secure information access).
    Type: Application
    Filed: March 20, 2018
    Publication date: September 26, 2019
    Inventors: Jason K. Resch, Hugo M. Krawczyk, Mark D. Seaborn
  • Patent number: 10379778
    Abstract: A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by identifying, for data stored within a DSN memory, one or more encryption keys used to encrypt data stored within the DSN memory. The method continues by identifying, for data stored within a portion of the DSN memory requiring sanitization, a master key of the one or more encryption keys that encrypts all of the data stored within the portion to be sanitized. The method continues by determining, if the master key is not used to encrypt data stored outside of the portion to be sanitized. The method continues, if the master key is not used to encrypt data stored outside of the portion to be sanitized, by sanitizing the data stored within a portion of the DSN memory by erasing the master key.
    Type: Grant
    Filed: August 18, 2016
    Date of Patent: August 13, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Alan M. Frazier, Scott M. Horan, Shibhani Rai, Jason K. Resch, Mark D. Seaborn
  • Patent number: 10372380
    Abstract: A method includes retrieving a decode threshold number of encoded data slices, wherein codecs process, in an order, a data segment and the processed data segment is encoded into a set of encoded data slices. The method further includes decoding the decode threshold number of encoded data slices to recover the processed data segment. In a reversed order to the order, applying a first codec on the processed data segment to produce a first partially processed recovered data segment. When the first codec is a verifiable codec, the method further includes separating the first partially processed recovered data segment into an initial integrity value and a processed data segment. The method further includes calculating a new integrity value from the processed data segment. When the new integrity value substantially matches the initial integrity value, the method further includes indicating that the set of encoded data slices is authentic.
    Type: Grant
    Filed: March 1, 2017
    Date of Patent: August 6, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jason K. Resch, Mark D. Seaborn
  • Patent number: 10360391
    Abstract: Systems and methods for encrypting and decrypting data in a dispersed storage network are disclosed. One encryption approach involves generating a random encryption key (REK), producing encrypted data using the REK, determining a computed value (CV) using the encrypted data, and combining the REK, CV and a supplied encryption key (SEK) into an Encrypted Difference (ED). The encrypted data and ED are then combined to produce a secure package. The secure package is then processed by an error coding function and stored as slices. One decryption approach includes accessing the slices and the SEK, decoding the slices to recover the secure package, re-computing the CV from the encrypted data within the secure package, and using the SEK and CV to de-combine the ED and recover the REK. The REK is then used to decrypt the encrypted data. Integrity verification of the secure package may also be used.
    Type: Grant
    Filed: April 3, 2017
    Date of Patent: July 23, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jason K. Resch, Mark D. Seaborn
  • Patent number: 10326740
    Abstract: An encryption module encrypts starting data using a random key to produce encrypted data. A hash module performs a secure hash function on the encrypted data using a secret key to produce a hash value. Processing circuitry masks the random key using the hash value to produce a masked random key, and combines the encrypted data and the masked random key to produce a secure package. A distributed storage and task module encodes the secure package to produce a set of encoded data slices. The secret key and a decode threshold number of the encoded data slices included in the set of encoded data slices are sufficient to recover the secure package and the starting data. The set of encoded data slices is stored in a set of storage units.
    Type: Grant
    Filed: January 19, 2017
    Date of Patent: June 18, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jason K. Resch, Mark D. Seaborn, Ilya Volvovski
  • Publication number: 20190171394
    Abstract: A method begins by determining, by an authenticated device of a dispersed storage network (DSN), whether an access request from a requesting device is affiliated with an anonymous user or an authenticated user. When the requesting device is affiliated with the anonymous user, the method continues by determining, by the authenticated device, status of the anonymous user where the status of the anonymous user includes one of minimal threat, non-minimal threat, and significant threat. The method continues by processing, by the authenticated device, the access request in accordance with the status of the anonymous user.
