Patents by Inventor Sergey Ignatchenko

Sergey Ignatchenko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140282906
    Abstract: The systems, methods and apparatuses described herein provide a computing device that is configured to attest itself to a communication partner. In one aspect, the computing device may comprise a communication port configured to receive an attestation request from the communication partner, and an application-specific integrated circuit (ASIC). The ASIC may be configured to receive the attestation request from the communication port. The attestation request may include a nonce generated at the communication partner. The ASIC may be further generate a verification value and send the verification value to the communication port to be transmitted back to the communication partner. The verification value may be a computation result of a predefined function taking the nonce as an initial value. In another aspect, the communication partner is configured to attest the computing device using speed of computation attestation.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 18, 2014
    Applicant: OLogN Technologies AG
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20140281587
    Abstract: The systems, methods and apparatuses described herein provide a system for accessing data stored securely external of a computer processor. In one aspect, the computer processor may comprise a central processing unit (CPU) and a memory controller. The memory controller may comprise a storage to store a key, a first set of circuitry and a security module. The first set of circuitry may be configured to receive a request for a piece of data from the CPU, determine that the requested piece of data needs to be read from an external storage stored in a secured format and read the piece of data from the external storage in the secured format. The security module may be configured to perform at least one of authentication and decryption on the piece of data in the secured format using the key stored in the storage.
    Type: Application
    Filed: March 12, 2014
    Publication date: September 18, 2014
    Applicant: OLogN Technologies AG
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20140282875
    Abstract: The systems, methods and apparatuses described herein provide a computing device configured for ensuring its proximity to a communication partner. In one aspect, the computing device may comprise a communication port and a processor. The processor may be configured to receive a message from the communication partner via the communication port, send a response to the message to the communication partner, generate a secondary value that includes a selected portion of the message and a selected portion of the response, generate authenticating data to authenticate the secondary value and send the generated secondary value and authenticating data to the communication partner via the communication port. In another aspect, the communication partner is configured to ensure proximity of the computing device.
    Type: Application
    Filed: March 11, 2014
    Publication date: September 18, 2014
    Applicant: OLogN Technologies AG
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20140270557
    Abstract: A system including a source display, externally updatable, an image compression algorithm database, a network connection, and a frame transfer engine. The algorithm database comprises a plurality of image compression algorithms. The frame transfer engine is configured to receive a plurality of updates made to the source display, store at least some of the updates in a queue, and select, based on a bandwidth of the network connection, a size of the update, and sizes and times of updates currently present in the queue, an image compression algorithm in the algorithm database for current transfer over the network connection.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Applicant: OLogN Technologies AG
    Inventors: Sergey Ignatchenko, Dmitri Ligoum
  • Publication number: 20140282878
    Abstract: The methods, apparatuses and systems described herein provide a system for authenticating users, authorization or information during secure transactions. The system may include a transaction device requiring user authentication, a personal communication device, and a wearable authentication device that communicates with both of the other devices. In one aspect, the wearable authentication device may be configured to communicate with the transaction device requiring authentication and the personal communication device through one or more wireless communication technologies, wherein the wearable authentication device may be configured to act as an intermediary between the transaction device and the personal communication device to facilitate the exchange of at least one authentication information or transaction completion information between the personal communication device and the transaction device.
    Type: Application
    Filed: March 13, 2014
    Publication date: September 18, 2014
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20140250875
    Abstract: The systems, methods and apparatuses described herein provide a footwear hydraulic system for harvesting power generated by pressing a foot on a surface and providing a cushion for the impact. In certain aspects, a hydraulic system for a footwear may comprise at least one chamber with a first and second compartments separated by an elastic membrane. The first compartment may be filled with gas and the second compartment may be filled with liquid. The gas may provide impact cushion and transient energy storage, and the liquid may pressured to push a generator to produce energy. The pressure may be generated by pressing the footwear on a surface and/or the elastic membrane of the chamber trying to restore its shape.
