Sam Curry

Boston, Massachusetts, United States Contact Info
21K followers 500+ connections

Join to view profile

Articles by Sam

Activity

Join now to see all activity

Licenses & Certifications

Publications

  • Strategically-Thinking Senior Executives Need to Take a New View of the Digital World - It is Here to Stay and Is Getting More Scary

    Effective Executive

    Many companies and their leadership teams are intimidated by the digital world and the dark, mysterious risks from cyber threats. Many Chief Executive Officers (CEOs) do not understand the implications of increasing digital transformation and their increasing exposure to cybercrime—but they must. So, from both an academic and practical perspective, the authors of this paper have interviewed several Chief Security Officers (CSOs) and analyzed their remarks from a leadership perspective— it is…

    Many companies and their leadership teams are intimidated by the digital world and the dark, mysterious risks from cyber threats. Many Chief Executive Officers (CEOs) do not understand the implications of increasing digital transformation and their increasing exposure to cybercrime—but they must. So, from both an academic and practical perspective, the authors of this paper have interviewed several Chief Security Officers (CSOs) and analyzed their remarks from a leadership perspective— it is only human to not understand the digital world, and to see the security function as a technical niche, but business leaders have an enormous and scary gap to bridge, and mounting pressures to do so. Arguably, the skills/abilities required for engaging in responsible leadership include the appreciation of risk—even risks such as digital issues and cyber security challenges which the typical business leader barely understands. Some companies are more responsive to global problems such as cybercrime than others—and much of this response depends on how seriously they take their digital transformation and if they listen to their cyber security experts.

    Other authors
    • stephanie jones
    See publication
  • Computer and Information Security Handbook

    John R. Vacca

    Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and…

    Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, including Internet security threats and measures (audit trails IP sniffing/spoofing etc.) and how to implement security policies and procedures. In addition, this book covers security and network design with respect to particular vulnerabilities and threats. It also covers risk assessment and mitigation and auditing and testing of security systems as well as application standards and technologies required to build secure VPNs, configure client software and server operating systems, IPsec-enabled routers, firewalls and SSL clients. This comprehensive book will provide essential knowledge and skills needed to select, design and deploy a public key infrastructure (PKI) to secure existing and future applications.

    * Chapters contributed by leaders in the field cover theory and practice of computer security technology, allowing the reader to develop a new level of technical expertise
    * Comprehensive and up-to-date coverage of security issues facilitates learning and allows the reader to remain current and fully informed from multiple viewpoints
    * Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions

    See publication

Patents

  • Systems and methods for asset-based severity scoring and protection therefrom

    Issued US20220345469A1

    Systems and methods are provided to determine a maliciousness level of an element using a hypergraph of neighbors. The method can include receiving the element; generating a hypergraph of neighbor target elements found in a database, the hypergraph comprising a set of nodes and a set of edges, wherein the set of nodes represents the neighbor target elements, and the set of edges represents connections between the neighbor target elements; classifying nodes and edges in the hypergraph;…

    Systems and methods are provided to determine a maliciousness level of an element using a hypergraph of neighbors. The method can include receiving the element; generating a hypergraph of neighbor target elements found in a database, the hypergraph comprising a set of nodes and a set of edges, wherein the set of nodes represents the neighbor target elements, and the set of edges represents connections between the neighbor target elements; classifying nodes and edges in the hypergraph; generating a maliciousness level profile for the element based on aggregation of nodes and edges in the hypergraph; linking information related to the element with the maliciousness level profile for the element; and performing an action based on a type of the element.

    Other inventors
    See patent
  • Authenticating an Agent

    Issued US US9781129B1

    There is disclosed a method and system for use in authenticating an entity. An authentication request is received from the entity. An input signal is received from a communications device associated with the entity. The input signal comprises the current location of the communications device. The current location of the communications device is derived from the input signal. Based on the current location of the communications device, an event is detected at substantially the same location as…

    There is disclosed a method and system for use in authenticating an entity. An authentication request is received from the entity. An input signal is received from a communications device associated with the entity. The input signal comprises the current location of the communications device. The current location of the communications device is derived from the input signal. Based on the current location of the communications device, an event is detected at substantially the same location as the current location of the communications device. An analysis is performed between the current location of the communications device and the event. An authentication result is generated based on the analysis between the current location of the communications device and the event. The authentication result can be used for authenticating the entity.

    Other inventors
    See patent
  • Authenticating an entity

    Issued US13/536,990

    There is disclosed a method, system and a computer program product for use in authenticating an entity. An authentication request is received from the entity. Information in connection with the entity is acquired from an external source. Based on the information, a risk score is set such that the riskiness of the authentication request can be readily deduced therefrom.

