Patents by Inventor Stephen G. MITCHELL
Stephen G. MITCHELL has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12124594Abstract: This disclosure relates to, among other things, electronic device security systems and methods. Certain embodiments disclosed herein provide for protection of cryptographic keys and/or associated operations using both an operating system security service and a software-based whitebox cryptographic security service executing on a device. Leveraging operating system security services and software-based whitebox cryptographic security services may provide enhanced security when compared to using either service alone to protect cryptographic keys and associated operations. In additional embodiments, server-side cryptographic security solutions may be further used to enhance device security implementations.Type: GrantFiled: January 6, 2023Date of Patent: October 22, 2024Inventors: Yutaka Nagao, Stephen G. Mitchell, Vishisht Tiwari, Rohaan Advani
-
Patent number: 12070455Abstract: The present disclosure relates generally to certain compounds, pharmaceutical compositions comprising said compounds, and methods of making and using said compounds and pharmaceutical compositions. The compounds and compositions provided herein may be used for the treatment or prevention of an autoimmune disease and/or inflammatory condition, including systemic lupus erythematosus and cutaneous lupus erythematosus.Type: GrantFiled: September 8, 2022Date of Patent: August 27, 2024Assignee: Gilead Sciences, Inc.Inventors: Stephen E. Ammann, Eda Y. Canales, Weng K. Chang, Henok H. Kinfe, Scott E. Lazerwith, Michael L. Mitchell, Yasamin Moazami, Scott D. Schroeder, Daniel G. Shore
-
Patent number: 12050904Abstract: Systems and methods are described that use software diversification techniques to improve the security of mobile applications. Embodiments of the disclosed systems and methods may, among other things, facilitate secure application distribution through deployment of diverse of applications in an application distribution channel. Software diversification consistent with certain disclosed embodiments may mitigate large-scale automated circumvention of security protections by presenting attacking malware moving and/or otherwise unpredictable diverse targets.Type: GrantFiled: July 23, 2021Date of Patent: July 30, 2024Assignee: Intertrust Technologies CorporationInventors: Stephen G. Mitchell, Gilles Boccon-Gibod
-
Publication number: 20240106809Abstract: Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment associated with a software application. Embodiments of the disclosed systems and methods may, among other things, facilitate cryptographic operations within an execution environment associated with browser software of a client system while maintaining security of cryptographic keys imported into the environment. As the security of keys is maintained in an execution environment implementing embodiments of the disclosed systems and methods, users and/or systems may be more willing to consign their keys for use in connection with cryptographic operations performed in such environments.Type: ApplicationFiled: December 6, 2023Publication date: March 28, 2024Inventor: Stephen G. Mitchell
-
Publication number: 20240063999Abstract: This disclosure relates to systems and methods for performing cryptographic operations in connection with the management of electronic content using multiple license services. In some circumstances, a content service may not wish to share unencrypted content keys with a single license service for a variety of security reasons. Embodiments of the disclosed systems and methods may use multi-party cryptographic methods in connection with the management of protected content keys and/or associated licenses and/or the distribution of content keys and/or licenses to authorized users and/or devices. In various embodiments, a content service may split a content key into a plurality of key shares and may transmit the key shares to a plurality of different license services. The license services may coordinate operations to generate a protected content key without revealing unencrypted content key to any of the participating license services.Type: ApplicationFiled: November 1, 2023Publication date: February 22, 2024Applicant: Intertrust Technologies CorporationInventors: Stephen G. Mitchell, Vanishree Rao
-
Publication number: 20230409700Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.Type: ApplicationFiled: August 30, 2023Publication date: December 21, 2023Applicant: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Patent number: 11848922Abstract: Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment associated with a software application. Embodiments of the disclosed systems and methods may, among other things, facilitate cryptographic operations within an execution environment associated with browser software of a client system while maintaining security of cryptographic keys imported into the environment. As the security of keys is maintained in an execution environment implementing embodiments of the disclosed systems and methods, users and/or systems may be more willing to consign their keys for use in connection with cryptographic operations performed in such environments.Type: GrantFiled: November 18, 2021Date of Patent: December 19, 2023Assignee: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Patent number: 11843686Abstract: This disclosure relates to systems and methods for performing cryptographic operations in connection with the management of electronic content using multiple license services. In some circumstances, a content service may not wish to share unencrypted content keys with a single license service for a variety of security reasons. Embodiments of the disclosed systems and methods may use multi-party cryptographic methods in connection with the management of protected content keys and/or associated licenses and/or the distribution of content keys and/or licenses to authorized users and/or devices. In various embodiments, a content service may split a content key into a plurality of key shares and may transmit the key shares to a plurality of different license services. The license services may coordinate operations to generate a protected content key without revealing unencrypted content key to any of the participating license services.Type: GrantFiled: August 27, 2020Date of Patent: December 12, 2023Assignee: Intertrust Technologies CorporationInventors: Stephen G. Mitchell, Vanishree Rao
-
Patent number: 11783027Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.Type: GrantFiled: December 1, 2021Date of Patent: October 10, 2023Assignee: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Publication number: 20230153445Abstract: This disclosure relates to, among other things, electronic device security systems and methods. Certain embodiments disclosed herein provide for protection of cryptographic keys and/or associated operations using both an operating system security service and a software-based whitebox cryptographic security service executing on a device. Leveraging operating system security services and software-based whitebox cryptographic security services may provide enhanced security when compared to using either service alone to protect cryptographic keys and associated operations. In additional embodiments, server-side cryptographic security solutions may be further used to enhance device security implementations.Type: ApplicationFiled: January 6, 2023Publication date: May 18, 2023Applicant: Intertrust Technologies CorporationInventors: Yutaka Nagao, Stephen G. Mitchell, Vishisht Tiwari, Rohaan Advani
-
Patent number: 11550933Abstract: This disclosure relates to, among other things, electronic device security systems and methods. Certain embodiments disclosed herein provide for protection of cryptographic keys and/or associated operations using both an operating system security service and a software-based whitebox cryptographic security service executing on a device. Leveraging operating system security services and software-based whitebox cryptographic security services may provide enhanced security when compared to using either service alone to protect cryptographic keys and associated operations. In additional embodiments, server-side cryptographic security solutions may be further used to enhance device security implementations.Type: GrantFiled: March 9, 2021Date of Patent: January 10, 2023Assignee: Intertrust Technologies CorporationInventors: Yutaka Nagao, Stephen G. Mitchell, Vishisht Tiwari, Rohaan Advani
-
Publication number: 20220092175Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.Type: ApplicationFiled: December 1, 2021Publication date: March 24, 2022Applicant: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Publication number: 20220078168Abstract: Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment associated with a software application. Embodiments of the disclosed systems and methods may, among other things, facilitate cryptographic operations within an execution environment associated with browser software of a client system while maintaining security of cryptographic keys imported into the environment. As the security of keys is maintained in an execution environment implementing embodiments of the disclosed systems and methods, users and/or systems may be more willing to consign their keys for use in connection with cryptographic operations performed in such environments.Type: ApplicationFiled: November 18, 2021Publication date: March 10, 2022Applicant: Intertrust Technologies CorporationInventor: STEPHEN G. MITCHELL
-
Patent number: 11232195Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.Type: GrantFiled: July 29, 2020Date of Patent: January 25, 2022Assignee: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Publication number: 20210390189Abstract: This disclosure relates to, among other things, electronic device security systems and methods. Certain embodiments disclosed herein provide for protection of cryptographic keys and/or associated operations using both an operating system security service and a software-based whitebox cryptographic security service executing on a device. Leveraging operating system security services and software-based whitebox cryptographic security services may provide enhanced security when compared to using either service alone to protect cryptographic keys and associated operations. In additional embodiments, server-side cryptographic security solutions may be further used to enhance device security implementations.Type: ApplicationFiled: March 9, 2021Publication date: December 16, 2021Applicant: Intertrust Technologies CorporationInventors: Yutaka Nagao, Stephen G. Mitchell, Vishisht Tiwari, Rohaan Advani
-
Patent number: 11196724Abstract: Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment associated with a software application. Embodiments of the disclosed systems and methods may, among other things, facilitate cryptographic operations within an execution environment associated with browser software of a client system while maintaining security of cryptographic keys imported into the environment. As the security of keys is maintained in an execution environment implementing embodiments of the disclosed systems and methods, users and/or systems may be more willing to consign their keys for use in connection with cryptographic operations performed in such environments.Type: GrantFiled: January 11, 2019Date of Patent: December 7, 2021Assignee: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Publication number: 20210349712Abstract: Systems and methods are described that use software diversification techniques to improve the security of mobile applications. Embodiments of the disclosed systems and methods may, among other things, facilitate secure application distribution through deployment of diverse of applications in an application distribution channel. Software diversification consistent with certain disclosed embodiments may mitigate large-scale automated circumvention of security protections by presenting attacking malware moving and/or otherwise unpredictable diverse targets.Type: ApplicationFiled: July 23, 2021Publication date: November 11, 2021Inventors: Stephen G. MITCHELL, Gilles BOCCON-GIBOD
-
Patent number: 11080042Abstract: Systems and methods are described that use software diversification techniques to improve the security of mobile applications. Embodiments of the disclosed systems and methods may, among other things, facilitate secure application distribution through deployment of diverse of applications in an application distribution channel. Software diversification consistent with certain disclosed embodiments may mitigate large-scale automated circumvention of security protections by presenting attacking malware moving and/or otherwise unpredictable diverse targets.Type: GrantFiled: July 26, 2017Date of Patent: August 3, 2021Assignee: Intertrust Technologies CorporationInventors: Stephen G. Mitchell, Gilles Boccon-Gibod
-
Publication number: 20210067315Abstract: This disclosure relates to systems and methods for performing cryptographic operations in connection with the management of electronic content using multiple license services. In some circumstances, a content service may not wish to share unencrypted content keys with a single license service for a variety of security reasons. Embodiments of the disclosed systems and methods may use multi-party cryptographic methods in connection with the management of protected content keys and/or associated licenses and/or the distribution of content keys and/or licenses to authorized users and/or devices. In various embodiments, a content service may split a content key into a plurality of key shares and may transmit the key shares to a plurality of different license services. The license services may coordinate operations to generate a protected content key without revealing unencrypted content key to any of the participating license services.Type: ApplicationFiled: August 27, 2020Publication date: March 4, 2021Applicant: Intertrust Technologies CorporationInventors: Stephen G. Mitchell, Vanishree Rao
-
Publication number: 20210034736Abstract: The disclosure relates to systems and methods for managing state using relatively small assistance from protected hardware. Obfuscated code segments may communicate with supporting protected hardware, store encrypted state values in main memory, and/or communicate via secure channels to secure platform hardware components. In various embodiments, consistent state may be achieved, at least in part, by computing secure tag information and storing the secure tag information in a secure and/or otherwise protected device register. Consistent with embodiments disclosed herein, the tag information may be used to derive keys used to encrypt and/or decrypt stored state information. Tag information may further be used in connection with verification operations prior to using the information to derive associated keys.Type: ApplicationFiled: July 29, 2020Publication date: February 4, 2021Applicant: Intertrust Technologies CorporationInventor: Stephen G. Mitchell