T-Central, Inc.

United States of America

Back to Profile

1-23 of 23 for T-Central, Inc. Sort by
Query
Aggregations
IP Type
        Patent 22
        Trademark 1
Jurisdiction
        United States 20
        World 3
Date
New (last 4 weeks) 1
2025 February 1
2025 (YTD) 1
2023 2
2022 1
See more
IPC Class
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system 21
H04L 9/08 - Key distribution 20
H04L 29/06 - Communication control; Communication processing characterised by a protocol 17
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols 7
H04W 12/06 - Authentication 7
See more
Status
Pending 1
Registered / In Force 22

1.

SYSTEM AND METHOD TO ENABLE PKI- AND PMI-BASED DISTRIBUTED LOCKING OF CONTENT AND DISTRIBUTED UNLOCKING OF PROTECTED CONTENT AND/OR SCORING OF USERS AND/OR SCORING OF END-ENTITY ACCESS MEANS - ADDED

      
Application Number 18938982
Status Pending
Filing Date 2024-11-06
First Publication Date 2025-02-20
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
  • H04L 67/53 - Network services using third party service providers

2.

Using PKI for security and authentication of control devices and their data

      
Application Number 18224022
Grant Number 12028466
Status In Force
Filing Date 2023-07-19
First Publication Date 2023-12-28
Grant Date 2024-07-02
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David William
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn Lee
  • Dietz, Russell S.
  • Jones, James
  • Juarez, Jamie Lynn

Abstract

Method for utilizing a communication line certificate corresponding to a first device and a second device for a communication line, each of the first and second devices including a hardware processor and associated memory includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first generating a digitally signed request by the first device, wherein the digitally signed request comprises a first proof of an association of the first device to the communication line; transmitting the digitally signed request to the second device; verifying the first proof by the second device to produce a first verification of the association of the first device to the communication line; and generating a digitally signed acceptance by the second device, wherein the digitally signed acceptance comprises a second proof of an association of the second device to the communication line.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 9/40 - Network security protocols
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security
  • H04W 12/71 - Hardware identity
  • H04W 12/76 - Group identity

3.

System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

      
Application Number 17886291
Grant Number 12149514
Status In Force
Filing Date 2022-08-11
First Publication Date 2023-05-04
Grant Date 2024-11-19
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
  • H04L 67/53 - Network services using third party service providers

4.

Using PKI for security and authentication of control devices and their data

      
Application Number 17896992
Grant Number 11743057
Status In Force
Filing Date 2022-08-26
First Publication Date 2022-12-29
Grant Date 2023-08-29
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David William
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn Lee
  • Dietz, Russell S.
  • Jones, James
  • Juarez, Jamie Lynn

Abstract

Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • H04W 12/08 - Access security
  • H04W 12/06 - Authentication
  • H04W 12/71 - Hardware identity
  • H04W 12/76 - Group identity

5.

TRUSTCENTRAL

      
Serial Number 90645172
Status Registered
Filing Date 2021-04-14
Registration Date 2023-01-17
Owner T-Central, Inc., DBA TrustCentral ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

COMPUTER SECURITY CONSULTANCY

6.

Using PKI for security and authentication of control devices and their data

      
Application Number 16872112
Grant Number 11456882
Status In Force
Filing Date 2020-05-11
First Publication Date 2020-09-24
Grant Date 2022-09-27
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David William
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn Lee
  • Dietz, Russell S.
  • Jones, James
  • Juarez, Jamie Lynn

Abstract

Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • H04W 12/08 - Access security
  • H04W 12/06 - Authentication
  • H04W 12/71 - Hardware identity
  • H04W 12/76 - Group identity

7.

System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

      
Application Number 16786884
Grant Number 11463423
Status In Force
Filing Date 2020-02-10
First Publication Date 2020-07-23
Grant Date 2022-10-04
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 67/53 - Network services using third party service providers

8.

Secure communication of IoT devices for vehicles

      
Application Number 16412247
Grant Number 10644891
Status In Force
Filing Date 2019-05-14
First Publication Date 2019-09-26
Grant Date 2020-05-05
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.
  • Stacy, Kent William

Abstract

Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security
  • H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity

9.

Using PKI for security and authentication of control devices and their data

      
Application Number 16236124
Grant Number 10652031
Status In Force
Filing Date 2018-12-28
First Publication Date 2019-05-09
Grant Date 2020-05-12
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.
  • Stacy, Kent William

Abstract

Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 12/08 - Access security
  • H04W 12/06 - Authentication
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

10.

SECURE COMMUNICATION OF IOT DEVICES FOR VEHICLES

      
Application Number US2018047578
Publication Number 2019/040651
Status In Force
Filing Date 2018-08-22
Publication Date 2019-02-28
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.
  • Stacy, Kent William

Abstract

Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

11.

System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added

      
Application Number 16045646
Grant Number 10567361
Status In Force
Filing Date 2018-07-25
First Publication Date 2018-11-15
Grant Date 2020-02-18
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

12.

Secure communication of IOT devices for vehicles

      
Application Number 15890140
Grant Number 10333720
Status In Force
Filing Date 2018-02-06
First Publication Date 2018-06-28
Grant Date 2019-06-25
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.
  • Stacy, Kent William

Abstract

Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security

13.

Secure communication of IOT devices for vehicles

      
Application Number 15686076
Grant Number 10153908
Status In Force
Filing Date 2017-08-24
First Publication Date 2018-01-04
Grant Date 2018-12-11
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.
  • Stacy, Kent William

Abstract

Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04W 12/06 - Authentication
  • H04W 12/08 - Access security

14.

