Patents by Inventor Dulce B. Ponceleon
Dulce B. Ponceleon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9147179Abstract: A method for de-identification of visual media data, including: merging a sequence of images from a set of visual media data into an averaged image; bounding portions of the averaged image that are determined to be relatively fixed, wherein each bounded portion is identified by a corresponding position in the averaged image; generating a template comprising the bounded portions and the corresponding position for each bounded portion in the averaged image; and de-identifying the sequence of images by obfuscating content in the bounded portions.Type: GrantFiled: August 28, 2012Date of Patent: September 29, 2015Assignee: International Business Machines CorporationInventors: Tanveer F. Syeda-Mahmood, David J. Beymer, Omar U. F. Choque, Dulce B. Ponceleon, Dai Shi
-
Patent number: 9066082Abstract: Embodiments of the invention relate to encoding multi-channel media content. In one embodiment, a set of multi-channel media content is received. The set of multi-channel media content includes a plurality of content frames. Each content frame includes a first channel content frame and second channel content frame. Each of the first channel content frames is grouped into a first group of content frames. Each of the second channel content frames is grouped into a second group of content frames. Each content frame in the first group of content frames is encoded. At least a first content frame in the first group of content frames includes at least one variation, where the variation is a different version of the first content frame. Each content frame in the second group of content frames is also encoded, where the second group of content frames is absent any content frames including a variation.Type: GrantFiled: March 15, 2013Date of Patent: June 23, 2015Assignee: International Business Machines CorporationInventors: John Bernard Geagan, III, Dulce B. Ponceleon
-
Publication number: 20150110273Abstract: Embodiments of the present invention relate to space-efficient key allocations in broadcast encryption systems. In one embodiment, a method of and computer program product for broadcast encryption is provided. In this embodiment, a key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. Encrypted content is received. A plurality of encrypted keys is received. Each encrypted key has an associated identifier. A first encrypted key is selected from the plurality of encrypted keys such that the key identifier of the first encrypted is equivalent to the first key identifier. A first cryptographic function is determined corresponding to the first cryptographic function identifier. The first cryptographic function is applied to the first encrypted key using the first cryptographic key to obtain a first intermediate cryptographic key.Type: ApplicationFiled: October 18, 2013Publication date: April 23, 2015Applicant: International Business Machines CorporationInventor: Dulce B. Ponceleon
-
Publication number: 20150110274Abstract: Embodiments of the present invention relate to time delayed release of previously distributed digital content. In one embodiment, a method of and computer program product for low-bandwidth time-embargoed content disclosure are provided. A first cryptographic key is received. Encrypted content is received, encoded in a computer readable medium. A correction value is received. A predetermined function is applied to the first cryptographic key and the correction value to determine a second cryptographic key. The second cryptographic key is applied to the encrypted content to obtain decrypted content.Type: ApplicationFiled: October 18, 2013Publication date: April 23, 2015Applicant: International Business Machines CorporationInventors: Dulce B. Ponceleon, John Bernard Geagan, III
-
Publication number: 20150058995Abstract: Embodiments of the present invention relate to searching for secret data through an untrusted searcher without exposing the secret data. In one embodiment, a method of and computer program product for searching for secret data through an untrusted searcher is provided. A secret value is read from a storage medium. The secret value is divided into a plurality of portions. Each of the plurality of portions is ranked. A subset of the secret value is determined from the ranking of the plurality of portions. A search string is constructed from the subset. The search string is transmitted to a searcher via a network. Search results are received from the searcher via the network. The search results are compared to the secret value to determine whether the searcher found the secret value.Type: ApplicationFiled: August 26, 2013Publication date: February 26, 2015Applicant: International Business Machines CorporationInventors: John Bernard Geagan, III, Dulce B. Ponceleon
-
Publication number: 20140280272Abstract: Embodiments of the invention relate to managing access to media files and content therein. In one embodiment, a first identifier representing a first media content component in a first set of media content components is identified. The first set of media content components is included within a first media file that has been received from a first source. The identifier is compared with at least a second identifier representing at least a second media content component in a second set of media content components. The second set of media content components is associated with at least a second media file received from a second source. The first source is different than the second source. Responsive to the first digital signature substantially matching the second identifier, the first media content component is replaced with the second media content component.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Omar Florez CHOQUE, John Bernard GEAGAN, III, Dulce B. PONCELEON
