Patents by Inventor Mihir Bellare

Mihir Bellare has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11637690
    Abstract: A format-preserving Just Encrypt 1 (JE1) system and method provides significant performance advantages over known FPE methods for longer character strings due to the technical improvements.
    Type: Grant
    Filed: October 8, 2021
    Date of Patent: April 25, 2023
    Assignee: Baffle, Inc.
    Inventors: Mihir Bellare, Priyadarshan Kolte
  • Publication number: 20230113150
    Abstract: A format-preserving Just Encrypt 1 (JE1) system and method provides significant performance advantages over known FPE methods for longer character strings due to the technical improvements.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 13, 2023
    Inventors: Mihir BELLARE, Priyadarshan KOLTE
  • Patent number: 11190339
    Abstract: An encryption system and method that addresses private computation in public clouds and provides the ability to perform operations of encrypted data (including equality determinations and compare for less than operations) are provided.
    Type: Grant
    Filed: May 14, 2019
    Date of Patent: November 30, 2021
    Assignee: BAFFLE, INC.
    Inventors: Priyadarshan Kolte, Spence Jackson, Palanivel Rajan Shanmugavelayutham, Mihir Bellare, Nathan Chenette
  • Patent number: 11101980
    Abstract: An encryption system and method that addresses private computation in public clouds and provides the ability to perform operations of encrypted data are provided.
    Type: Grant
    Filed: May 1, 2019
    Date of Patent: August 24, 2021
    Assignee: BAFFLE, INC.
    Inventors: Priyadarshan Kolte, Spence Jackson, Palanivel Rajan Shanmugavelayutham, Mihir Bellare
  • Publication number: 20200366462
    Abstract: An encryption system and method that addresses private computation in public clouds and provides the ability to perform operations of encrypted data (including equality determinations and compare for less than operations) are provided.
    Type: Application
    Filed: May 14, 2019
    Publication date: November 19, 2020
    Inventors: Priyadarshan Kolte, Spence Jackson, Palanivel Rajan Shanmugavelayutham, Mihir Bellare, Nathan Chenette
  • Publication number: 20200351078
    Abstract: An encryption system and method that addresses private computation in public clouds and provides the ability to perform operations of encrypted data are provided.
    Type: Application
    Filed: May 1, 2019
    Publication date: November 5, 2020
    Inventors: Priyadarshan Kolte, Spence Jackson, Palanivel Rajan Shanmugavelayutham, Mihir Bellare
  • Patent number: 10007910
    Abstract: Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device.
    Type: Grant
    Filed: February 1, 2016
    Date of Patent: June 26, 2018
    Assignee: VeriFone, Inc.
    Inventors: Clay von Mueller, Mihir Bellare, Scott Yale, Patrick K. Hazel, Paul Elbridge Catinella
  • Publication number: 20180097624
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext. Fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Application
    Filed: September 25, 2017
    Publication date: April 5, 2018
    Inventors: Mihir Bellare, Phillip Rogaway
  • Publication number: 20180041485
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. A keyed information dispersal algorithm (keyed IDA) may also be used. The key for the keyed IDA may additionally be protected by an external workgroup key, resulting in a multi-factor secret sharing scheme.
    Type: Application
    Filed: October 20, 2017
    Publication date: February 8, 2018
    Inventors: Mark S. O'Hare, Rick L. Orsini, Mihir Bellare, Phillip Rogaway
  • Patent number: 9825927
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. A keyed information dispersal algorithm (keyed IDA) may also be used. The key for the keyed IDA may additionally be protected by an external workgroup key, resulting in a multi-factor secret sharing scheme.
    Type: Grant
    Filed: June 25, 2015
    Date of Patent: November 21, 2017
    Assignee: Security First Corp.
    Inventors: Mark S. O'Hare, Rick L. Orsini, Mihir Bellare, Phillip Rogaway
  • Patent number: 9774449
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext. Fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Grant
    Filed: July 6, 2016
    Date of Patent: September 26, 2017
    Assignee: Security First Corp.
