Patents by Inventor Adi Shamir

Adi Shamir has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090273465
    Abstract: A wireless location system for tracking and locating a wireless tag in a structure having defined areas that provides for differentiation between the defined areas has at least one ultrasonic transmitter positioned in each of the defined areas for transmitting an ultrasonic signal having area identification and/or transmitter ID information. A plurality of wireless tags are provided wherein each wireless tag transmits a last area identifying and/or transmitter ID information received and accepted by the wireless tag in a tag message. A plurality of location receivers is installed in the structure for receiving the tag message and for reporting the received message from the tag along with optional measured parameters to a common server. The common server determines the location of each wireless tags in the structure using the defined area or transmitter ID as reported by each wireless tag.
    Type: Application
    Filed: May 2, 2008
    Publication date: November 5, 2009
    Inventors: Adi Shamir, Daniel Aljadeff, Reuven Amsalem
  • Publication number: 20090225985
    Abstract: A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. The sender and the receiver maintain a vector of n entries that is repeatedly refreshed by pairwise XORING entries, with a new vector of n entries that is randomly chosen by the sender and sent to the receiver as a part of each communication session. Also, a computational secure scheme based on the information secure scheme is employed to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars).
    Type: Application
    Filed: September 11, 2007
    Publication date: September 10, 2009
    Applicants: Sami Shamoon College of Engineering, Yeda Research & Development Co. Ltd.
    Inventors: Shlomi Dolev, Marina Kopeetsky, Adi Shamir
  • Publication number: 20080186231
    Abstract: A wireless location system has at least one wireless tag to be located by the wireless location system, wherein the at least one wireless tag transmits two wireless signals having a known time relationship and having different bandwidths. A plurality of receivers is provided wherein a first receiver receives and processes a first of the two wireless signals and estimates a time to arrive (TOA) of the first wireless signal, and a second receiver receives and processes a second of the two wireless signals and estimates a TOA of the second wireless signal at the second transceiver. The plurality of receivers is time synchronized based on a common timing signal. A location server is coupled to each of the plurality of receivers. The location server receives the TOA of the first wireless signal from the first receiver and the TOA of the second wireless signal from the second receiver.
    Type: Application
    Filed: February 4, 2008
    Publication date: August 7, 2008
    Inventors: Daniel Aljadeff, Reuven Amsalem, Amir Lavi, Adi Shamir
  • Patent number: 7057574
    Abstract: A method for designing a high performance, small antenna that is matched to a required output impedance, does not require filtering, is simple and inexpensive to manufacture, and is easily integrable with an RF power amplifier- with minimum cost, minimum external components and minimum energy losses. The method includes finding a singular point (102) in the impedance vs. antenna geometrical dimension/wavelength ratio graph, the singular point (102) exhibiting a high very high positive reactance, setting the antenna geometry to match this point, and canceling the very high positive reactance (high inductance) resulting from this match by adding to the antenna a very small capacitance, preferably provided by at least one gap capacitor (202) The antenna is preferably a loop antenna (200), and both the antenna and the gap capacitor (202) (204) are preferably implemented by printing methods on printed circuit board or ceramic substrates. The antenna (200) may also be implemented in non-differential designs.
    Type: Grant
    Filed: October 9, 2001
    Date of Patent: June 6, 2006
    Assignee: Vishay Advanced Technology Ltd.
    Inventors: Adi Shamir, Meir Gazit
  • Publication number: 20040135726
    Abstract: A method for designing a high performance, small antenna that is matched to a required output impedance, does not require filtering, is simple and inexpensive to manufacture, and is easily integrable with an RF power amplifier- with minimum cost, minimum external components and minimum energy losses. The method includes finding a singular point (102) in the impedance vs. antenna geometrical dimension/wavelength ratio graph, the singular point (102) exhibiting a high very high positive reactance, setting the antenna geometry to match this point, and canceling the very high positive reactance (high inductance) resulting from this match by adding to the antenna a very small capacitance, preferably provided by at least one gap capacitor (202) The antenna is preferably a loop antenna (200), and both the antenna and the gap capacitor (202) (204) are preferably implemented by printing methods on printed circuit board or ceramic substrates. The antenna (200) may also be implemented in non-differential designs.
    Type: Application
    Filed: November 20, 2003
    Publication date: July 15, 2004
    Inventors: Adi Shamir, Meir Gazit
  • Patent number: 6603445
    Abstract: A method and apparatus for factoring large numbers which utilizes an optoelectronic device that has a wafer at one end that contains a plurality of LEDs. Each LED is associated with at least one period pj and at least one delay dj. A clock drives the plurality of LEDs responsive to clock cycles to flash for one clock cycle at times described by the processing pj•r+dl for r≧0. The light intensity flashed by the LEDs is controlled by a filter to be proportional to log2 (pj), and a photodetector positioned at the other end of the cylinder collects the light flashed by the LEDs.
