Private Machines Inc.

United States of America

Back to Profile

1-13 of 13 for Private Machines Inc. Sort by
Query
Aggregations
Jurisdiction
        United States 8
        World 5
Date
2020 2
Before 2020 11
IPC Class
H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols 5
G06F 21/60 - Protecting data 4
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules 4
G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits 4
G06F 21/87 - Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits 4
See more
Found results for  patents

1.

Systems and methods for using extended hardware security modules

      
Application Number 16889704
Grant Number 11604901
Status In Force
Filing Date 2020-06-01
First Publication Date 2020-09-17
Grant Date 2023-03-14
Owner Private Machines Inc. (USA)
Inventor Sion, Radu

Abstract

An extended hardware security module (“HSM”) possessing additional security properties relative to conventional HSMs and methods for initializing, deploying, and managing such extended HSMs in a networked environment. In the preferred embodiment, an extended HSM includes additional hardware and software components that configure it to run sensitive client tasks on demand inside a cloud-hosted, anti-tamper HSM housing so as to ensure sensitive data is encrypted when stored or processed outside the housing. Methods for initializing, deploying, and managing provide a framework through which extended HSMs may be secured from their initial assembly through their availing for use and actual use over a network by one or more clients. Such use often entails repeated discrete sequential secure sessions and concurrent discrete secure sessions.

IPC Classes  ?

  • G06F 21/87 - Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • G06F 21/60 - Protecting data
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

2.

Method for the integrated use of a secondary cloud resource

      
Application Number 16584832
Grant Number 11178153
Status In Force
Filing Date 2019-09-26
First Publication Date 2020-04-02
Grant Date 2021-11-16
Owner Private Machines Inc. (USA)
Inventor Sion, Radu

Abstract

A method for the integrated use of a secondary cloud resource, provided by a secondary cloud service software function executed on secondary hardware, from a primary cloud service, provided by a primary cloud service software function executed on primary hardware which is remote to said secondary hardware including provision step operative to provide a primary integration interface and a secondary integration interface, a resource request step operative to identify a set of secondary user data and request said secondary cloud resource from the secondary cloud service, a resource allocation step for allocating the requested secondary cloud resource and providing corresponding secondary cloud resource allocation information, an information association step for associating said secondary cloud resource allocation information with said secondary cloud user data and a set of primary user data, and a user authentication step for authenticating the primary cloud service user access to said secondary cloud resource.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

3.

Tamper-proof computer device

      
Application Number 16363445
Grant Number 10765018
Status In Force
Filing Date 2019-03-25
First Publication Date 2019-10-03
Grant Date 2020-09-01
Owner Private Machines Inc. (USA)
Inventor Sion, Radu

Abstract

wherein the metal heat sink structure (50) is also arranged in direct thermal contact with a side of the membrane (40) not facing the said inside surface (22), so that the membrane (40) is sandwiched between the hollow metal body (20) and the metal heat sink structure (50) so that thermal connection is achieved between the metal heat sink structure (50) and the enclosure (10), via the membrane (40). The invention also relates to a method for manufacturing such a computer device.

IPC Classes  ?

  • G06F 1/20 - Cooling means
  • H05K 5/02 - Casings, cabinets or drawers for electric apparatus Details
  • G06F 1/16 - Constructional details or arrangements
  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
  • H05K 13/04 - Mounting of components
  • G06F 1/18 - Packaging or power distribution
  • G06F 21/86 - Secure or tamper-resistant housings

4.

COMPUTER SERVER DEVICE AND METHODS FOR INITIATING AND RUNNING A COMPUTER PROCESS

      
Application Number IB2018057103
Publication Number 2019/069159
Status In Force
Filing Date 2018-09-17
Publication Date 2019-04-11
Owner PRIVATE MACHINES INC. (USA)
Inventor Sion, Radu

Abstract

Computer server device (690) comprising a server control unit (600) and at least one physical connectors (605) for respective physical tamper-protected computer modules (80), which tamper-protected computer modules (SO) each comprises a respective tamper-protected enclosure (162), a respective module control unit and a respective information processing module (128), which module control unit and information processing module (128) are both entirely enclosed by said tamper-protected enclosure (162) in question. The invention is characterised in that the server control unit (600) is arranged to expose a digital virtualization interface (610) on a network to which the computer server device (690) is connected, providing access to other devices on said network to a respective virtual computer device corresponding to each tamper-protected computer module (80) which is connected to the server control unit (690), and in that the server control unit (600) is arranged to receive calls directed to each such virtual computer device, to produce corresponding calls to a corresponding tamper-protected computer module (80) and to, via said digital virtualization interface, deliver such corresponding calls to the corresponding tamper-protected computer module (80) in question. The invention also relates to a method, a computer software program and an interface.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 21/86 - Secure or tamper-resistant housings
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

5.

