Smart Cards Information Security Encryption Software Development Security Project Management Product Management Pki Management Enterprise Software Program Management System Architecture Cloud Security Network Security Identity Management Saas Cloud Computing Computer Security Application Security Embedded Systems Cryptography Information Security Management
Interests:
Exercise Home Improvement Reading Gourmet Cooking Sports Home Decoration Photograph Cooking Electronics Outdoors Crafts Music Family Values Movies Collecting Christianity Kids Automobiles Travel Traveling
Dominique Vincent Pavlin - Montigny le Bretonneux, FR Mehdi Sotoodeh - Mission Viejo CA, US Reed H. Tibbetts - Tustin CA, US Patrick N. Godding - Lake Forest CA, US Alain Raymond Spiewek - Courbevoie, FR Roger Graham Nixon - Farnhan Common, GB
A method and apparatus for protecting computer software from unauthorized execution or duplication using a hardware key is disclosed. The apparatus comprises a means for communicating with the computer to receive command messages from the computer in the hardware key and to provide response messages to the computer, a memory for storing data for translating command messages into response messages enabling software execution, and a processor coupled to the communicating means for translating command messages into response messages using the data stored in the memory. The processor further comprises a memory manager, including means for logically segmenting the memory storing the data into at least one protected segment, and a means for controlling access to the protected segment.
Laszlo Elteto - Irvine CA, US Shawn D. Abbott - Calgary, CA James Khalaf - Santa Ana CA, US Reed H. Tibbetts - Tustin CA, US Mehdi Sotoodeh - Mission Viejo CA, US Calvin W. Long - Arcadia CA, US
A method and apparatus for securing a token from unauthorized use is disclosed. The method comprises the steps of receiving a first message transmitted from a host processing device and addressed to a PIN entry device according to a universal serial bus (USB) protocol; accepting a PIN entered into the PIN entry device; and transmitting a second message comprising at least a portion of the first message and the PIN from the PIN entry device to the token along a secure communication path. In another embodiment, the present invention describes an apparatus for securing a token from unauthorized use, comprising a PIN entry device, communicably coupleable to a host processing device transmitting a first message addressed to the PIN entry device, and communicatively coupleable to the token according to a universal serial bus USB protocol, the PIN entry device comprising a user input device, for accepting a user-input PIN; and a processor, communicatively coupled to the user input device, the processor for receiving the first message and combining the first message with the user-input PIN, and for producing a second message having at least a portion of the first message and the user-input PIN.
Secure Authentication Using Hardware Token And Computer Fingerprint
Brian Grove - Laguna Niguel CA, US Reed H. Tibbetts - Tustin CA, US James Khalaf - Santa Ana CA, US Laszlo Elteto - Irvine CA, US
Assignee:
SafeNet, Inc. - Belcamp MD
International Classification:
H04L 9/00 H04L 9/32
US Classification:
713182, 713159, 713185, 713186, 726 20
Abstract:
A method and apparatus for secure authentication of a hardware token is disclosed. In one embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-response authentication which is performed on the hardware token. In another embodiment, the host computer fingerprint is used as a personal identification number for the hardware token.
Secure Authentication Using Hardware Token And Computer Fingerprint
Brian Grove - Belcamp MD, US Reed Tibbetts - Tustin CA, US James Khalaf - Belcamp MD, US Laszlo Elteto - Irvine CA, US
Assignee:
SafeNet, Inc. - Belcamp MD
International Classification:
G06F 7/04 G06F 15/16 G06F 17/30 H04L 29/06
US Classification:
726 9, 726 20, 713172, 713182
Abstract:
A method and apparatus for secure authentication of a hardware token is disclosed. In one embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-response authentication which is performed on the hardware token. In another embodiment, the host computer fingerprint is used as a personal identification number for the hardware token.
Secure Authentication Using Hardware Token And Computer Fingerprint
Brian Grove - Belcamp MD, US Reed Tibbetts - Tustin CA, US James Khalaf - Belcamp MD, US Laszlo Elteto - Irvine CA, US
Assignee:
SafeNet, Inc. - Belcamp MD
International Classification:
G06F 7/04
US Classification:
726 9, 726 3, 726 20, 713171, 713185
Abstract:
A method and apparatus for secure authentication of a hardware token is disclosed. In one embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-response authentication which is performed on the hardware token. In another embodiment, the host computer fingerprint is used as a personal identification number for the hardware token.
Secure Ir Communication Between A Keypad And A Token
Laszlo Elteto - Irvine CA, US Shawn D. Abbott - Calgary, CA James Khalaf - Santa Ana, CA Reed H. Tibbetts - Tustin CA, US Mehdi Sotoodeh - Mission Viejo CA, US Calvin W. Long - Arcadia CA, US
A device that secures a token from unauthorized use is disclosed. The device comprises a user interface for accepting a personal identifier, a processor, communicatively coupled to the user interface device, and a token interface. The token interface includes a token interface IR emitter that produces an IR signal having information included in the PIN. The token IR emitter is coupled to the processor and is further communicatively coupled to a token IR sensor when the token is physically coupled with the token interface. The token interface also includes a shield, substantially opaque to the IR signal, for substantially confining the reception of the IR signal to the token IR sensor. In one embodiment, the shield substantially circumscribes the IR emitter. In another embodiment, the interface also comprises a token interface IR sensor, which allows communications from the token to the device as well.
DOMINIQUE VINCENT PAVLIN - MONTIGNY LE BRETONNEUX, FR MEHDI SOTOODEH - MISSION VIEJO CA, US REED H. TIBBETTS - TUSTIN CA, US PATRICK N. GODDING - LAKE FOREST CA, US ALAIN RAYMOND SPIEWEK - COURBEVOIE, FR ROGER GRAHAM NIXON - FARNHAN COMMON, GB
International Classification:
G06F012/14
US Classification:
713/193000, 705/055000, 717/006000
Abstract:
A method and apparatus for protecting computer software from unauthorized execution or duplication using a hardware key is disclosed. The apparatus comprises a means for communicating with the computer to receive command messages from the computer in the hardware key and to provide response messages to the computer, a memory for storing data for translating command messages into response messages enabling software execution, and a processor coupled to the communicating means for translating command messages into response messages using the data stored in the memory. The processor further comprises a memory manager, including means for logically segmenting the memory storing the data into at least one protected segment, and a means for controlling access to the protected segment.
Youtube
Andy Sutton vs Billy Tibbetts
Andy Sutton ( Minnesota Wild ) vs Billy Tibbetts ( Pittsburgh Penguins...
Duration:
1m 58s
Billy Tibbetts vs Jamal Mayers
Jamal Mayers ( St. Louis Blues ) vs Billy Tibbetts ( Pittsburgh Pengui...
Duration:
17s
Billy Tibbetts vs Sean Avery
Billy Tibbetts ( New York Rangers ) vs Sean Avery ( Detroit Red Wings ...
Duration:
1m 23s
Mollie Tibbetts Killer Sentenced To Life In P...
NBC News Digital is a collection of innovative and powerful news brand...
Duration:
2m 32s
Eric Godard vs Billy Tibbetts
Eric Godard pounds scumbag Billy Tibbetts in this battle. 12/3/00.
Duration:
1m 15s
Tibbetts Suckers Hordichuk
Bob Boughner fights Yves Sarault then Billy Tibbetts suckers Darcy Hod...