Patents by Inventor Royce Slick

Royce Slick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8447977
    Abstract: The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token.
    Type: Grant
    Filed: December 9, 2008
    Date of Patent: May 21, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventors: Royce Slick, Don Matsubayashi, Kevin Piazza, Dariusz Dusberger, Neil Iwamoto
  • Publication number: 20100146275
    Abstract: The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token.
    Type: Application
    Filed: December 9, 2008
    Publication date: June 10, 2010
    Applicant: Canon Kabushiki Kaisha
    Inventors: Royce Slick, Don Matsubayashi, Kevin Piazza, Dariusz Dusberger, Neil Iwamoto
  • Publication number: 20070150420
    Abstract: The invention provides for installing encryption keys on a device not having any previous security credentials. An installation authority generates a security token to be used by the device for secure communications, and an installation credential for the device, and stores them in association with one another. A user of the device is provided with the installation credential, whereby the user inputs the installation credential into the device. The device utilizes the installation credential as a temporary security key, establishes a secure communication channel with the installation authority and requests provision of the security token. The installation authority provides the security token associated with the installation credential to the device over the established secure communication channel, and the device installs the security token, after which the device erases the installation credential from the device.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Inventors: Neil Iwamoto, Royce Slick, Craig Mazzagatte, Martin Martinez
  • Publication number: 20050289344
    Abstract: Security against replay of a message by generating a list of unique message enabling codes (TATs) in a first device and storing the list in a second device. A message generated in the first device, which includes at least one of the unique message enabling codes from the list, is transmitted to the second device. The unique message enabling code of the received message is compared with the list stored in the second device to determine whether or not to enable processing of the message by the second device. If the unique message enabling code received with the message is included in the stored list, processing of the message is enabled and, the corresponding unique message enabling code is deleted from the stored list. If the unique message enabling code received with the message is not included in the stored list, processing of the message is rejected.
    Type: Application
    Filed: June 25, 2004
    Publication date: December 29, 2005
    Inventors: Royce Slick, Neil Iwamoto, Martin Martinez
  • Publication number: 20050235145
    Abstract: A file format for a secure file for use with a block cipher or a stream cipher, the secure file having a secure client header and a data block appended to the secure client header. The client header has a client information block comprised of a public information block, a private information block and an initialization vector. At least a portion of the private information block is encrypted, and a client information block integrity check value is appended to the client information block, the client information block integrity check value being obtained by performing an integrity check on the client information block. The data block is preferably encrypted and is comprised of a plurality of encrypted data blocks each appended with its own respective integrity check result value.
    Type: Application
    Filed: June 7, 2005
    Publication date: October 20, 2005
    Applicant: CANON KABUSHIKI KAISHA
    Inventors: Royce Slick, Neil Iwamoto