BackgroundCheck.run
Search For

Edward M Scheidt, 851048 Dead Run Dr, Mc Lean, VA 22101

Edward Scheidt Phones & Addresses

1048 Dead Run Dr, McLean, VA 22101    703-8479688   

1314 Nina Ct, McLean, VA 22101    703-8830135   

Mc Lean, VA   

945 Walker Rd, Great Falls, VA 22066    703-7592808   

Vienna, VA   

Miami, FL   

Social networks

Edward M Scheidt

Linkedin

Mentions for Edward M Scheidt

Edward Scheidt resumes & CV records

Resumes

Edward Scheidt Photo 12

Edward Scheidt

Publications & IP owners

Wikipedia

Edward Scheidt Photo 13

Edward Scheidt

Edward M. Scheidt (born 1939) is the retired Chairman of the CIA Cryptographic Center, and the designer of the cryptographic systems on the Kryptos sculpture at the center of CIA ...

Us Patents

Access Control And Authorization System

US Patent:
6490680, Dec 3, 2002
Filed:
Dec 4, 1998
Appl. No.:
09/205221
Inventors:
Edward M. Scheidt - McLean VA
Ersin L. Domangue - Woodbine MA
Assignee:
TecSec Incorporated - Vienna VA
International Classification:
H04L 900
US Classification:
713166, 713176, 713185, 380286
Abstract:
A process of encrypting an object includes applying a hash algorithm to the object, generating a random number, combining a first plurality of splits including the random number to form a working split, encrypting the object using the working split, combining a second plurality of splits not including the random number to form a value, encrypting the random number using the value, encrypting the hashed object according to a signature algorithm using a user private key, encrypting the hashed object according to a selected algorithm using the working split as a key, forming a header including information that can be used to decrypt the object, encrypting the header, and adding the encrypted header to the encrypted object. The pluralities of splits include a fixed split, a variable split, and a label split corresponding to a selected label. The header includes the encrypted random number, a label, and a digital signature.

Cryptographic Key Split Combiner

US Patent:
6542608, Apr 1, 2003
Filed:
Jul 31, 2001
Appl. No.:
09/917795
Inventors:
Edward M. Scheidt - McLean VA
C. Jay Wack - Clarksburg MD
Assignee:
TecSec Incorporated - Vienna VA
International Classification:
H04L 912
US Classification:
380 44, 380 46, 380 47, 380262, 380264, 380280, 713162
Abstract:
A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.

Cryptographic Key Split Combiner

US Patent:
6549623, Apr 15, 2003
Filed:
Feb 4, 2002
Appl. No.:
09/917802
Inventors:
Edward M. Scheidt - McLean VA
C. Jay Wack - Clarksburg MD
Assignee:
TecSec, Incorporated - Vienna VA
International Classification:
H04L 922
US Classification:
380 44, 380 46, 380 47, 380262, 380264, 713185, 713186
Abstract:
A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.

Cryptographic Key Split Combiner

US Patent:
6606386, Aug 12, 2003
Filed:
Jul 31, 2001
Appl. No.:
09/917807
Inventors:
Edward M. Scheidt - McLean VA
C. Jay Wack - Clarksburg MD
Assignee:
TecSec INC - Vienna VA
International Classification:
H04L 922
US Classification:
380 44, 380 46, 380 47, 380262, 380264, 713185, 713186
Abstract:
A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.

Cryptographic Key Split Combiner

US Patent:
6608901, Aug 19, 2003
Filed:
Jul 31, 2001
Appl. No.:
09/917794
Inventors:
Edward M. Scheidt - McLean VA
C. Jay Wack - Clarksburg MD
Assignee:
TecSec, Inc. - Vienna VA
International Classification:
H04L 922
US Classification:
380 44, 380 46, 380 47, 380262, 380264
Abstract:
A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data.

Cryptographic Information And Flow Control

US Patent:
6684330, Jan 27, 2004
Filed:
Oct 15, 1999
Appl. No.:
09/418806
Inventors:
C. Jay Wack - Clarksburg MD
Edward M. Scheidt - McLean VA
Jeffrey K. Morris - Arlington VA
Assignee:
Tecsec, Inc. - Vienna VA
International Classification:
H04L 914
US Classification:
713162, 713153, 713155, 380 44, 380278
Abstract:
A method of providing cryptographic information and flow control includes first determining a target domain from an IP address. An organization policy is looked up from a credential store, and an algorithm and credentials specified for the target domain are looked up in a domain-credential map. Any further credentials that are provided and that are permitted by the organizational policy are added. A working key is then generated, and information is received in the form of a receive packet. Any packet header is stripped from the receive packet and the remaining data is encrypted. Key splits are retrieved from the credential store, and are combined to form a key-encrypting key. The working key is the encrypted with the key-encrypting key, and a CKM header is encrypted. The encrypted CKM header is concatenated to the beginning of the encrypted data to form transmit data, and the packet header and the transmit data are concatenated to form a transmit packet. The transmit packet is then provided to a network interface card for transmission on a network.

Multiple Level Access System

US Patent:
6754820, Jun 22, 2004
Filed:
Jan 30, 2002
Appl. No.:
10/060011
Inventors:
Edward M. Scheidt - McLean VA
Ersin Domangue - Woodbine MD
Assignee:
Tecsec, Inc. - Vienna VA
International Classification:
G06F 1130
US Classification:
713166, 713184, 713187, 713201, 713202, 380 30, 380277, 380286
Abstract:
A method of securing an object at an access level includes selecting a profile for a user, including a credential having an encrypted credential public key, an encrypted credential public key encryption key, and a multiple-level access identifier. A working key is generated by binding a domain value with a random value. The object is encrypted with the working key. A random value encryption key is generated based on the shared value by decrypting the credential public key encryption key with the profile key encryption key, decrypting the credential public key with the credential public key encryption key, generating an ephemeral key pair, and generating a shared value based on the ephemeral private key and the credential public key. The random value is encrypted with the random value encryption key, and the encrypted object, the ephemeral public key, and the encrypted random value are provided for an authorized recipient.

Multiple Factor-Based User Identification And Authentication

US Patent:
6845453, Jan 18, 2005
Filed:
Jan 30, 2002
Appl. No.:
10/060039
Inventors:
Edward M. Scheidt - McLean VA, US
Ersin Domangue - Woodbine MD, US
Assignee:
Tecsec, Inc. - Vienna VA
International Classification:
G01F 1760
G06F 1130
US Classification:
713202, 713166, 713183, 713184, 713185, 713186, 705 50
Abstract:
A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user's identity is authenticated, and granting or restricting the user's access to the system if the user's identity is authenticated. More particularly, the method includes providing a modified data instance based on a second data instance, generating a key based on a first data instance, applying the key to the a modified data instance to generate a recovered data instance, interrogating the recovered data instance against the second data instance to generate an authentication value as a result of a correspondence evaluation, and granting or restricting the user's access to the system based at least in part on the validity of the authentication value.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.