Patents by Inventor Serge Jean Maurice Mister

Serge Jean Maurice Mister has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11930125
    Abstract: Root certificates generated by root certificate authorities may be bound at the time of generation. In an example, a first root certificate can include an identity of a first root certificate authority, a first key identifier associated with a first key of the first root certificate authority and an identity of a first digital signature algorithm used by the first root certificate authority. The first root certificate can also include at least one extension including a second key identifier of a second key associated with the second root certificate authority and an identity of a second digital signature algorithm used by the second root certificate authority, the second digital signature algorithm being different from the first digital signature algorithm.
    Type: Grant
    Filed: August 17, 2021
    Date of Patent: March 12, 2024
    Assignee: Entrust Corporation
    Inventors: Michael Ounsworth, John Robert Gray, Serge Jean Maurice Mister
  • Patent number: 11909893
    Abstract: Content, such as an encryption key, may be transmitted between computing systems that both use more than one encryption algorithm. Secrets may be used to encode the content. The different encryption algorithms may be used to separately encrypt the encoded content and the secrets prior to communicating the encrypted, encoded content and encrypted secrets between computing systems.
    Type: Grant
    Filed: June 27, 2022
    Date of Patent: February 20, 2024
    Assignee: Entrust Corporation
    Inventors: Michael Ounsworth, John Robert Gray, Serge Jean Maurice Mister
  • Publication number: 20230325508
    Abstract: A configuration information management system is provided for secure update of dynamic configuration data in a containerized execution environment. A configuration container may be maintained within the environment separately from an application container hosting a secure enterprise application. The secure enterprise application may require secure configuration information for interaction via a secured connection with one or more remote endpoints from within the application container. The configuration container hosts a service that is configured to maintain the secure configuration information on behalf of the secure enterprise application, allowing the secure enterprise application to not persist secure configuration information within the application container.
    Type: Application
    Filed: April 7, 2023
    Publication date: October 12, 2023
    Inventors: THOMAS P. CHMARA, XAVIER GUARCH, MICHAEL OUNSWORTH, ANDREW ASSALY, CHAD AUTRY, SERGE JEAN MAURICE MISTER
  • Publication number: 20230093146
    Abstract: Methods and systems for cross-certification to bind together two cryptographic systems are disclosed. One method includes receiving, from a first certificate authority at a second certificate authority, a cross certificate request, the cross certificate request including an attribute unique to the first certificate authority. The method includes generating a cross certificate and embedding the hash value as a certificate extension within the cross certificate.
    Type: Application
    Filed: December 1, 2022
    Publication date: March 23, 2023
    Inventors: JOHN ROBERT GRAY, MICHAEL OUNSWORTH, SERGE JEAN MAURICE MISTER
  • Publication number: 20220417037
    Abstract: Content, such as an encryption key, may be transmitted between computing systems that both use more than one encryption algorithm. Secrets may be used to encode the content. The different encryption algorithms may be used to separately encrypt the encoded content and the secrets prior to communicating the encrypted, encoded content and encrypted secrets between computing systems.
    Type: Application
    Filed: June 27, 2022
    Publication date: December 29, 2022
    Inventors: MICHAEL OUNSWORTH, JOHN ROBERT GRAY, SERGE JEAN MAURICE MISTER
  • Publication number: 20220060341
    Abstract: Root certificates generated by root certificate authorities may be bound at the time of generation. In an example, a first root certificate can include an identity of a first root certificate authority, a first key identifier associated with a first key of the first root certificate authority and an identity of a first digital signature algorithm used by the first root certificate authority. The first root certificate can also include at least one extension including a second key identifier of a second key associated with the second root certificate authority and an identity of a second digital signature algorithm used by the second root certificate authority, the second digital signature algorithm being different from the first digital signature algorithm.
    Type: Application
    Filed: August 17, 2021
    Publication date: February 24, 2022
    Inventors: MICHAEL OUNSWORTH, JOHN ROBERT GRAY, SERGE JEAN MAURICE MISTER
  • Publication number: 20210392002
    Abstract: Methods and systems for cross-certification to bind together two cryptographic systems are disclosed. One method includes receiving, from a first certificate authority at a second certificate authority, a cross certificate request, the cross certificate request including an attribute unique to the first certificate authority. The method also includes calculating a signature at the second certificate authority based at least in part on the attribute, and calculating a hash value based on a combination of the signature calculated at the second certificate authority and a key associated with the second certificate authority. The method includes generating a cross certificate and embedding the hash value as a certificate extension within the cross certificate.
    Type: Application
    Filed: June 10, 2021
    Publication date: December 16, 2021
    Inventors: JOHN Robert GRAY, Michael OUNSWORTH, SERGE Jean Maurice MISTER
  • Patent number: 9954860
    Abstract: In one example, a proxy server acts as a gateway to a website and modifies the traffic between a web browser on a user device and the website server, as necessary to request protection by providing step-up authentication and/or transaction verification. The proxy server blocks transactions when protection is required but has not occurred (either because the authentication was not proper or due to the detection of another problem). Associated methods and systems are also provided.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: April 24, 2018
    Assignee: Entrust, Inc.
    Inventors: Christopher D. Wood, Michael Holtstrom, Roland Thomas Lockhart, Murray McCulligh, Serge Jean Maurice Mister, Greg Wetmore
  • Publication number: 20140373093
    Abstract: In one example, a proxy server acts as a gateway to a website and modifies the traffic between a web browser on a user device and the website server, as necessary to request protection by providing step-up authentication and/or transaction verification. The proxy server blocks transactions when protection is required but has not occurred (either because the authentication was not proper or due to the detection of another problem). Associated methods and systems are also provided.
    Type: Application
    Filed: March 13, 2014
    Publication date: December 18, 2014
    Applicant: Entrust, Inc.
    Inventors: Christopher D. Wood, Michael Holtstrom, Roland Thomas Lockhart, Murray McCulligh, Serge Jean Maurice Mister, Greg Wetmore
  • Patent number: 8769433
    Abstract: A method and apparatus for protecting communication of information through a graphical user interface displays a graphical user interface that includes a trusted interaction window. In one example, the method includes continuously determining whether information has been overlayed on top of at least a portion of the displayed trusted interaction window and then disabling an operation being requested when an overlay condition has been determined. In one example, the trusted interaction window is maintained to be the top most window when it is called by an application, for example, during an online transaction, or any other suitable action. The trusted interaction window may be generated via a browser, or operating system, or any other suitable application. As such, the trusted interaction window detects when another window is overlayed on top of it, such as a chromeless window, thereby preventing an unscrupulous party from tricking the user or obtaining sensitive information.
    Type: Grant
    Filed: May 13, 2005
    Date of Patent: July 1, 2014
    Assignee: Entrust, Inc.
    Inventor: Serge Jean Maurice Mister
  • Patent number: 7328457
    Abstract: A method and apparatus facilitates the prevention of interception of incoming data, such as keystroke data in the form of a message to an application, by inserting application generated random insertion data into a message stream. The random insertion data is related to actual data that is being generated for a software application so that it is difficult for an attacker to distinguish between actual message data and inserted message data. The system and method then reads incoming data typically in the form of messages, and filters out the messages that it determines were knowingly inserted. The remaining received messages are determined to be actual data from the data source, such as a keyboard, voice input or other suitable data source. In one embodiment, the system effectively hides actual input data such as actual keystrokes in a stream of randomly generated fake keystrokes.
    Type: Grant
    Filed: June 30, 1999
    Date of Patent: February 5, 2008
    Assignee: Entrust Limited
    Inventor: Serge Jean Maurice Mister