BackgroundCheck.run
Search For

Philip A Mackenzie, ~63Leonia, NJ

Philip Mackenzie Phones & Addresses

Leonia, NJ   

Edgewater, NJ   

Staten Island, NY   

Princeton, MO   

2138 Crescent St, Astoria, NY 11105    718-9561438   

474 48Th St, Long Is City, NY 11109    718-3401134   

Long Island City, NY   

474 48Th Ave FL 4, Long Is City, NY 11109    718-3401134   

Social networks

Philip A Mackenzie

Linkedin

Mentions for Philip A Mackenzie

Resumes

Resumes

Philip Mackenzie Photo 1

Philip Mackenzie

Location:
United States

Publications

Wikipedia

Philip Mackenzie Photo 2

Philip Charles Mackenzie

Philip Charles MacKenzie is an American actor and television director. He is best known for his role as Donald Maltby on Brothers and his role as Ted Nichols on
Philip Mackenzie Photo 3

Philip Mackenzie

Phillip Mackenzie is a British musician and a graduate of Oxford University. He is the founder of the Amadeus Orchestra - a British orchestra dedicated to young

Us Patents

Secure Mutual Network Authentication Protocol

US Patent:
6757825, Jun 29, 2004
Filed:
Jul 13, 1999
Appl. No.:
09/353468
Inventors:
Philip Douglas MacKenzie - Maplewood NJ
Ram Swaminathan - New Providence NJ
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 930
US Classification:
713169, 713200, 713201, 713171, 713155, 380285, 380 30, 340 51
Abstract:
A password-only mutual network authentication protocol and key exchange protocol using a public key encryption scheme in which a server generates a public key/secret key pair and transmits the public key to a client. The client determines whether the public key was chosen in an acceptable manner, and if so, continues with the protocol. Otherwise, the client rejects authentication. If the protocol is continued, in one embodiment the client generates a parameterp as a function of the public key and a password (or, in an alternate embodiment, as a function of the public key and a function of a password). If the public key space mapping function F applied to p, F (p), is an element of the public key message space, then the protocol continues. If F (p) is not an element of the public key message space, then the client determines to reject authentication, but continues with the protocol so that the server does not gain any information about the password. If the client determines to reject authentication, it will terminate the protocol at a later step at which time the termination of the protocol cannot leak any sensitive information.

Secure Mutual Network Authentication And Key Exchange Protocol

US Patent:
7047408, May 16, 2006
Filed:
Aug 14, 2000
Appl. No.:
09/638320
Inventors:
Victor Vladimir Boyko - Monsey NY,
Eric Grosse - Berkeley Heights NJ,
Philip Douglas MacKenzie - Maplewood NJ,
Sarvar Patel - Montville NJ,
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/32
H04L 9/28
US Classification:
713169, 380 28
Abstract:
Secure communication protocols are disclosed in which two parties generate a shared secret which may be used as a secure session key for communication between the parties. The protocols are based on Diffie-Hellman type key exchange in which a Diffie-Hellman value is combined with a function of at least a password using the group operation such that the Diffie-Hellman value may be extracted by the other party using the inverse group operation and knowledge of the password. In one embodiment, each of the parties explicitly authenticates the other party, while in another embodiment, the parties utilize implicit authentication relying on the generation of an appropriate secret session key to provide the implicit authentication. Typically, the parties will be a client computer and a server computer. In accordance with other embodiments of the invention, in order to protect against a security compromise at the server, the server is not in possession of the password, but instead is provided with, and stores, a so-called password verifier which is a function of the password and where the password itself cannot be determined from the value of the password verifier.

Method And Apparatus For Distributing Shares Of A Password For Use In Multi-Server Password Authentication

US Patent:
7073068, Jul 4, 2006
Filed:
May 24, 2002
Appl. No.:
10/154746
Inventors:
Bjorn Markus Jakobsson - Hoboken NJ,
Philip D MacKenzie - Maplewood NJ,
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
G06F 1/26
US Classification:
713184, 713200, 713201
Abstract:
A method for distributing a password amongst a plurality of servers for subsequent use in a provably secure multi-server threshold password authentication process. A client, having a password to be authenticated by a plurality of servers, generates an encryption of a function of the password. Then, this encryption is provided to each of the servers for use in subsequent password authentication. In accordance with one illustrative embodiment of the invention, the encryption is of an ElGamal ciphertext of the function g, where πis password and g is the generator used to generate the cryptographic keys used for communication between the client and the plurality of servers.

