Patents by Inventor Thomas Michael Leavy
Thomas Michael Leavy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10715504Abstract: A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.Type: GrantFiled: July 12, 2017Date of Patent: July 14, 2020Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Christopher Howell, Joël Alwen
-
Publication number: 20200213111Abstract: The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device initializes a secure communication session with at least one second device. Initializing the secure communication session includes transmitting an invitation to a secure communication session to the at least one second device. The at least one second device may generate a transmission root key, which may be used to derive a first key for encrypting data transmitted to the first device and a second key for decrypting received data from the first device. The at least one second device may transmit the transmission root key to the first device, which may use the transmission root key to derive a first key to encrypt data transmitted to the at least one second device and a second key to decrypt data received from the at least one second device.Type: ApplicationFiled: February 25, 2020Publication date: July 2, 2020Inventors: Thomas Michael Leavy, Joël Alwen, Christopher Howell
-
Patent number: 10635289Abstract: Screen capture mitigation is disclosed. It is conveyed to a user that a received content item can be displayed in response to the user placing at least one finger on a display. A first finger in a first screen area of the display is detected. A second finger in a second screen area of the display is detected. The received content item is displayed in response to detecting the first finger in the first screen area and the second finger in the second screen area. A change in location of at least one of the first finger and the second finger is detected. In response to detecting the change, it is determined whether the change in the at least one of the first finger and the second finger is greater than a threshold. When the change is greater than the threshold, displaying the received content item is ceased.Type: GrantFiled: January 6, 2016Date of Patent: April 28, 2020Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Robert Statica
-
Patent number: 10630663Abstract: The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.Type: GrantFiled: September 26, 2018Date of Patent: April 21, 2020Assignee: Wickr Inc.Inventors: Dipakkumar R. Kasabwala, Thomas Michael Leavy
-
Publication number: 20200053145Abstract: A solution for circumventing censorship is disclosed. A first device connects to a first server hosted in a content delivery network (CDN). The CDN routes the first device's connection request to the first server. The first server responds by providing the first device with a configuration file that contains a plurality of secondary servers for the first device to access. Accordingly, the first device disconnects from the first server and hops between one or more of the plurality of secondary servers contained in the configuration file. By distributing the configuration file from a first server hosted in a CDN, the first device is able to obfuscate the true endpoint of the connection. Thus, the first device is able to obtain the configuration file without drawing the ire of censors. By hopping from server-to-server, the first device is able to stay one-step ahead of censors. Accordingly, the present disclosure describes a multi-prong approach to staying a step ahead of eavesdroppers, sniffers, and censors.Type: ApplicationFiled: August 13, 2018Publication date: February 13, 2020Applicant: Wickr Inc.Inventors: Christopher Dowd, Christopher Lalonde, Thomas Michael Leavy, Arjun Bhatnagar, Dipakkumar R. Kasabwala, David Lautz, Matthew Downs
-
Patent number: 10541814Abstract: The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device receives an invitation to a secure communication session. The invitation includes a token, which the first device transmits to the call initiating device. Next, the first device performs a three-way handshake with the call initiating device to negotiate a first encryption key and a second encryption key for the secure communication session. The first device encrypts first communication data using the first encryption key and transmits the encrypted first communication data to the call initiating device.Type: GrantFiled: November 8, 2017Date of Patent: January 21, 2020Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Joël Alwen
-
Publication number: 20190356649Abstract: The present disclosure describes techniques that allow for a client-side application, located on a first client device, to generate a random encryption key and encrypt locally-stored application data with the random encryption key. The random encryption key is used in lieu of a password-derived encryption key. In order to ensure that the client-device application is unable to decrypt the locally-stored encrypted application data prior to authenticating with an external authentication source (i.e., SSO, IdP), the random encryption key is encrypted with a key-encrypting key derived using a pseudorandom function (PRF). By using a PRF, the first device is able to authenticate to the first server and derive a secure key as part of the authentication process. Accordingly, the present disclosure describes techniques for securing data on a client device when credentials are managed by an external authentication system.Type: ApplicationFiled: August 21, 2018Publication date: November 21, 2019Applicant: Wickr Inc.Inventors: Joël Alwen, Thomas Michael Leavy, Christopher Howell
