Patents by Inventor Payman Mohassel

Payman Mohassel has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10637652
    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: April 28, 2020
    Assignee: Oath Inc.
    Inventors: Juan Garay, Payman Mohassel, David Gil
  • Patent number: 10461932
    Abstract: The present teaching relates to adjustable one-time password (OTP) setup, sign-in, and verification. In one example, a first length of a signature is determined. The signature has been used previously by a first user to initially sign in a second device. A second length that is different from the first length is determined. A signing key is generated based at least partially on the second length. A new signature having the second length is generated based on the signing key. The new signature is provided to a second user so that the second user can input at least a portion of the new signature into the second device for a subsequent sign in. The verification key is generated based at least partially on the new signature. The new signature input by the second user into the second device is transmitted from the second device to the third device.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: October 29, 2019
    Assignee: Oath Inc.
    Inventors: Payman Mohassel, Juan Garay, Xiong Fan
  • Publication number: 20190273608
    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.
    Type: Application
    Filed: May 20, 2019
    Publication date: September 5, 2019
    Inventors: Juan Garay, Payman Mohassel, David Gil
  • Publication number: 20190245695
    Abstract: Embodiments of the invention can establish secure communications using a single non-traceable request message from a first computer and a single non-traceable response message from a second computer. Non-traceability may be provided through the use of blinding factors. The request and response messages can also include signatures that provide for non-repudiation. In addition, the encryption of the request and response message is not based on the static keys pairs, which are used for validation of the signatures. As such, perfect forward secrecy is maintained.
    Type: Application
    Filed: April 16, 2019
    Publication date: August 8, 2019
    Inventors: Eric Le Saint, Payman Mohassel
  • Patent number: 10333700
    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.
    Type: Grant
    Filed: August 6, 2018
    Date of Patent: June 25, 2019
    Assignee: OATH INC.
    Inventors: Juan Garay, Payman Mohassel, David Gil
  • Patent number: 10313133
    Abstract: Embodiments of the invention can establish secure communications using a single non-traceable request message from a first computer and a single non-traceable response message from a second computer. Non-traceability may be provided through the use of blinding factors. The request and response messages can also include signatures that provide for non-repudiation. In addition, the encryption of the request and response message is not based on the static keys pairs, which are used for validation of the signatures. As such, perfect forward secrecy is maintained.
    Type: Grant
    Filed: June 21, 2017
    Date of Patent: June 4, 2019
    Assignee: Visa International Service Association
    Inventors: Eric Le Saint, Payman Mohassel
  • Patent number: 10243738
    Abstract: Standardized digital signature schemes (e.g., Rivest-Shamir-Adleman (RSA), Digital Signature Algorithm (DSA), Elliptical Curve Digital Signature Algorithm (EC-DSA), etc.) may be employed to prove authenticity of a message containing credentials. Proving possession of valid credentials may be performed using a combination of garbled circuits with message authentication codes (MACs) and proof of knowledge protocols (e.g., Sigma protocol, Schnorr protocol, etc.). Such techniques may allow proving entities to prove possession of valid credentials using standardized signature schemes without revealing those credentials directly to a verifying entity.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: March 26, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Melissa E. Chase, Payman Mohassel, Chaya Ganesh
  • Publication number: 20190026362
    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.
    Type: Application
    Filed: September 21, 2018
    Publication date: January 24, 2019
    Inventors: Payman Mohassel, Ian Miers
  • Publication number: 20180375663
    Abstract: Embodiments of the invention can establish secure communications using a single non-traceable request message from a first computer and a single non-traceable response message from a second computer. Non-traceability may be provided through the use of blinding factors. The request and response messages can also include signatures that provide for non-repudiation. In addition, the encryption of the request and response message is not based on the static keys pairs, which are used for validation of the signatures. As such, perfect forward secrecy is maintained.
    Type: Application
    Filed: June 21, 2017
    Publication date: December 27, 2018
    Inventors: Eric Le Saint, Payman Mohassel
  • Publication number: 20180365315
    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.
    Type: Application
    Filed: August 29, 2018
    Publication date: December 20, 2018
    Inventors: Payman Mohassel, Ian Miers
  • Publication number: 20180343112
    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.
    Type: Application
    Filed: August 6, 2018
    Publication date: November 29, 2018
    Inventors: Juan Garay, Payman Mohassel, David Gil
  • Patent number: 10095776
    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.
    Type: Grant
    Filed: May 4, 2017
    Date of Patent: October 9, 2018
    Assignee: OATH INC.
    Inventors: Payman Mohassel, Ian Miers
  • Patent number: 10069623
    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: September 4, 2018
    Assignee: OATH INC.
    Inventors: Juan Garay, Payman Mohassel, David Gil
  • Publication number: 20170264436
    Abstract: The present teaching relates to adjustable one-time password (OTP) setup, sign-in, and verification. In one example, a first length of a signature is determined. The signature has been used previously by a first user to initially sign in a second device. A second length that is different from the first length is determined. A signing key is generated based at least partially on the second length. A new signature having the second length is generated based on the signing key. The new signature is provided to a second user so that the second user can input at least a portion of the new signature into the second device for a subsequent sign in. The verification key is generated based at least partially on the new signature. The new signature input by the second user into the second device is transmitted from the second device to the third device.
    Type: Application
    Filed: March 8, 2016
    Publication date: September 14, 2017
    Inventors: Payman Mohassel, Juan Garay, Xiong Fan
  • Publication number: 20170242912
    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.
    Type: Application
    Filed: May 4, 2017
    Publication date: August 24, 2017
    Inventors: Payman Mohassel, Ian Miers
  • Patent number: 9715546
    Abstract: The present teaching relates to searching encrypted data. In one example, a search request is received for encrypted documents. An encrypted query is generated based on the search request. The encrypted query is sent to a server that stores a first encrypted index and a second encrypted index. The first encrypted index maps encrypted keywords to full blocks each of which has a same size and is fully filled with encrypted document identities (IDs). The second encrypted index maps encrypted keywords to partial blocks each of which has the same size and is partially filled with encrypted document IDs. Based on the encrypted query, one or more encrypted document IDs are determined by searching against both the first encrypted index and the second encrypted index. A search result is generated based on the one or more encrypted document IDs. The search result is provided in response to the search request.
    Type: Grant
    Filed: February 18, 2016
    Date of Patent: July 25, 2017
    Assignee: YAHOO! INC.
    Inventors: Payman Mohassel, Ian Miers
  • Publication number: 20170163421
    Abstract: Standardized digital signature schemes (e.g., Rivest-Shamir-Adleman (RSA), Digital Signature Algorithm (DSA), Elliptical Curve Digital Signature Algorithm (EC-DSA), etc.) may be employed to prove authenticity of a message containing credentials. Proving possession of valid credentials may be performed using a combination of garbled circuits with message authentication codes (MACs) and proof of knowledge protocols (e.g., Sigma protocol, Schnorr protocol, etc.). Such techniques may allow proving entities to prove possession of valid credentials using standardized signature schemes without revealing those credentials directly to a verifying entity.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Melissa E. Chase, Payman Mohassel, Chaya Ganesh
  • Publication number: 20170078090
    Abstract: The present teaching relates to exchanging a key with a device. In one example, a secret value is generated. A message is transmitted to the device. The message includes information related to the secret value based on which the device is to create a cryptographic key. A visual code displayed on the device is captured. The visual code includes a first piece of information and a second piece of information. A key value is generated based on the first piece of information and the secret value. A test value is calculated based on the key value. It is determined whether the device is securely connected based on the test value.
    Type: Application
    Filed: September 14, 2015
    Publication date: March 16, 2017
    Applicant: Yahoo! Inc.
    Inventors: Juan Garay, Payman Mohassel, David Gil
  • Patent number: 9077539
    Abstract: The disclosed architecture employs techniques that make secure multi-party computation (MPC) practical and scalable. In support of utilizing cloud computing, for example, for evaluating functionality, a third party server can be employed which does not have any input to the computation and does not receive any output from the computation, yet has a vast amount of computational resources. Accordingly, the secure MPC architecture can outsource as much as possible of the computation and communications burden of the parties without the server(s) learning any information about the party inputs.
    Type: Grant
    Filed: March 9, 2011
    Date of Patent: July 7, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Seny F. Kamara, Payman Mohassel
  • Publication number: 20120233460
    Abstract: The disclosed architecture employs techniques that make secure multi-party computation (MPC) practical and scalable. In support of utilizing cloud computing, for example, for evaluating functionality, a third party server can be employed which does not have any input to the computation and does not receive any output from the computation, yet has a vast amount of computational resources. Accordingly, the secure MPC architecture can outsource as much as possible of the computation and communications burden of the parties without the server(s) learning any information about the party inputs.
    Type: Application
    Filed: March 9, 2011
    Publication date: September 13, 2012
    Applicant: Microsoft Corporation
    Inventors: Seny F. Kamara, Payman Mohassel