throbber
Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 1 of 15
`
`Exhibit U
`
`

`

`11/23/21, 12:45 AM
`
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 2 of 15
`Laszlo Elteto
`
`Laszlo Elteto
`Sr. Principal Software Engineer at Raytheon
`Irvine, California, United States · 288 connections
`
`Sign in to Connect
`
`Raytheon Technologies
`
`Eötvös Loránd University
`
`About
`Security research; security software architecture, design and development
`
`Specialties: crypto, high assurance software
`software security, anti-debugging / obfuscation techniques, software protection technologies,
`security consulting
`FIPS-140, Common Criteria, Cryptoki, MS CAPI, patent prosecution
`
`Experience
`CISSP, Sr. Principal Software Engineer
`Raytheon Technologies
`Dec 2012 - Present · 9 years
`https://www.linkedin.com/in/laszloelteto
`
`1/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 3 of 15
`Fullerton, CA
`Laszlo Elteto
`security research and development
`high assurance software development
`
`CISSP, Senior System Architect
`SafeNet, Inc.
`Apr 2004 - Dec 2012 · 8 years 9 months
`security research and devlopment, security consulting
`member of the company's CTO Office
`Microsoft Most Valuable Professional
`
`member
`Trusted Computing Group
`1996 - 2012 · 16 years
`actively participated in TCG workgroups
`Rainbow Technologies
`9 years 3 months
`
`Fellow Scientist
`Jan 2000 - Mar 2004 · 4 years 3 months
`security research and development
`
`Software Scientist
`Jan 1998 - Dec 1999 · 2 years
`security research and development
`
`Manager, Software Engineering
`Jan 1995 - Dec 1997 · 3 years
`managing software design and development
`
`Senior Software Developer
`Software Security
`Jun 1992 - Dec 1995 · 3 years 7 months
`developing security software
`
`President
`EltSOFT GMK
`https://www.linkedin.com/in/laszloelteto
`
`2/14
`
`

`

`EltSOFT GMK
`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 4 of 15
`Jun 1988 - Mar 1992 · 3 years 10 months
`Laszlo Elteto
`security software development, customer relations, sales, (everything in my small
`private company)
`
`Education
`Eötvös Loránd University
`Diploma with distinction (equivalent: MS) · Applied Mathematics
`1975 - 1981
`Applied Mathematics (Masters Degree)
`
`Licenses & Certifications
`Certified Information Systems Security Professional (CISSP)
`(ISC)²
`Issued Nov 2003
`See credential
`
`Patents
`System and methods for detecting rollback
`Issued August 4, 2015 · United States · 9,098,676
`In an embodiment of a method of and system for detecting rollback of usage data, the usage
`data is recording in a database. A sequence value in the database is repeatedly advanced. A
`copy of the sequence value is repeatedly saved to protected storage. The copy of the sequence
`value in the protected storage is compared with the sequence value in the database, and it is
`determined whether the result of the comparison is consistent with normal operation of the
`database since the previous save to…
`Show more
`
`See patent
`
`Locking changing hard disk content to a hardware token
`
`https://www.linkedin.com/in/laszloelteto
`
`3/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 5 of 15
`Issued July 23, 2013 · United States · 8,495,389
`Laszlo Elteto
`A method for preventing unauthorized use of a software program on a computing device
`includes updating a state of a software program on a computing device to an updated state.
`Transmitting an update signal from the software program to a hardware token coupled to the
`computing device and updating a state of the hardware token to an updated state in response
`to the received update signal. Performing a first cryptographic check using the updated state of
`the software program and the updated state…
`Show more
`
`Other inventors
`
`See patent
`
`Secure authentication using hardware token and computer fingerprint
`Issued March 5, 2013 · United States · 8,392,978
`A method and apparatus for secure authentication of a hardware token is disclosed. In one
`embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-
`response authentication which is performed on the hardware token. In another embodiment,
`the host computer fingerprint is used as a personal identification number for the hardware
`token.
`
`Other inventors
`
`See patent
`
`Protecting guest virtual machine memory
`Issued November 6, 2012 · United States · 8,307,169
`A hypervisor runs on a host computer system and defines at least one virtual machine. An
`address space of the virtual machine resides on physical memory of the host computer system
`
`https://www.linkedin.com/in/laszloelteto
`
`4/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 6 of 15
`under control of the hypervisor. A guest operating system runs in the virtual machine. At least
`Laszlo Elteto
`one of a host operating system and the hypervisor sets parts of the address space of the host
`computer system corresponding to parts of the address space of the virtual machine to a locked
`state in which those parts can be…
`Show more
`
`See patent
`
`Database obfuscation system and method
`Issued February 14, 2012 · United States · 8,117,221
`A system and method for obfuscating a database's schema while preserving its functionality by
`modifying the original table names, column names, table order, column order, and/or data
`character set such that the standard order of the original characters is maintained.
`
`Other inventors
`
`See patent
`
`Secure authentication using hardware token and computer fingerprint
`Issued November 22, 2011 · United States · 8,065,718
`A method and apparatus for secure authentication of a hardware token is disclosed. In one
`embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-
`response authentication which is performed on the hardware token. In another embodiment,
`the host computer fingerprint is used as a personal identification number for the hardware
`token.
`
`Other inventors
`
`See patent
`
`Secure authentication using hardware token and computer fingerprint
`
`https://www.linkedin.com/in/laszloelteto
`
`5/14
`
`

