Patents by Inventor Stephen Chasko

Stephen Chasko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11516687
    Abstract: A network tap device is configured to join a secured network to be monitored through a joining process. The joining process includes communicating with the access point to obtain security keys of the monitored network and communicating with the access point to obtain a network address for the network tap device. After joining the secured network, the network tap device collects the network data on the secured network. Collecting the network data includes detecting network traffic on the monitored network, the network traffic containing encrypted data and unencrypted data, decrypting the encrypted data in the network traffic using the security keys to generate decrypted data, and adding the decrypted data and unencrypted data to the network data. The network tap device further transmits the collected network data to a monitoring workstation via a data transmission network.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: November 29, 2022
    Assignee: LANDIS+GYR INNOVATIONS, INC.
    Inventors: Stephen Chasko, James P. Hartman, Damien Hugoo
  • Publication number: 20220232400
    Abstract: A network tap device is configured to join a secured network to be monitored through a joining process. The joining process includes communicating with the access point to obtain security keys of the monitored network and communicating with the access point to obtain a network address for the network tap device. After joining the secured network, the network tap device collects the network data on the secured network. Collecting the network data includes detecting network traffic on the monitored network, the network traffic containing encrypted data and unencrypted data, decrypting the encrypted data in the network traffic using the security keys to generate decrypted data, and adding the decrypted data and unencrypted data to the network data. The network tap device further transmits the collected network data to a monitoring workstation via a data transmission network.
    Type: Application
    Filed: January 21, 2021
    Publication date: July 21, 2022
    Inventors: Stephen Chasko, James P. Hartman, Damien Hugoo
  • Patent number: 11133923
    Abstract: A method for performing a blockchain operation includes receiving an indication of a number of a plurality of endpoints in a processing network. The method further includes assigning nonce offsets to each endpoint of the plurality of endpoints and assigning communication randomization windows to each endpoint of the plurality of endpoints. The communication randomization windows stagger communication windows of the endpoints to a head-end. Additionally, the method includes sending a message to each of the endpoints indicating an operation to perform and an expected result. Further, the method includes receiving a success indication from a first endpoint of the plurality of endpoints. The success indication including a nonce match value from the nonce offset of the first endpoint. Furthermore, the method includes verifying a nonce match value with the expected result.
    Type: Grant
    Filed: October 24, 2018
    Date of Patent: September 28, 2021
    Assignee: Landis+Gyr Innovations, Inc.
    Inventors: Stephen Chasko, Michael Demeter
  • Publication number: 20200136808
    Abstract: A method for performing a blockchain operation includes receiving an indication of a number of a plurality of endpoints in a processing network. The method further includes assigning nonce offsets to each endpoint of the plurality of endpoints and assigning communication randomization windows to each endpoint of the plurality of endpoints. The communication randomization windows stagger communication windows of the endpoints to a head-end. Additionally, the method includes sending a message to each of the endpoints indicating an operation to perform and an expected result. Further, the method includes receiving a success indication from a first endpoint of the plurality of endpoints. The success indication including a nonce match value from the nonce offset of the first endpoint. Furthermore, the method includes verifying a nonce match value with the expected result.
    Type: Application
    Filed: October 24, 2018
    Publication date: April 30, 2020
    Inventors: Stephen Chasko, Michael Demeter
  • Patent number: 10015020
    Abstract: Systems and methods are disclosed for interleaving communications with a home area network (HAN) and a data network. A gateway device interleaves communications within timeslots of a time slotted channel hopping protocol. A gateway device can be configured to determine, during a first portion of a timeslot, whether the gateway device received a portion of a message from a data network. If the gateway device receives no messages from the data network during the first portion of the timeslot, the gateway device switches to listen for communication from the HAN during a second portion of the timeslot. If the gateway device receives a portion of the message from the HAN, the gateway device continues to receive receives the remainder of the message until one or more trigger conditions that cause the gateway device to listen for communication from the data network.
    Type: Grant
    Filed: September 7, 2017
    Date of Patent: July 3, 2018
    Assignee: LANDIS+GYR INNOVATIONS, INC.