-
Publication number: 20190356650Abstract: The present disclosure describes techniques that allow for a client-side application, located on a first client device, to generate a random encryption key and encrypt locally-stored application data with the random encryption key. In order to ensure that the client-device application is unable to decrypt the locally-stored encrypted application data prior to authenticating with an external authentication source (i.e., SSO, IdP), the client-side application divides the random encryption key into at least a first share and a second share according to a secret sharing algorithm. The first share is transmitted to a trusted third party, while the second share is encrypted locally and stored in a secure location on the client device. Upon successful authentication, the trusted third party returns the second share to the first client device. The client-side application derives the random encryption key and decrypts the locally-stored encrypted application data to be used by the client-side application.Type: ApplicationFiled: August 21, 2018Publication date: November 21, 2019Applicant: Wickr Inc.Inventors: Thomas Michael Leavy, Joël Alwen, Christopher Howell
-
Patent number: 10396987Abstract: The present disclosure describes a system, method, and non-transitory computer readable medium for provisioning multiple instances of a secure communication application on multiple devices. A secure communication application on a first device generates a first set of private keys that are associated with the user and a second set of keys that are associated with the secure communication application executing on the first device. The first set of private keys establishes a set of root identifying keys for the user that are identical for all installations of the secure communication application, while the second set of keys will vary from device to device. In this regard, the first set of root identifying keys must be securely transferred from the first device to any subsequent installations of the secure communication application on one or more second devices.Type: GrantFiled: March 2, 2017Date of Patent: August 27, 2019Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Christopher Howell
-
Publication number: 20190140832Abstract: The present application describes a method, system, and non-transitory computer-readable medium for end-to-end encryption during a secure communication session. According to the present disclosure, a first device receives an invitation to a secure communication session. The invitation includes a token, which the first device transmits to the call initiating device. Next, the first device performs a three-way handshake with the call initiating device to negotiate a first encryption key and a second encryption key for the secure communication session. The first device encrypts first communication data using the first encryption key and transmits the encrypted first communication data to the call initiating device.Type: ApplicationFiled: November 8, 2017Publication date: May 9, 2019Applicant: Wickr Inc.Inventors: Thomas Michael Leavy, Joël Alwen
-
Patent number: 10248799Abstract: Screen capture mitigation is disclosed. A first finger of a user is detected in a first designated region of a display. Content is displayed when the first finger is detected in the first designated region of the display. Periodically, a determination is made whether the first finger is detected in the first designated region of the display. The content is ceased to be displayed in response to a determination that the first finger is outside the first designated region of the display.Type: GrantFiled: August 28, 2015Date of Patent: April 2, 2019Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Robert Statica
-
Patent number: 10242217Abstract: The present disclosure describes techniques for storing encrypted files in a secure file repository and transferring those encrypted files to one or more recipients. A user selects a file to upload to a secure file repository. A secure collaboration app on the user's device generates a first encryption key that is used to encrypt the file. The encrypted file is then uploaded to the secure file repository, which provides the secure collaboration app with a random file name and a location of the encrypted file. The secure collaboration app updates locally stored metadata of the first encrypted file. To securely transfer the file, the user generates a second encryption key, encrypts the metadata with the second encryption key, and transmits the encrypted metadata to one or more receivers. The one or more receivers decrypt the encrypted metadata and use the decrypted metadata to retrieve the file and decrypt it.Type: GrantFiled: September 26, 2017Date of Patent: March 26, 2019Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Christopher Howell, David A. Sugar, Dipakkumar R. Kasabwala, Ernest W. Grzybowski
-