`

`Secure authentication using hardware token and computer fingerprint
`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 7 of 15
`Issued February 22, 2011 · United States · 7,895,443
`Laszlo Elteto
`A method and apparatus for secure authentication of a hardware token is disclosed. In one
`embodiment, a host computer fingerprint is used to generate a partial seed for a challenge-
`response authentication which is performed on the hardware token. In another embodiment,
`the host computer fingerprint is used as a personal identification number for the hardware
`token.
`
`Other inventors
`
`See patent
`
`Boot-up and hard drive protection using a USB-compliant token
`Issued February 26, 2008 · United States · 7,337,323
`A method and apparatus for booting a computer. The method comprises the steps of emulating
`a floppy disk drive communicatively coupled to a computer in a token via a USB-compatible
`interface, and booting the computer using the token. The apparatus comprises means for
`performing these functions, including a token with a processor having one or more memories
`storing processor instructions and data for performing the method steps. The memory may also
`securely store sensitive data.
`
`Other inventors
`
`See patent
`
`Software protection method utilizing hidden application code in a protection
`dynamic link library object
`Issued January 15, 2008 · United States · 7,320,075
`A system and method in which the operating system of the user computer loads the software
`application and a DLL having a portion of the application execution code stored therein into
`memory is disclosed. At selected points during its execution, the software application calls the
`https://www.linkedin.com/in/laszloelteto
`
`6/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 8 of 15
`DLL to execute a portion of the application code that was saved into the DLL before delivery to
`Laszlo Elteto
`the end user. Since this code is encrypted and the encryption key is stored in a hardware
`security device and not in the…
`Show more
`
`Other inventors
`
`See patent
`
`Secure IR communication between a keypad and a token
`Issued September 11, 2007 · United States · 7,269,844
`A device that secures a token from unauthorized use is disclosed. The device comprises a user
`interface for accepting a personal identifier, a processor, communicatively coupled to the user
`interface device, and a token interface. The token interface includes a token interface IR emitter
`that produces an IR signal having information included in the PIN. The token IR emitter is
`coupled to the processor and is further communicatively coupled to a token IR sensor when the
`token is physically…
`Show more
`
`Other inventors
`
`See patent
`
`Method and apparatus for software protection via multiple-route execution
`Issued August 28, 2007 · United States · 7,263,606
`A method, apparatus, and article of manufacture for protecting a shelled computer program
`with a startup code featuring multiple-route execution. In one embodiment, the startup code
`comprises a sequence of tasks collectively executing a startup code wherein one or more of the
`https://www.linkedin.com/in/laszloelteto
`
`7/14
`
`