Secure searchable and shareable remote storage system and method

      
Application Number 15742497
Grant Number 10762229
Status In Force
Filing Date 2016-05-06
First Publication Date 2019-03-21
Grant Date 2020-09-01
Owner Private Machines Inc. (USA)
Inventor
  • Sion, Radu
  • Bajaj, Sumeet Vijay
  • Kasiak, Jan Wojciech

Abstract

A secure searchable and shareable remote storage system and method which utilizes client side processing to enable search capability of the stored data, allow the synchronizing of stored data between multiple discrete devices, and allow sharing of stored data between multiple discrete users. Such a remote storage system and method includes a networked remote computer server which receives and stores encrypted data and manages access thereto and a client device configured to index data to be stored, upload secured data and related information, perform searches on the stored data and related information locally, and implement cryptographic protocols which allow the stored data and related information to be synchronized with other desired client devices. Advantageously, since trusted client-side search code may directly access mostly plaintext data, it may operate orders of magnitude faster than the equivalent server code which may access encrypted data only.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/08 - Key distribution
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/903 - Querying
  • G06F 16/178 - Techniques for file synchronisation in file systems
  • G06F 16/13 - File access structures, e.g. distributed indices
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

6.

Secure data management system and method

      
Application Number 15742498
Grant Number 11003787
Status In Force
Filing Date 2016-05-07
First Publication Date 2019-03-21
Grant Date 2021-05-11
Owner Private Machines Inc. (USA)
Inventor
  • Sion, Radu
  • Bajaj, Sumeet Vijay
  • Kasiak, Jan Wojciech

Abstract

A secure data management system and method which separates query processing operations from transaction management and data storage operations to provides secure outsourced data management assurances while remaining practically viable for commercial deployment. The secure data management system and method includes a untrusted database module which performs transaction management and data storage operations on encrypted data from at least one network accessible computer and a trusted database module which processes user generated queries and commands on a secure client device by selectively accessing, decrypting and re-encrypting the encrypted data on the at least one network accessible computer. In this regard, total privacy can be maintained while still outsourcing transaction management and data storage operations to untrusted third parties because all sensitive operations are performed in a secure environment and the transaction management and data storage operations can only access encrypted data.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/08 - Key distribution
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/903 - Querying
  • G06F 16/178 - Techniques for file synchronisation in file systems
  • G06F 16/13 - File access structures, e.g. distributed indices
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

7.

Anti-tamper system

      
Application Number 15996511
Grant Number 10572696
Status In Force
Filing Date 2018-06-03
First Publication Date 2018-09-27
Grant Date 2020-02-25
Owner Private Machines Inc. (USA)
Inventor Sion, Radu

Abstract

The present invention relates to a system for protecting sensitive data including at least one enclosing layer, at least one tamper-detecting sensor, zeroization support logic, at least one memory module, and at least one Internal IPM Decoupler configured to provide a link between the anti-tamper system and at least one electronic component that is enclosed by at least one enclosing layer.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/87 - Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
  • G09C 1/00 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • H01L 23/00 - Details of semiconductor or other solid state devices
  • H05K 1/02 - Printed circuits Details

8.

Anti-tamper system

      
Application Number 15553344
Grant Number 10007811
Status In Force
Filing Date 2015-12-28
First Publication Date 2018-04-26
Grant Date 2018-06-26
Owner Private Machines Inc. (USA)
Inventor Sion, Radu

Abstract

The present invention relates to a system for protecting sensitive data including at least one enclosing layer, a cryptography module, at least one tamper-detecting sensor, zeroization support logic, at least one memory module, and at least one Internal IPM Decoupler configured to provide a link between the anti-tamper system and at least one electronic component that is enclosed by at least one enclosing layer.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • G06F 21/87 - Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • G06F 21/60 - Protecting data
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 11/30 - Monitoring
  • G06F 12/14 - Protection against unauthorised use of memory

9.