    Other inventors
    See patent
  • Authenticating an entity

    Issued US 9405897

    There is disclosed a method and system for use in authenticating an entity. An entity location history is stored comprising a historical record of locations visited by the entity. An authentication request is received from the entity. A pattern of recent locations visited by the entity indicative of irregular behavior is detected. An analysis is performed between the pattern of recent locations indicative of irregular behavior and the entity location history for establishing the riskiness of…

    There is disclosed a method and system for use in authenticating an entity. An entity location history is stored comprising a historical record of locations visited by the entity. An authentication request is received from the entity. A pattern of recent locations visited by the entity indicative of irregular behavior is detected. An analysis is performed between the pattern of recent locations indicative of irregular behavior and the entity location history for establishing the riskiness of the authentication request. An authentication result is generated based on the analysis between the pattern of recent locations indicative of irregular behavior and the entity location history.

    Other inventors
    See patent
  • Distributed protection of credential stores utilizing multiple keys derived from a master key

    Issued US US9374221 B1

    A user device is configured for communication with a distributed verification system over a network. The user device generates first and second keys from a master key for a password vault or other credential store, provides the first key to the distributed verification system, encrypts the credential store based at least in part on the second key, and provides the encrypted credential store to the distributed verification system. The credential store is encrypted utilizing the second key and…

    A user device is configured for communication with a distributed verification system over a network. The user device generates first and second keys from a master key for a password vault or other credential store, provides the first key to the distributed verification system, encrypts the credential store based at least in part on the second key, and provides the encrypted credential store to the distributed verification system. The credential store is encrypted utilizing the second key and information that is stored in a distributed manner over a plurality of servers of the distributed verification system. For example, encrypting the credential store illustratively comprises generating a ciphertext by encrypting the credential store utilizing the second key, obtaining a third key stored in the distributed manner over the servers, and encrypting the ciphertext utilizing the third key to generate the encrypted credential store that is provided to the distributed verification system.

    Other inventors
    See patent
  • Software License with Drifting Component

    Issued US US9122878 B1

    An improved technique for verifying a license of a software product includes performing license checks with a server and passing to the server, as part of the license checks, a drifting digital code. The drifting code forms a particular drift pattern, which the server detects over the course of multiple license checks. The drift pattern is typically unique, or relatively unique, to the machine on which the software product is run, and changes in a manner that is difficult for malicious users to…

    An improved technique for verifying a license of a software product includes performing license checks with a server and passing to the server, as part of the license checks, a drifting digital code. The drifting code forms a particular drift pattern, which the server detects over the course of multiple license checks. The drift pattern is typically unique, or relatively unique, to the machine on which the software product is run, and changes in a manner that is difficult for malicious users to replicate on other machines. If a second copy of the software is installed, e.g., if the software is pirated, the second copy will produce a drifting code that has its own drift pattern, which differs from that of the initial copy. The server detects the duplicate copy by observing a divergence in the codes it receives during license checks.

    See patent
  • Methods and apparatus for mediating access to derivatives of sensitive data

    Issued US US8978159B1

    Access control systems are provided that mediate access to derivatives of sensitive data. A method is provided for processing a data request from a client, the data request comprising a client identifier and an indication of the intended use of the data, by receiving the data request from the client; providing the client identifier and indicated use to an access manager, wherein the access manager assesses a risk of providing access to the data for the indicated use; if the access manager…

    Access control systems are provided that mediate access to derivatives of sensitive data. A method is provided for processing a data request from a client, the data request comprising a client identifier and an indication of the intended use of the data, by receiving the data request from the client; providing the client identifier and indicated use to an access manager, wherein the access manager assesses a risk of providing access to the data for the indicated use; if the access manager grants access for the indicated use, receiving one or more keys with corresponding computing restrictions from the access manager; computing a result; and providing the result to the client, wherein the provided result comprises the derivative of sensitive data. The access manager grants the access for the indicated use, for example, based on a risk score.

    Other inventors
    See patent
  • Authentication based on a current location of a communications device associated with an entity

    Issued US US8904496B1

    There is disclosed a method and system for use in authenticating an entity in connection with a computerized resource. An authentication request is received from entity for access to computerized resource. An input signal is received from a communications device associated with entity. The input signal comprises current location of communications device. The current location of communications device is derived from input signal. A location history in connection with communications device is…

    There is disclosed a method and system for use in authenticating an entity in connection with a computerized resource. An authentication request is received from entity for access to computerized resource. An input signal is received from a communications device associated with entity. The input signal comprises current location of communications device. The current location of communications device is derived from input signal. A location history in connection with communications device is captured. The location history comprises a record of discrete locations visited by communications device over a period of time. An analysis is performed between current location of the communications device and location history in connection with communications device. An authentication result is generated based on analysis between current location of communications device and location history in connection with communications device. The authentication result can be used for authenticating entity.

