|
1.
|
SYSTEM AND METHOD TO ENABLE PKI- AND PMI-BASED DISTRIBUTED LOCKING OF CONTENT AND DISTRIBUTED UNLOCKING OF PROTECTED CONTENT AND/OR SCORING OF USERS AND/OR SCORING OF END-ENTITY ACCESS MEANS - ADDED
Application Number |
18938982 |
Status |
Pending |
Filing Date |
2024-11-06 |
First Publication Date |
2025-02-20 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 9/40 - Network security protocols
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- H04L 9/08 - Key distribution
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 67/10 - Protocols in which an application is distributed across nodes in the network
- H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
- H04L 67/53 - Network services using third party service providers
|
2.
|
Using PKI for security and authentication of control devices and their data
Application Number |
18224022 |
Grant Number |
12028466 |
Status |
In Force |
Filing Date |
2023-07-19 |
First Publication Date |
2023-12-28 |
Grant Date |
2024-07-02 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David William
- Graham, Iii, Donald Houston
- Boudett, Josselyn Lee
- Dietz, Russell S.
- Jones, James
- Juarez, Jamie Lynn
|
Abstract
Method for utilizing a communication line certificate corresponding to a first device and a second device for a communication line, each of the first and second devices including a hardware processor and associated memory includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first generating a digitally signed request by the first device, wherein the digitally signed request comprises a first proof of an association of the first device to the communication line; transmitting the digitally signed request to the second device; verifying the first proof by the second device to produce a first verification of the association of the first device to the communication line; and generating a digitally signed acceptance by the second device, wherein the digitally signed acceptance comprises a second proof of an association of the second device to the communication line.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/08 - Key distribution
- H04L 9/40 - Network security protocols
- H04W 12/06 - Authentication
- H04W 12/08 - Access security
- H04W 12/71 - Hardware identity
- H04W 12/76 - Group identity
|
3.
|
System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
Application Number |
17886291 |
Grant Number |
12149514 |
Status |
In Force |
Filing Date |
2022-08-11 |
First Publication Date |
2023-05-04 |
Grant Date |
2024-11-19 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- H04L 9/08 - Key distribution
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/40 - Network security protocols
- H04L 67/10 - Protocols in which an application is distributed across nodes in the network
- H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
- H04L 67/53 - Network services using third party service providers
|
4.
|
Using PKI for security and authentication of control devices and their data
Application Number |
17896992 |
Grant Number |
11743057 |
Status |
In Force |
Filing Date |
2022-08-26 |
First Publication Date |
2022-12-29 |
Grant Date |
2023-08-29 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David William
- Graham, Iii, Donald Houston
- Boudett, Josselyn Lee
- Dietz, Russell S.
- Jones, James
- Juarez, Jamie Lynn
|
Abstract
Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/40 - Network security protocols
- H04L 9/08 - Key distribution
- H04W 12/08 - Access security
- H04W 12/06 - Authentication
- H04W 12/71 - Hardware identity
- H04W 12/76 - Group identity
|
5.
|
TRUSTCENTRAL
Serial Number |
90645172 |
Status |
Registered |
Filing Date |
2021-04-14 |
Registration Date |
2023-01-17 |
Owner |
T-Central, Inc., DBA TrustCentral ()
|
NICE Classes ? |
42 - Scientific, technological and industrial services, research and design
|
Goods & Services
COMPUTER SECURITY CONSULTANCY
|
6.
|
Using PKI for security and authentication of control devices and their data
Application Number |
16872112 |
Grant Number |
11456882 |
Status |
In Force |
Filing Date |
2020-05-11 |
First Publication Date |
2020-09-24 |
Grant Date |
2022-09-27 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David William
- Graham, Iii, Donald Houston
- Boudett, Josselyn Lee
- Dietz, Russell S.
