Patents by Inventor Adrian Perrig

Adrian Perrig has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8352738
    Abstract: Phishing attacks succeed by exploiting a user's inability to distinguish legitimate websites from spoofed websites. Most prior work focuses on assisting the user in making this distinction; however, users must make the right security decision every time. Unfortunately, humans are ill-suited for performing the security checks necessary for secure site identification, and a single mistake may result in a total compromise of the user's online account. Fundamentally, users should be authenticated using information that they cannot readily reveal to malicious parties. Placing less reliance on the user during the authentication process enhances security and eliminates many forms of fraud. We disclose using a trusted device to perform mutual authentication that eliminates reliance on perfect user behavior, thwarts Man-in-the-Middle attacks after setup, and protects a user's account even in the presence of keyloggers and most forms of spyware.
    Type: Grant
    Filed: December 3, 2007
    Date of Patent: January 8, 2013
    Assignee: Carnegie Mellon University
    Inventors: Bryan Parno, Cynthia Kuo, Adrian Perrig
  • Patent number: 8312276
    Abstract: A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: November 13, 2012
    Assignee: Industrial Technology Research Institute
    Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
  • Publication number: 20120203872
    Abstract: A method of serving content to multiple clients via a network is provided. Independent sessions with each of a plurality of clients are maintained, wherein the number of clients in the plurality of clients can vary over time, and wherein the start of each session and the end of each session can be independent of the start and end of other sessions. A stream of packet payloads is received, each packet payload of the stream of packet payloads including data generated from the content, wherein each packet payload in at least a subset of the stream of packet payloads includes a different set of data. Each packet payload in the stream of packet payloads is transmitted to each client of the plurality of clients in corresponding packets, wherein the packet payload transmitted to a client at any particular time is independent of the state of the corresponding session.
    Type: Application
    Filed: April 18, 2012
    Publication date: August 9, 2012
    Applicant: DIGITAL FOUNTAIN, INC.
    Inventors: Michael Luby, Ronen Vainish, Lars Rasmussen, David Kushi, Serban Simu, Adrian Perrig, Roberto Attias, Michael Walfish, Diane Hernek, John Byers
  • Patent number: 8185809
    Abstract: A method of serving content to multiple clients via a network is provided. Independent sessions with each of a plurality of clients are maintained, wherein the number of clients in the plurality of clients can vary over time, and wherein the start of each session and the end of each session can be independent of the start and end of other sessions. A stream of packet payloads is received, each packet payload of the stream of packet payloads including data generated from the content, wherein each packet payload in at least a subset of the stream of packet payloads includes a different set of data. Each packet payload in the stream of packet payloads is transmitted to each client of the plurality of clients in corresponding packets, wherein the packet payload transmitted to a client at any particular time is independent of the state of the corresponding session.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: May 22, 2012
    Assignee: Digital Fountain, Inc.
    Inventors: Michael Luby, Ronen Vainish, Lars Rasmussen, David Kushi, Serban Simu, Adrian Perrig, Roberto Attias, Michael Walfish, Diane Hernek, John Byers
  • Patent number: 8150037
    Abstract: A method of securely deploying information to a device includes placing a device into a shielded structure and exchanging timing messages between a keying device located inside the shielded structure and a beacon located outside of the shielded structure. The shielded structure is closed. The exchange of timing messages is terminated, and upon termination, the keying device transfers the information via one or more shielded messages to the device, and the beacon jams the frequency at which the shielded messages are transferred. The shielded structure is opened, and the keying device and beacon exchange messages to verify the secure deployment of the information.
