Patents by Inventor Randolph C. Marchany

Randolph C. Marchany has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10243733
    Abstract: A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send small pieces of information over a network while only requiring an exchange of public keys ahead of time. The system relies on the size and resilience of the BitTorrent Distributed Hash Table and the security properties of cryptographic constructions such as Elliptic Curve Diffie-Hellman key exchange and secure one-way hash functions.
    Type: Grant
    Filed: March 16, 2017
    Date of Patent: March 26, 2019
    Assignee: Virginia Tech Intellectual Properties, Inc.
    Inventors: Christopher F. Morrell, Reese A. Moore, Joseph G. Tront, Randolph C. Marchany
  • Publication number: 20170272242
    Abstract: A system and method performs a moving target blind rendezvous by exchanging data through a distributed hash table. The system allows users to securely send small pieces of information over a network while only requiring an exchange of public keys ahead of time. The system relies on the size and resilience of the BitTorrent Distributed Hash Table and the security properties of cryptographic constructions such as Elliptic Curve Diffie-Hellman key exchange and secure one-way hash functions.
    Type: Application
    Filed: March 16, 2017
    Publication date: September 21, 2017
    Inventors: Christopher F. Morrell, Reese A. Moore, Joseph G. Tront, Randolph C. Marchany
  • Patent number: 9461875
    Abstract: The invention dynamically obscures network and transport layer addresses of packets to achieve anonymity, including authentication privacy, as well as protection against tracking and traffic correlation and certain classes of network attacks by combining both intrusion protection with anonymity, avoiding the use of a separate management unit outside the host for distribution of obscured addresses. The invention enables a host to automatically configure obscured addresses and determine the obscured address of the intended recipient without outside involvement, computing addresses based on a set of parameters, and to operate without re-authentication whenever an address changes. The invention enables encryption of the packet payload to prevent traffic correlation. The technology of the invention can be implemented embedded on a host device or as a connected gateway device and requires negligible configuration and is therefore transparent to hosts.
    Type: Grant
    Filed: October 7, 2011
    Date of Patent: October 4, 2016
    Assignee: Virginia Tech Intellectual Properties, Inc.
    Inventors: Stephen L. Groat, Matthew W. Dunlop, William M. Urbanski, Randolph C. Marchany, Joseph Tront
  • Publication number: 20130212249
    Abstract: The invention dynamically obscures network and transport layer addresses of packets to achieve anonymity, including authentication privacy, as well as protection against tracking and traffic correlation and certain classes of network attacks by combining both intrusion protection with anonymity, avoiding the use of a separate management unit outside the host for distribution of obscured addresses. The invention enables a host to automatically configure obscured addresses and determine the obscured address of the intended recipient without outside involvement, computing addresses based on a set of parameters, and to operate without re-authentication whenever an address changes. The invention enables encryption of the packet payload to prevent traffic correlation. The technology of the invention can be implemented embedded on a host device or as a connected gateway device and requires negligible configuration and is therefore transparent to hosts.
    Type: Application
    Filed: October 7, 2011
    Publication date: August 15, 2013
    Applicant: VIRGINIA TECH INTELLECTUAL PROPERTIES, INC.
    Inventors: Stephen L. Groat, Matthew W. Dunlop, William M. Urbanski, Randolph C. Marchany, Joseph Tront
  • Patent number: 7877621
    Abstract: Software attacks such as worms and viruses are detected in an electronic device by monitoring power consumption patterns. In a first embodiment, software attacks are detected by an increase in power consumption. The increased power consumption can be caused by increased network traffic, or by increased activity in the microprocessor. Monitoring power consumption is particularly effective for detecting DOS/flooding attacks when the electronic device is in an idle state. In a second embodiment, a power consumption signal is converted to the frequency domain (e.g., by fast Fourier transform). The highest amplitude frequencies are identified. Specific software attacks produce characteristic frequencies in the power consumption signal. Software attacks are therefore detected by matching the highest amplitude frequencies with frequencies associated with specific worms and viruses.
    Type: Grant
    Filed: June 24, 2005
    Date of Patent: January 25, 2011
    Assignees: Virginia Tech Intellectual Properties, Inc., The United States of America as represented by the Secretary of the Army
    Inventors: Grant A. Jacoby, Nathaniel J Davis, IV, Randolph C. Marchany
  • Publication number: 20080276111
    Abstract: Software attacks such as worms and viruses are detected in an electronic device by monitoring power consumption patterns. In a first embodiment, software attacks are detected by an increase in power consumption. The increased power consumption can be caused by increased network traffic, or by increased activity in the microprocessor. Monitoring power consumption is particularly effective for detecting DOS/flooding attacks when the electronic device is in an idle state. In a second embodiment, a power consumption signal is converted to the frequency domain (e.g., by fast Fourier transform). The highest amplitude frequencies are identified. Specific software attacks produce characteristic frequencies in the power consumption signal. Software attacks are therefore detected by matching the highest amplitude frequencies with frequencies associated with specific worms and viruses.
    Type: Application
    Filed: June 24, 2005
    Publication date: November 6, 2008
    Inventors: Grant A. Jacoby, Nathaniel J. Davis, Randolph C. Marchany