Patents by Inventor Mariusz H. Jakubowski

Mariusz H. Jakubowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7188249
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
    Type: Grant
    Filed: November 3, 2005
    Date of Patent: March 6, 2007
    Assignee: Microsoft Corporation
    Inventors: M Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 7181622
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
    Type: Grant
    Filed: November 3, 2005
    Date of Patent: February 20, 2007
    Assignee: Microsoft Corporation
    Inventors: Mehmet Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 7103574
    Abstract: An enforcement architecture and method for implementing digital rights management are disclosed. Digital content is distributed from a content server to a computing device of a user and received, and an attempt is made to render the digital content by way of a rendering application. The rendering application invokes a Digital Rights Management (DRM) system, and such DRM system determines whether a right to render the digital content in the manner sought exists based on any digital license stored in the computing device and corresponding to the digital content. If the right does not exist, a digital license that provides such right and that corresponds to the digital content is requested from a license server, and the license server issues the digital license to the DRM system. The computing device receives the issued digital license and stores the received digital license thereon.
    Type: Grant
    Filed: April 12, 1999
    Date of Patent: September 5, 2006
    Assignee: Microsoft Corporation
    Inventors: Marcus Peinado, Rajasekhar Abburi, Arnold N. Blinn, Thomas C. Jones, John L. Manferdelli, Jeffrey R. C. Bell, Ramaranthnam Venkatesan, Paul England, Mariusz H. Jakubowski, Hai Ying (Vincent) Yu
  • Patent number: 7080249
    Abstract: Cyclic verification of code integrity is applied to an object by identifying multiple segments of the object. Each segment is separated into multiple blocks, and a message authentication code (MAC) value of each of these segments is computed. The computed module MAC values are then incorporated into selected ones of the multiple segments (referred to here as “checker segments”), which may also have their MAC values incorporated into other checker segments. A new MAC value for each of the checker segments is then calculated. A new block is added to each of the checker segments that results in restoring the MAC value of the checker segment back to its original value. Thus, the checker segments can be subsequently verified based on the MAC values stored in other segments.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: July 18, 2006
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi
  • Patent number: 7080257
    Abstract: Oblivious checking of a digital good is performed by identifying a plurality of key instructions within a function of a digital good. Each key instruction is an instruction that possibly modifies a register or a flag. An extra instruction is then inserted into the function for each of the key instructions. The extra instructions each correspond to one of the key instructions and modify a register in a deterministic fashion based on the corresponding key instruction. A set of inputs to the function are then identified that result in different valid computation paths in the function being taken. A checksum for the function is then generated by using a mapping function which maps the contents of the register to the set of inputs.
    Type: Grant
    Filed: August 30, 2000
    Date of Patent: July 18, 2006
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan
  • Patent number: 7054443
    Abstract: A digital rights management (DRM) distribution architecture produces and distributes digital goods (e.g., software, audio, video, and other content) in a fashion that renders the digital goods resistant to many known forms of attacks. The DRM distribution architecture protects digital goods by automatically and randomly manipulating portions of the code using multiple protection techniques. Applying a mixture protection techniques in random fashion makes it extremely difficult for pirates to create illicit copies that go undetected as legitimate copies. In addition, the architecture also supports a quantitative unit that allows a producer to specify how much protection may be added to the digital good.
    Type: Grant
    Filed: March 27, 2000
    Date of Patent: May 30, 2006
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan, Saurabh Sinha
  • Patent number: 7051005
    Abstract: A digital rights management (DRM) system operates on a computing device and requires a black box for performing decryption and encryption functions. To obtain the black box from a black box server, the DRM system requests such black box from such black box server. The black box server in response generates the black box, where such black box is unique and has a public/private key pair. The black box server then delivers the generated black box to the DRM system and the DRM system installs the delivered black box in such DRM system.
