Patents by Inventor Jan Leonhard Camenisch
Jan Leonhard Camenisch has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20120063593Abstract: A method, apparatus, and a computer readable storage medium having computer readable instructions to carry out the steps of the method for anonymous access to a database. Each record of the database has different access control permissions (e.g. attributes, roles, or rights). The method allows users to access the database record while the database does not learn who queries a record. The database does not know which record is being queried: (i) the access control list of that record or (ii) whether a user's attempt to access a record had been successful. The user can only obtain a single record per query and only those records for which he has the correct permissions. The user does not learn any other information about the database structure and the access control lists other than whether he was granted access to the queried record, and if so, the content of the record.Type: ApplicationFiled: September 9, 2011Publication date: March 15, 2012Applicant: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Maria Dubovitskaya, Gregory Neven, Greg Zaverucha
-
Patent number: 8135649Abstract: A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the identity marker (s) by splitting the anonymous trade order into a number (n) of trade orders each having a corresponding order quantity x (i) to generate a trade order set; and placing the generated trade order set in an electronic order book.Type: GrantFiled: August 20, 2009Date of Patent: March 13, 2012Assignee: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Christopher Mark Kenyon
-
Patent number: 8015398Abstract: A method and apparatus for proving and a method and apparatus for verifying that a secret value is a member of a predetermined set of values. The proving mechanism receives a set of signatures which has respective values in the predetermined set signed using a private key. The proving mechanism sends to the verifying mechanism a commitment on the secret value of the proving mechanism. The proving mechanism and verifying mechanism then communicate to implement a proof of knowledge protocol demonstrating knowledge by the proving mechanism of a signature on the secret value committed to in the commitment, thus proving that the secret value is a member of the predetermined set.Type: GrantFiled: December 5, 2008Date of Patent: September 6, 2011Assignee: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Rafik Chaabouni, Abhi A. Shelat
-
Patent number: 7974407Abstract: A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets.Type: GrantFiled: March 26, 2008Date of Patent: July 5, 2011Assignee: International Business Machines CorporationInventors: Chris P Vanden Berghe, Tadeusz J Pietraszek, Jan Leonhard Camenisch, Dieter Sommer
-
Patent number: 7974406Abstract: A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets.Type: GrantFiled: November 29, 2007Date of Patent: July 5, 2011Assignee: International Business Machines CorporationInventors: Chris P Vanden Berghe, Tadeusz J Pietraszek, Jan Leonhard Camenisch, Dieter Sommer
-
Publication number: 20110145589Abstract: A protocol for anonymous access to a database where the different records have different access control permissions is described. The permissions can be attributes, roles or rights that an authorized user needs to have to access the record. The database provider does not learn which record the user accesses and which attributes or roles the user has when she accesses the database. The database provider publishes the encrypted database where each record is encrypted with a key that is derived from at least the index of the record, its access control attributes and a secret key of the database provider. The user obtains a credential from an issuer for each access control attribute (ACL) that is associated with the user. Then the user retrieves the key for a particular record from the database provider and uses this key to decrypt the encrypted record.Type: ApplicationFiled: October 21, 2010Publication date: June 16, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan Leonhard Camenisch, Maria Dubovitskaya, Gregory Neven
-
Publication number: 20110029885Abstract: Methods and apparatus for presenting confidential presentations are presented. For example, a method for providing a confidential presentation includes providing a data stream by a stream server of a provider of the confidential presentation to a participant client, providing virtual world elements from a virtual world provider to the participant client, and forming, by the participant client, virtual world display data comprising the data stream and the virtual world elements. The virtual world provider is distinct from the provider of the confidential presentation.Type: ApplicationFiled: July 30, 2009Publication date: February 3, 2011Applicant: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Dirk Husemann, Dieter Sommer
-
Patent number: 7835978Abstract: A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the identity marker (s) by splitting the anonymous trade order into a number (n) of trade orders each having a corresponding order quantity x (i) to generate a trade order set; and placing the generated trade order set in an electronic order book.Type: GrantFiled: December 19, 2006Date of Patent: November 16, 2010Assignee: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Christopher Mark Kenyon
