Patents by Inventor Melissa Schneider

Melissa Schneider has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146535
    Abstract: Various embodiments relate to a fault detection system and method for a digital signature algorithm, including: producing a digital signature of a message using a digital signature algorithm; storing parameters from a last round of the digital signature algorithm; executing the last round of the digital signature algorithm using the stored parameters to produce a check signature; comparing the digital signature to the check signature; and outputting the digital signature when the digital signature is the same as the check signature.
    Type: Application
    Filed: October 11, 2022
    Publication date: May 2, 2024
    Inventors: Joost Roland Renes, Melissa Azouaoui, Joppe Willem Bos, Björn Fay, Tobias Schneider
  • Publication number: 20240137214
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for a cryptographic operation including matrix multiplication for lattice-based cryptography in a processor, the instructions, including: applying a first function to the rows of a matrix of polynomials to generate first outputs, wherein the first function excludes the identity function; adding an additional row to the matrix of polynomials to produce a modified matrix, wherein each element in the additional row is generated by a second function applied to a column of outputs associated with each element in the additional row; multiplying the modified matrix with a vector of polynomials to produce an output vector of polynomials; applying a verification function to the output vector that produces an indication of whether a fault occurred in the multiplication of the modified matrix with the vector of polynomials; and carrying out a cryptographic operation using
    Type: Application
    Filed: October 6, 2022
    Publication date: April 25, 2024
    Inventors: Melissa Azouaoui, Joppe Willem Bos, Tobias Schneider, Joost Roland Renes, Björn Fay
  • Publication number: 20240126511
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for a cryptographic operation using masked compressing of coefficients of a polynomial having ns arithmetic shares for lattice-based cryptography in a processor, the instructions, including: shifting a first arithmetic share of the ns arithmetic shares by an input mask ?1; scaling the shifted first arithmetic share by a value based on a first compression factor ? and a masking scaling factor ?1; shifting the scaled first arithmetic share by a value based on the masking scaling factor ?1; scaling a second to ns shares of the ns arithmetic shares by a value based on the first compression factor ? and the masking scaling factor ?1; converting the ns scaled arithmetic shares to ns Boolean shares; right shifting the ns Boolean shares based upon the masking scaling factor ?1 and a second compression factor ?2; XORing an output mask ?2 with the shifted first Boolean s
    Type: Application
    Filed: September 26, 2022
    Publication date: April 18, 2024
    Inventors: Melissa Azouaoui, Yulia Kuzovkova, Tobias Schneider, Markus Schoenauer, Christine van Vredendaal
  • Publication number: 20240089113
    Abstract: plurality of objects that comprise an input to a cryptographic signing function. For each object in the plurality of objects, an output value yi of a hash function is calculated, where the value i is equal to an index value of the object, a compressed output value xi of a compression function is calculated, the output value yi from the computer readable memory, and the compressed output value xi is stored. For each object in the plurality of objects, an output value y?i of the hash function is calculated, where the value i is equal to the index value of the object, a compressed output value x?i of the compression function executed on the output value y?i is calculated, the output value x?i is determined to be equal to the output value xi, and the output value y?i is transmitted in an output data stream.
    Type: Application
    Filed: September 12, 2022
    Publication date: March 14, 2024
    Inventors: Tobias SCHNEIDER, Melissa AZOUAOUI, Christine VAN VREDENDAAL
  • Publication number: 20240080204
    Abstract: A device includes a computer readable memory storing a plurality of one-time signature (OTS) keypairs and a processor that is configured to execute a hash function on a message using a first private key of a first OTS keypair of the plurality of OTS keypairs to determine a message signature, execute the hash function to calculate a leaf node value of a hash tree using the first OTS keypair, determine a plurality of authentication path nodes in the hash tree, retrieve, from the computer readable memory, values of a first subset of the plurality of authentication path nodes, calculate values for each node in a second subset of the plurality of authentication path nodes, and store, in the computer readable memory, the values for each node in the authentication path and the value of the leaf node.
