21
Anthony C Fascenda: Localized network authentication and security using tamper-resistant keys. Koolspan, Hunton & Williams, October 30, 2012: US08301891 (2 worldwide citation)

The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key an ...


22
Anthony C Fascenda, James Gibbons: Network cryptography system and method. Koolspan, Hunton & Williams, February 8, 2011: US07886146 (2 worldwide citation)

A system for and method of providing encrypted network communications is presented. The system and method involve creating encrypted frames used for secure communications between cooperating peers that are the same size as the original unencrypted frames. The system and method thus provide secure co ...


23
Anthony C Fascenda, Emil Sturniolo: System and method of creating and sending broadcast and multicast data. Koolspan, Hunton & Williams, April 14, 2015: US09008312 (1 worldwide citation)

A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding t ...


24
Anthony C Fascenda, Emil Sturniolo: System and method of creating and sending broadcast and multicast data. Koolspan, Hunton & Williams, March 15, 2011: US07907735 (1 worldwide citation)

A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding t ...


25
Anthony C Fascenda: Self-management network access using localized access management. Koolspan, Hunton & Williams, May 31, 2011: US07954136 (1 worldwide citation)

The invention provides a method and system for locally tracking network usage and enforcing usage plans at a client device. In an embodiment of the invention, a unique physical key, or token, is installed at a client device of one or more networks. The key comprises a usage application and one or mo ...


26
Anthony C Fascenda: Localized network authentication and security using tamper-resistant keys. KOOLSPAN, Hunton & Williams, March 22, 2016: US09294915

The invention provides a secure Wi-Fi communications method and system. In an embodiment of the invention, unique physical keys, or tokens, are installed at an access point and each client device of the network. Each key comprises a unique serial number and a common network send cryptographic key an ...


27
Anthony C Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware: System for and method of cryptographic provisioning. KOOLSPAN, Hunton & Williams, November 21, 2017: US09824239

A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent in ...


28
Anthony C Fascenda, Emil Sturniolo: System and method of per-packet keying. KOOLSPAN, Hunton & Williams, December 8, 2015: US09209969

A method of per-packet keying for encrypting and decrypting data transferred between two or more parties, each party having knowledge of a shared key that allows a per-packet key to differ for each packet is provided. Avoiding the use of a static session key during encryption offers several advantag ...


29
Anthony C Fascenda, Emil Sturniolo, Robert Cichielo, Paul Benware: System for and method of cryptographic provisioning. Koolspan, Hunton & Williams, September 23, 2014: US08842836

A system for and method of securely provisioning a module with cryptographic parameters, such as cryptographic keys and key tables, is presented. Such modules may be used to enable encrypted communications between mobile phones to which they are coupled. The system and method prevent a malevolent in ...


30
Anthony C Fascenda: Subnet box. Koolspan, Hunton & Williams, November 20, 2012: US08316142

The invention provides an external in-line device (“Subnet Box”) placed between a network and an access point to achieve secure Wi-Fi communications without needing to modify the access point. The Subnet Box comprises an embedded token and will authenticate users based on pre-stored access rights. I ...