- Jones, James
- Juarez, Jamie Lynn
|
Abstract
Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/40 - Network security protocols
- H04L 9/08 - Key distribution
- H04W 12/08 - Access security
- H04W 12/06 - Authentication
- H04W 12/71 - Hardware identity
- H04W 12/76 - Group identity
|
7.
|
System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
Application Number |
16786884 |
Grant Number |
11463423 |
Status |
In Force |
Filing Date |
2020-02-10 |
First Publication Date |
2020-07-23 |
Grant Date |
2022-10-04 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/40 - Network security protocols
- H04L 9/08 - Key distribution
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 67/125 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
- H04L 67/10 - Protocols in which an application is distributed across nodes in the network
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- H04L 67/53 - Network services using third party service providers
|
8.
|
Secure communication of IoT devices for vehicles
Application Number |
16412247 |
Grant Number |
10644891 |
Status |
In Force |
Filing Date |
2019-05-14 |
First Publication Date |
2019-09-26 |
Grant Date |
2020-05-05 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
- Stacy, Kent William
|
Abstract
Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
- H04W 12/06 - Authentication
- H04W 12/08 - Access security
- H04W 12/00 - Security arrangementsAuthenticationProtecting privacy or anonymity
|
9.
|
Using PKI for security and authentication of control devices and their data
Application Number |
16236124 |
Grant Number |
10652031 |
Status |
In Force |
Filing Date |
2018-12-28 |
First Publication Date |
2019-05-09 |
Grant Date |
2020-05-12 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
- Stacy, Kent William
|
Abstract
Method for authenticating a first and a second electronic devices associated through a communication line includes: creating a unique ID, by a third electronic device; transmitting the unique ID to the first electronic device; signing the transmitted unique ID by the first electronic device; transmitting the signed unique ID to the second electronic device, by the first electronic device; signing the transmitted signed unique ID by the second electronic device; transmitting the unique ID signed by the first and second electronic devices to the third electronic device; verifying and accepting the unique ID signed by the first device and the second device, by the third device; issuing a certificate for a secure communication line between the first electronic device and the second electronic device; and transmitting the certificate to the first electronic device and the second electronic device.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
- H04W 12/08 - Access security
- H04W 12/06 - Authentication
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
|
10.
|
SECURE COMMUNICATION OF IOT DEVICES FOR VEHICLES
Application Number |
US2018047578 |
Publication Number |
2019/040651 |
Status |
In Force |
Filing Date |
2018-08-22 |
Publication Date |
2019-02-28 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
- Stacy, Kent William
|
Abstract
Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/08 - Key distribution
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
|
11.
|
System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
Application Number |
16045646 |
Grant Number |
10567361 |
Status |
In Force |
Filing Date |
2018-07-25 |
First Publication Date |
2018-11-15 |
Grant Date |
2020-02-18 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
|
12.
|
Secure communication of IOT devices for vehicles
Application Number |
15890140 |
Grant Number |
10333720 |
Status |
In Force |
Filing Date |
2018-02-06 |
First Publication Date |
2018-06-28 |
Grant Date |
2019-06-25 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
- Stacy, Kent William
|
Abstract
Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
- H04W 12/06 - Authentication
- H04W 12/08 - Access security
|
13.
|
Secure communication of IOT devices for vehicles
Application Number |
15686076 |
Grant Number |
10153908 |
Status |
In Force |
Filing Date |
2017-08-24 |
First Publication Date |
2018-01-04 |
Grant Date |
2018-12-11 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
- Stacy, Kent William
|
Abstract
Method for establishing secure communication between a plurality of IoT devices in one or more vehicles include: provisioning the plurality of IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of IoT devices; establishing a secure communication line between the plurality of IoT devices by authenticating respective communication lines between respective IoT devices and issuing a digital certificate to the respective communication lines; grouping the plurality of IoT devices into different groups based on a predetermined criteria; and including a group membership for a group of the different groups in an attribute certificate indicating group characterization.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
- H04W 12/06 - Authentication
- H04W 12/08 - Access security
|
14.
