Search

Paul N Alito

from Round Rock, TX
Age ~70

Paul Alito Phones & Addresses

  • 605 Deerfoot Dr, Round Rock, TX 78664 (512) 218-1335
  • 66 Twin Ridge Dr, Round Rock, TX 78664 (512) 218-4568
  • 9801 Parmer Ln, Austin, TX 78717 (512) 733-2870
  • 9801 W Parmer Ln #935, Austin, TX 78717 (512) 733-2870
  • 11913 Charing Cross Rd, Austin, TX 78759 (512) 733-2870
  • Spring, TX
  • Houston, TX
  • Tomball, TX

Business Records

Name / Title
Company / Classification
Phones & Addresses
Paul Alito
Managing M, Director, Managing
METAFACET, LLC
Business Services at Non-Commercial Site
605 Deerfoot Dr, Round Rock, TX 78664
605 Quail Crk Dr, Round Rock, TX 78664
10711 Watchful Fox Dr, Austin, TX 78748

Publications

Us Patents

Secure Deterministic Encryption Key Generator System And Method

View page
US Patent:
59636467, Oct 5, 1999
Filed:
Dec 28, 1998
Appl. No.:
9/221421
Inventors:
Guy L Fielder - Houston TX
Paul N Alito - Austin TX
Assignee:
The PACid Group - Austin TX
International Classification:
H04L 900
US Classification:
380 21
Abstract:
An encryption key generator is disclosed which is highly resistant to cryptographic analysis or brute force attacks, and which accommodates the destruction of an encryption key after each use by providing for the recreation of the key without need of key directories or other encryption key storage processes. A constant value and a secret E-Key Seed are applied as inputs to a bit-shuffling algorithm to provide a first many-to-few bit mapping and produce a first pseudo-random number. The first pseudo-random number in turn is applied as an input to a secure one-way hash algorithm to provide a second many-to-few bit mapping and produce a second pseudo-random number or message digest that may be truncated to a desired bit length to serve as a non-predictable but deterministic encryption key. Same constant value and E-Key Seed inputs to the key generator will provide the same message digest and hence the same key.

File Encryption Method And System

View page
US Patent:
60496126, Apr 11, 2000
Filed:
Dec 28, 1998
Appl. No.:
9/221521
Inventors:
Guy L. Fielder - Austin TX
Paul N. Alito - Austin TX
Assignee:
The PACid Group - Austin TX
International Classification:
H04C 900
US Classification:
380 44
Abstract:
A file security system is disclosed in which both a deterministic, non-predictable, pseudo-random, symmetric encryption key and an encrypted information file are highly resistant to cryptographic analysis or brute force trial-and-error attacks. The encryption key is formed by first combining a constant value and a secret E-Key Seed in accordance with a logic, algebraic, and/or encryption function to shuffle bits and perform a first many-to-few bit mapping to provide a first pseudo-random result, and by operating upon the result with a secure one-way hash algorithm to perform a second many-to-few bit mapping and thereby provide a pseudo-random message digest. The message digest may be truncated to provide a deterministic encryption key. The information file to be protected is then encrypted with the encryption key, and thereafter the encryption key is destroyed by the file manager of the host system. The encrypted information file and the constant value then are concatenated, and the result is operated upon by a secure hash algorithm to provide a message integrity code.

Bilateral Authentication And Encryption System

View page
US Patent:
61051330, Aug 15, 2000
Filed:
Dec 23, 1998
Appl. No.:
9/219967
Inventors:
Guy L. Fielder - Houston TX
Paul N. Alito - Austin TX
Assignee:
The PACid Group - Austin TX
International Classification:
H04L 932
US Classification:
713169
Abstract:
A bilateral system for authenticating remote transceiving stations through use of station identifiers (IDs), and through use of passwords which are used only one time, and thereafter exchanging messages through use of an encryption key which is changed after each system connection. Upon authentication, each of the stations independently creates a secret session encryption key in response to the other station's unique station identifier that is exchanged over a communication link in cleartext. The station identifiers are used as tags to look up a unique static secret and a unique dynamic secret which are known only by the two stations, but which are not exchanged over the communication link. The secrets are independently combined by a bit-shuffle algorithm, the result of which is applied to a secure hash function to produce a message digest. The secret session encryption key, a one-time password for the originating station, a one-time password for the receiving station, and a pseudo-random change value for updating the dynamic secret are derived from the message digest.

Bilateral Authentication And Information Encryption Token System And Method

View page
US Patent:
59956240, Nov 30, 1999
Filed:
Mar 10, 1997
Appl. No.:
8/815403
Inventors:
Guy L Fielder - Houston TX
Paul N Alito - Austin TX
Assignee:
The Pacid Group - Austin TX
International Classification:
H04L 900
US Classification:
380 25
Abstract:
An authentication and information encryption system and method which uses a token system for increased security in accommodating bilateral encrypted communications between an originating system and an answering system, with each system without synchronization independently generating a message digest through use of an encryption key generator which employs bit-shuffling, many-to-few bit mapping, and secure hash processing to forestall attempts to discover the secret inputs to the generator, or the system password, encryption key, or change value outputs extracted from the message digest, through cryptographic analysis or brute force trial-and-error attacks, and with each system using the passwords, encryption key and change value during only a single system connection before using the change value to update one of the secret inputs to the key generator to provide new password, encryption key and change value parameters having no predictable relationship to their previous counterparts, and with each system accommodating plural authentication cycles to verify the originating system, the answering system, the token system, and the pairing of the token system with either the originating system, the answering system, or both, all without public exposure of the secret inputs, encryption key or change value. Further, a deterministic, non-predictable, pseudo-random, and symmetric encryption key is generated, used during only a single system connection, and then destroyed. Thus, the need for key directories is obviated.
Paul N Alito from Round Rock, TX, age ~70 Get Report