-
Publication number: 20100242108Abstract: A computer-implemented system and method for protecting a memory are provided. The system includes a memory section with privileged and non-privileged sections, a host gateway (HG) to generate a capability credential, a device controller (DC) to append the credential to data transmitted to the memory, and at least one IO device enabled to do direct memory access (DMA) transactions with the memory.Type: ApplicationFiled: June 3, 2010Publication date: September 23, 2010Applicant: International Business Machines CorporationInventors: Michael Backes, Shmuel Ben-Yehuda, Jan Leonhard Camenisch, Ton Engbersen, Zorik Machulsky, Julian Satran, Leah Shalev, Ilan Shimony, Thomas Basil Smith, III, Michael Waidner
-
Patent number: 7757280Abstract: A computer-implemented method for protecting a memory is provided. The method includes responsive to a direct memory access (DMA) request received from a consumer for a transaction of data from an IO device to the memory, the request including an IO command and a capability (CAP), generating a cryptographically signed capability (CAPB), forming a credential from CAP and CAPB, appending the credential to the IO command, configuring the IO device according to the credential and the IO command, transmitting the data from the IO device to the memory and prior to allowing execution of the DMA, authenticating that the credential is valid, further includes regenerating CAPB from a key available to an authenticating entity and from the CAP (included in CAPB) and verifying that the memory region information described in the cryptographically signed capability is the same as the requested region that was originally created, and that the cryptographically signed capability encompasses the IO command.Type: GrantFiled: January 17, 2006Date of Patent: July 13, 2010Assignee: International Business Machines CorporationInventors: Michael Backes, Shmuel Ben-Yehuda, Jan Leonhard Camenisch, Ton Engbersen, Zorik Machulsky, Julian Satran, Leah Shalev, Ilan Shimony, Thomas Basil Smith, III, Michael Waidner
-
Publication number: 20100142704Abstract: Methods and apparatus are provided for cryptographically encoding secret data in a data processing system. The secret data is encoded in accordance with a verifiable encryption process to produce a cryptographic construction (?) having a decryption constraint dependent on the occurrence of a predetermined event. An event-dependent decryption constraint is thereby built into the cryptography, so that there is an intrinsic restriction on the ability to decrypt the encoded secret data which is dependent on occurrence of the predetermined event. Decoding apparatus for such a cryptographic construction is also provided, as well as distributed trust data processing systems providing accountable privacy based on use of such cryptographic constructions.Type: ApplicationFiled: October 27, 2009Publication date: June 10, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan Leonhard Camenisch, Thomas R. Gross, Thomas Scott Heydt-Benjamin
-
Publication number: 20100115281Abstract: Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as prime numbers E in accordance with a predetermined mapping and a cryptographic credential is generated encoding E. To prove that an attribute encoded in a cryptographic credential associated with a proving module of the system is a member of a predetermined set of user attributes, without revealing the attribute in question, the proving module determines the product Q of respective prime numbers corresponding to the attributes in the set in accordance with the predetermined mapping of attributes to prime numbers. The proving module demonstrates to the receiving module possession of a cryptographic credential encoding a secret value that is the prime number E, and then whether this secret value divides the product value Q.Type: ApplicationFiled: August 27, 2009Publication date: May 6, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan Leonhard Camenisch, Thomas R. Gross
-
Publication number: 20100063932Abstract: Techniques are disclosed for issuing inoperative credentials, and making the inoperative credential operative at a subsequent point in time. For example, an inoperative credential is made valid when a triggering event occurs qualifying or entitling the inoperative credential holder to the operative credential. Using methods and apparatus of the invention enables issuing inoperative credentials, as well as any operative credential, at the time that an electronic identity card is issued. Operative and inoperative credentials are issued only once. Therefore, electronic identity cards do not need to be reissued at a later time to add, remove or change credentials, thus eliminating costs associated with electronic identity card reissue. An embodiment of the invention is a method of forming a credential. The method comprises the step of forming, at a first point in time, an inoperative credential. The inoperative credential is adapted to become operative, at a second point in time, to form an operative credential.Type: ApplicationFiled: September 8, 2008Publication date: March 11, 2010Inventors: Jan Leonhard Camenisch, Thomas R. Gross
-