-
Publication number: 20140270168Abstract: Embodiments of the invention relate to encoding multi-channel media content. In one embodiment, a set of multi-channel media content is received. The set of multi-channel media content includes a plurality of content frames. Each content frame includes a first channel content frame and second channel content frame. Each of the first channel content frames is grouped into a first group of content frames. Each of the second channel content frames is grouped into a second group of content frames. Each content frame in the first group of content frames is encoded. At least a first content frame in the first group of content frames includes at least one variation, where the variation is a different version of the first content frame. Each content frame in the second group of content frames is also encoded, where the second group of content frames is absent any content frames including a variation.Type: ApplicationFiled: March 15, 2013Publication date: September 18, 2014Applicant: International Business Machines CorporationInventors: John Bernard GEAGAN, III, Dulce B. PONCELEON
-
Patent number: 8782440Abstract: Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of extended applications supported the media key blocks and facilitates the assignment of the applications to the media key blocks. One aspect of the invention concerns a method that comprises assigning a first media key block in a protected area of the media for extended applications accessing protected content, processing the first media key block with a first device key set to generate a first media key, and for each extended application, creating a second media key block in a protected area of the media. The second media key block is processed to generate a second media key. A content-accessing device processes the first and second media keys in order to access protected content.Type: GrantFiled: August 15, 2012Date of Patent: July 15, 2014Assignee: International Business Machines CorporationInventors: Sigfredo I. Nin, Dulce B. Ponceleon
-
Publication number: 20140052996Abstract: Embodiments of the invention relate to digital content protection for recordable media using encryption and decryption based on device keys in the media. The invention increases the number of extended applications supported the media key blocks and facilitates the assignment of the applications to the media key blocks. One aspect of the invention concerns a method that comprises assigning a first media key block in a protected area of the media for extended applications accessing protected content, processing the first media key block with a first device key set to generate a first media key, and for each extended application, creating a second media key block in a protected area of the media. The second media key block is processed to generate a second media key. A content-accessing device processes the first and second media keys in order to access protected content.Type: ApplicationFiled: August 15, 2012Publication date: February 20, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sigfredo I. Nin, Dulce B. Ponceleon
-
Publication number: 20130182006Abstract: A visual media de-identification system is described. The system includes an image merger and a de-identifying engine. The image merger is configured to merge a sequence of images from a set of visual media data into an averaged image. The de-identifying engine is configured to: bound portions of the averaged image that are determined to be relatively fixed, wherein each bounded portion is identified by a corresponding position in the averaged image; generate a template comprising the bounded portions and the corresponding position for each bounded portion in the averaged image; and de-identify the sequence of images by obfuscating content in the bounded portions.Type: ApplicationFiled: January 16, 2012Publication date: July 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tanveer F. Syeda-Mahmood, David J. Beymer, Omar U.F. Choque, Dulce B. Ponceleon, Dai Shi
-
Publication number: 20130182007Abstract: A method for de-identification of visual media data, including: merging a sequence of images from a set of visual media data into an averaged image; bounding portions of the averaged image that are determined to be relatively fixed, wherein each bounded portion is identified by a corresponding position in the averaged image; generating a template comprising the bounded portions and the corresponding position for each bounded portion in the averaged image; and de-identifying the sequence of images by obfuscating content in the bounded portions.Type: ApplicationFiled: August 28, 2012Publication date: July 18, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Tanveer F. Syeda-Mahmood, David J. Beymer, Omar U.F. Choque, Dulce B. Ponceleon, Dai Shi
-
Patent number: 8396896Abstract: Embodiments of this disclosure relate to binary tree structures, and more specifically to assigning resources to a binary tree structure, such as for content protection. In embodiments, a total number of resources in a first category of resources is identified. The resources may be devices that play encryption protected content such as a CD, a DVD, an HD DVD, a BD, and a Secure Digital card, for example. In embodiments, a minimum number of dummy resources are assigned to a corresponding number of leaf nodes of the binary tree structure before resources in the first category of resources are assigned to leaf nodes in the binary tree structure. Generally, the minimum number of dummy resources is greater than or equal to 1+floor(2^floor(log2(N)?1)), wherein N is greater than or equal to the total number of resources in the first category of resources.Type: GrantFiled: November 10, 2010Date of Patent: March 12, 2013Assignee: International Business Machines CorporationInventors: John Bernard Geagan, III, Dulce B. Ponceleon
