Patents by Inventor Sahil Chadha
Sahil Chadha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11956357Abstract: Techniques are shown for key management using a traceable key blockchain. A first block corresponding to a cryptographic key is generated on the blockchain, and the first block is securely modified to include metadata describing a key source for the cryptographic key. A second block corresponding to a first key transaction with the cryptographic key is generated on the blockchain, the second block is linked to the first block, and the second block is securely modified to include metadata describing the first key transaction with the cryptographic key.Type: GrantFiled: July 7, 2023Date of Patent: April 9, 2024Assignee: eBay Inc.Inventors: Michael J. T. Chan, Sean R. Embry, Derek A. Chamorro, Anuj Kaul, Sahil Chadha, Nikhil Firke
-
Publication number: 20230353357Abstract: Techniques are shown for key management using a traceable key blockchain. A first block corresponding to a cryptographic key is generated on the blockchain, and the first block is securely modified to include metadata describing a key source for the cryptographic key. A second block corresponding to a first key transaction with the cryptographic key is generated on the blockchain, the second block is linked to the first block, and the second block is securely modified to include metadata describing the first key transaction with the cryptographic key.Type: ApplicationFiled: July 7, 2023Publication date: November 2, 2023Inventors: Michael J.T. CHAN, Sean R. EMBRY, Derek A. CHAMORRO, Anuj KAUL, Sahil CHADHA, Nikhil FIRKE
-
Patent number: 11736288Abstract: Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a key block on a block-chain ledger corresponding to the cryptographic key, and securely modifying the key block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block on the block-chain ledger corresponding to the first key transaction with the cryptographic key, linking the first transaction block to the key block and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.Type: GrantFiled: July 29, 2021Date of Patent: August 22, 2023Assignee: eBay Inc.Inventors: Michael J. T. Chan, Sean R. Embry, Derek A. Chamorro, Anuj Kaul, Sahil Chadha, Nikhil Firke
-
Publication number: 20220014370Abstract: Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a key block on a block-chain ledger corresponding to the cryptographic key, and securely modifying the key block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block on the block-chain ledger corresponding to the first key transaction with the cryptographic key, linking the first transaction block to the key block and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.Type: ApplicationFiled: July 29, 2021Publication date: January 13, 2022Inventors: Michael J.T. CHAN, Sean R. EMBRY, Derek A. CHAMORRO, Anuj KAUL, Sahil CHADHA, Nikhil FIRKE
-
Patent number: 11108554Abstract: Techniques are shown for key tracing using a traceable key block-chain ledger involving, in response to detection of an attack on a resource protected by a cryptographic key, retrieving a key block-chain ledger corresponding to the cryptographic key having one or more transaction blocks. Each transaction block corresponds to a key transaction with the cryptographic key and includes metadata describing the key transaction with the cryptographic key. Metadata from the transaction blocks in the key block-chain ledger is used to trace the key transactions of the cryptographic key to a point of attack. A transaction block corresponding to the point of attack is determined and an alert is generated indicating the point of attack with metadata from the transaction block corresponding to the point of attack.Type: GrantFiled: April 7, 2020Date of Patent: August 31, 2021Assignee: EBAY INC.Inventors: Michael J. T. Chan, Sean R. Embry, Derek A. Chamorro, Anuj Kaul, Sahil Chadha, Nikhil Firke
-
Patent number: 10798129Abstract: Multiuse certificates (e.g., wildcard certificates) can be associated with policies that specify one or more computational constraints, e.g., limited processor power, limited access time, limited access to file system usage, or limited memory access. An application associated with a multiuse certificate can be monitored to ensure that the specified computational constraints are not violated. Upon the computational constraints being violated, the multiuse certificate can be invalidated and/or authentication requests rejected.Type: GrantFiled: September 11, 2017Date of Patent: October 6, 2020Assignee: EBAY INC.Inventors: Nikhil Firke, Michael Chan, Ralph Forsythe, Brian Peter Dickson, Akhila Nama, Nigel Campbell, Sahil Chadha
-
Publication number: 20200235926Abstract: Techniques are shown for key tracing using a traceable key block-chain ledger involving, in response to detection of an attack on a resource protected by a cryptographic key, retrieving a key block-chain ledger corresponding to the cryptographic key having one or more transaction blocks. Each transaction block corresponds to a key transaction with the cryptographic key and includes metadata describing the key transaction with the cryptographic key. Metadata from the transaction blocks in the key block-chain ledger is used to trace the key transactions of the cryptographic key to a point of attack. A transaction block corresponding to the point of attack is determined and an alert is generated indicating the point of attack with metadata from the transaction block corresponding to the point of attack.Type: ApplicationFiled: April 7, 2020Publication date: July 23, 2020Inventors: Michael J.T. CHAN, Sean R. EMBRY, Derek A. CHAMORRO, Anuj KAUL, Sahil CHADHA, Nikhil FIRKE
-
Patent number: 10715323Abstract: Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a genesis block for a key block-chain ledger corresponding to the cryptographic key, and securely modifying the genesis block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block corresponding to the first key transaction with the cryptographic key and adding the first transaction block to the key block-chain ledger, and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.Type: GrantFiled: December 29, 2017Date of Patent: July 14, 2020Assignee: EBAY INC.Inventors: Michael J. T. Chan, Sean R. Embry, Derek A. Chamorro, Anuj Kaul, Sahil Chadha, Nikhil Firke
-
Publication number: 20190207759Abstract: Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a genesis block for a key block-chain ledger corresponding to the cryptographic key, and securely modifying the genesis block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block corresponding to the first key transaction with the cryptographic key and adding the first transaction block to the key block-chain ledger, and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.Type: ApplicationFiled: December 29, 2017Publication date: July 4, 2019Inventors: Michael J.T. CHAN, Sean R. EMBRY, Derek A. CHAMORRO, Anuj KAUL, Sahil CHADHA, Nikhil FIRKE
-
Publication number: 20190014151Abstract: Multiuse certificates (e.g., wildcard certificates) can be associated with policies that specify one or more computational constraints, e.g., limited processor power, limited access time, limited access to file system usage, or limited memory access. An application associated with a multiuse certificate can be monitored to ensure that the specified computational constraints are not violated. Upon the computational constraints being violated, the multiuse certificate can be invalidated and/or authentication requests rejected.Type: ApplicationFiled: September 11, 2017Publication date: January 10, 2019Inventors: Nikhil Firke, Michael Chan, Ralph Forsythe, Brian Peter Dickson, Akhila Nama, Nigel Campbell, Sahil Chadha