    Type: Grant
    Filed: December 30, 1999
    Date of Patent: August 5, 2003
    Assignee: Yeda Research and Development Co. Ltd.
    Inventor: Adi Shamir
  • Patent number: 6507913
    Abstract: A method and apparatus for protecting smart cards against simple and differential power attacks when they are inserted into card readers controlled by other entities. The technique is particularly useful in financial applications such as ATM cards, credit cards, and electronic wallets, in which cards have to be inserted into card readers which may be specifically manufactured or modified to perform undetectable measurements of the power supplied to the card during its normal operation. The basic technique is to use two capacitors embedded in the smart card in such a way that at any given time one of them is charged by the external power supply and the other one is discharged by powering the smart card chip. The roles of the two capacitors alternate rapidly, and the power supply is detached from the smart card chip in the sense that external power measurements do not reveal information about its internal operations.
    Type: Grant
    Filed: December 30, 1999
    Date of Patent: January 14, 2003
    Assignee: Yeda Research and Development Co. Ltd.
    Inventor: Adi Shamir
  • Patent number: 6044464
    Abstract: A well-known technique to discourage piracy of digital objects is to fingerprint the version each customer receives. The invention provides a novel way of fingerprinting the decryption functions given by broadcasters to their customers (usually in the form of smart cards). The main difficulty is to ensure that all the algorithms provided by the broadcaster implement the same decryption function, and yet to make it computationally difficult for a pirate who obtains a large number of such implementations to find even one fundamentally different implementation which is not traceable to a particular customer.
    Type: Grant
    Filed: May 8, 1998
    Date of Patent: March 28, 2000
    Assignee: Yeda Research and Development Co. Ltd. at the Weizmann Institute of Science
    Inventor: Adi Shamir
  • Patent number: 5991415
    Abstract: Improved methods and apparatus are provided for protecting public key schemes based on modular exponentiation (including RSA and Diffie-Hellman) from indirect cryptanalytic techniques such as timing and fault attacks. Known methods for making the implementation of number-theoretic schemes resistant to such attacks typically double their running time, whereas the novel methods and apparatus described in this patent add only negligible overhead. This improvement is particularly significant in smart card and software-based implementations, in which the modular exponentiation operation is quite slow, and doubling its time may be an unacceptable solution.
    Type: Grant
    Filed: May 12, 1997
    Date of Patent: November 23, 1999
    Assignee: Yeda Research and Development Co. Ltd. at the Weizmann Institute of Science
    Inventor: Adi Shamir
  • Patent number: 5504817
    Abstract: Memory efficient variants of public key encryption and identification schemes for smart card applications with severely limited RAM without using dedicated coprocessors. The variants replace the memory-intensive modular multiplication operation z=x*y (mod n) by a new randomized multiplication operation z'=x*y+r*n, where r is a randomly chosen integer in a suitable range 0,b!, and a double convolution process to compute z' is used. Method and apparatus are described.
    Type: Grant
    Filed: May 9, 1994
    Date of Patent: April 2, 1996
    Assignee: Yeda Research and Development Co. Ltd. at the Weizmann Institute of Science
    Inventor: Adi Shamir
  • Patent number: 5488664
    Abstract: A method and device for protecting visual information against unauthorized access and modification using a printed cryptographic watermark includes printing a first array of shapes on a first sheet of material to be protected and printing a second array of shapes on a second sheet of material, which is transparent so as to form a developer for developing a watermark encoded in a combination of the first and second arrays of shapes. The watermark is encoded by preparing each array using black and white pixels. Each pixel, which may be a square, rectangle, circle, hexagon or other shape, is split into first and second collections of subpixels, the first collection of subpixels appearing in the first array of shapes and the second collection of subpixels appearing in the second array of shapes.
    Type: Grant
    Filed: April 22, 1994
    Date of Patent: January 30, 1996
    Assignee: Yeda Research and Development Co., Ltd.
    Inventor: Adi Shamir
  • Patent number: 5375170
    Abstract: A birational permutation is a function f which is a one-to-one and onto mapping over k-tuples of numbers, where both f and its inverse are low degree rational functions. This patent describes a novel digital signature scheme which is based on a new class of birational permutations which have small keys and require few arithmetic operations.
    Type: Grant
    Filed: April 19, 1993
    Date of Patent: December 20, 1994
    Assignee: Yeda Research & Development Co., Ltd.
    Inventor: Adi Shamir
  • Patent number: 5263085
    Abstract: A new type of digital signature scheme whose security is based on the difficulty of solving systems of k polynomial equations in m unknowns modulo a composite n is proposed. The scheme uses a simple technique (called sequential linearization) for embedding trapdoors into such systems of equations.
