Patents by Inventor Melissa Schneider
Melissa Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240146535Abstract: Various embodiments relate to a fault detection system and method for a digital signature algorithm, including: producing a digital signature of a message using a digital signature algorithm; storing parameters from a last round of the digital signature algorithm; executing the last round of the digital signature algorithm using the stored parameters to produce a check signature; comparing the digital signature to the check signature; and outputting the digital signature when the digital signature is the same as the check signature.Type: ApplicationFiled: October 11, 2022Publication date: May 2, 2024Inventors: Joost Roland Renes, Melissa Azouaoui, Joppe Willem Bos, Björn Fay, Tobias Schneider
-
Publication number: 20240137214Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for a cryptographic operation including matrix multiplication for lattice-based cryptography in a processor, the instructions, including: applying a first function to the rows of a matrix of polynomials to generate first outputs, wherein the first function excludes the identity function; adding an additional row to the matrix of polynomials to produce a modified matrix, wherein each element in the additional row is generated by a second function applied to a column of outputs associated with each element in the additional row; multiplying the modified matrix with a vector of polynomials to produce an output vector of polynomials; applying a verification function to the output vector that produces an indication of whether a fault occurred in the multiplication of the modified matrix with the vector of polynomials; and carrying out a cryptographic operation usingType: ApplicationFiled: October 6, 2022Publication date: April 25, 2024Inventors: Melissa Azouaoui, Joppe Willem Bos, Tobias Schneider, Joost Roland Renes, Björn Fay
-
Publication number: 20240126511Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for a cryptographic operation using masked compressing of coefficients of a polynomial having ns arithmetic shares for lattice-based cryptography in a processor, the instructions, including: shifting a first arithmetic share of the ns arithmetic shares by an input mask ?1; scaling the shifted first arithmetic share by a value based on a first compression factor ? and a masking scaling factor ?1; shifting the scaled first arithmetic share by a value based on the masking scaling factor ?1; scaling a second to ns shares of the ns arithmetic shares by a value based on the first compression factor ? and the masking scaling factor ?1; converting the ns scaled arithmetic shares to ns Boolean shares; right shifting the ns Boolean shares based upon the masking scaling factor ?1 and a second compression factor ?2; XORing an output mask ?2 with the shifted first Boolean sType: ApplicationFiled: September 26, 2022Publication date: April 18, 2024Inventors: Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Markus Schoenauer, Christine van Vredendaal
-
Publication number: 20240089113Abstract: plurality of objects that comprise an input to a cryptographic signing function. For each object in the plurality of objects, an output value yi of a hash function is calculated, where the value i is equal to an index value of the object, a compressed output value xi of a compression function is calculated, the output value yi from the computer readable memory, and the compressed output value xi is stored. For each object in the plurality of objects, an output value y?i of the hash function is calculated, where the value i is equal to the index value of the object, a compressed output value x?i of the compression function executed on the output value y?i is calculated, the output value x?i is determined to be equal to the output value xi, and the output value y?i is transmitted in an output data stream.Type: ApplicationFiled: September 12, 2022Publication date: March 14, 2024Inventors: Tobias SCHNEIDER, Melissa AZOUAOUI, Christine VAN VREDENDAAL
-
Publication number: 20240080204Abstract: A device includes a computer readable memory storing a plurality of one-time signature (OTS) keypairs and a processor that is configured to execute a hash function on a message using a first private key of a first OTS keypair of the plurality of OTS keypairs to determine a message signature, execute the hash function to calculate a leaf node value of a hash tree using the first OTS keypair, determine a plurality of authentication path nodes in the hash tree, retrieve, from the computer readable memory, values of a first subset of the plurality of authentication path nodes, calculate values for each node in a second subset of the plurality of authentication path nodes, and store, in the computer readable memory, the values for each node in the authentication path and the value of the leaf node.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Inventors: Christine VAN VREDENDAAL, Melissa AZOUAOUI, Tobias SCHNEIDER
-