    Type: Application
    Filed: March 5, 2014
    Publication date: September 11, 2014
    Applicant: OLogN Technologies AG
    Inventors: Georgii IGNATCHENKO, Sergey IGNATCHENKO
  • Publication number: 20140006788
    Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages private key storage. An apparatus according to the present disclosure may comprise a first non-volatile storage for storing a private root key for signing digital certificates, an input device for receiving manual input from an operator, a communication interface consisting of a one-way transmitter for transmitting information from the apparatus, and a processor. The processor may be configured to retrieve the private root key from the first non-volatile storage, receive information for a new digital certificate through the input device, generate the new digital certificate according to the received information, sign the new digital certificate using the private root key and transmit the new digital certificate from the apparatus using the transmitter.
    Type: Application
    Filed: June 27, 2013
    Publication date: January 2, 2014
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20130346747
    Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages root certificates. An apparatus according to the present disclosure may comprise a non-volatile storage storing a plurality of root certificates and a supervisor. The supervisor may be configured to receive a message identifying one of the plurality of root certificates stored in the non-volatile storage to be revoked, verify the message being signed by at least two private keys corresponding to two root certificates stored in the non-volatile storage and revoke the root certificate identified in the message.
    Type: Application
    Filed: June 21, 2013
    Publication date: December 26, 2013
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20130346760
    Abstract: The systems, methods and apparatuses described herein provide a computing environment that manages application specific identification of devices. An apparatus according to the present disclosure may comprise a non-volatile storage storing identifier (ID) base data and a processor. The processor may be configured to validate a certificate of an application being executed on the apparatus. The certificate may contain a code signer ID for a code signer of the application. The processor may further be configured to receive a request for a unique ID of the application, generate the unique ID from the code signer ID and the ID base data and return the generated unique ID.
    Type: Application
    Filed: June 25, 2013
    Publication date: December 26, 2013
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20130343674
    Abstract: Methods, computer devices, and computer readable media containing instructions for executing such methods are provided for the modification of digital images having a plurality of visual elements.
    Type: Application
    Filed: June 7, 2013
    Publication date: December 26, 2013
    Applicant: RATIONAL INTELLECTUAL HOLDINGS LIMITED
    Inventors: Sergey IGNATCHENKO, Victor GAVRYSH, Dmitri LIGOUM
  • Publication number: 20130339742
    Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes secure time management. An apparatus according to the present disclosure may comprise a non-volatile storage to store a synchronization time and a processor. The processor may be configured to generate a request for a current time, transmit the request to a trusted timekeeper, receive a digitally signed response containing a current, real-world time from the trusted timekeeper, verify the digital signature of the response, verify that the response is received within a predefined time, compare a nonce in the request to a nonce in the response, determine that the current, real-world time received from the trusted timekeeper is within a range of a current time calculated at the apparatus and update the synchronization time with the current, real-world time in the response.
    Type: Application
    Filed: June 18, 2013
    Publication date: December 19, 2013
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20130339746
    Abstract: The systems, methods and apparatuses described herein provide a computing environment for authenticating a user. An apparatus according to the present disclosure may comprise a non-volatile storage, a user interface, and a password engine. The password engine is configured to retrieve two or more predetermined prompts from the non-volatile storage, present the two or more predetermined prompts on the user interface to a user in a random order, receive a first set of input(s) in response to the two or more predetermined prompts, create an encryption keyword from the received first set of input(s) according to an original order of the two or more predetermined prompts stored in the non-volatile storage, and use the encryption keyword to authenticate the user.
    Type: Application
    Filed: June 18, 2013
    Publication date: December 19, 2013
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20130283353
    Abstract: An apparatus according to the present disclosure may comprise a secure zone configured to execute a task having a subtask. The task and subtask may have respective executable code and may be digitally signed by respective code providers. The secure zone may be further configured to apply respective sets of permissions while the respective executable code of the task and subtask are executed. The respective set of permissions for the task may be based on at least one of information associated with the signed task and information in a digital certificate of the respective code provider for the task. The respective set of permissions for the subtask may be based on at least one of information associated with the signed subtask and information in a digital certificate of the respective code provider for the subtask.
