Kenneth P. Weiss

Last updated
Kennethweiss.jpg

Kenneth P. Weiss is an American entrepreneur, human factors engineer and inventor. He invented the SecurID Card, [1] now a trademark of RSA Security.

Contents

Career

Weiss holds a bachelor's degree from the University of Bridgeport, continued graduate studies and research at the University of New Hampshire and Temple University, and received a doctorate from the Neotarian Fellowship.[ citation needed ]

He founded Security Dynamics in 1984 and served as CEO until 1986 and chairman of the board and CTO until 1996. He initiated the purchase in 1993 of RSA Security, then a small encryption company working in internet commerce. In 1994, Security Dynamics went public on the NASDAQ stock exchange. Weiss was the company's largest individual shareholder.[ citation needed ]. The company developed and sold the SecurID Card and RSA encryption technologies for computer security, electronic commerce and identity authentication. He resigned in 1996 citing policy disagreements with directors and with the company's operations and policies, [2] [3] when the company had achieved a market capitalization of more than $4 billion[ citation needed ] In 2006 the company was purchased by EMC Corporation.

In 1994 he published an article enumerating what he regarded as seven significant flaws in the Clipper chip initiative. [4] Weiss’ position and the article contributed to the abandonment of the multibillion-dollar U.S. government program, which Weiss asserted would have allowed electronic eavesdropping on any US citizen with a surveillance chip embedded in private electronic communication equipment.[ citation needed ]

Weiss has taught at Penn State, the University of Bridgeport, Nasson College, and at King's College, where he was chairman of the psychology department for seven years as a professor and textbook author.[ citation needed ]

He was on the editorial board of the Journal of Information Systems Security, and was chairman of the identification and authentication division of the American Defense Preparedness Association's committee on computer security.[ citation needed ] He is also a member of the Technology and Ethics Committee of the Information Systems Security Association (ISSA).[ citation needed ]

Currently, Weiss is the founder and CEO of Universal Secure Registry (USR), a company based in Newton, Massachusetts, that develops technologies for identification, authentication and mobile phone applications. [5]

He holds 22 U.S. patents, as well as foreign patents.[ citation needed ]

Awards and recognition

Weiss is a member of the American Association for the Advancement of Science, and the honor societies Sigma Xi and Psi Chi.[ citation needed ]

Philanthropic work

Weiss is also involved philanthropic work for the Cape Ann Symphony, Rockport Chamber Music Society, Gloucester Stage Co., the Gloucester Schooner Festival, historical meeting house restoration, the Cape Ann Historical Association, the Perfect Storm Foundation, Addison Gilbert and Beverly Hospitals, the Lahey Clinic, and political action groups[ which? ].

Related Research Articles

<span class="mw-page-title-main">Secure cryptoprocessor</span> Device used for encryption

A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance. Unlike cryptographic processors that output decrypted data onto a bus in a secure environment, a secure cryptoprocessor does not output decrypted data or decrypted program instructions in an environment where security cannot always be maintained.

<span class="mw-page-title-main">Smart card</span> Pocket-sized card with embedded integrated circuits for identification or payment functions

A smart card (SC), chip card, or integrated circuit card, is a card used to control access to a resource. It is typically a plastic credit card-sized card with an embedded integrated circuit (IC) chip. Many smart cards include a pattern of metal contacts to electrically connect to the internal chip. Others are contactless, and some are both. Smart cards can provide personal identification, authentication, data storage, and application processing. Applications include identification, financial, public transit, computer security, schools, and healthcare. Smart cards may provide strong security authentication for single sign-on (SSO) within organizations. Numerous nations have deployed smart cards throughout their populations.

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder called a tag, a radio receiver, and a transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods.

Articles related to cryptography include:

RSA SecurID, formerly referred to as SecurID, is a mechanism developed by RSA for performing two-factor authentication for a user to a network resource.

<span class="mw-page-title-main">RSA Security</span> American computer security company

RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer and network security company with a focus on encryption and encryption standards. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Leonard Adleman, after whom the RSA public key cryptography algorithm was also named. Among its products is the SecurID authentication token. The BSAFE cryptography libraries were also initially owned by RSA. RSA is known for incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference.

<span class="mw-page-title-main">Software protection dongle</span> Electronic software copy protection device

A software protection dongle is an electronic copy protection and content protection device. When connected to a computer or other electronics, they unlock software functionality or decode content. The hardware key is programmed with a product key or other cryptographic protection mechanism and functions via an electrical connector to an external bus of the computer or appliance.