System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content

      
Application Number 15668598
Grant Number 09843450
Status In Force
Filing Date 2017-08-03
First Publication Date 2017-11-16
Grant Date 2017-12-12
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

System and method for authenticating a computer user includes: sending an invitation message from an entity computer to an API for authenticating a user of a user computer; receiving and translating by the API the invitation message and sending the translated invitation message including the first public key to the platform server; sending an invitation response to the API to be translated and sending the translated invitation response to the entity computer; preparing a first message including a link and a unique code by the entity computer and sending the first message to the user computer; registering with the platform server utilizing the link and the unique code, and generating a second public key, by the user computer; receiving a correct answer to the secret from the user computer; receiving the second public key by the platform server; and authenticating the user based on the received correct answer.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution

15.

System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added

      
Application Number 15642304
Grant Number 10038678
Status In Force
Filing Date 2017-07-05
First Publication Date 2017-11-09
Grant Date 2018-07-31
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution

16.

SYSTEM AND METHOD FOR INTERNET OF THINGS (IOT) SECURITY AND MANAGEMENT

      
Application Number US2017024112
Publication Number 2017/165828
Status In Force
Filing Date 2017-03-24
Publication Date 2017-09-28
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David, W.
  • Graham, Donald, Houston, Iii
  • Boudett, Josselyn, L.
  • Dietz, Russell, S.

Abstract

System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes issuing a first digital certificate to the second IoT device, inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device by receiving a digital token from the second IoT device, authenticating the second IoT device using the unique identification and cryptographic key of the second IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the established communication line and issuing a second digital certificate to the communication line between the first IoT device and the second IoT device; and preventing a third IoT device for which a secure communication line to the first or second IoT device has not been established from communicating with the first or second IoT device.

IPC Classes  ?

  • G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • G06F 21/60 - Protecting data
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

17.

System and method from Internet of Things (IoT) security and management

      
Application Number 15621982
Grant Number 09832026
Status In Force
Filing Date 2017-06-13
First Publication Date 2017-09-28
Grant Date 2017-11-28
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes provisioning a first and a second IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the first and second IoT devices; authenticating the second IoT device by the first IoT device; inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the communication line between the first IoT device and the second IoT device and issuing a digital certificate to the communication line between the first IoT device and the second IoT device; establishing secure communication lines between the first IoT device, the second IoT device and a plurality of more devices; and grouping the first IoT device, the second IoT device and the plurality of more devices into different groups based on a predetermined criteria.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

18.

System and method for internet of things (IOT) security and management

      
Application Number 15469244
Grant Number 09716595
Status In Force
Filing Date 2017-03-24
First Publication Date 2017-07-13
Grant Date 2017-07-25
Owner T-Central, Inc. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes issuing a first digital certificate to the second IoT device, inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device by receiving a digital token from the second IoT device, authenticating the second IoT device using the unique identification and cryptographic key of the second IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the established communication line and issuing a second digital certificate to the communication line between the first IoT device and the second IoT device; and preventing a third IoT device for which a secure communication line to the first or second IoT device has not been established from communicating with the first or second IoT device.

IPC Classes  ?

  • G06F 21/33 - User authentication using certificates
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution

19.

System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content

      
Application Number 15154861
Grant Number 09578035
Status In Force
Filing Date 2016-05-13
First Publication Date 2016-11-17
Grant Date 2017-02-21
Owner T-Central, Inc. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration (Platform) to extend the security capabilities of Public Key Infrastructure and Privilege Management Infrastructure systems to authenticated external users and protected content.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

20.

System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

      
Application Number 15002225
Grant Number 09455978
Status In Force
Filing Date 2016-01-20
First Publication Date 2016-08-25
Grant Date 2016-09-27
Owner T-Central, Inc. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution

21.

System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added

      
Application Number 14218897
Grant Number 09270663
Status In Force
Filing Date 2014-03-18
First Publication Date 2016-02-23
Grant Date 2016-02-23
Owner T-Central, Inc. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution

22.

System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content

      
Application Number 14715588
Grant Number 09356916
Status In Force
Filing Date 2015-05-18
First Publication Date 2015-12-31
Grant Date 2016-05-31
Owner T-Central, Inc. (USA)
Inventor
  • Kravitz, David W.
  • Graham, Iii, Donald Houston
  • Boudett, Josselyn L.
  • Dietz, Russell S.

Abstract

A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration (Platform) to extend the security capabilities of Public Key Infrastructure and Privilege Management Infrastructure systems to authenticated external users and protected content.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

23.

METHODS AND APPARATUS FOR PREVENTING CRIMEWARE ATTACKS

      
Application Number US2012039734
Publication Number 2012/166669
Status In Force
Filing Date 2012-05-25
Publication Date 2012-12-06
Owner T-CENTRAL, INC. (USA)
Inventor
  • Kravitz, David W.
  • Graham Iii, Donald H.
  • Boudett, Josselyn

Abstract

A central server configured to mediate communications including establishing secure online sessions between user-controlled devices and 3rd party devices, such as a 3rd party device hosting a financial site. The methods and apparatus used to instantiate and carry out the mediated communications can be designed to thwart crimeware. To enable communications between the user-controlled devices and the 3rd party devices, the central server can be configured to instantiate a first secure communication session between the central server and the user-controlled device and a second secure communication session between the central server and the 3rd party device. If desired, separate encryption keys can be used for the first communication session and the second communication session where only the central server possesses the encryption keys for both the first communication session and the second communication session. Optionally, after the communications are established between the devices, the server can withdraw from the communications.

IPC Classes  ?

  • H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system