    Inventors: Chris Calvert, Stephen Chasko, James Hartman, Sean Holcombe, Jeffrey Shudark
  • Patent number: 9900296
    Abstract: Systems and methods for securing communication within a network endpoint, for example, a meter. The meter may include a communication module and a metrology module where the modules are connected via a communication path that is external to both modules. The modules exchange a pairing key to establish a paired channel of communication. When the communication module receives a communication through a network for establishing a secure channel to the endpoint, the communications module sends some or all of the security data to the metrology module to establish a secure communication from a head-end system through the communication module to the metrology module.
    Type: Grant
    Filed: March 15, 2017
    Date of Patent: February 20, 2018
    Assignee: LANDIS+GYR INNOVATIONS, INC.
    Inventors: Ruben Salazar, Stephen Chasko
  • Publication number: 20170366369
    Abstract: Systems and methods are disclosed for interleaving communications with a home area network (HAN) and a data network. A gateway device interleaves communications within timeslots of a time slotted channel hopping protocol. A gateway device can be configured to determine, during a first portion of a timeslot, whether the gateway device received a portion of a message from a data network. If the gateway device receives no messages from the data network during the first portion of the timeslot, the gateway device switches to listen for communication from the HAN during a second portion of the timeslot. If the gateway device receives a portion of the message from the HAN, the gateway device continues to receive receives the remainder of the message until one or more trigger conditions that cause the gateway device to listen for communication from the data network.
    Type: Application
    Filed: September 7, 2017
    Publication date: December 21, 2017
    Inventors: Chris Calvert, Stephen Chasko, James Hartman, Sean Holcombe, Jeffrey Shudark
  • Patent number: 9787491
    Abstract: Systems and methods are disclosed for interleaving communications with a home area network (HAN) and a data network. A gateway device interleaves communications within timeslots of a time slotted channel hopping protocol. A gateway device can be configured to determine, during a first portion of a timeslot, whether the gateway device received a portion of a message from a data network. If the gateway device receives no messages from the data network during the first portion of the timeslot, the gateway device switches to listen for communication from the HAN during a second portion of the timeslot. If the gateway device receives a portion of the message from the HAN, the gateway device continues to receive receives the remainder of the message until one or more trigger conditions that cause the gateway device to listen for communication from the data network.
    Type: Grant
    Filed: August 19, 2015
    Date of Patent: October 10, 2017
    Assignee: Landis & Gyr Innovations, Inc.
    Inventors: Chris Calvert, Stephen Chasko, James Hartman, Sean Holcombe, Jeff Shudark
  • Publication number: 20170187698
    Abstract: Systems and methods for securing communication within a network endpoint, for example, a meter. The meter may include a communication module and a metrology module where the modules are connected via a communication path that is external to both modules. The modules exchange a pairing key to establish a paired channel of communication. When the communication module receives a communication through a network for establishing a secure channel to the endpoint, the communications module sends some or all of the security data to the metrology module to establish a secure communication from a head-end system through the communication module to the metrology module.
    Type: Application
    Filed: March 15, 2017
    Publication date: June 29, 2017
    Inventors: Ruben Salazar, Stephen Chasko
  • Patent number: 9635054
    Abstract: Systems and methods for securing communication within a network endpoint, for example, a meter. The meter may include a communication module and a metrology module where the modules are connected via a communication path that is external to both modules. The modules exchange a pairing key to establish a paired channel of communication. When the communication module receives a communication through a network for establishing a secure channel to the endpoint, the communications module sends some or all of the security data to the metrology module to establish a secure communication from a head-end system through the communication module to the metrology module.
    Type: Grant
    Filed: October 3, 2013
    Date of Patent: April 25, 2017
    Assignee: Landis+Gyr Innovations, Inc.