Methods And Apparatus For Providing Efficient Password-Authenticated Key Exchange

US Patent:
7076656, Jul 11, 2006
Filed:
Apr 5, 2001
Appl. No.:
09/827227
Inventors:
Philip D. MacKenzie - Maplewood NJ,
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/32
H04L 9/28
US Classification:
713171, 713169, 380 28
Abstract:
A secure protocol is provided which uses a Diffie-Hellman type shared secret, but modified such that the two parties may authenticate each other using a shared password. In accordance with the invention, a party generates the Diffie-Hellman value gand combines it with a function of at least the password using a group operation, wherein any portion of a result associated with the function that is outside the group is randomized. The resulting value is transmitted to the other party. The group operation is defined for the particular group being used. Every group has a group operation and a corresponding inverse group operation. Upon receipt of the value, the other party performs the inverse group operation on the received value and the function of at least the password, and removes the randomization of any portion of the result associated with the function that is outside the group, to extract gsuch that the other party may then generate the shared secret gusing its knowledge of y.

Methods And Apparatus For Providing Networked Cryptographic Devices Resilient To Capture

US Patent:
7149311, Dec 12, 2006
Filed:
Feb 7, 2002
Appl. No.:
10/072331
Inventors:
Philip D. MacKenzie - Maplewood NJ,
Michael Kendrick Reiter - Raritan NJ,
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/00
US Classification:
380286, 380277, 713168, 713171, 713180, 726 18, 726 19, 726 26, 726 30
Abstract:
Techniques are provided by which a device that performs private key operations (e. g. , signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i. e. , its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.

Robust Efficient Distributed Rsa-Key Generation

US Patent:
7313701, Dec 25, 2007
Filed:
May 21, 2001
Appl. No.:
09/860441
Inventors:
Yair Frankel - Westfield NJ,
Marcel M. Yung - New York NY,
Philip D. MacKenzie - Maplewood NJ,
Assignee:
CQR Cert, LLC - New York NY
International Classification:
H04L 9/00
US Classification:
713180, 713168, 713172, 713173, 713174, 705 64
Abstract:
The invention provides for robust efficient distributed generation of RSA keys. An efficient protocol is one which is independent of the primality test “circuit size”, while a robust protocol allows correct completion even in the presence of a minority of arbitrarily misbehaving malicious parties. The disclosed protocol is secure against any minority of malicious parties (which is optimal). The disclosed method is useful in establishing sensitive distributed cryptographic function sharing services (certification authorities, signature schemes with distributed trust, and key escrow authorities), as well as other applications besides RSA (namely: composite ElGamal, identification schemes, simultaneous bit exchange, etc. ). The disclosed method can be combined with proactive function sharing techniques to establish the first efficient, optimal-resilience, robust and proactively-secure RSA-based distributed trust services where the key is never entrusted to a single entity (i. e. , distributed trust totally “from scratch”).

Methods And Apparatus For Delegation Of Cryptographic Servers For Capture-Resilient Devices

US Patent:
7373499, May 13, 2008
Filed:
Jun 26, 2002
Appl. No.:
10/183901
Inventors:
Philip D. MacKenzie - Maplewood NJ,
Michael Kendrick Reiter - Pittsburgh PA,
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/00
US Classification:
713150
Abstract:
Improved cryptographic techniques are provided by which a device that performs private key operations (e. g. , signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i. e. , confirmation of the password guess) from the originally designated entity or party to another designated entity or party.

Methods And Apparatus For Providing Secure Two-Party Public Key Cryptosystem

US Patent:
8520844, Aug 27, 2013
Filed:
Jun 20, 2003
Appl. No.:
10/600687
Inventors:
Philip D. MacKenzie - Maplewood NJ,
Assignee:
Alcatel Lucent - Paris
International Classification:
H04L 9/00
US Classification:
380 44, 380 30, 380 42, 380282, 380286, 713171, 713176, 713180
Abstract:
Techniques for an efficient and provably secure protocol by which two parties, each holding a share of a Cramer-Shoup private key, can jointly decrypt a ciphertext, but such that neither party can decrypt a ciphertext alone. In an illustrative embodiment, the secure protocol may use homomorphic encryptions of partial Cramer-Shoup decryption subcomputations, and three-move Σ-protocols for proving consistency.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.