Patent application number | Description | Published |
20100299529 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for securing communication between members. The method includes a first member obtaining a secret. An n-bit generator executing on the first member generates a message digest using the first secret. The first member extracts algorithm selector bits and an encryption key from the message digest, and selects an encryption algorithm identified by the algorithm selector bits. The method further includes the first member encrypting a communication using the encryption algorithm and the encryption key to obtain an encrypted communication, and the first member sending, to a second member of the group, the first encrypted communication. | 11-25-2010 |
20110307699 | TOKEN FOR SECURING COMMUNICATION - In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token. | 12-15-2011 |
20110307705 | SYSTEM AND METHOD FOR PROTECTING SECRETS FILE - A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory. | 12-15-2011 |
20110307706 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for securing communication between a plurality of members. The method includes a first member sending a first input to a second member, receiving a second input from the second member, and generating, by an n-bit generator, an initial message digest using the first input and the second input. Communications between the first member and the second member are encrypted using the initial message digest. | 12-15-2011 |
20110307707 | METHOD AND SYSTEM FOR SECURING A FILE - A method for securing files. The method includes an n-bit generator, executing on a first member of a group, generating a message digest using a first secret and a file constant value. The file constant value describes a file. The member extracts an encryption solution from at least the message digest, encrypts the file using the encryption solution to create the encrypted file, and sends the encrypted file and the file constant value to a second member. | 12-15-2011 |
20110314281 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for securing communication among members of a group. The method includes a first member obtaining a first secret. An n-bit generator executing on the first member generates a first message digest using the first secret. The first member extracts a first encryption solution and a second encryption solution, at least in part, from the first message digest, encrypts a first communication using the first encryption solution to obtain a first encrypted communication, and sends, to a second member of the group, the first encrypted communication. The first member further receives, from the second member, a second encrypted communication, and decrypts the second encrypted communication using the second encryption solution to obtain a second communication. | 12-22-2011 |
20130085944 | SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret. | 04-04-2013 |
20130086691 | SECURE ISLAND COMPUTING SYSTEM AND METHOD - A method for generating an n-bit result includes a secured containment device (SCD) receiving a request to generate the n-bit result. The request includes an n-bit generator input and a master secret identifier. The request is sent from an application executing on a host system using an input/output (I/O) interface. The SCD disables all I/O interfaces on the SCD between the host system and the SCD. After disabling all the I/O interfaces on the SCD between the host system and the SCD, the SCD provides the n-bit generator input and the master secret identifier to a secured hardware token over a second I/O interface, receives the n-bit result from the secured hardware token over the second I/O interface, enables at least the first I/O interface after the n-bit result is generated, and provides, after enabling the first I/O interface, the n-bit result to the application using the first I/O interface. | 04-04-2013 |
20130262882 | SECURE ISLAND COMPUTING SYSTEM AND METHOD - A method for generating an n-bit result includes a secured containment device (SCD) receiving a request to generate the n-bit result. The request includes an n-bit generator input and a master secret identifier. The request is sent from an application executing on a host system using an input/output (I/O) interface. The SCD disables all I/O interfaces on the SCD between the host system and the SCD. After disabling all the I/O interfaces on the SCD between the host system and the SCD, the SCD provides the n-bit generator input and the master secret identifier to a secured hardware token over a second I/O interface, receives the n-bit result from the secured hardware token over the second I/O interface, enables at least the first I/O interface after the n-bit result is generated, and provides, after enabling the first I/O interface, the n-bit result to the application using the first I/O interface. | 10-03-2013 |
20140006792 | METHOD AND SYSTEM FOR SECURING COMMUNICATION | 01-02-2014 |
20140136418 | SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret. | 05-15-2014 |