    Type: Grant
    Filed: January 13, 2000
    Date of Patent: May 23, 2006
    Assignee: Microsoft Corporation
    Inventors: Marcus Peinado, Rajasekhar Abburi, Arnold N. Blinn, Thomas C. Jones, John L. Manferdelli, Jeffrey R. C. Bell, Ramaranthnam Venkatesan, Paul England, Mariusz H. Jakubowski, Hai Ying (Vincent) Yu
  • Patent number: 7051200
    Abstract: A secure repository individualized for a hardware environment and a method and system for providing the same. The secure repository includes a hidden cryptographic key and code that applies the key without requiring access to a copy of the key. The code that implements the secure repository is generated in a manner that is at least partly based on a hardware ID associated with the hardware environment in which the secure repository is to be installed, and may also be based on a random number. Cryptographic functions implemented by the secure repository include decryption of encrypted information and validation of cryptographically signed information. The secure repository may be coupled to an application program, which uses cryptographic services provided by the secure repository, by way of a decoupling interface that provides a common communication and authentication interface for diverse types of secure repositories.
    Type: Grant
    Filed: June 27, 2000
    Date of Patent: May 23, 2006
    Assignee: Microsoft Corporation
    Inventors: John L. Manferdelli, Michael David Marr, Vinay Krishnaswamy, Mariusz H. Jakubowski
  • Patent number: 7028189
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: April 11, 2006
    Assignee: Microsoft Corporation
    Inventors: M. Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 7020777
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: March 28, 2006
    Assignee: Microsoft Corporation
    Inventors: M. Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 7020775
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good. This technology finds the proper balance between minimizing the probability of false alarms (i.e., detecting a non-existent watermark) and the probability of misses (i.e., failing to detect an existing watermark). The technology, described herein, performs quantization index modulation (QIM) based upon non-local characteristics of the digital good. Non-local characteristics may include statistics (e.g., averages, median) of a group of individual parts (e.g., pixels) of a digital good. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: April 24, 2001
    Date of Patent: March 28, 2006
    Assignee: Microsoft Corporation
    Inventors: M. Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 6952774
    Abstract: A watermark encoding system encodes an audio signal with both a strong and a weak watermark. The strong watermark identifies the content producer and is designed to survive all typical kinds of processing and malicious attacks. The weak watermark identifies the content as an original and is designed to be significantly removed as a result of most normal signal processing (other than A/D and D/A). The watermark encoding system has a converter to convert an audio signal into frequency and phase components and a mask processor to determine a hearing threshold for corresponding frequency components. The watermark encoding system also has a pattern generator to generate both the strong and weak watermarks and a watermark insertion unit to selectively insert either the strong or weak watermark into the audio signal. The watermark insertion unit adds the strong watermark to the audio signal when the signal exceeds the hearing threshold by a buffer value (e.g.
    Type: Grant
    Filed: May 22, 1999
    Date of Patent: October 4, 2005
    Assignee: Microsoft Corporation
    Inventors: Darko Kirovski, Henrique Malvar, Mariusz H. Jakubowski
  • Publication number: 20040059581
    Abstract: A watermark encoding system encodes an audio signal with both a strong and a weak watermark. The strong watermark identifies the content producer and is designed to survive all typical kinds of processing and malicious attacks. The weak watermark identifies the content as an original and is designed to be significantly removed as a result of most normal signal processing (other than A/D and D/A). The watermark encoding system has a converter to convert an audio signal into frequency and phase components and a mask processor to determine a hearing threshold for corresponding frequency components. The watermark encoding system also has a pattern generator to generate both the strong and weak watermarks and a watermark insertion unit to selectively insert either the strong or weak watermark into the audio signal. The watermark insertion unit adds the strong watermark to the audio signal when the signal exceeds the hearing threshold by a buffer value (e.g.