|
System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI- based distributed locking of content and distributed unlocking of protected content
Application Number |
15668598 |
Grant Number |
09843450 |
Status |
In Force |
Filing Date |
2017-08-03 |
First Publication Date |
2017-11-16 |
Grant Date |
2017-12-12 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
System and method for authenticating a computer user includes: sending an invitation message from an entity computer to an API for authenticating a user of a user computer; receiving and translating by the API the invitation message and sending the translated invitation message including the first public key to the platform server; sending an invitation response to the API to be translated and sending the translated invitation response to the entity computer; preparing a first message including a link and a unique code by the entity computer and sending the first message to the user computer; registering with the platform server utilizing the link and the unique code, and generating a second public key, by the user computer; receiving a correct answer to the secret from the user computer; receiving the second public key by the platform server; and authenticating the user based on the received correct answer.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/08 - Key distribution
|
15.
|
System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means-added
Application Number |
15642304 |
Grant Number |
10038678 |
Status |
In Force |
Filing Date |
2017-07-05 |
First Publication Date |
2017-11-09 |
Grant Date |
2018-07-31 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/08 - Key distribution
|
16.
|
SYSTEM AND METHOD FOR INTERNET OF THINGS (IOT) SECURITY AND MANAGEMENT
Application Number |
US2017024112 |
Publication Number |
2017/165828 |
Status |
In Force |
Filing Date |
2017-03-24 |
Publication Date |
2017-09-28 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David, W.
- Graham, Donald, Houston, Iii
- Boudett, Josselyn, L.
- Dietz, Russell, S.
|
Abstract
System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes issuing a first digital certificate to the second IoT device, inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device by receiving a digital token from the second IoT device, authenticating the second IoT device using the unique identification and cryptographic key of the second IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the established communication line and issuing a second digital certificate to the communication line between the first IoT device and the second IoT device; and preventing a third IoT device for which a secure communication line to the first or second IoT device has not been established from communicating with the first or second IoT device.
IPC Classes ?
- G06F 21/71 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
- G06F 21/60 - Protecting data
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
|
17.
|
System and method from Internet of Things (IoT) security and management
Application Number |
15621982 |
Grant Number |
09832026 |
Status |
In Force |
Filing Date |
2017-06-13 |
First Publication Date |
2017-09-28 |
Grant Date |
2017-11-28 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes provisioning a first and a second IoT devices by providing a unique identification, a digital identity token and a cryptographic key to each of the first and second IoT devices; authenticating the second IoT device by the first IoT device; inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the communication line between the first IoT device and the second IoT device and issuing a digital certificate to the communication line between the first IoT device and the second IoT device; establishing secure communication lines between the first IoT device, the second IoT device and a plurality of more devices; and grouping the first IoT device, the second IoT device and the plurality of more devices into different groups based on a predetermined criteria.
IPC Classes ?
- G06F 21/33 - User authentication using certificates
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/08 - Key distribution
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
|
18.
|
System and method for internet of things (IOT) security and management
Application Number |
15469244 |
Grant Number |
09716595 |
Status |
In Force |
Filing Date |
2017-03-24 |
First Publication Date |
2017-07-13 |
Grant Date |
2017-07-25 |
Owner |
T-Central, Inc. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
System and method for establishing a secure communication between a plurality of Internet of Things (IoT) devices, includes issuing a first digital certificate to the second IoT device, inviting the second IoT device by the first IoT device to establish a communication line with the first IoT device by receiving a digital token from the second IoT device, authenticating the second IoT device using the unique identification and cryptographic key of the second IoT device; establishing a secure communication line between the first IoT device and the second IoT device by authenticating the established communication line and issuing a second digital certificate to the communication line between the first IoT device and the second IoT device; and preventing a third IoT device for which a secure communication line to the first or second IoT device has not been established from communicating with the first or second IoT device.
IPC Classes ?
