1
John G Brainard, Burton S Kaliski Jr, Magnus Nyström, Ronald L Rivest: System and method for authentication seed distribution. RSA Security, Wilmer Cutler Pickering Hale and Dorr, January 10, 2006: US06985583 (286 worldwide citation)

In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation funct ...


2
John G Brainard, Burton S Kaliski Jr, Ronald L Rivest: Method and apparatus for performing enhanced time-based authentication. RSA Security, BainwoodHuang, April 22, 2008: US07363494 (236 worldwide citation)

A time-based method for generating an authentication code associated with an entity uses an authentication code generated from a secret, a dynamic, time-varying variable, and the number of previous authentication code generations within the particular time interval. Other information such as a perso ...


3
Ari Juels, John G Brainard: Radio frequency identification system with privacy policy implementation based on device classification. RSA Security, Ryan Mason & Lewis, November 20, 2007: US07298243 (194 worldwide citation)

Methods and apparatus are disclosed for use in an RFID system comprising a plurality of RFID devices and at least one reader which communicates with one or more of the devices. In accordance with an aspect of the invention, identifiers transmitted by the RFID devices are received by the reader. The ...


4
John G Brainard, Burton S Kaliski Jr, Magnus Nyström, Ronald L Rivest: System and method for authentication seed distribution. RSA Security, BainwoodHuang, March 10, 2009: US07502467 (180 worldwide citation)

In one embodiment of a user authentication system and method according to the invention, a device shares a secret, referred to as a master seed, with a server. The device and the server both derive one or more secrets, referred to as verifier seeds, from the master seed, using a key derivation funct ...


5
Daniel Vernon Bailey, John G Brainard, Ari Juels, Burton S Kaliski Jr: Authentication methods and apparatus using pairing protocols and other techniques. EMC Corporation, Ryan Mason & Lewis, July 23, 2013: US08495372 (16 worldwide citation)

In one aspect, a first processing device, which may be an authentication token, establishes a shared key through a pairing protocol carried out between the first processing device and a second processing device. The pairing protocol also involves communication between the second processing device an ...


6
Daniel V Bailey, John G Brainard, William M Duane, Michael J O Malley, Robert S Phipott: Agile OTP generation. Krishnendu Gupta, Joseph D Angelo, November 13, 2012: US08312519 (14 worldwide citation)

A method, system, and apparatus for agile generation of one time passcodes (OTPs) in a security environment, the security environment having a token generator comprising a token generator algorithm and a validator, the method comprising generating a OTP at the token generator according to a variance ...


7
John G Brainard, Ari Juels, Ronald L Rivest, Michael Szydlo: User authentication based on voucher codes. EMC Corporation, Ryan Mason & Lewis, May 7, 2013: US08438617 (5 worldwide citation)

An authentication server authenticates a first user, and generates a voucher code that is provided to the authenticated first user. The first user may provide the voucher code to a second user, responsive to a request by the second user for the first user to vouch for the second user, to thereby all ...


8
Daniel Vernon Bailey, John G Brainard, Ari Juels, Burton S Kaliski Jr: Wireless authentication methods and apparatus. EMC Corporation, Ryan Mason & Lewis, September 15, 2015: US09137012 (3 worldwide citation)

A first processing device, which may be, for example, a wireless authentication token or an RFID tag, transmits information in a wireless network in a manner that emulates standard communications of an access point of the wireless network, although the first processing device is not configured to op ...


9
John G Brainard: Updating keys for use in authentication. EMC Corporation, Krishnendu Gupta, Jason A Reyes, Deepika Bhayana, April 5, 2016: US09306741 (3 worldwide citation)

A method is used in updating keys for use in authentication. A cryptographic operation is performed based on a stored representation of a higher-level key. The cryptographic operation results in a derived key. The derived key is used for authentication. A key update operation is applied to replace t ...


10
Marten van Dijk, Kevin D Bowers, John G Brainard, Samuel Curry, Sean P Doyle, Michael J O Malley, Nikolaos Triandopoulos: Controlling a soft token running within an electronic apparatus. EMC Corporation, BainwoodHuang, October 28, 2014: US08875263 (2 worldwide citation)

A technique controls a soft token running within an electronic apparatus. The technique involves providing an initial series of authentication codes based on a first set of machine states. The initial series of authentication codes is provided from the electronic apparatus to a server through a forw ...