    Inventors: Ruben Salazar, Stephen Chasko
  • Publication number: 20160277206
    Abstract: Systems and methods are disclosed for interleaving communications with a home area network (HAN) and a data network. A gateway device interleaves communications within timeslots of a time slotted channel hopping protocol. A gateway device can be configured to determine, during a first portion of a timeslot, whether the gateway device received a portion of a message from a data network. If the gateway device receives no messages from the data network during the first portion of the timeslot, the gateway device switches to listen for communication from the HAN during a second portion of the timeslot. If the gateway device receives a portion of the message from the HAN, the gateway device continues to receive receives the remainder of the message until one or more trigger conditions that cause the gateway device to listen for communication from the data network.
    Type: Application
    Filed: August 19, 2015
    Publication date: September 22, 2016
    Inventors: Chris Calvert, Stephen Chasko, James Hartman, Sean Holcombe, Jeff Shudark
  • Patent number: 9425968
    Abstract: Systems and methods are provided for generating subsequent encryption keys by a client device as one of a plurality of client devices across a network. Each client device is provided with the same key generation information and the same key setup information from an authentication server. Each client device maintains and stores its own key generation information and key setup information. Using its own information, each client device generates subsequent encryption keys that are common or the same across devices. These subsequent encryption keys are generated and maintained the same across devices without any further instruction or information from the authentication server or any other client device. Additionally, client devices can recover the current encryption key by synchronizing information with another client device.
    Type: Grant
    Filed: May 28, 2014
    Date of Patent: August 23, 2016
    Assignee: Landis+Gyr Innovations, Inc.
    Inventors: Michael Demeter, Stephen Chasko
  • Publication number: 20150143108
    Abstract: Systems and methods are provided for generating subsequent encryption keys by a client device as one of a plurality of client devices across a network. Each client device is provided with the same key generation information and the same key setup information from an authentication server. Each client device maintains and stores its own key generation information and key setup information. Using its own information, each client device generates subsequent encryption keys that are common or the same across devices. These subsequent encryption keys are generated and maintained the same across devices without any further instruction or information from the authentication server or any other client device. Additionally, client devices can recover the current encryption key by synchronizing information with another client device.
    Type: Application
    Filed: May 28, 2014
    Publication date: May 21, 2015
    Applicant: LANDIS+GYR INNOVATIONS, INC.
    Inventors: Michael Demeter, Stephen Chasko
  • Publication number: 20150101016
    Abstract: Systems and methods for securing communication within a network endpoint, for example, a meter. The meter may include a communication module and a metrology module where the modules are connected via a communication path that is external to both modules. The modules exchange a pairing key to establish a paired channel of communication. When the communication module receives a communication through a network for establishing a secure channel to the endpoint, the communications module sends some or all of the security data to the metrology module to establish a secure communication from a head-end system through the communication module to the metrology module.
    Type: Application
    Filed: October 3, 2013
    Publication date: April 9, 2015
    Applicant: Landis+Gyr Innovations, Inc.
    Inventors: Ruben Salazar, Stephen Chasko
  • Patent number: 8719938
    Abstract: Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data. The first network device receives data from the second network device that is encrypted using the decoy cryptographic key. The first network device determines that the data is encrypted using the decoy cryptographic key. The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key. The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data. The alert message also instructs the other network devices to ignore data originating from the second network device.
    Type: Grant
    Filed: April 9, 2012
    Date of Patent: May 6, 2014
    Assignee: Landis+Gyr Innovations, Inc.
    Inventors: Stephen Chasko, Michael Demeter
  • Publication number: 20130269032
    Abstract: Systems and methods for detecting intrusion into a data network are disclosed. Such intrusion can be detected, for example, by providing at least two network devices in a data network. Each of the network devices has a decoy cryptographic key that is used to detect unauthorized data and an authentic cryptographic key that is used to encrypt authorized data. The first network device receives data from the second network device that is encrypted using the decoy cryptographic key. The first network device determines that the data is encrypted using the decoy cryptographic key. The first network device deletes or otherwise discards the data encrypted using the decoy cryptographic key. The first network device can generate an alert message instructing other network devices that the second network device is generating the unauthorized data. The alert message also instructs the other network devices to ignore data originating from the second network device.
    Type: Application
    Filed: April 9, 2012
    Publication date: October 10, 2013
    Applicant: Cellnet Innovations, Inc.
    Inventors: Stephen Chasko, Michael Demeter