Patents by Inventor Sergey Bezzateev

Sergey Bezzateev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070192600
    Abstract: A key handshake method in a wireless local area network (LAN) capable of performing authentication between two wirelessly connected stations by exchanging keys once is provided. Because the security key for authentication can be exchanged by one 4-way handshake between an authenticator and a supplicant in a wireless LAN, an authentication delay can be prevented.
    Type: Application
    Filed: May 23, 2006
    Publication date: August 16, 2007
    Inventors: Marcus Wong, Sergey Bezzateev
  • Publication number: 20070180256
    Abstract: An apparatus and method are provided for reducing time taken for generating a digital signature and generating the digital signature using a minimum number of operations using at least two secret keys. One secret key among at least two secret keys may be set from a value resulting from hashing a message to be transmitted. A number of times for hashing the secret key is determined, and a value resulting from hashing the determined secret key by the determined hashing number of times is set as the digital signature.
    Type: Application
    Filed: March 3, 2006
    Publication date: August 2, 2007
    Inventors: Mi-suk Huh, Kyung-hee Lee, Tae-chul Jung, Sergey Bezzateev, Alexey Sitalov
  • Publication number: 20070174626
    Abstract: Provided are a method and an apparatus for generating and validating a digital signature. The apparatus for generating the digital signature includes: a converter converting a message to be transmitted into a codeword having a set length using a Griesmer code; and a digital signature generator allowing each of bits constituting the codeword to correspond to one of a plurality of secret keys constituting a table and combining the corresponding secret keys to generate the digital signature. The apparatus for validating the digital signature includes: a converter converting a received message into a codeword having a set length using a Griesmer code; and a digital signature validator allowing each of bits constituting the codeword to correspond to one of a plurality of public keys constituting a table and validating whether a value obtained by combining the corresponding public keys is equal to a value obtained by hashing the digital signature.
    Type: Application
    Filed: March 3, 2006
    Publication date: July 26, 2007
    Inventors: Mi-suk Huh, Kyung-hee Lee, Tae-chul Jung, Alexandra Afanasyeva, Sergey Bezzateev, Evgeny Krouk, Alexey Sitalov, Mikhail Stepanov
  • Publication number: 20060188095
    Abstract: A combination encoding method, a transmitting apparatus thereof, a combination decoding method, and a receiving apparatus thereof are provided. The transmitting apparatus includes a combination encoding unit for performing combination encoding on a source coded message and outputting the combination encoded message, thereby performing encrypting and channel encoding simultaneously. The receiving apparatus includes a combination decoding unit for performing combination decoding on the noise-added combination encoded message from the demodulator, and outputting a source coded message, thereby simultaneously performing channel decoding and decrypting on the noise-added combination encoded message.
    Type: Application
    Filed: February 24, 2006
    Publication date: August 24, 2006
    Inventors: Tae-chul (Edward) Jung, Kyung-hee Lee, Evgeny Krouk, Evgeny Linsky, Sergey Bezzateev
  • Publication number: 20050117745
    Abstract: A data encryption method using a public key includes encoding data into a first code using a first public key, selecting a predetermined error vector, encoding the selected error vector into a second code using a second public key, and generating a ciphertext by adding the first and second codes. A corresponding decryption method includes performing first decoding of the ciphertext using a first set of a plurality of secret keys, determining locations of errors in the result of the first decoding using a second set of the plurality of secret keys and declaring erasures to the locations, performing second decoding according to a predetermined decoding algorithm and correcting a predetermined number of errors and the declared erasures, and detecting data from a result of correcting the errors and erasures.
    Type: Application
    Filed: October 8, 2004
    Publication date: June 2, 2005
    Inventors: Kyung-hee Lee, Tae-chul Jung, Evgeny Krouk, Sergey Bezzateev, Alexey Fomin
  • Publication number: 20050111657
    Abstract: A weighted secret sharing and reconstructing method includes encoding the secret using a predetermined code, producing voices so that different weights are assigned to errors in an error vector according to locations of the errors, encrypting the encoded secret using the error vector and distributing the encrypted encoded secret to a plurality of participants.
    Type: Application
    Filed: October 8, 2004
    Publication date: May 26, 2005
    Applicant: Samsung Electronics Co., Ltd.
    Inventors: Kyung-hee Lee, Tae-chul Jung, Evgeny Krouk, Sergey Bezzateev, Evgeny Linsky
  • Publication number: 20050114660
    Abstract: An encryption method for encrypting data for multi-level access control in an ad-hoc network including hierarchical security classes includes encoding data into a predetermined code using a first public key of a highest security class, adding a private key of a security class to which a user belongs, to the predetermined code, and generating a ciphertext by adding a second public key, published by the security class to which the user belongs, to the addition result. A corresponding decryption method includes subtracting the private key from the ciphertext, performing a first decoding using a secret key known by a security class, to which a receiver belongs, by the receiver of the ciphertext, and correcting errors included in the second public key and detecting the data by performing a second decoding of the result of the first decoding using a code known by the security class to which the receiver belongs.
    Type: Application
    Filed: October 8, 2004
    Publication date: May 26, 2005
    Inventors: Kyung-hee Lee, Tae-chul Jung, Evgeny Krouk, Alexey Sitalov, Sergey Bezzateev