`

`comprises a sequence of tasks, collectively executing a startup code, wherein one or more of the
`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 9 of 15
`tasks is selectably performed by one of a plurality of task code variations as selected by a
`Laszlo Elteto
`selection code associated with the task.
`
`See patent
`
`Token for storing installation software and drivers
`Issued May 22, 2007 · United States · 7,222,240
`A "dual" personal key/token is disclosed. The "dual" personal key is useful for installing drivers
`and other command interfaces which allow the personal key to be coupled to and used with a
`host computer. In a first embodiment, the personal key operates as a USB hub, and reports two
`devices, a storage device and a personal key, to the host computer. In a second embodiment
`presents a single device, and different portions of the personal key are activated as required.
`
`See patent
`
`USB hub keypad
`Issued September 19, 2006 · United States · 7,111,324
`A method and apparatus for securing a token from unauthorized use is disclosed. The method
`comprises the steps of receiving a first message transmitted from a host processing device and
`addressed to a PIN entry device according to a universal serial bus (USB) protocol; accepting a
`PIN entered into the PIN entry device; and transmitting a second message comprising at least a
`portion of the first message and the PIN from the PIN entry device to the token along a secure
`communication path. In…
`Show more
`
`Other inventors
`
`See patent
`
`Method of software protection using a random code generator
`Issued October 8, 2002 · United States · 6,463,538
`The computer-based software protection systems are provided using methods that improve the
`protection of vendor's software against unauthorized use. A code generator generates
`randomized protection code, which is then used to protect the application software. Because the
`
`https://www.linkedin.com/in/laszloelteto
`
`8/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 10 of 15
`code is unique for each protected software, potential crackers have to analyze and crack every
`Laszlo Elteto
`instance of the protection, so that generic hack is almost impossible. Some embodiments of the
`present invention also randomize…
`Show more
`
`See patent
`
`Apparatus and method for preventing theft of computer devices
`Issued April 6, 1999 · United States · 5,892,906
`Apparatus and method for discouraging computer theft. The apparatus and method requires
`that a password or other unique information be supplied to the computer before the computer
`BIOS routines can be completely executed. A BIOS memory storing the BIOS routines includes a
`security routine which will determine whether or not the required password entered by the user,
`or a known quantity read from an externally connected memory device is present. The security
`function stored within the BIOS…
`Show more
`
`Other inventors
`
`See patent
`
`Method of metering and protecting computer software
`Issued October 20, 1998 · United States · 5,826,011
`A method of protecting computer software on installation is provided by providing an
`installation media containing an installation program supplied to the user along with an
`hardware security electrical device (HSED). The HSED must be connected to the user's computer
`before the software from the installation media can be entered on the user's computer. The
`HSED contains a variety of secret installation data which is used to install a program to be
`protected. In general the secret installation…
`Show more
`
`Other inventors
`
`https://www.linkedin.com/in/laszloelteto
`
`9/14
`
`

`

`11/23/21, 12:45 AM
`
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 11 of 15
`Laszlo Elteto
`
`See patent
`
`Method and system for secure distribution of protected data using elliptic curve
`systems
`Issued April 7, 1998 · United States · 5,737,424
`A method and system for secure distribution of protected data using elliptic curve systems
`includes a program to unlock software. The user obtains an encrypted unlocking code from a
`processing center and enters it into the unlocking program, which decrypts the message,
`yielding the unlocking code, then uses the unlocking code to unlock the software. To encrypt
`the unlocking code, the processing center selects an appropriate unlocking code using
`information received from the user, selects an…
`Show more
`
`Other inventors
`
`See patent
`
`Method of software distribution protection
`Issued August 9, 1994 · United States · 5,337,357
`A method is provided for protecting distributed software which relies on a unique factor such as
`an accessible serial number or the generation of a profile or fingerprint of the computer of the
`user which is entered individually and/or with a random factor to generate a unique first key
`which will differ for different computers. The first key is sent to a processing center which then
`generates a second key. The user applies the second key which compares the unique and/or
`random factors. If the…
`Show more
`
`Other inventors
`
`https://www.linkedin.com/in/laszloelteto
`
`10/14
`
`