Systems and methods for using extended hardware security modules

      
Application Number 15537408
Grant Number 10706182
Status In Force
Filing Date 2015-10-19
First Publication Date 2017-12-07
Grant Date 2020-07-07
Owner Private Machines Inc. (USA)
Inventor Sion, Radu

Abstract

An extended hardware security module (“HSM”) possessing additional security properties relative to conventional HSMs and methods for initializing, deploying, and managing such extended HSMs in a networked environment. In the preferred embodiment, an extended HSM includes additional hardware and software components that configure it to run sensitive client tasks on demand inside a cloud-hosted, anti-tamper HSM housing so as to ensure sensitive data is encrypted when stored or processed outside the housing. Methods for initializing, deploying, and managing provide a framework through which extended HSMs may be secured from their initial assembly through their availing for use and actual use over a network by one or more clients. Such use often entails repeated discrete sequential secure sessions and concurrent discrete secure sessions.

IPC Classes  ?

  • G06F 21/87 - Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
  • G06F 21/72 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
  • G06F 21/60 - Protecting data
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system

10.

SECURE SEARCHABLE AND SHAREABLE REMOTE STORAGE SYSTEM AND METHOD

      
Application Number US2016031156
Publication Number 2017/023385
Status In Force
Filing Date 2016-05-06
Publication Date 2017-02-09
Owner PRIVATE MACHINES INC. (USA)
Inventor
  • Sion, Radu
  • Kasiak, Jan Wojciech
  • Bajaj, Sumeet, Vijay

Abstract

A secure searchable and shareable remote storage system and method which utilizes client side processing to enable search capability of the stored data, allow the synchronizing of stored data between multiple discrete devices, and allow sharing of stored data between multiple discrete users. Such a remote storage system and method includes a networked remote computer server which receives and stores encrypted data and manages access thereto and a client device configured to index data to be stored, upload secured data and related information, perform searches on the stored data and related information locally, and implement cryptographic protocols which allow the stored data and related information to be synchronized with other desired client devices. Advantageously, since trusted client-side search code may directly access mostly plaintext data, it may operate orders of magnitude faster than the equivalent server code which may access encrypted data only.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs

11.

SECURE DATA MANAGEMENT SYSTEM AND METHOD

      
Application Number US2016031393
Publication Number 2017/023388
Status In Force
Filing Date 2016-05-07
Publication Date 2017-02-09
Owner PRIVATE MACHINES INC. (USA)
Inventor
  • Sion, Radu
  • Kasiak, Jan Wojciech
  • Bajaj, Sumeet Vijay

Abstract

A secure data management system and method which separates query processing operations from transaction management and data storage operations to provides secure outsourced data management assurances while remaining practically viable for commercial deployment. The secure data management system and method includes a untrusted database module which performs transaction management and data storage operations on encrypted data from at least one network accessible computer and a trusted database module which processes user generated queries and commands on a secure client device by selectively accessing, decrypting and re-encrypting the encrypted data on the at least one network accessible computer. In this regard, total privacy can be maintained while still outsourcing transaction management and data storage operations to untrusted third parties because all sensitive operations are performed in a secure environment and the transaction management and data storage operations can only access encrypted data.

IPC Classes  ?

12.

ANTI-TAMPER SYSTEM

      
Application Number US2015067738
Publication Number 2016/137573
Status In Force
Filing Date 2015-12-28
Publication Date 2016-09-01
Owner PRIVATE MACHINES INC. (USA)
Inventor Sion, Radu

Abstract

The present invention relates to a system for protecting sensitive data including at least one enclosing layer, a cryptography module, at least one tamper-detecting sensor, zeroization support logic, at least one memory module, and at least one Internal IPM Decoupler configured to provide a link between the anti-tamper system and at least one electronic component that is enclosed by at least one enclosing layer.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

13.

SYSTEMS AND METHODS FOR USING EXTENDED HARDWARE SECURITY MODULES

      
Application Number US2015056197
Publication Number 2016/099644
Status In Force
Filing Date 2015-10-19
Publication Date 2016-06-23
Owner PRIVATE MACHINES INC. (USA)
Inventor Sion, Radu

Abstract

An extended hardware security module ("HSM") possessing additional security properties relative to conventional HSMs and methods for initializing, deploying, and managing such extended HSMs in a networked environment. In the preferred embodiment, an extended HSM includes additional hardware and software components that configure it to run sensitive client tasks on demand inside a cloud-hosted, anti-tamper HSM housing so as to ensure sensitive data is encrypted when stored or processed outside the housing. Methods for initializing, deploying, and managing provide a framework through which extended HSMs may be secured from their initial assembly through their availing for use and actual use over a network by one or more clients. Such use often entails repeated discrete sequential secure sessions and concurrent discrete secure sessions.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/24 - Loading of the microprogram