Patents by Inventor Binyamin Pinkas
Binyamin Pinkas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20140058952Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: ApplicationFiled: November 4, 2013Publication date: February 27, 2014Applicant: Intertrust Technologies CorporationInventors: Binyamin PINKAS, Tomas SANDER, William G. HORNE
-
Patent number: 8577812Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: GrantFiled: May 22, 2012Date of Patent: November 5, 2013Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander, William G. Horne
-
Patent number: 8542886Abstract: A method for privacy-retaining face identification comprising dividing at least one input face into a first set of patches, providing an assortment of patch profiles for each patch in the first set of patches, each patch profile in the assortment being associated with a unique index thereby to define an assortment of unique indices, for each individual patch in the input face, finding at least one patch profile within the assortment of patch profiles which most resembles the individual patch, thereby to define a first set of indices from among the assortment of unique indices whose corresponding patch profiles most resemble the input face's patches respectively, and using a privacy preserving computation to generate a physical output indicative of a comparison of the input face and at least one target face by comparing first and second functions of the first set of indices and of a second set of indices respectively, the second set of indices corresponding to patch profiles which most resemble a second set ofType: GrantFiled: July 1, 2010Date of Patent: September 24, 2013Assignee: Carmel-Haifa University Economic Corporation Ltd.Inventors: Margarita Osadchy, Binyamin Pinkas, Ayman Jarrous, Boaz Moskovich
-
Publication number: 20130013493Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: ApplicationFiled: May 22, 2012Publication date: January 10, 2013Applicant: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander, William G. Horne
-
Publication number: 20120266226Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: ApplicationFiled: June 25, 2012Publication date: October 18, 2012Inventors: Binyamin Pinkas, Tomas Sander
-
Publication number: 20120204246Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: April 19, 2012Publication date: August 9, 2012Inventors: Binyamin PINKAS, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 8230489Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: GrantFiled: April 7, 2011Date of Patent: July 24, 2012Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander
-
Patent number: 8220036Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: GrantFiled: December 12, 2006Date of Patent: July 10, 2012Assignee: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 8185478Abstract: Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly.Type: GrantFiled: September 30, 2010Date of Patent: May 22, 2012Assignee: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Tomas Sander, William G. Home
-
Publication number: 20110214169Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: ApplicationFiled: April 7, 2011Publication date: September 1, 2011Inventors: Binyamin Pinkas, Tomas Sander
-
Patent number: 7941836Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: GrantFiled: July 20, 2007Date of Patent: May 10, 2011Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander
-
Publication number: 20110026781Abstract: A method for privacy-retaining face identification comprising dividing at least one input face into a first set of patches, providing an assortment of patch profiles for each patch in the first set of patches, each patch profile in the assortment being associated with a unique index thereby to define an assortment of unique indices, for each individual patch in the input face, finding at least one patch profile within the assortment of patch profiles which most resembles the individual patch, thereby to define a first set of indices from among the assortment of unique indices whose corresponding patch profiles most resemble the input face's patches respectively, and using a privacy preserving computation to generate a physical output indicative of a comparison of the input face and at least one target face by comparing first and second functions of the first set of indices and of a second set of indices respectively, the second set of indices corresponding to patch profiles which most resemble a second set ofType: ApplicationFiled: July 1, 2010Publication date: February 3, 2011Applicant: CARMEL-HAIFA UNIVERSITY ECONOMIC CORPORATION LTD.Inventors: Margarita Osadchy, Binyamin Pinkas, Ayman Jarrous, Boaz Moskovich
-
Publication number: 20110029780Abstract: Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly.Type: ApplicationFiled: September 30, 2010Publication date: February 3, 2011Applicant: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Tomas Sander, William G. Home
-
Patent number: 7827114Abstract: Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly.Type: GrantFiled: October 30, 2006Date of Patent: November 2, 2010Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander, William G. Horne
-
Patent number: 7703130Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: GrantFiled: July 20, 2007Date of Patent: April 20, 2010Assignee: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Tomas Sander
-
Patent number: 7584223Abstract: A first version of a database is accessed. The first version includes the identities of items of information included in the database. A second version of the database is generated. The second version includes changed identities created by applying a function to the identities of the first version. In response to a query that seeks to determine whether a particular item is in the first version, the function is applied to the particular item to generate a changed identity for the particular item. Verification information is provided to demonstrate that the changed identity for the particular item was determined using the same function used to create the changed identities in the second version. A determination is made whether or not the particular item is in the second version and hence in the first version of the database, without requiring a release of the identities in the first version.Type: GrantFiled: June 28, 2006Date of Patent: September 1, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Binyamin Pinkas, Stuart Haber
-
Patent number: 7516326Abstract: An authentication system and method for anonymous authentication of a data processing system from a group of data processing systems by a service provider are disclosed. A group key (110) is assigned to each data processing system (100) of the group of data processing systems. A service provider (120) is arranged to provide an encrypted authenticator (140) that is decryptable using the group key (110) to one of the data processing systems (100) to be authenticated and positively authenticate the data processing system upon receipt of data associated with the decrypted authenticator (130). Upon revocation of authentication rights of one of the data processing systems of the group, a new group key is distributed to the other data processing systems of the group using broadcast encryption.Type: GrantFiled: October 15, 2004Date of Patent: April 7, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventor: Binyamin Pinkas
-
Publication number: 20080184346Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: ApplicationFiled: July 20, 2007Publication date: July 31, 2008Applicant: Intertrust Technologies Corp.Inventors: Binyamin PINKAS, Tomas Sander
-
Publication number: 20080134323Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: ApplicationFiled: October 29, 2007Publication date: June 5, 2008Inventors: Binyamin Pinkas, Tomas Sander
-
Patent number: 7383570Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: GrantFiled: April 25, 2003Date of Patent: June 3, 2008Assignee: Intertrust Technologies, Corp.Inventors: Binyamin Pinkas, Tomas Sander