Key generation for hierarchical data access

GB Roth, MR Barbour, BJ Behm, CM Ilac… - US Patent …, 2015 - Google Patents
TO73, 195 B2 7/2006 Brickell et al. 2006/0100928 A1 5/2006 Waleczak, Jr. et al. 739,917 B2
11/2006 Jablon 2006, O130 100 A1 6, 2006 Pentland 7,228.417 B2 6/2007 Roskind …

Managed identity federation

WF Kruse, BJ Behm - US Patent 10,243,945, 2019 - Google Patents
Managed identity federation provides numerous options for authentication to access one or
more services. A user authen ticates with an identity verification provider and provides proof …

Multifactor username based authentication

JP Schneider - US Patent 9,225,526, 2015 - Google Patents
8,225,093 8,352,738 8,660,268 2002.0056040 2002/014.6005 2003, OO14646
2003/OO93671 2003/O105964 2003/0233546 2003/0236803 2004/0223619 …

Username based key exchange

JP Schneider - US Patent 9,258,113, 2016 - Google Patents
(57) ABSTRACT A method and apparatus for an System and process for sharing a secret
over an unsecured channel in conjunction with an authentication system. A client computes …

Parameter based key derivation

GB Roth, BJ Behm, ED Crahen, CM Ilac… - US Patent …, 2015 - Google Patents
Systems and methods for authentication generate keys from secret credentials shared
between authenticating parties and authenticators. Generation of the keys may involve …

Handshake offload

C MacCarthaigh - US Patent 10,122,692, 2018 - Google Patents
Cryptographically protected communications sessions are established using a distributed
process. A server proxies handshake messages to another computer system that negotiates …

Data security using request-supplied keys

GB Roth, EJ Brandwine - US Patent 9,311,500, 2016 - Google Patents
7,890,767 B2 2/2011 Smith et al. 2006/0282878 Al 12/2006 Stanley et al. 7.913, 084 B2
3/2011 Medvinsky et al. 2007/0005955 A1 1/2007 Pyle et al. T. 917.764 B2 3/2011 Futa …

Key derivation techniques

GB Roth, BJ Behm, ED Crahen, CM Ilac… - US Patent …, 2015 - Google Patents
Systems and methods for authentication generate keys from secret credentials shared
between authenticating parties and authenticators. Generation of the keys may involve …

Generating and using ephemeral identifiers and message integrity codes

K Krieger, M Weksler - US Patent 9,832,194, 2017 - Google Patents
Abstract Systems and methods for generating and using ephemeral identifiers are provided.
One example method includes determining, by one or more computing devices, a current …

Mutual authentication with symmetric secrets and signatures

GB Roth, GA Rubin - US Patent 9,258,117, 2016 - Google Patents
--------Key Path, Client Digital Signature-ma x tiation initiates, lacks access to the pre-shared
key. The server obtains the pre-shared key from another server that shares a secret with the …