Patent number: 11924346Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for masked sampling of polynomials for lattice-based cryptography in a processor, the instructions, including: determining a number m of random bits to be sampled based upon a sample bound parameter ?; producing a plurality of Boolean masked shares of a polynomial coefficient each having the determined number m of random bits using a uniform random function; determining that the polynomial coefficient is within a range of values based upon the sample bound parameter ?; converting the plurality of Boolean masked shares of the polynomial coefficient to a plurality of arithmetic masked shares of the polynomial coefficient; and shifting the plurality of arithmetic masked shares based upon the sample bound parameter ?.Type: GrantFiled: April 28, 2022Date of Patent: March 5, 2024Assignee: NXP B.V.Inventors: Markus Schoenauer, Tobias Schneider, Joost Roland Renes, Melissa Azouaoui
-
Patent number: 9399282Abstract: A cylindrical handle extender removably-coupleable to a utensil system includes a cylindrical handle extender assembly comprising a cylindrical extender member having a first end; a second end; a radial slit along a length of the cylindrical member, the cylindrical member with an inner-volume defined by an interior surface, the cylindrical member able to be removably-coupled repeatedly to and from the handle of a utensil; a first end cap; and a second end cap. The cylindrical handle extender is removably-coupleable to a utensil system comprises the cylindrical handle extender removably-coupleable to a utensil assembly. The cylindrical extender member provides a large surface area and gripping surface laterally-positionable to a mouth of the user, comfortably positioning for the user who is handicapped.Type: GrantFiled: April 8, 2014Date of Patent: July 26, 2016Inventor: Melissa Schneider
-
Patent number: 7584287Abstract: A method of detecting fraudulent Internet traffic sent from a first web site to a second web site including providing a first web site database having a list of first web sites likely to send bad traffic, providing a link to the second web site on the first web site, after an Internet user having a web browser clicks on the link, transferring the Internet user to an intermediate web site that gathers information from the Internet user web browser; and determining if a validation request is required.Type: GrantFiled: March 16, 2004Date of Patent: September 1, 2009Assignee: EMERgency,24, Inc.Inventors: Melissa Schneider, Arsen Vladimirskiy
-
Patent number: 7181445Abstract: A software module referred to as a content manager is provided for loading and maintaining a variety of data and associated metadata in a computer database. The data may be loaded in the form of individual documents that support business preparation or sales presentations where only one copy of each document is stored in the database. The metadata may be loaded in the form of attributes of the documents. A table of users may also be loaded in the database including a geographic or business division for each user. A role is assigned to the user, thereby granting access privileges to certain views of the database. An online user interface software module is also provided for remote access to the documents. Searches may be conducted by a variety of attributes. Documents may be associated into visual presentations or multiple presentations merged into one presentation. Three types of presentations private, shared, and global are supported.Type: GrantFiled: September 5, 2003Date of Patent: February 20, 2007Assignee: BellSouth Intellectual Property CorporationInventors: Michael Bebo, Merle Carr, Melissa Schneider, Linda Domi, Rebecca Sroufe
-
Publication number: 20050055337Abstract: A software module referred to as a content manager is provided for loading and maintaining a variety of data and associated metadata in a computer database. The data may be loaded in the form of individual documents that support business preparation or sales presentations where only one copy of each document is stored in the database. The metadata may be loaded in the form of attributes of the documents. A table of users may also be loaded in the database including a geographic or business division for each user. A role is assigned to the user, thereby granting access privileges to certain views of the database. An online user interface software module is also provided for remote access to the documents. Searches may be conducted by a variety of attributes. Documents may be associated into visual presentations or multiple presentations merged into one presentation. Three types of presentations private, shared, and global are supported.Type: ApplicationFiled: September 5, 2003Publication date: March 10, 2005Inventors: Michael Bebo, Merle Carr, Melissa Schneider, Linda Domi, Rebecca Sroufe
-
Publication number: 20040153365Abstract: A method of detecting fraudulent Internet traffic sent from a first web site to a second web site including providing a first web site database having a list of first web sites likely to send bad traffic, providing a link to the second web site on the first web site, after an Internet user having a web browser clicks on the link, transferring the Internet user to an intermediate web site that gathers information from the Internet user web browser; and determining if a validation request is required.Type: ApplicationFiled: March 16, 2004Publication date: August 5, 2004Applicant: EMERGENCY 24, INC.Inventors: Melissa Schneider, Arsen Vladimirskiy