Patents by Inventor Peter M. Jones
Peter M. Jones has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210058238Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses key thresholding to cryptographically control data access. An example method may include: accessing a plurality of cryptographic key shares, wherein two or more of the plurality of cryptographic key shares enable access to content; selecting, by a processing device, a set of cryptographic attributes in view of a characteristic of a computing device; encrypting the plurality of cryptographic key shares to produce a plurality of wrapped key shares, wherein at least one of the plurality of cryptographic key shares is encrypted in view of the set of cryptographic attributes; and providing a wrapped key share of the plurality of wrapped key shares and at least one of the cryptographic attributes to the computing device, wherein the at least one cryptographic attribute facilitates deriving an access key from the plurality of wrapped key shares.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
-
Publication number: 20210058378Abstract: The technology disclosed herein provides an enhanced access control mechanism that uses a proof-of-work key wrapping system to temporally restrict access to data. An example method may include: determining, by a processing device, characteristics of a computing device; accessing a cryptographic key for accessing content; selecting a set of cryptographic attributes for wrapping the cryptographic key, wherein the set of cryptographic attributes are selected to enable the computing device to derive the cryptographic key from a wrapped key in a predetermined duration of time; and providing the wrapped key and an indication of at least one of the cryptographic attributes to the computing device.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
-
Publication number: 20210058247Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for verifying device capabilities. An example method may include: receiving a wrapped key and a cryptographic attribute for the wrapped key, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute, wherein the deriving consumes computing resources for a duration of time; using the cryptographic key to access program data; executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time; and transmitting a message comprising an indication of the condition.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
-
Publication number: 20210058245Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that cryptographically controls access to data. An example method may include: selecting a set of cryptographic attributes in view of a characteristic of a computing device; obtaining, by a processing device, a cryptographic key; encrypting, by the processing device, the cryptographic key in view of the set of cryptographic attributes to produce a wrapped key; and providing the wrapped key and at least one of the cryptographic attributes to the computing device, wherein the at least one cryptographic attribute facilitates deriving the cryptographic key from the wrapped key.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
-
Publication number: 20210058248Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses key fragments to cryptographically control access to data. An example method may include: encrypting a first cryptographic key to produce a wrapped key, wherein the first cryptographic key enables a computing device to access content; splitting a second cryptographic key into a plurality of key fragments, wherein the second cryptographic key is for decrypting the wrapped key; selecting a set of cryptographic attributes for deriving at least one of the plurality of key fragments, wherein the set of cryptographic attributes are selected in view of a characteristic of the computing device; and providing the wrapped key and the set of cryptographic attributes to the computing device, the set of cryptographic attributes facilitating determination of the second cryptographic key.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
-
Publication number: 20210056214Abstract: The technology disclosed herein provides a proof-of-work key wrapping system for restricting data execution based on device capabilities. An example method may include: accessing a wrapped key and a cryptographic attribute for the wrapped key, wherein the wrapped key encodes a cryptographic key; deriving, by a processing device, the cryptographic key in view of the wrapped key and the cryptographic attribute; using the cryptographic key to access program data; and executing, by the processing device, the program data, wherein the executed program data evaluates a condition related to the duration of time.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones
-
Publication number: 20210058379Abstract: The technology disclosed herein provides a proof-of-work key wrapping system that uses integrated key fragments to cryptographically control access to data. An example method may include encrypting a first cryptographic key to produce a wrapped key, wherein the first cryptographic key enables a computing device to access content; determining a plurality of key fragments of a second cryptographic key, wherein the second cryptographic key is for decrypting the wrapped key and at least one of the plurality of key fragments is derived using one of the key fragments as input; selecting a set of cryptographic attributes for deriving the plurality of key fragments, wherein the set of cryptographic attributes are selected in view of a characteristic of the computing device; and providing the wrapped key and the set of cryptographic attributes to the computing device, the set of cryptographic attributes facilitating determination of the second cryptographic key.Type: ApplicationFiled: August 19, 2019Publication date: February 25, 2021Inventors: Michael Hingston McLaughlin Bursell, Nathaniel Philip McCallum, Peter M. Jones, John David Strunk
-
Publication number: 20200259641Abstract: The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses a cryptographic keys that are based on proximity data. An example method may include: determining proximity data of a computing device; transforming the proximity data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate proximity data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed proximity data; and using the cryptographic key to enable access to a protected resource.Type: ApplicationFiled: February 7, 2019Publication date: August 13, 2020Inventors: Nathaniel P. McCallum, Peter M. Jones
-
Publication number: 20200259645Abstract: The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses a cryptographic keys that are based on location data. An example method may include: determining location data of a computing device; transforming the location data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate location data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed location data; and using the cryptographic key to enable access to a protected resource.Type: ApplicationFiled: February 7, 2019Publication date: August 13, 2020Inventors: Nathaniel P. McCallum, Peter M. Jones
-
Publication number: 20200259642Abstract: The technology disclosed herein may enable a client to access a protected resource using cryptographic keys that are based on contextual data of a device. An example method may include: determining contextual data of a computing device; transforming the contextual data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate contextual data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed contextual data; and using the cryptographic key to enable access to a protected resource.Type: ApplicationFiled: February 7, 2019Publication date: August 13, 2020Inventors: Nathaniel P. McCallum, Peter M. Jones
-
Publication number: 20200259644Abstract: The technology disclosed herein provides an enhanced cryptographic access control mechanism that uses cryptographic keys that are based on temporal data. An example method may include: determining temporal data of a computing device; transforming the temporal data in view of conversion data associated with the computing device, wherein the conversion data causes a set of alternate temporal data values to transform to a specific cryptographic value; creating, by a processing device, a cryptographic key in view of the transformed temporal data; and using the cryptographic key to enable access to a protected resource.Type: ApplicationFiled: February 7, 2019Publication date: August 13, 2020Inventors: Nathaniel P. McCallum, Peter M. Jones
-
Patent number: 10524131Abstract: A method includes, with a first computing system, sending a request over a network to a second computing system and receiving a response to the request over the network from the second computing system. The method further includes, with the first computing system, measuring a latency based on the request and the response, dividing the latency by a threshold value, resulting in a quotient, and determining whether to allow the second computing system to engage in secure communications with the first computing system.Type: GrantFiled: February 4, 2019Date of Patent: December 31, 2019Assignee: RED HAT, INC.Inventors: Nathaniel Philip McCallum, Peter M. Jones
-
Patent number: 9721101Abstract: A processing device searches executing at least one of a boot loader or a kernel for the operating system searches for an extensible firmware interface (EFI) binary object. Responsive to finding a first EFI binary object, the processing device verifies that a first signature associated with the first EFI binary object is valid using a platform key. Responsive to verifying that the first signature for the first EFI binary object is valid, the processing device performs the following operations: identifying a first public key encapsulated in the first EFI binary object, wherein the first public key is associated with a non-EFI certificate authority; extracting the first public key from the first EFI binary object; and performing at least one of a) passing the first public key to a kernel of an operating system (OS) or b) exposing the first public key to a user space of the OS.Type: GrantFiled: June 24, 2013Date of Patent: August 1, 2017Assignee: Red Hat, Inc.Inventors: Peter M. Jones, Adam D. Jackson
-
Patent number: 9720808Abstract: A debugging system receives traceback data representing logging of a system error of a target system. An operating environment of the target system is replicated by creating a virtual machine (VM) having characteristics represented by the state data representing an operating state of the target system. An analysis is performed on the traceback data within the VM to simulate the system error.Type: GrantFiled: November 29, 2011Date of Patent: August 1, 2017Assignee: Red Hat, Inc.Inventors: Peter M. Jones, Christopher E. Lumens
-
Publication number: 20140380031Abstract: A processing device searches executing at least one of a boot loader or a kernel for the operating system searches for an extensible firmware interface (EFI) binary object. Responsive to finding a first EFI binary object, the processing device verifies that a first signature associated with the first EFI binary object is valid using a platform key. Responsive to verifying that the first signature for the first EFI binary object is valid, the processing device performs the following comprising: identifying a first public key encapsulated in the first EFI binary object, wherein the first public key is associated with a non-EFI certificate authority; extracting the first public key from the first EFI binary object; and performing at least one of a) passing the first public key to a kernel of an operating system (OS) or b) exposing the first public key to a user space of the OS.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Inventors: Peter M. Jones, Adam D. Jackson
-
Publication number: 20130139128Abstract: A debugging system receives traceback data representing logging of a system error of a target system. An operating environment of the target system is replicated by creating a virtual machine (VM) having characteristics represented by the state data representing an operating state of the target system. An analysis is performed on the traceback data within the VM to simulate the system error.Type: ApplicationFiled: November 29, 2011Publication date: May 30, 2013Applicant: RED HAT INC.Inventors: Peter M. Jones, Christopher E. Lumens
-
Patent number: 5804762Abstract: An electromagnetic interference (EMI) shielding gasket for mounting on a substrate having a surface. The gasket is formed of a resilient, elongate core member extending along a central longitudinal axis and having an outer circumferential surface defininga cross-sectional profile, and an electrically-conductive outer member having an inner and an outer surface and extending from a first distal end to a sheathing portion. The sheathing portion of the outer member covers a portion of the circumferential surface of the core member and extends from a first proximal end to a second proximal end. The first distal end of the outer member and the first proximal end of the sheathing portion thereof define a first inner shear surface therebetween which is attachable to the substrate. The uncovered portion of the circumferential surface of the core member defines an interface surface for disposition on the surface of the substrate.Type: GrantFiled: September 27, 1996Date of Patent: September 8, 1998Assignee: Parker-Hannifin CorporationInventors: Peter M. Jones, Joseph C. Houle
-
Patent number: 5307742Abstract: A shielding device such as for a primer fuse is disclosed. The shielding device is multi-layered, and combines the shielding affectivity of metal foil with electrically conductive adhesive and a dielectric film. Upon application of the shielding device, the primer in the base of the shell is shielded, yet an electrical connection can be made upon firing the pin to fire the round without requiring removal of the shielding device.Type: GrantFiled: September 17, 1992Date of Patent: May 3, 1994Assignee: Chomerics, Inc.Inventor: Peter M. Jones
-
Patent number: 4297522Abstract: A flat cable shielding device comprises a metal foil sleeve formed of an upper and a lower length of conductive metal foil. To aid the insertion of flat cable into the shielding device, a low-friction inside surface is provided on the inside surface of the metal foil sleeve. The outside of metal foil sleeve is covered with an electrically insulating film, to provide wear and scuff protection. Both the low-friction inside surface and other outer coating are coupled to the metal foil sleeve preferably using adhesive. Good electrical connections can be made easily to the shielding device which can be used as a floating ground or can be grounded to a common system ground as desired.Type: GrantFiled: September 7, 1979Date of Patent: October 27, 1981Assignee: TME, Inc.Inventors: Harold W. Jesse, Peter M. Jones