    Type: Application
    Filed: January 24, 2019
    Publication date: June 6, 2019
    Inventors: Jason K. Resch, Mark D. Seaborn, Ilya Volvovski
  • Publication number: 20190171524
    Abstract: Methods and apparatus for isolating the introduction of software defects in a dispersed storage network (DSN) are disclosed. In various embodiments, a search strategy is employed whereby after identifying a test failure in a current version of the memory software code, a sequence of interim versions of the code between the current version of the memory software code and a previous successfully tested version of the code is determined. A first version of the memory software code is selected from the sequence of interim versions (e.g., from the middle of or approximately in the middle of the sequence) and tested. When testing of the first version does not result in a test failure, a second version of the memory software code is tested, the second version selected from a sub-sequence of the sequence of interim versions between the first version of the code and the current version of the code.
    Type: Application
    Filed: January 28, 2019
    Publication date: June 6, 2019
    Inventors: Teague S. Algie, Andrew G. Peake, Mark D. Seaborn, Ilya Volvovski
  • Patent number: 10255133
    Abstract: A dispersed storage network facilitates isolating the introduction of software defects in dispersed storage units. A search strategy is employed whereby after identifying a test failure in a current version of the memory software code, a code version since a previous successfully tested version is identified. An interim version that represents the point at which approximately one half the changes were introduced is then tested. When there is a test failure, the next interim version selected for testing represents the point at which approximately one half the changes were introduced between the first interim version tested and the current version. If no failure, a next interim version is tested that represents the point at which approximately one half the changes were introduced between the previous successfully tested version and the first interim version tested.
    Type: Grant
    Filed: August 26, 2016
    Date of Patent: April 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Teague S. Algie, Andrew G. Peake, Mark D. Seaborn, Ilya Volvovski
  • Patent number: 10241697
    Abstract: A method begins by receiving, by an authenticated device of a dispersed storage network (DSN), an access request from a requesting device. The method continues by determining, by the authenticated device, whether the requesting device is affiliated with an anonymous user or an authenticated user. When the requesting device is affiliated with the anonymous user, the method continues by determining, by the authenticated device, status of the anonymous user. When the status of the anonymous user is of minimal threat to the DSN, the method continues by granting, by the authenticated device, temporary credentials and temporary access privileges to the anonymous user for use by the requesting device. The method continues by processing, by the authenticated device, the access request in accordance with the temporary credentials and the temporary access privileges.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: March 26, 2019
    Assignee: International Business Machines Corporation
    Inventors: Jason K. Resch, Mark D. Seaborn, Ilya Volvovski
  • Publication number: 20180351740
    Abstract: A method begins by determining an encryption change regarding one or more sets of encrypted encoded data slices stored in storage units of a dispersed storage network (DSN). The method continues by updating an encryption file to include information regarding one or more of level of encryption, new encryption keys, new encryption key identifiers, and previous encryption file information. The method continues by dispersed storage error encoding the updated encryption file to produce a set of encoded encryption file slices (EEFSs) and outputting the set of EEFSs to a set of storage units of the DSN. The method continues by retrieving EEFSs from the set of storage units, recovering the updated encryption file from the EEFSs. The method continues by re-encrypting the encrypted encoded data slice based on the new encryption key to produce a re-encrypted encoded data slice and storing the re-encrypted encoded data slice in the storage units.
    Type: Application
    Filed: June 1, 2017
    Publication date: December 6, 2018
    Inventors: Adam M. Gray, Wesley B. Leggette, Jason K. Resch, Mark D. Seaborn
  • Publication number: 20180285582
    Abstract: Systems and methods for encrypting and decrypting data in a dispersed storage network are disclosed. One encryption approach involves generating a random encryption key (REK), producing encrypted data using the REK, determining a computed value (CV) using the encrypted data, and combining the REK, CV and a supplied encryption key (SEK) into an Encrypted Difference (ED). The encrypted data and ED are then combined to produce a secure package. The secure package is then processed by an error coding function and stored as slices. One decryption approach includes accessing the slices and the SEK, decoding the slices to recover the secure package, re-computing the CV from the encrypted data within the secure package, and using the SEK and CV to de-combine the ED and recover the REK. The REK is then used to decrypt the encrypted data. Integrity verification of the secure package may also be used.