    Other inventors
    See patent
  • Controlling a soft token running within an electronic apparatus

    Issued US US8875263 B1

    A technique controls a soft token running within an electronic apparatus. The technique involves providing an initial series of authentication codes based on a first set of machine states. The initial series of authentication codes is provided from the electronic apparatus to a server through a forward channel to authenticate a user. The technique further involves receiving a command from the server through a reverse channel between the electronic apparatus and the server. The reverse channel…

    A technique controls a soft token running within an electronic apparatus. The technique involves providing an initial series of authentication codes based on a first set of machine states. The initial series of authentication codes is provided from the electronic apparatus to a server through a forward channel to authenticate a user. The technique further involves receiving a command from the server through a reverse channel between the electronic apparatus and the server. The reverse channel provides communications in a direction opposite to that of the forward channel. The technique further involves changing the first set of machine states to a second set of machine states in response to the command, and providing a new series of authentication codes based on the second set of machine states. The new series of authentication codes is provided from the electronic apparatus to the server through the forward channel for user authentication.

    Other inventors
    See patent
  • Managing user access with mobile device posture

    Issued US US8819769 B1

    An improved technique for managing access of a user of a computing machine to a remote network collects device posture information about the user's mobile device. The mobile device runs a soft token, and the collected posture information pertains to various aspects of the mobile device, such as the mobile device's hardware, software, environment, and/or users, for example. The server applies the collected device posture information along with token codes from the soft token in authenticating…

    An improved technique for managing access of a user of a computing machine to a remote network collects device posture information about the user's mobile device. The mobile device runs a soft token, and the collected posture information pertains to various aspects of the mobile device, such as the mobile device's hardware, software, environment, and/or users, for example. The server applies the collected device posture information along with token codes from the soft token in authenticating the user to the remote network.

    Other inventors
    See patent
  • Detecting soft token copies

    Issued US US8752156B1

    A technique for detecting unauthorized copies of a soft token that runs on a mobile device includes generating a set of random bits on the mobile device and providing samples of the set of random bits, as well as token codes from the soft token, for delivery to a server during authentication requests. The server acquires the set of random bits of the mobile device, or learns the set of random bits over the course of multiple login attempts. Thereafter, the server predicts values of the samples…

    A technique for detecting unauthorized copies of a soft token that runs on a mobile device includes generating a set of random bits on the mobile device and providing samples of the set of random bits, as well as token codes from the soft token, for delivery to a server during authentication requests. The server acquires the set of random bits of the mobile device, or learns the set of random bits over the course of multiple login attempts. Thereafter, the server predicts values of the samples of the set of random bits and tests actual samples arriving in connection with subsequent authentication requests. Mismatches between predicted samples and received samples indicate discrepancies between the random bits of the device providing the samples and the random bits of the mobile device, and thus indicate unauthorized soft token copies.

    Other inventors
    See patent
  • Providing authentication codes which include token codes and biometric factors

    Issued US US8752146B1

    A technique provides authentication codes to authenticate a user to an authentication server. The technique involves generating, by an electronic apparatus (e.g., a smart phone, a tablet, a laptop, etc.), token codes from a cryptographic key. The technique further involves obtaining biometric measurements from a user, and outputting composite passcodes as the authentication codes. The composite passcodes include the token codes and biometric factors based on the biometric measurements…

    A technique provides authentication codes to authenticate a user to an authentication server. The technique involves generating, by an electronic apparatus (e.g., a smart phone, a tablet, a laptop, etc.), token codes from a cryptographic key. The technique further involves obtaining biometric measurements from a user, and outputting composite passcodes as the authentication codes. The composite passcodes include the token codes and biometric factors based on the biometric measurements. Additionally, the token codes and the biometric factors of the composite passcodes operate as authentication inputs to user authentication operations performed by the authentication server. In some arrangements, the biometric factors are results of facial recognition (e.g., via a camera), voice recognition (e.g., via a microphone), gate recognition (e.g., via an accelerometer), touch recognition and/or typing recognition (e.g., via a touchscreen or keyboard), combinations thereof, etc.