    Type: Application
    Filed: July 15, 2003
    Publication date: March 25, 2004
    Inventors: Darko Kirovski, Henrique Malvar, Mariusz H. Jakubowski
  • Publication number: 20040003278
    Abstract: A method, apparatus, and article of manufacture for providing secure and opaque type libraries to automatically provide secure variables within a programming module. A system for providing secure and opaque type libraries to automatically provide secure variables within a programming module. The system includes an OTL selection module, an OTL substitution module, an OTL type library database, a compiler module; and a linker module to create an executable processing module. The OTL selection module randomly selects or generates one of the possible variable obfuscation functions for each declared secure variable. The OTL substitution module substitutes the separate instance of the selected variable obfuscation function for every reference to the declared secure variable. The OTL type library database receives queries from the OTL selection module a database to identify of possible variable obfuscation functions applicable for the variable type corresponding to the declared secure variables.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Applicant: Microsoft Corporation
    Inventors: Yuqun Chen, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Publication number: 20030191940
    Abstract: An implementation of a technology, described herein, for facilitating the protection computer-executable instructions, such as software. At least one implementation, described herein, may generate integrity signatures of one or more program modules—which are sets of computer-executable instructions—based upon a trace of activity during execution of such modules and/or near-replicas of such modules. With at least one implementation, described herein, the execution context of an execution instance of a program module is considered when generating the integrity signatures. With at least one implementation, described herein, a determination may be made about whether a module is unaltered by comparing integrity signatures. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Application
    Filed: April 3, 2002
    Publication date: October 9, 2003
    Inventors: Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yuqun Chen, Matthew Cary, Ruoming Pang
  • Publication number: 20030191942
    Abstract: An implementation of a technology, described herein, for facilitating the protection computer-executable instructions, such as software. At least one implementation, described herein, may generate integrity signatures of multiple sets of computer-executable instructions based upon the output trace and/or an execution trace of such sets. With at least one implementation, described herein, a determination may be made about whether two or more of such sets are unaltered duplicates by comparing integrity signatures of such sets. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Application
    Filed: April 3, 2002
    Publication date: October 9, 2003
    Inventors: Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yuqun Chen, Matthew Cary, Ruoming Pang
  • Publication number: 20030078853
    Abstract: An enforcement architecture and method for implementing digital rights management are disclosed. Digital content is distributed from a content server to a computing device of a user and received, and an attempt is made to render the digital content by way of a rendering application. The rendering application invokes a Digital Rights Management (DRM) system, and such DRM system determines whether a right to render the digital content in the manner sought exists based on any digital license stored in the computing device and corresponding to the digital content. If the right does not exist, a digital license that provides such right and that corresponds to the digital content is requested from a license server, and the license server issues the digital license to the DRM system. The computing device receives the issued digital license and stores the received digital license thereon.
    Type: Application
    Filed: July 29, 2002
    Publication date: April 24, 2003
    Inventors: Marcus Peinado, Rajasekhar Abburi, Arnold N. Blinn, Thomas C. Jones, John L. Manferdelli, Jeffrey R.C. Bell, Ramaranthnam Venkatesan, Paul England, Mariusz H. Jakubowski, Hai Ying (Vincent) Yu
  • Publication number: 20020154778
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good. This technology finds the proper balance between minimizing the probability of false alarms (i.e., detecting a non-existent watermark) and the probability of misses (i.e., failing to detect an existing watermark). The technology, described herein, performs quantization index modulation (QIM) based upon non-local characteristics of the digital good. Non-local characteristics may include statistics (e.g., averages, median) of a group of individual parts (e.g., pixels) of a digital good. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Application
    Filed: April 24, 2001
    Publication date: October 24, 2002
    Inventors: M. Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 6226742
    Abstract: A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream—such as by chaining the message, wherein a predefined portion of the intermediate stream defines a message authentication code (MAC); inserting an encrypted version of the MAC into a predefined portion of a ciphertext message; and generating, in response to the intermediate stream and the encrypted MAC, a remainder of the ciphertext message such that the remainder exhibits a predefined variation, e.g., a pseudo-random sequence, also contained within the encrypted MAC. Decryption proceeds in essentially a reverse fashion.
    Type: Grant
    Filed: April 20, 1998
    Date of Patent: May 1, 2001
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan
  • Patent number: 6128737
    Abstract: A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream--such as by chaining the message, wherein a predefined portion of the intermediate stream defines a message authentication code (MAC); inserting an encrypted version of the MAC into a predefined portion of a ciphertext message; and generating, in response to the intermediate stream and the encrypted MAC, a remainder of the ciphertext message such that the remainder exhibits a predefined variation, e.g., a pseudo-random sequence, also contained within the encrypted MAC. Decryption proceeds in essentially a reverse fashion.
    Type: Grant
    Filed: April 20, 1998
    Date of Patent: October 3, 2000
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan