Patents by Inventor Torben Pryds Pedersen

Torben Pryds Pedersen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10581612
    Abstract: There is described a validation and authentication system and method for authenticating and validating messages. The system comprises a data store storing one or more digital fingerprints associated with user imaging devices. There is also a communication module configured to: receive a message M; receive a request for validation and authentication and receive an image PM of the message M captured using a user imaging device. The system comprises an image validation module for analysing the received image PM using one or more image processing techniques to determine if the image is valid and authentic. If the received image PM is determined to be authentic and valid, the image validation module generates a response to the request.
    Type: Grant
    Filed: March 1, 2016
    Date of Patent: March 3, 2020
    Assignee: Cryptomathic Ltd
    Inventors: Peter Landrock, Guillaume Forget, Torben Pryds Pedersen
  • Patent number: 9900148
    Abstract: A method for validating a signature request for a first message M, comprising: receiving, a validation challenge (VC) from a signature creation device (SCD), the VC created by the SCD, in response to receiving the signature request and message M from a user, using a second message M? which is based on message M and a secret shared between the SCD and user, the VC generated by encrypting message M? using the secret; generating, the message M? from the VC by decrypting the VC using the secret; displaying the message M? to the user; receiving confirmation from the user that the displayed message M? corresponds to the message M; generating, a validation code confirming the signature request to create a signature; and outputting the code to the SCD, to cause the SCD to generate the signature for the user for message M based on successfully verifying the code.
    Type: Grant
    Filed: June 2, 2017
    Date of Patent: February 20, 2018
    Assignee: Cryptomathic Ltd.
    Inventors: Guillaume Forget, Torben Pryds Pedersen, Peter Landrock
  • Publication number: 20180048474
    Abstract: There is described a validation and authentication system and method for authenticating and validating messages. The system comprises a data store storing one or more digital fingerprints associated with user imaging devices. There is also a communication module configured to: receive a message M; receive a request for validation and authentication and receive an image PM of the message M captured using a user imaging device. The system comprises an image validation module for analysing the received image PM using one or more image processing techniques to determine if the image is valid and authentic. If the received image PM is determined to be authentic and valid, the image validation module generates a response to the request.
    Type: Application
    Filed: March 1, 2016
    Publication date: February 15, 2018
    Inventors: Peter Landrock, Guillaume Forget, Torben Pryds Pedersen
  • Publication number: 20180041333
    Abstract: A method for validating a signature request for a first message M, comprising: receiving, a validation challenge (VC) from a signature creation device (SCD), the VC created by the SCD, in response to receiving the signature request and message M from a user, using a second message M? which is based on message M and a secret shared between the SCD and user, the VC generated by encrypting message M? using the secret; generating, the message M? from the VC by decrypting the VC using the secret; displaying the message M? to the user; receiving confirmation from the user that the displayed message M? corresponds to the message M; generating, a validation code confirming the signature request to create a signature; and outputting the code to the SCD, to cause the SCD to generate the signature for the user for message M based on successfully verifying the code.
    Type: Application
    Filed: June 2, 2017
    Publication date: February 8, 2018
    Inventors: Guillaume Forget, Torben Pryds Pedersen, Peter Landrock
  • Patent number: 9705681
    Abstract: A method and system for generating a signature for a user are described. The system comprises a signature server, an initial transaction device for a user and a validation device for a user. The initial transaction device is configured to display a first message M and send a request to the signature server to create a signature for said first message M. The signature server is configured to generate a validation challenge using a second message M? which is based on said first message M? and a first secret shared between said user and said signature server and send said validation challenge to the validation device. The validation device is configured to regenerate said second message M? using said first shared secret, display said second message M?, receive user confirmation that the displayed second message M? corresponds to said first message M, generate a validation code confirming the request to create a signature; and send said validation code to said signature server.
    Type: Grant
    Filed: June 6, 2014
    Date of Patent: July 11, 2017
    Assignee: Cryptomathic Ltd.
    Inventors: Guillaume Forget, Torben Pryds Pedersen, Peter Landrock
  • Publication number: 20160134424
    Abstract: A method and system for generating a signature for a user are described. The system comprises a signature server, an initial transaction device for a user and a validation device for a user. The initial transaction device is configured to display a first message M and send a request to the signature server to create a signature for said first message M. The signature server is configured to generate a validation challenge using a second message M? which is based on said first message M? and a first secret shared between said user and said signature server and send said validation challenge to the validation device. The validation device is configured to regenerate said second message M? using said first shared secret, display said second message M?, receive user confirmation that the displayed second message M? corresponds to said first message M, generate a validation code confirming the request to create a signature; and send said validation code to said signature server.
    Type: Application
    Filed: June 6, 2014
    Publication date: May 12, 2016
    Inventors: Guillaume Forget, Torben Pryds Pedersen, Peter Landrock
  • Patent number: 8737608
    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Grant
    Filed: March 2, 2012
    Date of Patent: May 27, 2014
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Publication number: 20120163591
    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Application
    Filed: March 2, 2012
    Publication date: June 28, 2012
    Applicant: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 8155310
    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
    Type: Grant
    Filed: June 25, 2009
    Date of Patent: April 10, 2012
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 8077861
    Abstract: A data input is divided into two segments; the second segment is also divided into groups. Bits in the first segment are used to control the application of permutation functions to bit groups in the second segment. The transformed data is assembled from the first segment and the permuted groups of the second segment. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: December 13, 2011
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Publication number: 20090262943
    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
    Type: Application
    Filed: June 25, 2009
    Publication date: October 22, 2009
    Applicant: CMLA, INC.
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 7577250
    Abstract: Key derivation algorithms are disclosed. In one key derivation application, a segment of the master key is hashed. Two numbers of derived from another segment of the master key. A universal hash function, using the two numbers, is applied to the result of the hash, from which bits are selected as the derived key. In another embodiment, an encoded counter is combined with segments of the master key. The result is then hashed, from which bits are selected as the derived key.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: August 18, 2009
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen
  • Patent number: 7564970
    Abstract: A data input is divided into two segments. The second segment is raised to a power of a function of the first segment, the power being relatively prime to a function of a predefined modulus. The modulus is then applied to the result. The transformed data is assembled from the first segment and the remainder modulo the modulus. This data transformation can be applied in combination with a key derivation algorithm, a key wrapping algorithm, or an encryption algorithm to enhance the security of these other applications.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: July 21, 2009
    Assignee: CMLA, LLC
    Inventors: Ivan Bjerre Damgaard, Torben Pryds Pedersen, Vincent Rijmen