20140236835 | SYSTEM AND METHOD FOR APPLICATION SECURITY - A secured hardware token includes an embedded processor, secured persistent storage, and read only memory. The storage includes functionality to store data that includes an account master secret for an account at a financial institution. The memory includes a security application, which causes the processor to receive, from a financial institution application executing on a mobile device, a call for an n-bit result. The security application further causes the processor to obtain, from the secured persistent storage, the account master secret, construct the n-bit result specific to the call using the account master secret and the n-bit generator input as input to an n-bit generator in the security application, and return the n-bit result to the financial institution application. The financial institution application provides the n-bit result to the financial institution, which completes a financial transaction when the n-bit result is verified using a copy of the account master secret. | 08-21-2014 |
20140298019 | METHOD AND SYSTEM FOR SECURING COMMUNICATION - A method for generating one or more secrets for use by members. The method includes sending a first request for connection with a second member, and sending a second request to connection with a third member. The method further includes receiving, by the first member from the second member, a second input after the first request is sent and after communication is initiated between the first member and the second member and receiving, by the first member from the third member, a third input after the second request is sent and after communication is initiated between the first member and the third member. The method further includes generating, using an n-bit generator executing on the first member, a message digest using a first input, the second input, and the third input, extracting a secret from the message digest, and storing the secret in a secrets repository on the first member. | 10-02-2014 |
20140298036 | SYSTEM AND METHOD FOR PROTECTING SECRETS FILE - A method for protecting a first secrets file. The method includes an n-bit generator generating a secrets file name for the secrets file and generating a decoy file names for decoy files. The secrets file includes a secret. Each of the decoy files includes decoy file contents, are a same size as the secrets file, and is associated with a modification time within a range of modification times. The modification time of the secrets file is within the range of modification times. The secrets file and decoy files are stored in a secrets directory. | 10-02-2014 |
Patent application number | Description | Published |
20090056939 | FLOW CONTROL DEVICE AND METHOD FOR A DOWNHOLE OIL-WATER SEPARATOR - A downhole device having an oil/water separator having a well fluid inlet, an oil stream outlet conduit, and a water stream outlet conduit; a removable flow-restrictor located in at least one of the water stream outlet conduit or the oil stream outlet conduit. | 03-05-2009 |
20090242197 | FLOW CONTROL SYSTEM AND METHOD FOR DOWNHOLE OIL-WATER PROCESSING - A technique is provided for processing well fluid downhole. The technique utilizes equipment for separating a well fluid downhole into a water component and an oil component. The separation of water and oil can be controlled by selecting an appropriately sized flow restrictor for use in limiting the flow of one or both of the water and the oil. Additionally, a sensor system is used to monitor a well characteristic that enables adjustment of the downhole fluid processing based on well characteristic data from the sensor system. | 10-01-2009 |
20100288493 | CABLE SUSPENDED PUMPING SYSTEM - Embodiments of the present invention generally relate to a cable suspended pumping system. In one embodiment, a method of producing fluid from a reservoir includes deploying a pumping system into a wellbore to a location proximate the reservoir using a cable. The pump assembly includes a motor, an isolation device, a pump, and a power conversion module (PCM). The method further includes setting the isolation device, thereby rotationally fixing the pumping system to a tubular string disposed in the wellbore and isolating an inlet of the pump from an outlet of the pump; supplying a DC power signal from the surface to the PCM via the cable; and supplying a second power signal to the motor, thereby operating the pump and pumping reservoir fluid from the reservoir to the surface. | 11-18-2010 |
20100288501 | ELECTRIC SUBMERSIBLE PUMPING SYSTEM FOR DEWATERING GAS WELLS - Embodiments of the present invention generally relate to an electric submersible pumping system for dewatering gas wells. In one embodiment, a method of unloading liquid from a reservoir includes deploying a pumping system into a wellbore to a location proximate the reservoir using a cable. The pumping system includes a motor, an isolation device, and a pump. The method further includes setting the isolation device, thereby rotationally fixing the pumping system to a tubular string disposed in the wellbore and isolating an inlet of the pump from an outlet of the pump; supplying a power signal from the surface to the motor via the cable, thereby operating the pump and lowering a liquid level in the tubular string to a level proximate the reservoir; unsetting the isolation device; and removing the pump assembly from the wellbore using the cable. | 11-18-2010 |
