Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
JA Nix - US Patent 9,288,059, 2016 - Google Patents
2008/0016230 A1 1/2008 Holtmanns et al. 2008/0022089 A1 1/2008 Leedom 2014/O1611
13 A1 6/2014 Cui et al. 2008.0114978 A1 5/2008 Lehtovirta et al. 2014/0165155 A1 6/2014 …
13 A1 6/2014 Cui et al. 2008.0114978 A1 5/2008 Lehtovirta et al. 2014/0165155 A1 6/2014 …
Key derivation for a module using an embedded universal integrated circuit card
JA Nix - US Patent 9,319,223, 2016 - Google Patents
A module with an embedded universal integrated circuit card (eUICC) can include a first
eUICC profile and a set of cryptographic algorithms. The first eUICC profile can include an …
eUICC profile and a set of cryptographic algorithms. The first eUICC profile can include an …
Systems and methods for “machine-to-machine”(M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
JA Nix - US Patent 9,276,740, 2016 - Google Patents
H04L63/0428—Network architectures or network communication protocols for network
security for providing a confidential data exchange among entities communicating through …
security for providing a confidential data exchange among entities communicating through …
Power management and security for wireless modules in “machine-to-machine” communications
JA Nix - US Patent 9,350,550, 2016 - Google Patents
Methods and systems are provided for power management and security for wireless
modules in “Machine-to-Machine” communications. A wireless module operating in a …
modules in “Machine-to-Machine” communications. A wireless module operating in a …
Key throttling to mitigate unauthorized file access
R Humphries, KD Ray, AJ Merry, H Schutz - US Patent 10,681,078, 2020 - Google Patents
A file system extension for an endpoint controls access to files by selectively decrypting files
under certain conditions. Where a pattern of access to the files suggests malicious and/or …
under certain conditions. Where a pattern of access to the files suggests malicious and/or …
Method of Altering Authentication Information to Multiple Systems
D Kalai - US Patent App. 14/220,687, 2015 - Google Patents
US20150271167A1 - Method of Altering Authentication Information to Multiple Systems - Google
Patents US20150271167A1 - Method of Altering Authentication Information to Multiple Systems …
Patents US20150271167A1 - Method of Altering Authentication Information to Multiple Systems …
Just-in-time encryption
A Berger, H Schutz, KD Ray, AJ Merry… - US Patent …, 2020 - Google Patents
(Continued) Primary Examiner Luu T Pham Assistant Examiner—Harvey I Cohen (74)
Attorney, Agent, or Firm—Strategic Patents, PC (57) ABSTRACT On an endpoint that …
Attorney, Agent, or Firm—Strategic Patents, PC (57) ABSTRACT On an endpoint that …
Intermediate encryption for exposed content
H Schutz, AJ Merry, KD Ray, A Berger - US Patent 10,686,827, 2020 - Google Patents
An endpoint encrypts local files with a key to protect file contents. If the endpoint or
processes on the endpoint becomes exposed to potentially harmful locations or resources …
processes on the endpoint becomes exposed to potentially harmful locations or resources …
Portable encryption format
S Ortner, A Berger, V Vanbiervliet, KD Ray - US Patent 10,791,097, 2020 - Google Patents
A portable encryption format wraps encrypted files in a self-executing container that
facilitates transparent, identity-based decryption for properly authenticated users while also …
facilitates transparent, identity-based decryption for properly authenticated users while also …
Key derivation for a module using an embedded universal integrated circuit card
JA Nix - US Patent 10,700,856, 2020 - Google Patents
A module with an embedded universal integrated circuit card (eUICC) can include a
received eUICC profile and a set of cryptographic algorithms. The received eUICC profile …
received eUICC profile and a set of cryptographic algorithms. The received eUICC profile …