    Other inventors
    See patent
  • Computing with presentation layer for multiple virtual machines

    Issued US US8726337B1

    An improved technique for managing multiple virtual machines includes a presentation layer that receives user input for multiple virtual machines and renders output from the virtual machines in a unified presentation, which can be displayed to a user. In certain examples, Red/Green security is implemented by designating one virtual machine as a Green virtual machine and another as a Red virtual machine. Although different virtual machines are used, the presentation layer unifies the user's…

    An improved technique for managing multiple virtual machines includes a presentation layer that receives user input for multiple virtual machines and renders output from the virtual machines in a unified presentation, which can be displayed to a user. In certain examples, Red/Green security is implemented by designating one virtual machine as a Green virtual machine and another as a Red virtual machine. Although different virtual machines are used, the presentation layer unifies the user's interaction with the virtual machines and reduces the need for the user to keep track of different virtual machines or to switch manually between them.

    Other inventors
    See patent
  • Soft token posture assessment

    Issued US US8683563B1

    An improved technique for assessing the security status of a device on which a soft token is run collects device posture information from the device running the soft token and initiates transmission of the device posture information to a server to be used in assessing whether the device has been subjected to malicious activity. The device posture information may relate to the software status, hardware status, and/or environmental context of the device. In some examples, the device posture…

    An improved technique for assessing the security status of a device on which a soft token is run collects device posture information from the device running the soft token and initiates transmission of the device posture information to a server to be used in assessing whether the device has been subjected to malicious activity. The device posture information may relate to the software status, hardware status, and/or environmental context of the device. In some examples, the device posture information is transmitted to the server directly. In other examples, the device posture information is transmitted to the server via auxiliary bits embedded in passcodes displayed to the user, which the user may read and transfer to the server as part of authentication requests. The server may apply the device posture information in a number of areas, including, for example, authentication management, risk assessment, and/or security analytics.

    Other inventors
    See patent
  • Scheduling soft token data transmission

    Issued US US8683570B1

    An improved technique provides scheduled data transfer between a mobile device and a server. The mobile device combines token codes generated by a soft token with sequences of auxiliary bits and displays the combinations to users as passcodes. Users may then copy the passcodes to their computers for authenticating to a server on a remote network. As the passcodes include both token codes and sequences of auxiliary bits, a communication channel is established whereby the auxiliary bits as well…

    An improved technique provides scheduled data transfer between a mobile device and a server. The mobile device combines token codes generated by a soft token with sequences of auxiliary bits and displays the combinations to users as passcodes. Users may then copy the passcodes to their computers for authenticating to a server on a remote network. As the passcodes include both token codes and sequences of auxiliary bits, a communication channel is established whereby the auxiliary bits as well as the soft token codes are transmitted from the mobile device to the server.

    Other inventors
    See patent
  • Computing with policy engine for multiple virtual machines

    Issued US US8683548 B1

    An improved technique for delegating computing actions among different machines includes a policy engine that receives inputs specifying computing actions to be performed and automatically selects a virtual machine to perform each action. Machine selection is based on a policy, which recognizes multiple categories of computing actions, classifies each input as belonging to one of the categories, and directs each computing action to a virtual machine designated for performing only that one…

    An improved technique for delegating computing actions among different machines includes a policy engine that receives inputs specifying computing actions to be performed and automatically selects a virtual machine to perform each action. Machine selection is based on a policy, which recognizes multiple categories of computing actions, classifies each input as belonging to one of the categories, and directs each computing action to a virtual machine designated for performing only that one category of computing actions.

    Other inventors
    See patent
  • METHODS AND APPARATUS FOR MEDIATING ACCESS TO DERIVATIVES OF SENSITIVE DATA

    Filed US 13/731,514

    Existing authentication systems typically aim to ensure that data is available only to those entities that are authorized to obtain it. Privacy goals, however, also require that even authorized entities are constrained in terms of how they use the data. A Mediated Privacy (MP) model has been proposed to grant access to sensitive data for specific types of usage, such as allowing filtered queries or selective data transfer.

    Other inventors

Honors & Awards

  • SC Magazine 30 Year Visionary Award

    SC Magazine

    SC Magazine celebrated 30 years in cybersecurity and recognized (among other awards) 5 Visionaries in addition to Sam Curry: Catherine Allen (Shared Assements), Renaud Deraison (Tenable), Dr. Tom Leighton (Akamai), Dug Song (Duo)
    https://www.scmagazine.com/home/security-news/celebrating-30-years-in-cybersecuity/

  • Pillar of CERIAS

    Purdue

    https://www.cerias.purdue.edu/site/people/pillar_award

Languages

  • French

    -

  • Spanish

    -

  • Arabic

    -

Recommendations received

More activity by Sam

View Sam’s full profile

  • See who you know in common
  • Get introduced
  • Contact Sam directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Sam Curry in United States

Add new skills with these courses