Patents by Inventor J. Alex Halderman
J. Alex Halderman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146818Abstract: Various embodiments of apparatuses and methods for a continuous scanning engine with automatic protocol detection are described. In some embodiments, the continuous scanning engine comprises one or more discovery components and one or more protocol detection components. The discovery components, in some embodiments, send initial packets to a plurality of ports of a plurality of network addresses of a network, receive responses to a least some of the initial packets, asynchronously match the received responses to the sent initial packets, and determine that some ports at some network addresses require further analysis.Type: ApplicationFiled: January 9, 2024Publication date: May 2, 2024Applicant: Censys, Inc.Inventors: Jeff Cody, David Adrian, J. Alex Halderman, Paul A. Parkanzky
-
Patent number: 11936748Abstract: Various embodiments of apparatuses and methods for a continuous scanning engine with automatic protocol detection are described. In some embodiments, the continuous scanning engine comprises one or more discovery components and one or more protocol detection components. The discovery components, in some embodiments, send initial packets to a plurality of ports of a plurality of network addresses of a network, receive responses to a least some of the initial packets, asynchronously match the received responses to the sent initial packets, and determine that some ports at some network addresses require further analysis.Type: GrantFiled: October 29, 2021Date of Patent: March 19, 2024Assignee: Censys, Inc.Inventors: Jeff Cody, David Adrian, J. Alex Halderman, Paul A. Parkanzky
-
Publication number: 20230135240Abstract: Various embodiments of a scanning engine are described. In some embodiments, the scanning engine comprises discovery components associated with different Internet providers and/or protocol detection components associated with the different Internet providers. When a first discovery component associated with a first Internet provider does not receive a response from a port at an Internet address, then a second discovery component associated with a second Internet provider sends packets to that port at that Internet address to attempt to elicit a response. When a first protocol inspection component associated with a first Internet provider is not able to communicate with a port at an Internet address, then it provides information that can be obtained by a second protocol inspection component associated with a second Internet provider. That second protocol inspection component attempts to communicate with the port at the Internet address through the second Internet provider using various communication protocols.Type: ApplicationFiled: October 28, 2022Publication date: May 4, 2023Applicant: Censys, Inc.Inventors: Jeff Cody, David Adrian, J. Alex Halderman, Paul A. Parkanzky
-
Patent number: 8407466Abstract: Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that can determine whether a client request to download or play content should be granted. All purchase, download, and playback requests require permission from the permission system. The server also includes a DD module system that transfers a DD module to the client. The DD module includes a content key decryption module, a content decryption module, and a content decompression module. The content key decryption module decrypts an encrypted content key that was received from the server. The decryption uses a unique DD module key that has been hard-coded into the content key decryption module. The content decryption module uses the content key to decrypt encrypted content. The content decompression module decompresses compressed content so that it can be played.Type: GrantFiled: October 24, 2011Date of Patent: March 26, 2013Assignee: Google Inc.Inventors: Wai Fun (Aaron) Lee, Marius P. Schilder, Jason D. Waddle, J. Alex Halderman
-
Publication number: 20120066494Abstract: Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that can determine whether a client request to download or play content should be granted. All purchase, download, and playback requests require permission from the permission system. The server also includes a DD module system that transfers a DD module to the client. The DD module includes a content key decryption module, a content decryption module, and a content decompression module. The content key decryption module decrypts an encrypted content key that was received from the server. The decryption uses a unique DD module key that has been hard-coded into the content key decryption module. The content decryption module uses the content key to decrypt encrypted content. The content decompression module decompresses compressed content so that it can be played.Type: ApplicationFiled: October 24, 2011Publication date: March 15, 2012Applicant: GOOGLE INC.Inventors: Wai Fun (Aaron) Lee, Marius P. Schilder, Jason D. Waddle, J. Alex Halderman
-
Patent number: 8074083Abstract: Systems and methods provide for controlling download and playback of media content. A system includes a client, which can play content, and a server. The server includes a permission system that can determine whether a client request to download or play content should be granted. All purchase, download, and playback requests require permission from the permission system. The server also includes a DD module system that transfers a DD module to the client. The DD module includes a content key decryption module, a content decryption module, and a content decompression module. The content key decryption module decrypts an encrypted content key that was received from the server. The decryption uses a unique DD module key that has been hard-coded into the content key decryption module. The content decryption module uses the content key to decrypt encrypted content. The content decompression module decompresses compressed content so that it can be played.Type: GrantFiled: January 9, 2007Date of Patent: December 6, 2011Assignee: Google Inc.Inventors: Wai Fun (Aaron) Lee, Marius P. Schilder, Jason D. Waddle, J. Alex Halderman
-
Patent number: 8033463Abstract: A method for auditing ballots cast in an election, wherein each ballot is associated with a group. A subset of groups from which sample ballots will be chosen is identified. An identifier is printed on each ballot in the subset. Each ballot has a different identifier than every other ballot in its group. A check is performed to determine whether the identifiers were printed correctly on the ballots. If so, a machine re-count of ballots in each group in the subset is performed and the results are compared to the initial tally of ballots associated with the group. If there is a mismatch, a further investigation is triggered. If there is a match, manual verification is performed on sample ballots from each group. The audit may begin prior to completion of voting from all precincts by estimating the number of samples that will be necessary.Type: GrantFiled: August 3, 2007Date of Patent: October 11, 2011Assignee: The Trustees of Princeton UniversityInventors: Edward W. Felten, Joseph A. Calendrino, J. Alex Halderman
-
Publication number: 20090037260Abstract: A method for auditing ballots cast in an election, wherein each ballot is associated with a group. A subset of groups from which sample ballots will be chosen is identified. An identifier is printed on each ballot in the subset. Each ballot has a different identifier than every other ballot in its group. A check is performed to determine whether the identifiers were printed correctly on the ballots. If so, a machine re-count of ballots in each group in the subset is performed and the results are compared to the initial tally of ballots associated with the group. If there is a mismatch, a further investigation is triggered. If there is a match, manual verification is performed on sample ballots from each group. The audit may begin prior to completion of voting from all precincts by estimating the number of samples that will be necessary.Type: ApplicationFiled: August 3, 2007Publication date: February 5, 2009Inventors: Edward W. Felten, Joseph A. Calandrino, J. Alex Halderman