- G06F 21/33 - User authentication using certificates
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
|
19.
|
System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
Application Number |
15154861 |
Grant Number |
09578035 |
Status |
In Force |
Filing Date |
2016-05-13 |
First Publication Date |
2016-11-17 |
Grant Date |
2017-02-21 |
Owner |
T-Central, Inc. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration (Platform) to extend the security capabilities of Public Key Infrastructure and Privilege Management Infrastructure systems to authenticated external users and protected content.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
- H04L 9/08 - Key distribution
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
|
20.
|
System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
Application Number |
15002225 |
Grant Number |
09455978 |
Status |
In Force |
Filing Date |
2016-01-20 |
First Publication Date |
2016-08-25 |
Grant Date |
2016-09-27 |
Owner |
T-Central, Inc. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
|
21.
|
System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means—added
Application Number |
14218897 |
Grant Number |
09270663 |
Status |
In Force |
Filing Date |
2014-03-18 |
First Publication Date |
2016-02-23 |
Grant Date |
2016-02-23 |
Owner |
T-Central, Inc. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A central server configured with an Attribute Authority (“AA”) acting as a Trusted Third Party mediating service provider and using X.509-compatible PKI and PMI, VPN technology, device-side thin client applications, security hardware (HSM, Network), cloud hosting, authentication, Active Directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys. It is not centrally managed, rather distributes rights to users. Using its Inviter-Invitee protocol suite, Inviters vouch for the identity of Invitees who successfully complete the protocol establishing communication lines. Users establish and respond to authorization requests and other real-time verifications pertaining to accessing each communication line (not end point) and sharing encrypted digital files. These are auditable, brokered, trusted-relationships where such relationships/digital agreements can each stand-alone (for privacy) or can leverage build-up of identity confidence levels across relationships. The service is agnostic to how encrypted user content is transported or stored.
IPC Classes ?
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
|
22.
|
System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
Application Number |
14715588 |
Grant Number |
09356916 |
Status |
In Force |
Filing Date |
2015-05-18 |
First Publication Date |
2015-12-31 |
Grant Date |
2016-05-31 |
Owner |
T-Central, Inc. (USA)
|
Inventor |
- Kravitz, David W.
- Graham, Iii, Donald Houston
- Boudett, Josselyn L.
- Dietz, Russell S.
|
Abstract
A security system for authenticating users and protecting content that provides an application program interface (API) with a Cloud Platform integration (Platform) to extend the security capabilities of Public Key Infrastructure and Privilege Management Infrastructure systems to authenticated external users and protected content.
IPC Classes ?
- H04L 29/06 - Communication control; Communication processing characterised by a protocol
- H04L 9/08 - Key distribution
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
|
23.
|
METHODS AND APPARATUS FOR PREVENTING CRIMEWARE ATTACKS
Application Number |
US2012039734 |
Publication Number |
2012/166669 |
Status |
In Force |
Filing Date |
2012-05-25 |
Publication Date |
2012-12-06 |
Owner |
T-CENTRAL, INC. (USA)
|
Inventor |
- Kravitz, David W.
- Graham Iii, Donald H.
- Boudett, Josselyn
|
Abstract
A central server configured to mediate communications including establishing secure online sessions between user-controlled devices and 3rd party devices, such as a 3rd party device hosting a financial site. The methods and apparatus used to instantiate and carry out the mediated communications can be designed to thwart crimeware. To enable communications between the user-controlled devices and the 3rd party devices, the central server can be configured to instantiate a first secure communication session between the central server and the user-controlled device and a second secure communication session between the central server and the 3rd party device. If desired, separate encryption keys can be used for the first communication session and the second communication session where only the central server possesses the encryption keys for both the first communication session and the second communication session. Optionally, after the communications are established between the devices, the server can withdraw from the communications.
IPC Classes ?
- H04L 9/14 - Arrangements for secret or secure communicationsNetwork security protocols using a plurality of keys or algorithms
- H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
|
|