    Type: Grant
    Filed: November 13, 1992
    Date of Patent: November 16, 1993
    Assignee: Yeda Research & Development Co. Ltd.
    Inventor: Adi Shamir
  • Patent number: 5058158
    Abstract: A method of encrypting a video signal employing a pseudorandom Space Filling Curve having a highly irregular scanning pattern for scanning the pixel addresses of a video picture stored in a frame buffer. The method is used with a video scrambler/descrambler device and is characterized by a much higher cryptographic strength than existing techniques, which is not subject to simple correlation attacks by comparing and matching of line portions. In addition, the method features a reduction in the video signal bandwidth for typical pictures.
    Type: Grant
    Filed: March 19, 1990
    Date of Patent: October 15, 1991
    Assignee: Yossi Matias
    Inventors: Yossi Matias, Adi Shamir
  • Patent number: 4933970
    Abstract: A method and apparatus are disclosed and claimed which enable an entity to generate proofs of identity and signatures of messages that everyone can verify but no one can forge. Compared to other schemes of this type (such as the RSA), the Fiat-Shamir scheme is faster by one to two orders of magnitude. In the present invention disclosed and claimed in this patent application, two improved variants of the Fiat-Shamir scheme are described which are even faster. One variant uses small public values to optimize the vertification procedure, and the other variant uses particular secret values to optimize the generation procedure.
    Type: Grant
    Filed: January 19, 1988
    Date of Patent: June 12, 1990
    Assignee: Yeda Research and Development Company Limited
    Inventor: Adi Shamir
  • Patent number: 4932056
    Abstract: A method and apparatus for identification of a prover to a verifier in which the prover demonstrates his knowledge of a secret permutation .pi. such that V.sub..pi. .epsilon. K(A) for publicly known A and V where all the arithmetic operations are carried out modulo p. The actual proof does not reveal any knowledge of .pi., and thus it cannot be misused by dishonest verifiers or eavesdroppers to later misrepresent themselves as the prover. The new scheme is much faster than the RSA and Fiat-Shamir identification schemes.
    Type: Grant
    Filed: March 16, 1989
    Date of Patent: June 5, 1990
    Assignee: Yeda Research and Development Company Limited
    Inventor: Adi Shamir
  • Patent number: 4910772
    Abstract: A method of encrypting a video signal employing a pseudo-random Space Filling Curve having a highly irregular scanning pattern for scanning the pixel addresses of a video picture stored in a frame buffer. The method is used with a video scrambler/descrambler device and is characterized by a much higher cryptographic strength than existing techniques, which is not subject to simple correlation attacks by comparing and matching of line portions. In addition, the method features a reduction in the video signal bandwidth for typical pictures.
    Type: Grant
    Filed: August 12, 1988
    Date of Patent: March 20, 1990
    Assignee: Yeda Research & Development Co. Ltd.
    Inventors: Yossi Matias, Adi Shamir
  • Patent number: 4748668
    Abstract: A method and apparatus for simple identification and signature which enable any user to prove his identity and the authenticity of his messages to any other user. The method and apparatus are provably secure against any known or chosen message attack if factoring is difficult, and require only 1% to 4% of the number of modular multiplications previously required. The simplicity, security and speed of the method and apparatus derive from microprocessor-based devices which may be incorporated into smart cards, personal computers, passports, and remote control systems.
    Type: Grant
    Filed: July 9, 1986
    Date of Patent: May 31, 1988
    Assignee: Yeda Research and Development Company Limited
    Inventors: Adi Shamir, Amos Fiat
  • Patent number: 4691299
    Abstract: Storage media such as digital optical disks, PROMS, and paper tape consist of a number of bit positions which initially contain a "zero" and which can later be irreversibly overwritten with a "one". An apparatus and method provide for rewriting in such "non-erasable memories" for expanding their capacity by allowing the non-erasable memory to be rewritten one or more time.
    Type: Grant
    Filed: December 29, 1983
    Date of Patent: September 1, 1987
    Assignee: Massachusetts Institute of Technology
    Inventors: Ronald L. Rivest, Adi Shamir
  • Patent number: 4405829
    Abstract: A cryptographic communications system and method. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be-transferred is enciphered to ciphertext at the encoding terminal by first encoding the message as a number M in a predetermined set, and then raising that number to a first predetermined power (associated with the intended receiver) and finally computing the remainder, or residue, C, when the exponentiated number is divided by the product of two predetermined prime numbers (associated with the intended receiver). The residue C is the ciphertext.
    Type: Grant
    Filed: December 14, 1977
    Date of Patent: September 20, 1983
    Assignee: Massachusetts Institute of Technology
    Inventors: Ronald L. Rivest, Adi Shamir, Leonard M. Adleman