Patents by Inventor Reed H. Tibbetts
Reed H. Tibbetts has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7895443Abstract: A method and apparatus for secure authentication of a hardware token is disclosed. In one embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-response authentication which is performed on the hardware token. In another embodiment, the host computer fingerprint is used as a personal identification number for the hardware token.Type: GrantFiled: November 4, 2003Date of Patent: February 22, 2011Assignee: SafeNet, Inc.Inventors: Brian Grove, Reed H. Tibbetts, James Khalaf, Laszlo Elteto
-
Publication number: 20100100746Abstract: A method and apparatus for secure authentication of a hardware token is disclosed. In one embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-response authentication which is performed on the hardware token. In another embodiment, the host computer fingerprint is used as a personal identification number for the hardware token.Type: ApplicationFiled: December 18, 2009Publication date: April 22, 2010Inventors: Brian Grove, Reed H. Tibbetts, James Khalaf, Laszlo Elteto
-
Patent number: 7269844Abstract: A device that secures a token from unauthorized use is disclosed. The device comprises a user interface for accepting a personal identifier, a processor, communicatively coupled to the user interface device, and a token interface. The token interface includes a token interface IR emitter that produces an IR signal having information included in the PIN. The token IR emitter is coupled to the processor and is further communicatively coupled to a token IR sensor when the token is physically coupled with the token interface. The token interface also includes a shield, substantially opaque to the IR signal, for substantially confining the reception of the IR signal to the token IR sensor. In one embodiment, the shield substantially circumscribes the IR emitter. In another embodiment, the interface also comprises a token interface IR sensor, which allows communications from the token to the device as well.Type: GrantFiled: July 3, 2001Date of Patent: September 11, 2007Assignee: SafeNet, Inc.Inventors: Laszlo Elteto, Shawn D. Abbott, James Khalaf, Reed H. Tibbetts, Mehdi Sotoodeh, Calvin W. Long
-
Patent number: 7111324Abstract: A method and apparatus for securing a token from unauthorized use is disclosed. The method comprises the steps of receiving a first message transmitted from a host processing device and addressed to a PIN entry device according to a universal serial bus (USB) protocol; accepting a PIN entered into the PIN entry device; and transmitting a second message comprising at least a portion of the first message and the PIN from the PIN entry device to the token along a secure communication path.Type: GrantFiled: January 16, 2001Date of Patent: September 19, 2006Assignee: Safenet, Inc.Inventors: Laszlo Elteto, Shawn D. Abbott, James Khalaf, Reed H. Tibbetts, Mehdi Sotoodeh, Calvin W. Long
-
Patent number: 7024564Abstract: A method and apparatus for protecting computer software from unauthorized execution or duplication using a hardware key is disclosed. The apparatus comprises a means for communicating with the computer to receive command messages from the computer in the hardware key and to provide response messages to the computer, a memory for storing data for translating command messages into response messages enabling software execution, and a processor coupled to the communicating means for translating command messages into response messages using the data stored in the memory. The processor further comprises a memory manager, including means for logically segmenting the memory storing the data into at least one protected segment, and a means for controlling access to the protected segment.Type: GrantFiled: November 22, 2002Date of Patent: April 4, 2006Assignee: SafeNet, Inc.Inventors: Dominique Vincent Pavlin, Mehdi Sotoodeh, Reed H. Tibbetts, Patrick N. Godding, Alain Raymond Spiewek, Roger Graham Nixon
-
Publication number: 20040098585Abstract: A method and apparatus for secure authentication of a hardware token is disclosed. In one embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-response authentication which is performed on the hardware token. In another embodiment, the host computer fingerprint is used as a personal identification number for the hardware token.Type: ApplicationFiled: November 4, 2003Publication date: May 20, 2004Applicants: RAINBOW TECHNOLOGIES, INC., RAINBOW TECHNOLOGIES B.V.Inventors: Brian Grove, Reed H. Tibbetts, James Khalaf, Laszlo Elteto
-
Publication number: 20030110388Abstract: A method and apparatus for protecting computer software from unauthorized execution or duplication using a hardware key is disclosed. The apparatus comprises a means for communicating with the computer to receive command messages from the computer in the hardware key and to provide response messages to the computer, a memory for storing data for translating command messages into response messages enabling software execution, and a processor coupled to the communicating means for translating command messages into response messages using the data stored in the memory. The processor further comprises a memory manager, including means for logically segmenting the memory storing the data into at least one protected segment, and a means for controlling access to the protected segment.Type: ApplicationFiled: November 22, 2002Publication date: June 12, 2003Applicant: Rainbow Technologies, Inc.Inventors: Dominique Vincent Pavlin, Mehdi Sotoodeh, Reed H. Tibbetts, Patrick N. Godding, Alain Raymond Spiewek, Roger Graham Nixon
-
Patent number: 6523119Abstract: A method and apparatus for protecting computer software from unauthorized execution or duplication using a hardware key is disclosed. The apparatus comprises a means for communicating with the computer to receive command messages from the computer in the hardware key and to provide response messages to the computer, a memory for storing data for translating command messages into response messages enabling software execution, and a processor coupled to the interface port for translating command messages into response messages using the data stored in the memory. The processor further comprises a memory manager, for logically segmenting the memory storing the data into at least one protected segment, and for controlling access to the protected segment.Type: GrantFiled: December 4, 1996Date of Patent: February 18, 2003Assignee: Rainbow Technologies, Inc.Inventors: Dominique Vincent Pavlin, Mehdi Sotoodeh, Reed H. Tibbetts, Patrick N. Godding, Alain Raymond Spiewek, Roger Graham Nixon
-
Publication number: 20020046342Abstract: A device that secures a token from unauthorized use is disclosed. The device comprises a user interface for accepting a personal identifier, a processor, communicatively coupled to the user interface device, and a token interface. The token interface includes a token interface IR emitter that produces an IR signal having information included in the PIN. The token IR emitter is coupled to the processor and is further communicatively coupled to a token IR sensor when the token is physically coupled with the token interface. The token interface also includes a shield, substantially opaque to the IR signal, for substantially confining the reception of the IR signal to the token IR sensor. In one embodiment, the shield substantially circumscribes the IR emitter. In another embodiment, the interface also comprises a token interface IR sensor, which allows communications from the token to the device as well.Type: ApplicationFiled: July 3, 2001Publication date: April 18, 2002Inventors: Laszlo Elteto, Shawn D. Abbott, James Khalaf, Reed H. Tibbetts, Mehdi Sotoodeh, Calvin W. Long
-
Publication number: 20010056539Abstract: A method and apparatus for protecting computer software from unauthorized execution or duplication using a hardware key is disclosed. The apparatus comprises a means for communicating with the computer to receive command messages from the computer in the hardware key and to provide response messages to the computer, a memory for storing data for translating command messages into response messages enabling software execution, and a processor coupled to the communicating means for translating command messages into response messages using the data stored in the memory. The processor further comprises a memory manager, including means for logically segmenting the memory storing the data into at least one protected segment, and a means for controlling access to the protected segment.Type: ApplicationFiled: December 4, 1996Publication date: December 27, 2001Inventors: DOMINIQUE VINCENT PAVLIN, MEHDI SOTOODEH, REED H. TIBBETTS, PATRICK N. GODDING, ALAIN RAYMOND SPIEWEK, ROGER GRAHAM NIXON