Patents by Inventor Stefan Kölbl

Stefan Kölbl has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240413994
    Abstract: This document describes techniques and apparatuses directed at stateful hash-based signing with a single public key and multiple independent signers. Upon obtaining a Leighton-Micali signature (LMS) randomized parameter, a provisioning server may share the LMS randomized parameter among multiple signers. Next, the provisioning server may associate a unique, starting leaf index number to each signer and notify each of the signers. The signers may then create a random SEED for Leighton-Micali one-time signature (LM-OTS) signatures and generate local LM-OTS and LMS public keys. After generating the local public keys, the signers may share local LMS public keys with the provisioning server. Upon receipt of the local LMS public keys, the provisioning server may then order the local LMS public keys and generate a common LMS public key. The provisioning server can then provision the ordered list, the common LMS public key, and a Merkle tree path to each of the signers.
    Type: Application
    Filed: October 15, 2021
    Publication date: December 12, 2024
    Applicant: Google LLC
    Inventors: Vadim Sukhomlinov, Andrey Vadimovich Pronin, Jett Rink, Stefan Kölbl
  • Publication number: 20230291565
    Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.
    Type: Application
    Filed: May 19, 2023
    Publication date: September 14, 2023
    Inventors: Tony Ureche, Roy D′Souza, Stefan Kölbl
  • Patent number: 11689369
    Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.
    Type: Grant
    Filed: August 11, 2021
    Date of Patent: June 27, 2023
    Assignee: Google LLC
    Inventors: Tony Ureche, Roy D'Souza, Stefan Kölbl
  • Publication number: 20230050003
    Abstract: According to an aspect, a method for accessing a computing device includes receiving, by the computing device, an authentication credential for recovery access to the computing device, the authentication credential being different from an authentication credential used to access encrypted data on the computing device, obtaining, in response to receipt of the authentication credential for recovery access, a first key portion stored on the computing device, transmitting, over a network, a request to receive a second key portion, receiving, over the network, a response that includes the second key portion, recovering a decryption key using the first key portion and the second key portion, and decrypting the encrypted data on the computing device using the decryption key.
    Type: Application
    Filed: August 11, 2021
    Publication date: February 16, 2023
    Inventors: Tony Ureche, Roy D'Souza, Stefan Kölbl