    Type: Application
    Filed: April 3, 2017
    Publication date: October 4, 2018
    Inventors: Jason K. Resch, Mark D. Seaborn
  • Publication number: 20180270060
    Abstract: Systems and Methods for encrypting and decrypting data in a dispersed storage network are disclosed. A data object may be encrypted using a data object specific encryption key, a container specific encryption key, a tenant account specific encryption key, or a time based encryption key. This specific, or more generally, secondary encryption key can be derived from a master or primary encryption key. Encryption key metadata pertaining to the master encryption key and the specific encryption key is also created and stored in the DSN. When reading an encrypted data object, the master encryption key can be retrieved and, along with the encryption key metadata, used to derive the specific encryption key. The specific encryption key can then be used to decrypt the encrypted data object to recover the data object.
    Type: Application
    Filed: March 17, 2017
    Publication date: September 20, 2018
    Inventors: Adam M. Gray, Harsha Hegde, Wesley B. Leggette, Manish Motwani, Jason K. Resch, Daniel J. Scholl, Mark D. Seaborn, Rohan P. Shah, Yogesh R. Vedpathak
  • Publication number: 20180254784
    Abstract: A method includes retrieving a decode threshold number of encoded data slices, wherein codecs process, in an order, a data segment and the processed data segment is encoded into a set of encoded data slices. The method further includes decoding the decode threshold number of encoded data slices to recover the processed data segment. In a reversed order to the order, applying a first codec on the processed data segment to produce a first partially processed recovered data segment. When the first codec is a verifiable codec, the method further includes separating the first partially processed recovered data segment into an initial integrity value and a processed data segment. The method further includes calculating a new integrity value from the processed data segment. When the new integrity value substantially matches the initial integrity value, the method further includes indicating that the set of encoded data slices is authentic.
    Type: Application
    Filed: March 1, 2017
    Publication date: September 6, 2018
    Inventors: Jason K. Resch, Mark D. Seaborn
  • Publication number: 20180063090
    Abstract: A dispersed storage network (DSN) includes a DSN memory, which in turn employs multiple distributed storage (DS) units to store encrypted secret material that can be decrypted using an unlock key. The unlock key is stored external to the DS unit, in some cases using multiple data slices dispersed throughout the DSN. To obtain the unlock key, the DS unit transmits authentication credentials to another device included in the DSN, but external to the DS unit. The other device authenticates the DS unit using the authentication credentials, and sends the unlock key to the DS unit. The DS unit uses the unlock key in normal decryption operations. In response to a security event, the DS unit transitions to a secure mode by erasing any material decrypted using the unlock key, the unlock key, and the DS unit's authentication credentials.
    Type: Application
    Filed: August 29, 2016
    Publication date: March 1, 2018
    Inventors: Jason K. Resch, Mark D. Seaborn
  • Publication number: 20180052636
    Abstract: A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by identifying, for data stored within a DSN memory, one or more encryption keys used to encrypt data stored within the DSN memory. The method continues by identifying, for data stored within a portion of the DSN memory requiring sanitization, a master key of the one or more encryption keys that encrypts all of the data stored within the portion to be sanitized. The method continues by determining, if the master key is not used to encrypt data stored outside of the portion to be sanitized. The method continues, if the master key is not used to encrypt data stored outside of the portion to be sanitized, by sanitizing the data stored within a portion of the DSN memory by erasing the master key.
    Type: Application
    Filed: August 18, 2016
    Publication date: February 22, 2018
    Inventors: Alan M. Frazier, Scott M. Horan, Shibhani Rai, Jason K. Resch, Mark D. Seaborn
  • Publication number: 20170289173
    Abstract: A method begins by receiving, by an authenticated device of a dispersed storage network (DSN), an access request from a requesting device. The method continues by determining, by the authenticated device, whether the requesting device is affiliated with an anonymous user or an authenticated user. When the requesting device is affiliated with the anonymous user, the method continues by determining, by the authenticated device, status of the anonymous user. When the status of the anonymous user is of minimal threat to the DSN, the method continues by granting, by the authenticated device, temporary credentials and temporary access privileges to the anonymous user for use by the requesting device. The method continues by processing, by the authenticated device, the access request in accordance with the temporary credentials and the temporary access privileges.
    Type: Application
    Filed: March 24, 2017
    Publication date: October 5, 2017
    Inventors: Jason K. Resch, Mark D. Seaborn, Ilya Volvovski
  • Publication number: 20170286280
    Abstract: A dispersed storage network facilitates isolating the introduction of software defects in dispersed storage units. A search strategy is employed whereby after identifying a test failure in a current version of the memory software code, a code version since a previous successfully tested version is identified. An interim version that represents the point at which approximately one half the changes were introduced is then tested. When there is a test failure, the next interim version selected for testing represents the point at which approximately one half the changes were introduced between the first interim version tested and the current version. If no failure, a next interim version is tested that represents the point at which approximately one half the changes were introduced between the previous successfully tested version and the first interim version tested.
    Type: Application
    Filed: August 26, 2016
    Publication date: October 5, 2017
    Inventors: Teague S. Algie, Andrew G. Peake, Mark D. Seaborn, Ilya Volvovski
  • Publication number: 20170250965
    Abstract: An encryption module encrypts starting data using a random key to produce encrypted data. A hash module performs a secure hash function on the encrypted data using a secret key to produce a hash value. Processing circuitry masks the random key using the hash value to produce a masked random key, and combines the encrypted data and the masked random key to produce a secure package. A distributed storage and task module encodes the secure package to produce a set of encoded data slices. The secret key and a decode threshold number of the encoded data slices included in the set of encoded data slices are sufficient to recover the secure package and the starting data. The set of encoded data slices is stored in a set of storage units.
    Type: Application
    Filed: January 19, 2017
    Publication date: August 31, 2017
    Inventors: Jason K. Resch, Mark D. Seaborn, Ilya Volvovski
  • Publication number: 20160127353
    Abstract: In a method a public key infrastructure (PKI) device receives a certificate signing request (CSR) and an identity assertion cryptographically bound to an end entity issuing the CSR. The PKI device validates the authenticity and integrity of the CSR using the identity assertion. In response to validating the authenticity and integrity of the CSR, the PKI device issues a certificate based on at least one of the CSR and fields in the identity assertion.
    Type: Application
    Filed: October 30, 2014
    Publication date: May 5, 2016
    Inventors: SHANTHI E. THOMAS, ANTHONY R. METKE, MARK D. SEABORN
  • Publication number: 20150134953
    Abstract: A HSM service controller receives an administrative request to enable a cloud-based application to have access to a cloud-based HSM service. The HSM service controller segments a cloud-based HSM into a plurality of VHSMs. The HSM service controller allocates to the cloud-based application, a source VHSM from among the plurality of VHSMs. The source VHSM includes an initial set of credentials, roles and/or metadata. The HSM service controller stores a handle for the source VHSM in association with a handle for the cloud-based application. The HSM service controller routes cryptography requests between the cloud-based application and the VHSM based on the handle for the source VHSM and the handle for the cloud-based application. The HSM service controller receives one or more management requests from the cloud-based application and executes cloud administrator functions responsive to the management request.
    Type: Application
    Filed: November 8, 2013
    Publication date: May 14, 2015
    Applicant: MOTOROLA SOLUTIONS, INC
    Inventors: MARK D. SEABORN, ANTHONY R. METKE