    Type: Application
    Filed: April 19, 2013
    Publication date: October 24, 2013
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20130276064
    Abstract: The systems, methods and apparatuses described herein provide a computing environment that includes a secure zone for executing tasks. An apparatus according to the present disclosure may comprise a screen, a secure zone and an indicator operatively controlled by the secure zone. The secure zone may be configured to execute a task and to assume control over an output to the screen while the apparatus is operating in a secure mode and to transfer control over the output to the screen to a non-secure zone while the apparatus is operating in a non-secure mode.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 17, 2013
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20130275755
    Abstract: The systems, methods and apparatuses described herein permit encrypted media content to be processed by a plurality of media processing blocks before being displayed on a screen. An apparatus according to the present disclosure may comprise a communication interface to receive an encrypted, encoded media stream, a first and second media processing blocks, and a screen for displaying decoded media stream. The first media processing block may decrypt the encrypted, encoded media stream to obtain the encoded media stream using a first key, decode the encoded media stream and encrypt the decoded media stream using a second key before transmitting it to the second media processing block. The second media processing block may decrypt the media stream using the second key and process the media stream using a screen controller before transmitting the media stream to the screen.
    Type: Application
    Filed: April 11, 2013
    Publication date: October 17, 2013
    Inventor: Sergey IGNATCHENKO
  • Publication number: 20130275306
    Abstract: The systems, methods and apparatuses described herein provide a computing environment for completing a secure transaction. An apparatus according to the present disclosure may comprise a screen, a first switching device coupled to the screen, an input device, a second switching device coupled to the input device, a non-secure processor, a secure processor and a credit card reader operatively coupled to the secure processor. The non-secure processor may generate a message containing a purchase transaction request. The secure processor may receive the message, assume control of the screen and input device while the apparatus is operating in a secure mode, establish a secure connection with a server, receive payment information to be submitted to the server, digitally sign certain transaction information and submit the digitally signed certain transaction information to the server to complete the secure transaction.
    Type: Application
    Filed: April 12, 2013
    Publication date: October 17, 2013
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20130232339
    Abstract: The systems, methods and apparatuses described herein permit encrypted media content to be displayed by a display device under control of a local device. The local device may comprise a computer processor to control playing of the encrypted media content and a first communication interface to transmit an association encryption envelope and, according to the control, the encrypted media content. The display device may comprise a second communication interface coupled to the first interface to receive the encrypted media content and the association encryption envelope, a decryption engine to decrypt the association encryption envelope using a private key of the display device to recover a symmetric encryption key used to encrypt the encrypted media content and decrypt the encrypted media content using the recovered symmetric encryption key, and a decoder to decode the decrypted media content for display on a display screen according to the control.
    Type: Application
    Filed: February 25, 2013
    Publication date: September 5, 2013
    Inventors: Sergey IGNATCHENKO, Dmytro IVANCHYKHIN
  • Publication number: 20130230171
    Abstract: The systems, methods and apparatuses described herein permit encrypted media content to be displayed by an apparatus for a restricted time period. The apparatus may comprise a communication interface configured to couple to a controlling device to transmit a first nonce and to receive the encrypted media content and an association encryption envelope. The association encryption envelope may comprise at least a second nonce and a first time restriction expressed as a first time interval. The apparatus may further comprise a counter, a storage configured to store a value of the counter representing a time of when the first nonce is transmitted, and an engine configured to perform operations according to the first time restriction.
    Type: Application
    Filed: February 28, 2013
    Publication date: September 5, 2013
    Inventors: Dmytro IVANCHYKHIN, Sergey IGNATCHENKO
  • Patent number: 8483514
    Abstract: Methods, computer devices, and computer readable media containing instructions for executing such methods are provided for the modification of digital images having a plurality of visual elements.
    Type: Grant
    Filed: November 17, 2011
    Date of Patent: July 9, 2013
    Assignee: Rational Intellectual Holdings Limited
    Inventors: Sergey Ignatchenko, Victor Gavrysh, Dmitri Ligoum
  • Publication number: 20130147787
    Abstract: The systems, methods and apparatuses described herein permit the transmittal of digital media content from a source device to a target device. A source device represents media content as discrete elements, wherein each element embodies a separate layer of the media content. The source device creates visual objects corresponding to the elements, wherein each visual object includes one or more attributes including, but not limited to, a Z-order designation designating the element's layer with respect to the other elements of the media content. Each visual object can be managed and updated independently. A target receives the visual objects, reconstructs the media content, and displays the media content on a display.
    Type: Application
    Filed: December 12, 2011
    Publication date: June 13, 2013
    Inventors: Sergey Ignatchenko, Dmytro Ivanchykhin