`

`11/23/21, 12:45 AM
`
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 12 of 15
`Laszlo Elteto
`
`See patent
`
`Languages
`Hungarian
`Native or bilingual proficiency
`
`English
`Full professional proficiency
`
`Groups
`Raytheon Professionals, Past & Present
`
`arathoners
`
`- M
`
`- I
`
`nformation Security Community
`-
`
`Recommendations received
`Bill Snyder
`“I have worked closely with Laszlo since I arrived at SafeNet. He is one of the brightest
`people I've worked with anywhere. A wall full of patents attests to his ability to apply his
`vast theoretical knowledge to many practical applications. Laszlo represents these
`inventions in accessible documentation then very quickly creates top quality software. His
`
`https://www.linkedin.com/in/laszloelteto
`
`11/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 13 of 15
`code reviews encourage others on the team to likewise work their best. His software
`designs elegantly incorporate all current requirements with the flexibility to accommodate
`Laszlo Elteto
`the unforeseen. He easily accepts the contributions from others even when it is clear to all
`he is the most knowledgeable person on the team. I have learned a great deal working
`with Laszlo.”
`
`Michael Cochran
`“I have worked with Laszlo for nearly 5 years. He is one of the brightest security engineers I
`have known. His knowledge base is outstanding. He work well in the theoretical realm
`participating in and driving standard committees and he knows how to get down in to the
`details writing code and perform code reviews. He is a professional in every sense of the
`word.”
`
`2 people have recommended Laszlo
`
`Sign in to view
`
`View Laszlo’s full profile
`See who you know in common
`Get introduced
`Contact Laszlo directly
`
`Sign in to view full profile
`
`People also viewed
`Bill Snyder
`Principal Software Engineer
`Mission Viejo, CA
`David Nguyen
`Engineering Manager at Dealpath
`Portland, OR
`Pratibha Meena
`https://www.linkedin.com/in/laszloelteto
`
`12/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 14 of 15
`Recruiter / Talent Management Specialist (MBA) with 7 years exp.
`Laszlo Elteto
`London
`Satish Chaturvedi
`Senior Assembly Integration and Release Management at ASML
`Eindhoven
`Andrea Weuffen
`Expert Automotive Camera bei ZF Group
`Ulm
`Deepak Prasad
`Connecting People, Business and Systems For Extraordinary Success
`Noida
`Pratyush Kumar
`Technology | Leadership | Director, SW Dev @Adobe
`New Delhi
`Niraj Sharma
`TÜV SÜD certified Functional Safety Engineer ISO26262 | AUTOSAR Classic | Certified ScrumMaster®
`(CSM®) | PRINCE2®
`Szczecin Metropolitan Area
`Ankit Sharma
`| Looking for Java full stack developer role | | Core Java | Spring-boot | Html | Css | JavaScript | Angular js |
`New Delhi
`Anupam Malhotra
`Helping Insurers accelerate Software Product Adoption at Whatfix
`Delhi, India
`
`Show more profiles
`Add new skills with these courses
`
`CCSP Cert Prep: 5 Cloud Security Operations Audio Review
`
`Learning Cryptography and Network Security
`
`CompTIA Network+ (N10-007) Cert Prep: 5 Securing TCP/IP
`
`https://www.linkedin.com/in/laszloelteto
`
`13/14
`
`

`

`11/23/21, 12:45 AM
`Laszlo Elteto - CISSP, Sr. Principal Software Engineer - Raytheon Technologies | LinkedIn
`Case 6:21-cv-00735-ADA Document 23-21 Filed 11/23/21 Page 15 of 15
`See all courses
`Laszlo Elteto
`Laszlo’s public profile badge
`Include this LinkedIn profile on other websites
`
`Laszlo Elteto
`Sr. Principal Software Engineer at Raytheon
`
`CISSP, Sr. Principal Software Engineer at Raytheon Technologies
`
`Eötvös Loránd University
`
`View profile
`
`View profile badges
`
`© 2021
`
`Accessibility
`
`Privacy Policy
`
`Copyright Policy
`
`Guest Controls
`
`Language
`
`About
`
`User Agreement
`
`Cookie Policy
`
`Brand Policy
`
`Community Guidelines
`
`https://www.linkedin.com/in/laszloelteto
`
`14/14
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket