Patents by Inventor Peter M. Jones

Peter M. Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210058238
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses key thresholding to cryptographically control data access. An example method may include: accessing a plurality of cryptographic key shares, wherein two or more of the plurality of cryptographic key shares enable access to content; selecting, by a processing device, a set of cryptographic attributes in view of a characteristic of a computing device; encrypting the plurality of cryptographic key shares to produce a plurality of wrapped key shares, wherein at least one of the plurality of cryptographic key shares is encrypted in view of the set of cryptographic attributes; and providing a wrapped key share of the plurality of wrapped key shares and at least one of the cryptographic attributes to the computing device, wherein the at least one cryptographic attribute facilitates deriving an access key from the plurality of wrapped key shares.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20210058378
    Abstract: The technology disclosed herein provides an enhanced access control mechanism that uses a proof-of-work key wrapping system to temporally restrict access to data. An example method may include: determining, by a processing device, characteristics of a computing device; accessing a cryptographic key for accessing content; selecting a set of cryptographic attributes for wrapping the cryptographic key, wherein the set of cryptographic attributes are selected to enable the computing device to derive the cryptographic key from a wrapped key in a predetermined duration of time; and providing the wrapped key and an indication of at least one of the cryptographic attributes to the computing device.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20210058247
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for verifying device capabilities. An example method may include: receiving a wrapped key and a cryptographic attribute for the wrapped key, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute, wherein the deriving consumes computing resources for a duration of time; using the cryptographic key to access program data; executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time; and transmitting a message comprising an indication of the condition.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20210058245
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that cryptographically controls access to data. An example method may include: selecting a set of cryptographic attributes in view of a characteristic of a computing device; obtaining, by a processing device, a cryptographic key; encrypting, by the processing device, the cryptographic key in view of the set of cryptographic attributes to produce a wrapped key; and providing the wrapped key and at least one of the cryptographic attributes to the computing device, wherein the at least one cryptographic attribute facilitates deriving the cryptographic key from the wrapped key.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20210058248
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses key fragments to cryptographically control access to data. An example method may include: encrypting a first cryptographic key to produce a wrapped key, wherein the first cryptographic key enables a computing device to access content; splitting a second cryptographic key into a plurality of key fragments, wherein the second cryptographic key is for decrypting the wrapped key; selecting a set of cryptographic attributes for deriving at least one of the plurality of key fragments, wherein the set of cryptographic attributes are selected in view of a characteristic of the computing device; and providing the wrapped key and the set of cryptographic attributes to the computing device, the set of cryptographic attributes facilitating determination of the second cryptographic key.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
  • Publication number: 20210056214
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for restricting data execution based on device capabilities. An example method may include: accessing a wrapped key and a cryptographic attribute for the wrapped key, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute; using the cryptographic key to access program data; and executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
  • Publication number: 20210058379
    Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses integrated key fragments to cryptographically control access to data. An example method may include encrypting a first cryptographic key to produce a wrapped key, wherein the first cryptographic key enables a computing device to access content; determining a plurality of key fragments of a second cryptographic key, wherein the second cryptographic key is for decrypting the wrapped key and at least one of the plurality of key fragments is derived using one of the key fragments as input; selecting a set of cryptographic attributes for deriving the plurality of key fragments, wherein the set of cryptographic attributes are selected in view of a characteristic of the computing device; and providing the wrapped key and the set of cryptographic attributes to the computing device, the set of cryptographic attributes facilitating determination of the second cryptographic key.
    Type: Application
    Filed: August 19, 2019
    Publication date: February 25, 2021
    Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
  • Publication number: 20200259641
    Abstract: The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses a cryptographic keys that are based on proximity data. An example method may include: determining proximity data of a computing device; transforming the proximity data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate proximity data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed proximity data; and using the cryptographic key to enable access to a protected resource.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 13, 2020
    Inventors: Nathaniel P. McCallum, Peter M. Jones
  • Publication number: 20200259645
    Abstract: The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses a cryptographic keys that are based on location data. An example method may include: determining location data of a computing device; transforming the location data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate location data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed location data; and using the cryptographic key to enable access to a protected resource.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 13, 2020
    Inventors: Nathaniel P. McCallum, Peter M. Jones
  • Publication number: 20200259642
    Abstract: The technology disclosed herein may enable a client to access a protected resource using cryptographic keys that are based on contextual data of a device. An example method may include: determining contextual data of a computing device; transforming the contextual data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate contextual data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed contextual data; and using the cryptographic key to enable access to a protected resource.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 13, 2020
    Inventors: Nathaniel P. McCallum, Peter M. Jones
  • Publication number: 20200259644
    Abstract: The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses cryptographic keys that are based on temporal data. An example method may include: determining temporal data of a computing device; transforming the temporal data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate temporal data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed temporal data; and using the cryptographic key to enable access to a protected resource.
    Type: Application
    Filed: February 7, 2019
    Publication date: August 13, 2020
    Inventors: Nathaniel P. McCallum, Peter M. Jones
  • Patent number: 10524131
    Abstract: A method includes, with a first computing system, sending a request over a network to a second computing system and receiving a response to the request over the network from the second computing system. The method further includes, with the first computing system, measuring a latency based on the request and the response, dividing the latency by a threshold value, resulting in a quotient, and determining whether to allow the second computing system to engage in secure communications with the first computing system.
    Type: Grant
    Filed: February 4, 2019
    Date of Patent: December 31, 2019
    Assignee: RED HAT, INC.
    Inventors: Nathaniel Philip McCallum, Peter M. Jones
  • Patent number: 9721101
    Abstract: A processing device searches executing at least one of a boot loader or a kernel for the operating system searches for an extensible firmware interface (EFI) binary object. Responsive to finding a first EFI binary object, the processing device verifies that a first signature associated with the first EFI binary object is valid using a platform key. Responsive to verifying that the first signature for the first EFI binary object is valid, the processing device performs the following operations: identifying a first public key encapsulated in the first EFI binary object, wherein the first public key is associated with a non-EFI certificate authority; extracting the first public key from the first EFI binary object; and performing at least one of a) passing the first public key to a kernel of an operating system (OS) or b) exposing the first public key to a user space of the OS.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: August 1, 2017
    Assignee: Red Hat, Inc.
    Inventors: Peter M. Jones, Adam D. Jackson
  • Patent number: 9720808
    Abstract: A debugging system receives traceback data representing logging of a system error of a target system. An operating environment of the target system is replicated by creating a virtual machine (VM) having characteristics represented by the state data representing an operating state of the target system. An analysis is performed on the traceback data within the VM to simulate the system error.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: August 1, 2017
    Assignee: Red Hat, Inc.
    Inventors: Peter M. Jones, Christopher E. Lumens
  • Publication number: 20140380031
    Abstract: A processing device searches executing at least one of a boot loader or a kernel for the operating system searches for an extensible firmware interface (EFI) binary object. Responsive to finding a first EFI binary object, the processing device verifies that a first signature associated with the first EFI binary object is valid using a platform key. Responsive to verifying that the first signature for the first EFI binary object is valid, the processing device performs the following comprising: identifying a first public key encapsulated in the first EFI binary object, wherein the first public key is associated with a non-EFI certificate authority; extracting the first public key from the first EFI binary object; and performing at least one of a) passing the first public key to a kernel of an operating system (OS) or b) exposing the first public key to a user space of the OS.
    Type: Application
    Filed: June 24, 2013
    Publication date: December 25, 2014
    Inventors: Peter M. Jones, Adam D. Jackson
  • Publication number: 20130139128
    Abstract: A debugging system receives traceback data representing logging of a system error of a target system. An operating environment of the target system is replicated by creating a virtual machine (VM) having characteristics represented by the state data representing an operating state of the target system. An analysis is performed on the traceback data within the VM to simulate the system error.
    Type: Application
    Filed: November 29, 2011
    Publication date: May 30, 2013
    Applicant: RED HAT INC.
    Inventors: Peter M. Jones, Christopher E. Lumens
  • Patent number: 5804762
    Abstract: An electromagnetic interference (EMI) shielding gasket for mounting on a substrate having a surface. The gasket is formed of a resilient, elongate core member extending along a central longitudinal axis and having an outer circumferential surface defininga cross-sectional profile, and an electrically-conductive outer member having an inner and an outer surface and extending from a first distal end to a sheathing portion. The sheathing portion of the outer member covers a portion of the circumferential surface of the core member and extends from a first proximal end to a second proximal end. The first distal end of the outer member and the first proximal end of the sheathing portion thereof define a first inner shear surface therebetween which is attachable to the substrate. The uncovered portion of the circumferential surface of the core member defines an interface surface for disposition on the surface of the substrate.
    Type: Grant
    Filed: September 27, 1996
    Date of Patent: September 8, 1998
    Assignee: Parker-Hannifin Corporation
    Inventors: Peter M. Jones, Joseph C. Houle
  • Patent number: 5307742
    Abstract: A shielding device such as for a primer fuse is disclosed. The shielding device is multi-layered, and combines the shielding affectivity of metal foil with electrically conductive adhesive and a dielectric film. Upon application of the shielding device, the primer in the base of the shell is shielded, yet an electrical connection can be made upon firing the pin to fire the round without requiring removal of the shielding device.
    Type: Grant
    Filed: September 17, 1992
    Date of Patent: May 3, 1994
    Assignee: Chomerics, Inc.
    Inventor: Peter M. Jones
  • Patent number: 4297522
    Abstract: A flat cable shielding device comprises a metal foil sleeve formed of an upper and a lower length of conductive metal foil. To aid the insertion of flat cable into the shielding device, a low-friction inside surface is provided on the inside surface of the metal foil sleeve. The outside of metal foil sleeve is covered with an electrically insulating film, to provide wear and scuff protection. Both the low-friction inside surface and other outer coating are coupled to the metal foil sleeve preferably using adhesive. Good electrical connections can be made easily to the shielding device which can be used as a floating ground or can be grounded to a common system ground as desired.
    Type: Grant
    Filed: September 7, 1979
    Date of Patent: October 27, 1981
    Assignee: TME, Inc.
    Inventors: Harold W. Jesse, Peter M. Jones