31
Anthony C Fascenda, Emil Sturniolo: System and method for secure document embedding. Global Integrity, Nixon & Vanderhye P C, October 23, 2018: US10108810

The example non-limiting technology herein uses a Microsoft Office module or other application that automatically encrypts an Office document (Excel, PowerPoint, Word) or other software object and embeds the encrypted data within a “mule” or carrier file of the same type. On user's systems without t ...


32
Anthony C Fascenda: Mass subscriber management. Koolspan, Hunton & Williams, August 20, 2013: US08515078

An authentication and mass subscriber management technique is provided by employing a key table derived as a subset of a larger key pool, a network edge device, and authentication tokens attached on both the network edge device and on a subscriber's computing device. The network edge device and subs ...


33
Anthony C Fascenda, Emil Sturniolo: System and method for manipulating both the plaintext and ciphertext of an encryption process prior to dissemination to an intended recipient. Global Integrity, Nixon & Vanderhye P C, October 23, 2018: US10110373

This technology manipulates both the plaintext and ciphertext before and after encryption respectively and prior to dissemination to recipients. The manipulation mitigates the possibility of discovery of the encryption key(s) and/or encryption parameters. Even if all of the encryption parameters are ...


34
Anthony C Fascenda, Emil Sturniolo, Paul Benware, Robert Cichielo: Secure mobile telephony. Koolspan, Hunton & Williams, October 8, 2013: US08555068

An system for and method of providing end-to-end encrypted real-time phone calls using a commodity mobile phone and without requiring service provider cooperation is presented. The system and method improve upon prior art techniques by omitting any requirement for mobile phones that are specially ma ...


35
Anthony C Fascenda, Emil Sturniolo: Widely distributed parameterization. Global Integrity, Nixon & Vanderhye P C, August 14, 2018: US10050943

This technology mitigates the vulnerabilities of parameter storage by calculating parameters dynamically rather than storing and using static parameters. This example non-limiting technology derives parameters “on-demand” from a subset of widely distributed parameters determined by a random string g ...


36
Anthony C Fascenda, Emil Sturniolo: System and method of creating and sending broadcast and multicast data. Koolspan, Hunton & Williams, January 1, 2013: US08345875

A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding t ...


37

38
Anthony C Fascenda: Shared network access using different access keys. Hunton & Williams, April 8, 2004: US20040068653-A1

The invention provides a secure Wi-Fi communications method and system to enable automatic network roaming without requiring any back-end authentication servers and alleviating the need to handle large numbers of network parameters. In an embodiment of the invention, a client device listens for a “b ...


39
Anthony C FASCENDA: Mass subscriber management. KOOLSPAN, Hunton & Williams, June 26, 2008: US20080152140-A1

An authentication and mass subscriber management technique is provided by employing a key table derived as a subset of a larger key pool, a network edge device, and authentication tokens attached on both the network edge device and on a subscriber's computing device. The network edge device and subs ...


40
Anthony C Fascenda, Emil Sturniolo: System and method of creating and sending broadcast and multicast data. Koolspan, Hunton & Williams, December 18, 2008: US20080313464-A1

A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding t ...