    Inventors: Mihir Bellare, Phillip Rogaway
  • Publication number: 20170005796
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext. Fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Application
    Filed: July 6, 2016
    Publication date: January 5, 2017
    Inventors: Mihir Bellare, Phillip Rogaway
  • Patent number: 9432337
    Abstract: A method for generating product authentication codes comprises allocating a lot identification value and a total lot size for an order of a plurality of product authentication codes, generating the plurality of product authentication codes based upon the lot identification value and the total lot size, and updating a counter table on an authentication server with the total lot size for the order of the authentication codes. A method for authenticating product codes comprises receiving a product code from a user of a product, decrypting the product code to obtain a sequence counter number unique to the product code and comparing the decrypted sequence counter number to a table of valid sequence counter number values to determine its authenticity. If the decrypted sequence counter number is authentic, it is added to an authentication table for future reference when operating to confirm a previous authentication of the sequence counter number.
    Type: Grant
    Filed: May 24, 2013
    Date of Patent: August 30, 2016
    Assignee: PharmaSecure, Inc.
    Inventors: Jay S. Kunin, Mihir Bellare, Nakul Pasricha
  • Publication number: 20160239836
    Abstract: Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device.
    Type: Application
    Filed: February 1, 2016
    Publication date: August 18, 2016
    Applicant: VeriFone, Inc.
    Inventors: Clay von Mueller, Mihir Bellare, Scott Yale, Patrick K. Hazel, Paul Elbridge Catinella
  • Patent number: 9407431
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext. Fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Grant
    Filed: June 16, 2014
    Date of Patent: August 2, 2016
    Assignee: Security First Corp.
    Inventors: Mihir Bellare, Phillip Rogaway
  • Patent number: 9361617
    Abstract: Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in the same format as the plaintext symbol set. The cipher can be based on DES, AES or other block ciphers. In one example implementation a method for enciphering token information the invention provides for enciphering token information by constructing a tweak of a defined length using token information; converting the tweak to a bit string of a defined size to form a first parameter; converting a number of digits of plaintext to a byte string of a defined size to form a second parameter, wherein the number of digits converted varies; defining a data encryption standard key; applying the data encryption standard key to the first and second parameters; computing a specified number of encryption rounds; and receiving enciphered token information.
    Type: Grant
    Filed: June 9, 2009
    Date of Patent: June 7, 2016
    Assignee: VeriFone, Inc.
    Inventors: Clay von Mueller, Mihir Bellare
  • Patent number: 9294268
    Abstract: Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device.
    Type: Grant
    Filed: May 23, 2014
    Date of Patent: March 22, 2016
    Assignee: VeriFone, Inc.
    Inventors: Clay von Mueller, Mihir Bellare, Scott R. Yale, Patrick K. Hazel, Paul Elbridge Catinella
  • Publication number: 20150295908
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. A keyed information dispersal algorithm (keyed IDA) may also be used. The key for the keyed IDA may additionally be protected by an external workgroup key, resulting in a multi-factor secret sharing scheme.
    Type: Application
    Filed: June 25, 2015
    Publication date: October 15, 2015
    Inventors: Mark S. O'Hare, Rick L. Orsini, Mihir Bellare, Phillip Rogaway
  • Patent number: 9098718
    Abstract: A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. A keyed information dispersal algorithm (keyed IDA) may also be used. The key for the keyed IDA may additionally be protected by an external workgroup key, resulting in a multi-factor secret sharing scheme.
    Type: Grant
    Filed: May 28, 2013
    Date of Patent: August 4, 2015
    Assignee: Security First Corp.
    Inventors: Mark S. O'Hare, Rick L. Orsini, Mihir Bellare, Phillip Rogaway
  • Publication number: 20150016604
    Abstract: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext. Fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values.
    Type: Application
    Filed: June 16, 2014
    Publication date: January 15, 2015
    Inventors: Mihir Bellare, Phillip Rogaway