Patent number: 10230524Abstract: The present disclosure describes a system, method, and non-transitory computer readable medium for provisioning multiple instances of a secure communication application on multiple devices. A secure communication application on a first device generates a first set of private keys that are associated with the user and a second set of keys that are associated with the secure communication application executing on the first device. The first set of private keys establishes a set of root identifying keys for the user that are identical for all installations of the secure communication application, while the second set of keys will vary from device to device. In this regard, the first set of root identifying keys must be securely transferred from the first device to any subsequent installations of the secure communication application on one or more second devices.Type: GrantFiled: March 2, 2017Date of Patent: March 12, 2019Assignee: Wickr Inc.Inventors: Christopher Howell, Thomas Michael Leavy
-
Publication number: 20190020631Abstract: A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.Type: ApplicationFiled: July 12, 2017Publication date: January 17, 2019Applicant: Wickr Inc.Inventors: Thomas Michael Leavy, Christopher Howell, Joël Alwen
-
Publication number: 20190020633Abstract: A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.Type: ApplicationFiled: July 12, 2017Publication date: January 17, 2019Applicant: Wickr Inc.Inventors: Thomas Michael Leavy, Christopher Howell, Joël Alwen
-
Publication number: 20190020632Abstract: A method, system, and non-transitory computer readable medium are described for providing a sender a plurality of ephemeral keys such that a sender and receiver can exchange encrypted communications. Accordingly, a sender may retrieve information, such as a public key and a key identifier, for the first receiver from a local storage. The retrieved information may be used to generate a key-encrypting key that is used to generate a random communication encryption key. The random communication encryption key is used to encrypt a communication, while the key-encrypting key encrypts the random communication key. The encrypted communication and the encrypted random communication key are transmitted to the first receiver.Type: ApplicationFiled: July 12, 2017Publication date: January 17, 2019Applicant: Wickr Inc.Inventors: Thomas Michael Leavy, Joël Alwen, Christopher Howell
-
Patent number: 10142300Abstract: A secure chat client is described that allows users to exchange encrypted communications via secure chat rooms, as well as one-to-one communications. In particular, the secure chat client allows users to create, configure, and manage secure chat rooms. Furthermore, the secure chat client provides users with the ability to recover secure messages when they obtain a new device or otherwise lose communications.Type: GrantFiled: June 27, 2018Date of Patent: November 27, 2018Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Gerard Ryan
-
Patent number: 10140043Abstract: Digital data sanitization is disclosed. An indication that a data sanitization process should be performed is received. The data sanitization process is performed. Performing the data sanitization process includes determining an amount of free space on a storage device. Performing the data sanitization process further includes performing a set of one or more write operations, where performing the write operations decreases the amount of free space on the storage of the device.Type: GrantFiled: October 26, 2017Date of Patent: November 27, 2018Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Christopher Howell, Robert Statica, Kara Lynn Coppa
-
Patent number: 10135612Abstract: The present disclosure describes techniques for configuring and participating in encrypted audio calls, audio conferences, video calls, and video conferences. In particular, a call initiator generates a meeting identifier and a first meeting key, which are encrypted using a first encryption key and distributed to one or more participants of the call. The one or more participants decrypt the meeting identifier and the first meeting key, and use that information to participate in the encrypted call. Further, participants respond to the encrypted communication data by encrypting their reply data with the first meeting key. The call initiator decrypts the reply data using the first meeting key.Type: GrantFiled: December 15, 2016Date of Patent: November 20, 2018Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Dipakkumar R. Kasabwala
-
Patent number: 10129229Abstract: The present disclosure describes systems and methods for authenticating a called party during the initialization stage of establishing a secure telecommunication channel to provide assurances to the initiator that they are communicating with whom they intended. A first user issues a challenge that includes a nonce to one or more second user devices. The second user's secure collaboration application receives the challenge, signs the nonce included in the challenge, and sends the response with the signed nonce to the first user. The first user receives the response and determines whether the signature of the first nonce is valid. If the signature is not valid, the first user's secure collaboration application terminates the secure telecommunication. However, if the signature received in the response is valid, the first user's secure collaboration application begins exchanging encrypted telecommunication data with the second user over a secure telecommunication channel.Type: GrantFiled: October 21, 2016Date of Patent: November 13, 2018Assignee: Wickr Inc.Inventors: Thomas Michael Leavy, Dipakkumar R. Kasabwala