-
Patent number: 8391481Abstract: According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device.Type: GrantFiled: December 31, 2009Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Robert Glenn Deen, Hongxia Jin, Sigfredo Ismael Nin, Dulce B. Ponceleon
-
Patent number: 8280043Abstract: A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.Type: GrantFiled: June 5, 2008Date of Patent: October 2, 2012Assignee: International Business Machines CorporationInventors: Julian A. Cerruti, Sigfredo I Nin, Dulce B Ponceleon, Vladimir Zbarsky
-
Publication number: 20120117123Abstract: Embodiments of this disclosure relate to binary tree structures, and more specifically to assigning resources to a binary tree structure, such as for content protection. In embodiments, a total number of resources in a first category of resources is identified. The resources may be devices that play encryption protected content such as a CD, a DVD, an HD DVD, a BD, and a Secure Digital card, for example. In embodiments, a minimum number of dummy resources are assigned to a corresponding number of leaf nodes of the binary tree structure before resources in the first category of resources are assigned to leaf nodes in the binary tree structure. Generally, the minimum number of dummy resources is greater than or equal to 1+floor(2?floor(log2(N)?1)), wherein N is greater than or equal to the total number of resources in the first category of resources.Type: ApplicationFiled: November 10, 2010Publication date: May 10, 2012Applicant: International Business Machines CorporationInventors: John Bernard Geagan, III, Dulce B. Ponceleon
-
Publication number: 20110158404Abstract: According to one embodiment of the present invention, a system, method, and computer program product is provided for rebinding title keys in clusters of devices with distinct security levels in broadcast encryption systems. The method includes receiving a new management key and unbinding an encrypted title key with a previously used management key, the title key having a security class and residing in a title key block for a device having a security class, the device being in a cluster of devices including devices having a plurality of security classes. If the device security class is lower that the title key security class, the unbound title key is partially rebound with the new management key. the partially rebound title key is then saved in the title key block for the device.Type: ApplicationFiled: December 31, 2009Publication date: June 30, 2011Applicant: International Business Machines CorporationInventors: Robert Glenn Deen, Hongxia Jin, Sigfredo Ismael Nin, Dulce B. Ponceleon
-
Patent number: 7860246Abstract: A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.Type: GrantFiled: November 1, 2006Date of Patent: December 28, 2010Assignee: International Business Machines CorporationInventors: Julian A Cerruti, Sigfredo I Nin, Dulce B Ponceleon, Vladimir Zbarsky
-
Publication number: 20090323970Abstract: A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.Type: ApplicationFiled: June 5, 2008Publication date: December 31, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian A. Cerruti, Sigfredo I. Nin, Dulce B. Ponceleon, Vladimir Zbarsky
-
Publication number: 20080101596Abstract: A system for protecting data in a security system generates and encodes a backup key for encoding long-lived secrets. The system generates a distribution plan for distributing cryptographic splits of the encoded backup key to selected persons based on geographic and organizational diversity. The distribution plan specifies a number M of the cryptographic splits to be generated and a number N of the cryptographic splits required to recover the backup key. The system processes utilize an init file comprising system parameters and state files each comprising parameters reflecting a state of the secure system after a transaction. Any of the state files may be used for any of the system processes. The state files and the init file are encoded by the backup key, thus protecting the long-lived secrets.Type: ApplicationFiled: November 1, 2006Publication date: May 1, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Julian A. CERRUTI, Sigfredo I. Nin, Dulce B. PONCELEON, Vladimir ZBARSKY
-
Patent number: RE41899Abstract: Information presented to a user via an information access system is ranked according to a prediction of the likely degree of relevance to the user's interests. A profile of interests is stored for each user having access to the system. Items of information to be presented to a user are ranked according to their likely degree of relevance to that user and displayed in order of ranking. The prediction of relevance is carried out by combining data pertaining to the content of each item of information with other data regarding correlations of interests between users. A value indicative of the content of a document can be added to another value which defines user correlation, to produce a ranking score for a document. Alternatively, multiple regression analysis or evolutionary programming can be carried out with respect to various factors pertaining to document content and user correlation, to generate a prediction of relevance.Type: GrantFiled: March 12, 2003Date of Patent: October 26, 2010Assignee: Apple Inc.Inventors: Daniel E. Rose, Jeremy J. Bornstein, Kevin Tiene, Dulce B. PonceleĆ³n