    Type: Grant
    Filed: February 20, 2008
    Date of Patent: April 3, 2012
    Assignee: Carnegie Mellon University
    Inventors: Mark Y. Luk, Cynthia Yu Kuo, Adrian Perrig, Evan Davis Gaustad
  • Publication number: 20100205430
    Abstract: A network reputation system and its controlling method are provided. A credentials and exchange component permits a user to generate credentials and exchange matching keys with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
    Type: Application
    Filed: March 26, 2009
    Publication date: August 12, 2010
    Inventors: Shin-Yan Chiou, Shih-Ying Chang, Ghita Mezzour, Adrian Perrig, Hung-Min Sun
  • Publication number: 20100049975
    Abstract: Phishing attacks succeed by exploiting a user's inability to distinguish legitimate websites from spoofed websites. Most prior work focuses on assisting the user in making this distinction; however, users must make the right security decision every time. Unfortunately, humans are ill-suited for performing the security checks necessary for secure site identification, and a single mistake may result in a total compromise of the user's online account. Fundamentally, users should be authenticated using information that they cannot readily reveal to malicious parties. Placing less reliance on the user during the authentication process enhances security and eliminates many forms of fraud. We disclose using a trusted device to perform mutual authentication that eliminates reliance on perfect user behavior, thwarts Man-in-the-Middle attacks after setup, and protects a user's account even in the presence of keyloggers and most forms of spyware.
    Type: Application
    Filed: December 3, 2007
    Publication date: February 25, 2010
    Inventors: Bryan Parno, Cynthia Kuo, Adrian Perrig
  • Publication number: 20100031360
    Abstract: Systems and methods are provided for preventing unauthorized modification of an operating system. The system includes an operating system comprised of kernel code for controlling access to operation of a processing unit. The system further includes an enforcement agent executing at a higher privilege than the kernel code such that any changes to the kernel code are approved by the enforcement agent prior to execution.
    Type: Application
    Filed: July 31, 2008
    Publication date: February 4, 2010
    Inventors: Arvind Seshadri, Ning Qu, Adrian Perrig
  • Publication number: 20080298587
    Abstract: A method of securely deploying information to a device includes placing a device into a shielded structure and exchanging timing messages between a keying device located inside the shielded structure and a beacon located outside of the shielded structure. The shielded structure is closed. The exchange of timing messages is terminated, and upon termination, the keying device transfers the information via one or more shielded messages to the device, and the beacon jams the frequency at which the shielded messages are transferred. The shielded structure is opened, and the keying device and beacon exchange messages to verify the secure deployment of the information.
    Type: Application
    Filed: February 20, 2008
    Publication date: December 4, 2008
    Inventors: Mark Y. Luk, Cynthia Yu Kuo, Adrian Perrig, Evan Davis Gaustad
  • Publication number: 20070233891
    Abstract: A method of serving content to multiple clients via a network is provided. Independent sessions with each of a plurality of clients are maintained, wherein the number of clients in the plurality of clients can vary over time, and wherein the start of each session and the end of each session can be independent of the start and end of other sessions. A stream of packet payloads is received, each packet payload of the stream of packet payloads including data generated from the content, wherein each packet payload in at least a subset of the stream of packet payloads includes a different set of data. Each packet payload in the stream of packet payloads is transmitted to each client of the plurality of clients in corresponding packets, wherein the packet payload transmitted to a client at any particular time is independent of the state of the corresponding session.
    Type: Application
    Filed: February 26, 2007
    Publication date: October 4, 2007
    Applicant: Digital Fountain, Inc.
    Inventors: Michael Luby, Ronen Vainish, Lars Rasmussen, David Kushi, Serban Simu, Adrian Perrig, Roberto Attias, Michael Walfish, Diane Hernek, John Byers
  • Publication number: 20020129159
    Abstract: A method of serving content to multiple clients via a network is provided. Independent sessions with each of a plurality of clients are maintained, wherein the number of clients in the plurality of clients can vary over time, and wherein the start of each session and the end of each session can be independent of the start and end of other sessions. A stream of packet payloads is received, each packet payload of the stream of packet payloads including data generated from the content, wherein each packet payload in at least a subset of the stream of packet payloads includes a different set of data. Each packet payload in the stream of packet payloads is transmitted to each client of the plurality of clients in corresponding packets, wherein the packet payload transmitted to a client at any particular time is independent of the state of the corresponding session.
    Type: Application
    Filed: June 15, 2001
    Publication date: September 12, 2002
    Inventors: Michael Luby, Ronen Vainish, Lars Rasmussen, David Kushi, Serban Simu, Adrian Perrig, Roberto Attias, Michael Walfish, Diane Hernek, John Byers