Patents by Inventor Vladimir Libershteyn

Vladimir Libershteyn has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9917696
    Abstract: According to an example, secure key component and PIN entry may include receiving a communication from a smart card control device upon connection of the smart card control device with a secure key component and PIN entry apparatus. The communication may be related to storage of a key component on a smart card that is communicatively connectable to the apparatus. The key component may be related to a Master File Key (MFK) that is formed by using a plurality of key components including the key component. In response to the communication, the smart card may be prompted to generate the key component, or entry of the key component may be received based on actuation of a keypad of the apparatus. Further, the generated or received key component may be stored on the smart card upon connection of the smart card with the apparatus.
    Type: Grant
    Filed: August 4, 2015
    Date of Patent: March 13, 2018
    Assignee: EntlT Software, LLC
    Inventors: Chris A. Windle, Vladimir Libershteyn, Richard Liu
  • Publication number: 20170041143
    Abstract: According to an example, secure key component and PIN entry may include receiving a communication from a smart card control device upon connection of the smart card control device with a secure key component and PIN entry apparatus. The communication may be related to storage of a key component on a smart card that is communicatively connectable to the apparatus. The key component may be related to a Master File Key (MFK) that is formed by using a plurality of key components including the key component. In response to the communication, the smart card may be prompted to generate the key component, or entry of the key component may be received based on actuation of a keypad of the apparatus. Further, the generated or received key component may be stored on the smart card upon connection of the smart card with the apparatus.
    Type: Application
    Filed: August 4, 2015
    Publication date: February 9, 2017
    Inventors: Chris A. WINDLE, Vladimir LIBERSHTEYN, Richard Liu
  • Publication number: 20170033927
    Abstract: According to an example, key obfuscation may include forming a key by using parts.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Chris A. WINDLE, Vladimir Libershteyn, Richard Liu
  • Patent number: 8826024
    Abstract: In one embodiment, a method of implementing trusted compliance operations inside secure computing boundaries comprises receiving, in a secure computing environment, a data envelope from an application operating outside the secure computing environment, the data envelope comprising data and a compliance operation command, verifying, in the secure computing environment, a signature associated with the data envelope, authenticating, in the secure computing environment, the data envelope, notarizing, in the secure computing environment, the application of the command to the data in the envelope, executing the compliance operation in the secure environment; and confirming a result of the compliance operation to a client via trusted communication tunnel.
    Type: Grant
    Filed: October 23, 2006
    Date of Patent: September 2, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeff Kalibjian, Vladimir Libershteyn, Steven W. Wierenga, John W. Clark, Susan Langford
  • Patent number: 8713667
    Abstract: Systems, methods, and apparatus are provided for policy protected cryptographic Application Programming Interfaces (APIs) that are deployed in secure memory. One embodiment is a method of software execution. The method includes executing an application in a first secure memory partition; formatting a request to comply with a pre-defined secure communication protocol; transmitting the request from the application to a cryptographic application programming interface (API) of the application, the API being in a second secure memory partition that is separate and secure from the first secure memory partition; and verifying, in the second secure memory partition, that the request complies with a security policy before executing the request.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: April 29, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeff Kalibjian, Ralph Bestock, Larry Hines, W. Dale Hopkins, Vladimir Libershteyn, Steven W. Wierenga, Susan Langford
  • Patent number: 7996680
    Abstract: In one embodiment a secure computer system comprises a processor and a memory module including logic instructions stored on a computer readable medium which. When executed by the processor, the logic instructions configure the processor to receive, in a secure computing environment, a portion of a data log from an application operating outside the secure computing environment, and when the portion of the data log exceeds a size threshold, to assign a timestamp to the portion of the data log, assign an identifier to the portion of the data log, create a digital signature load block comprising the portion of the data log, the timestamp, and the identifier, and store the digital signature load block in a memory module.
    Type: Grant
    Filed: September 27, 2006
    Date of Patent: August 9, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeff Kalibjian, Susan Langford, Vladimir Libershteyn, Larry Hines, Steve Wierenga
  • Publication number: 20080126429
    Abstract: In one embodiment a secure computer system comprises a processor and a memory module including logic instructions stored on a computer readable medium which. When executed by the processor, the logic instructions configure the processor to receive, in a secure computing environment, a portion of a data log from an application operating outside the secure computing environment, and when the portion of the data log exceeds a size threshold, to assign a timestamp to the portion of the data log, assign an identifier to the portion of the data log, create a digital signature load block comprising the portion of the data log, the timestamp, and the identifier, and store the digital signature load block in a memory module.
    Type: Application
    Filed: September 27, 2006
    Publication date: May 29, 2008
    Inventors: Jeff Kalibjian, Susan Langford, Vladimir Libershteyn, Larry Hines, Steve Wierenga
  • Publication number: 20080098230
    Abstract: In one embodiment, a method of implementing trusted compliance operations inside secure computing boundaries comprises receiving, in a secure computing environment, a data envelope from an application operating outside the secure computing environment, the data envelope comprising data and a compliance operation command, verifying, in the secure computing environment, a signature associated with the data envelope, authenticating, in the secure computing environment, the data envelope, notarizing, in the secure computing environment, the application of the command to the data in the envelope, executing the compliance operation in the secure environment; and confirming a result of the compliance operation to a client via trusted communication tunnel.
    Type: Application
    Filed: October 23, 2006
    Publication date: April 24, 2008
    Inventors: Jeff Kalibjian, Vladimir Libershteyn, Steven W. Wierenga, John W. Clark, Susan Langford
  • Publication number: 20070011736
    Abstract: Systems, methods, and apparatus are provided for policy protected cryptographic Application Programming Interfaces (APIs) that are deployed in secure memory. One embodiment is a method of software execution. The method includes executing an application in a first secure memory partition; formatting a request to comply with a pre-defined secure communication protocol; transmitting the request from the application to a cryptographic application programming interface (API) of the application, the API being in a second secure memory partition that is separate and secure from the first secure memory partition; and verifying, in the second secure memory partition, that the request complies with a security policy before executing the request.
    Type: Application
    Filed: July 8, 2005
    Publication date: January 11, 2007
    Inventors: Jeff Kalibjian, Ralph Bestock, Larry Hines, W. Hopkins, Vladimir Libershteyn, Steven Wierenga, Susan Langford