Patents by Inventor Robert J. Relyea
Robert J. Relyea has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12355874Abstract: Stateful hash-based signatures can be implemented using a secure device. For example, a computing device can transmit a request to a secure device to obtain a partial digital signature usable to cryptographically sign data, where the secure device is separate from the computing device. The secure device can generate the partial digital signature using a private key, which is generated by the secure device based on a counter value. The counter value is maintained internally to the secure device. The computing device can then receive, from the secure device, the partial digital signature and the counter value corresponding to the private key. The computing device can construct a full digital signature, to cryptographically sign the data, based on the partial digital signature and the counter value.Type: GrantFiled: April 24, 2023Date of Patent: July 8, 2025Assignee: Red Hat, Inc.Inventor: Robert J. Relyea
-
Publication number: 20240356736Abstract: Stateful hash-based signatures can be implemented using a secure device. For example, a computing device can transmit a request to a secure device to obtain a partial digital signature usable to cryptographically sign data, where the secure device is separate from the computing device. The secure device can generate the partial digital signature using a private key, which is generated by the secure device based on a counter value. The counter value is maintained internally to the secure device. The computing device can then receive, from the secure device, the partial digital signature and the counter value corresponding to the private key. The computing device can construct a full digital signature, to cryptographically sign the data, based on the partial digital signature and the counter value.Type: ApplicationFiled: April 24, 2023Publication date: October 24, 2024Inventor: Robert J. RELYEA
-
Patent number: 12058112Abstract: Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. The cryptographic system includes a memory to store encrypted data, and a processing device, operatively coupled to the memory, to identify a public key for a communications device in response to an indication of a presence of the communications device on a network. A first intermediate is determined in view of the public key for the communications device and in view of an acquisitioning public key. The acquisitioning public key is associated with the encrypted data. A second intermediate public key is received from the communications device in view of the first intermediate public key. Thereupon, the encrypted data is decrypted using an encryption key derived at least from the second intermediate public key.Type: GrantFiled: May 21, 2021Date of Patent: August 6, 2024Assignee: Red Hat, Inc.Inventors: Nathaniel McCallum, Robert J. Relyea
-
Publication number: 20210281550Abstract: Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. The cryptographic system includes a memory to store encrypted date, and a processing device, operatively coupled to the memory, to identify a public key for a communications device in response to an indication of a presence of the communications device on a network. A first intermediate is determined in view of the public key for the communications device and in view of an acquisitioning public key. The acquisitioning public key is associated with the encrypted data. A second intermediate public key is received from the communications device in view of the first intermediate public key. Thereupon, the encrypted data is decrypted using an encryption key derived at least from the second intermediate public key.Type: ApplicationFiled: May 21, 2021Publication date: September 9, 2021Inventors: Nathaniel McCallum, Robert J. Relyea
-
Patent number: 11032254Abstract: Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. The cryptographic system includes a memory to store encrypted data, and a processing device, operatively coupled to the memory, to identify a public key for a communications device in response to an indication of a presence of the communications device on a network. A first intermediate is determined in view of the public key for the communications device and in view of an acquisitioning public key. The acquisitioning public key associated with the encrypted data. A second intermediate public key is received from the communications device in view of the first intermediate public key. Thereupon, the encrypted data is decrypted using an encryption key derived at least from the second intermediate public key.Type: GrantFiled: September 6, 2016Date of Patent: June 8, 2021Assignee: Red Hat, Inc.Inventors: Nathaniel McCallum, Robert J. Relyea
-
Patent number: 10129025Abstract: Implementations of the disclosure provide for binding data to a network in the presence of an entity with revocation capabilities. A cryptographic system is provided that includes a memory to store revocation information comprising a plurality of identifiers and a processing device operatively coupled to the memory. A provisioning public key is recovered in view of a first intermediate public key associated with a client device storing encrypted data. A binding identifier is generated for the client device in view of the provisioning public key. It is determined whether access to the encrypted data associated with the binding identifier is revoked or allowed in view of the revocation information. Responsive to determining that the access is allowed, provide a second intermediate public key to derive an encryption key to access the encrypted data in view of at least the provisioning public key and the first intermediate public key.Type: GrantFiled: September 19, 2016Date of Patent: November 13, 2018Assignee: Red Hat, Inc.Inventors: Nathaniel McCallum, Robert J. Relyea
-
Publication number: 20180083778Abstract: Implementations of the disclosure provide for binding data to a network in the presence of an entity with revocation capabilities. A cryptographic system is provided that includes a memory to store revocation information comprising a plurality of identifiers and a processing device operatively coupled to the memory. A provisioning public key is recovered in view of a first intermediate public key associated with a client device storing encrypted data. A binding identifier is generated for the client device in view of the provisioning public key. It is determined whether access to the encrypted data associated with the binding identifier is revoked or allowed in view of the revocation information. Responsive to determining that the access is allowed, provide a second intermediate public key to derive an encryption key to access the encrypted data in view of at least the provisioning public key and the first intermediate public key.Type: ApplicationFiled: September 19, 2016Publication date: March 22, 2018Inventors: Nathaniel McCallum, Robert J. Relyea
-
Publication number: 20180069842Abstract: Implementations of the disclosure provide for binding data to a network in the presence of an entity. In one implementation, a cryptographic system is provided. The cryptographic system includes a memory to store encrypted data, and a processing device, operatively coupled to the memory, to identify a public key for a communications device in response to an indication of a presence of the communications device on a network. A first intermediate is determined in view of the public key for the communications device and in view of an acquisitioning public key. The acquisitioning public key associated with the encrypted data. A second intermediate public key is received from the communications device in view of the first intermediate public key. Thereupon, the encrypted data is decrypted using an encryption key derived at least from the second intermediate public key.Type: ApplicationFiled: September 6, 2016Publication date: March 8, 2018Inventors: Nathaniel McCallum, Robert J. Relyea
-
Patent number: 5574911Abstract: An intelligent system for the efficient selection and allocation of the various types of resources available in a multimedia environment. The system interrelates a combination of user input parameters with the resident hardware and software parameters of the requesting multimedia resources by grouping into common computing needs. In addition to traditionally known hardware/software parameters the system recognizes specific limitations of resources which would effect a proper multimedia presentation to the end user. The system uses an internal graph structure to interrelate the various resources as they are allocated to proved for an intelligent data flow.Type: GrantFiled: December 4, 1995Date of Patent: November 12, 1996Assignee: International Business Machines CorporationInventors: Stephen D'Angelo, Steven H. Goldberg, Robert J. Relyea, Lars C. Wolf