20110000675 | FLOW CONTROL DEVICE AND METHOD FOR A DOWNHOLE OIL-WATER SEPARATOR - A downhole device having an oil/water separator having a well fluid inlet, an oil stream outlet conduit, and a water stream outlet conduit; a removable flow-restrictor located in at least one of the water stream outlet conduit or the oil stream outlet conduit. | 01-06-2011 |
20110146977 | TWO-STAGE DOWNHOLE OIL-WATER SEPARATION - A method for downhole oil-water separation, according to one or more aspects of the present disclosure, comprises disposing a oil-water separation system in a wellbore, the system comprising a first separator connected in hydraulic series with a second separator; separating a well fluid in the first separator into a first injection stream and a first production stream; discharging the first injection stream to an inlet of the second separator; separating the first injection stream in the second separator into an output injection stream and a second production stream; and injecting the output injection stream from the wellbore into an injection formation. | 06-23-2011 |
20110297391 | COMPACT CABLE SUSPENDED PUMPING SYSTEM FOR DEWATERING GAS WELLS - A method of unloading liquid from a reservoir includes deploying a pumping system into a wellbore to a location proximate the reservoir using a cable. The pumping system includes a multi-section motor, an isolation device, and a pump. The method further includes supplying a power signal from the surface to the motor via the cable and sequentially operating each section of the motor to mimic a multi-phase motor, thereby driving the pump and lowering a liquid level in the tubular string to a level proximate the reservoir. | 12-08-2011 |
20110300008 | COMPACT CABLE SUSPENDED PUMPING SYSTEM FOR LUBRICATOR DEPLOYMENT - A method of installing or retrieving a pumping system into or from a live wellbore includes connecting a lubricator to a production tree of the live wellbore and raising or lowering one or more downhole components of the pumping system from or into the wellbore using the lubricator. | 12-08-2011 |
20120210926 | DC POWERED ROV AND UMBILICAL - A method of operating a remotely operated underwater vehicle (ROV) includes launching the ROV from a vessel into water; supplying a direct current (DC) power signal to the ROV from the vessel via an umbilical; and sending a first command signal to the ROV from the vessel via the umbilical while supplying the DC power signal. | 08-23-2012 |
20120211229 | CABLE DEPLOYED DOWNHOLE TUBULAR CLEANOUT SYSTEM - Embodiments of the present invention generally relate to cable deployed downhole tubular clean out system. In one embodiment, a method of cleaning a tubular string disposed in a wellbore includes connecting a cable to a BHA. The BHA includes a motor and a cleaner. The method further includes supplying a power signal to the BHA through the cable, thereby operating the motor to rotate the cleaner; deploying the BHA into the tubular string and the wellbore using the cable; and cleaning a deposit from an inner surface of the tubular string using the rotating cleaner. | 08-23-2012 |
20130192824 | COMPACT CABLE SUSPENDED PUMPING SYSTEM FOR DEWATERING GAS WELLS - A motor includes two or more sections. Each section includes a submersible tubular housing and a stator core disposed within the housing. The stator core has one or more lobes and each lobe has a winding wrapped therearound. The motor further includes a rotor disposed within the housing and including a shaft and a rotor core. The rotor core has two or more lobes. Each section is incrementally oriented so that the sections may be operated to mimic a multi-phase motor. | 08-01-2013 |
20130315751 | COMPACT CABLE SUSPENDED PUMPING SYSTEM FOR LUBRICATOR DEPLOYMENT - A method of installing or retrieving a pumping system into or from a live wellbore includes connecting a lubricator to a production tree of the live wellbore and raising or lowering one or more downhole components of the pumping system from or into the wellbore using the lubricator. | 11-28-2013 |
20140000864 | DOWNHOLE MODULAR Y-TOOL | 01-02-2014 |
20140158347 | METHODS AND APPARATUS FOR SENSING IN WELLBORES - Methods and apparatus for sensing wellbore conditions in artificial lift wells using low profile sensors that are installed on down hole production equipment that makes them easier to install and retrieve. In one embodiment, low profile sensors are installed on a rod string making their insertion and removal much easier than it would be if they were mounted on production tubing. The sensors can be attached directly to the rod string or can be attached to a cable that is attached to the rod string. The sensors can transmit their data electrically through the cable or through the rod string. Alternatively, the sensors can transmit their data acoustically through the rod string. | 06-12-2014 |