Publication number: 20090313172Abstract: A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the identity marker (s) by splitting the anonymous trade order into a number (n) of trade orders each having a corresponding order quantity x (i) to generate a trade order set; and placing the generated trade order set in an electronic order book.Type: ApplicationFiled: August 20, 2009Publication date: December 17, 2009Applicant: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Christopher Mark Kenyon
-
Publication number: 20090300347Abstract: A method and apparatus for proving and a method and apparatus for verifying that a secret value is a member of a predetermined set of values. The proving mechanism receives a set of signatures which has respective values in the predetermined set signed using a private key. The proving mechanism sends to the verifying mechanism a commitment on the secret value of the proving mechanism. The proving mechanism and verifying mechanism then communicate to implement a proof of knowledge protocol demonstrating knowledge by the proving mechanism of a signature on the secret value committed to in the commitment, thus proving that the secret value is a member of the predetermined set.Type: ApplicationFiled: December 5, 2008Publication date: December 3, 2009Inventors: Jan Leonhard Camenisch, Rafik Chaabouni, Abhi A. Shelat
-
Publication number: 20090271618Abstract: A method and apparatus for attesting the configuration of a computing platform to a verifier. A signature key (SK) is bound to the platform and bound to a defined configuration of the platform. A credential (C(SK), CDAA(SK)) for the signature key (SK) is obtained from an evaluator. This credential (C(SK), CDAA(SK)) certifies that the signature key (SK) is bound to an unspecified trusted platform configuration. The platform can then demonstrate to the verifier the ability to sign a challenge from the verifier using the signature key (SK), and demonstrate possession of the credential (C(SK), CDAA(SK)) to the verifier, thereby attesting that the platform has a trusted configuration without disclosing the platform configuration to the verifier.Type: ApplicationFiled: July 3, 2007Publication date: October 29, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jan Leonhard Camenisch, Jonathan A. Poritz, Roger Daniel Zimmermann
-
Publication number: 20090063986Abstract: A system for verifying an electronic document, including a first device comprising a first display, a first interface and a first displaying program for displaying the electronic document on the first display, a second device comprising a second display, a second interface and a second displaying program, a communication channel between the first interface and the second interface, wherein the first and the second device are operable to exchange the electronic document and wherein the system comprises a selection function, the selection function for selecting a part of the electronic document and generating position information of the selected part of the electronic document, and wherein the second displaying program is operable to lock the electronic document after the exchange with the first device and display the selected part of the electronic document on the second display.Type: ApplicationFiled: September 4, 2008Publication date: March 5, 2009Applicant: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Thomas R. Gross
-
Publication number: 20080310621Abstract: A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets.Type: ApplicationFiled: March 26, 2008Publication date: December 18, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chris P. Vanden Berghe, Tadeusz J. Pietraszek, Jan Leonhard Camenisch, Dieter Sommer
-
Publication number: 20080137840Abstract: A computer implemented method for performing a privacy enhanced comparison of a plurality of data sets includes allocating a private encryption key to each of the data sets; performing an encryption operation for each of the data sets, the encryption operation comprising generating a commutatively encrypted data set of the respective data set, wherein the commutatively encrypted data sets are generated by successively applying a keyed commutative encryption function on the respective data set with the private encryption key of the respective data set itself and with the private encryption keys of the other data sets; and comparing the commutatively encrypted data sets.Type: ApplicationFiled: November 29, 2007Publication date: June 12, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chris P. Vanden Berghe, Tadeusz J. Pietraszek, Jan Leonhard Camenisch, Dieter Sommer
-
Publication number: 20070101138Abstract: A cryptographic method is provided for a host system having an associated trusted platform module. A first contribution to a message is computed by the TPM based on a first secret parameter stored in the TPM. The host system computes a second contribution to the message based on a second secret parameter stored in the host system outside the TPM. The first and second contributions to the message are then combined by either the host or the TPM and a first proof is conducted, proving to the host system that the contribution of the TPM was computed correctly or proving to the TPM that the contribution of the host was computed correctly.Type: ApplicationFiled: September 29, 2006Publication date: May 3, 2007Applicant: International Business Machines CorporationInventor: Jan Leonhard Camenisch