<span class="mw-page-title-main">One-time password</span> Password that can only be used once

A one-time password (OTP), also known as a one-time PIN, one-time authorization code (OTAC) or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

<span class="mw-page-title-main">Security token</span> Device used to access electronically restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless keycards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing a transaction such as a wire transfer.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

<span class="mw-page-title-main">Common Access Card</span> Standard identification for Active Duty United States Defense personnel

The common access card, also commonly referred to as the CAC, is the standard identification for active duty United States defense personnel. The card itself is a smart card about the size of a credit card. Defense personnel that use the CAC include the Selected Reserve and National Guard, United States Department of Defense (DoD) civilian employees, United States Coast Guard (USCG) civilian employees and eligible DoD and USCG contractor personnel. It is also the principal card used to enable physical access to buildings and controlled spaces, and it provides access to defense computer networks and systems. It also serves as an identification card under the Geneva Conventions. In combination with a personal identification number, a CAC satisfies the requirement for two-factor authentication: something the user knows combined with something the user has. The CAC also satisfies the requirements for digital signature and data encryption technologies: authentication, integrity and non-repudiation.

A card reader is a data input device that reads data from a card-shaped storage medium and provides the data to a computer. Card readers can acquire data from a card via a number of methods, including: optical scanning of printed text or barcodes or holes on punched cards, electrical signals from connections made or interrupted by a card's punched holes or embedded circuitry, or electronic devices that can read plastic cards embedded with either a magnetic strip, computer chip, RFID chip, or another storage medium.

A contactless smart card is a contactless credential whose dimensions are credit card size. Its embedded integrated circuits can store data and communicate with a terminal via NFC. Commonplace uses include transit tickets, bank cards and passports.

<span class="mw-page-title-main">Gemalto</span> International digital security company

Gemalto was an international digital security company providing software applications, secure personal devices such as smart cards and tokens, e-wallets and managed services. It was formed in June 2006 by the merger of two companies, Axalto and Gemplus International. Gemalto N.V.'s revenue in 2018 was €2.969 billion.

A mobile signature is a digital signature generated either on a mobile phone or on a SIM card on a mobile phone.

<span class="mw-page-title-main">Entrust</span>

Entrust Corp., formerly Entrust Datacard, provides software and hardware used to issue financial cards, e-passport production, user authentication for those looking to access secure networks or conduct financial transactions, trust certificated for websites, mobile credentials, and connected devices. The privately-held company is based in Shakopee, Minnesota and employs more than 2,500 people globally.

<span class="mw-page-title-main">German identity card</span> German identity document

The German Identity Card is issued to German citizens by local registration offices in Germany and diplomatic missions abroad, while it is produced at the Bundesdruckerei in Berlin.

Utimaco Atalla, founded as Atalla Technovation and formerly known as Atalla Corporation or HP Atalla, is a security vendor, active in the market segments of data security and cryptography. Atalla provides government-grade end-to-end products in network security, and hardware security modules (HSMs) used in automated teller machines (ATMs) and Internet security. The company was founded by Egyptian engineer Mohamed M. Atalla in 1972. Atalla HSMs are the payment card industry's de facto standard, protecting 250 million card transactions daily as of 2013, and securing the majority of the world's ATM transactions as of 2014.

Nitrokey is an open-source USB key used to enable the secure encryption and signing of data. The secret keys are always stored inside the Nitrokey which protects against malware and attackers. A user-chosen PIN and a tamper-proof smart card protect the Nitrokey in case of loss and theft. The hardware and software of Nitrokey are open-source. The free software and open hardware enables independent parties to verify the security of the device. Nitrokey is supported on Microsoft Windows, macOS, Linux, and BSD.

<span class="mw-page-title-main">Documento Nacional de Identidad (Peru)</span> National identity card of Peru

The Documento Nacional de Identidad (DNI) (Spanish for 'National Identity Document') is the only personal identity card recognized by the Peruvian Government for all civil, commercial, administrative, judicial acts and, in general, for all those cases in which, by legal mandate, it must be presented. It is a public document, personal, and non-transferable and also constitutes the only title of right to the suffrage of the person in whose favor it has been granted. Its issuance is in charge of the National Registry of Identification and Civil Status (RENIEC).

References

  1. "Definition of: SecurID card". Encyclopedia. PC Magazine . Retrieved 2008-06-02.
  2. "Security Dynamics announces resignation of Kenneth P. Weiss as chairman, director and chief technical officer". Business Wire. 22 May 1996. Retrieved 10 November 2014.
  3. Dave Kearns (13 September 2011). "Stupid, arrogant and greedy". Network World . Retrieved 10 November 2014.
  4. Weiss, Kenneth P. "New Initiatives which May Erode Your Privacy: Or George Orwell Was Off by Only a Decade". Information Management & Computer Security. 2 (3). Emerald Group Publishing. doi:10.1108/09685229410792943. ISSN   0968-5227.
  5. "Can Kenneth Weiss, founder of Security Dynamics, become a key player in mobile payments?". Boston Globe . 27 June 2011. Retrieved 10 November 2014.