    Type: Application
    Filed: September 1, 2022
    Publication date: March 7, 2024
    Inventors: Christine VAN VREDENDAAL, Melissa AZOUAOUI, Tobias SCHNEIDER
  • Patent number: 11924346
    Abstract: Various embodiments relate to a data processing system comprising instructions embodied in a non-transitory computer readable medium, the instructions for masked sampling of polynomials for lattice-based cryptography in a processor, the instructions, including: determining a number m of random bits to be sampled based upon a sample bound parameter ?; producing a plurality of Boolean masked shares of a polynomial coefficient each having the determined number m of random bits using a uniform random function; determining that the polynomial coefficient is within a range of values based upon the sample bound parameter ?; converting the plurality of Boolean masked shares of the polynomial coefficient to a plurality of arithmetic masked shares of the polynomial coefficient; and shifting the plurality of arithmetic masked shares based upon the sample bound parameter ?.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: March 5, 2024
    Assignee: NXP B.V.
    Inventors: Markus Schoenauer, Tobias Schneider, Joost Roland Renes, Melissa Azouaoui
  • Patent number: 9399282
    Abstract: A cylindrical handle extender removably-coupleable to a utensil system includes a cylindrical handle extender assembly comprising a cylindrical extender member having a first end; a second end; a radial slit along a length of the cylindrical member, the cylindrical member with an inner-volume defined by an interior surface, the cylindrical member able to be removably-coupled repeatedly to and from the handle of a utensil; a first end cap; and a second end cap. The cylindrical handle extender is removably-coupleable to a utensil system comprises the cylindrical handle extender removably-coupleable to a utensil assembly. The cylindrical extender member provides a large surface area and gripping surface laterally-positionable to a mouth of the user, comfortably positioning for the user who is handicapped.
    Type: Grant
    Filed: April 8, 2014
    Date of Patent: July 26, 2016
    Inventor: Melissa Schneider
  • Patent number: 7584287
    Abstract: A method of detecting fraudulent Internet traffic sent from a first web site to a second web site including providing a first web site database having a list of first web sites likely to send bad traffic, providing a link to the second web site on the first web site, after an Internet user having a web browser clicks on the link, transferring the Internet user to an intermediate web site that gathers information from the Internet user web browser; and determining if a validation request is required.
    Type: Grant
    Filed: March 16, 2004
    Date of Patent: September 1, 2009
    Assignee: EMERgency,24, Inc.
    Inventors: Melissa Schneider, Arsen Vladimirskiy
  • Patent number: 7181445
    Abstract: A software module referred to as a content manager is provided for loading and maintaining a variety of data and associated metadata in a computer database. The data may be loaded in the form of individual documents that support business preparation or sales presentations where only one copy of each document is stored in the database. The metadata may be loaded in the form of attributes of the documents. A table of users may also be loaded in the database including a geographic or business division for each user. A role is assigned to the user, thereby granting access privileges to certain views of the database. An online user interface software module is also provided for remote access to the documents. Searches may be conducted by a variety of attributes. Documents may be associated into visual presentations or multiple presentations merged into one presentation. Three types of presentations private, shared, and global are supported.
    Type: Grant
    Filed: September 5, 2003
    Date of Patent: February 20, 2007
    Assignee: BellSouth Intellectual Property Corporation
    Inventors: Michael Bebo, Merle Carr, Melissa Schneider, Linda Domi, Rebecca Sroufe
  • Publication number: 20050055337
    Abstract: A software module referred to as a content manager is provided for loading and maintaining a variety of data and associated metadata in a computer database. The data may be loaded in the form of individual documents that support business preparation or sales presentations where only one copy of each document is stored in the database. The metadata may be loaded in the form of attributes of the documents. A table of users may also be loaded in the database including a geographic or business division for each user. A role is assigned to the user, thereby granting access privileges to certain views of the database. An online user interface software module is also provided for remote access to the documents. Searches may be conducted by a variety of attributes. Documents may be associated into visual presentations or multiple presentations merged into one presentation. Three types of presentations private, shared, and global are supported.
    Type: Application
    Filed: September 5, 2003
    Publication date: March 10, 2005
    Inventors: Michael Bebo, Merle Carr, Melissa Schneider, Linda Domi, Rebecca Sroufe
  • Publication number: 20040153365
    Abstract: A method of detecting fraudulent Internet traffic sent from a first web site to a second web site including providing a first web site database having a list of first web sites likely to send bad traffic, providing a link to the second web site on the first web site, after an Internet user having a web browser clicks on the link, transferring the Internet user to an intermediate web site that gathers information from the Internet user web browser; and determining if a validation request is required.
    Type: Application
    Filed: March 16, 2004
    Publication date: August 5, 2004
    Applicant: EMERGENCY 24, INC.
    Inventors: Melissa Schneider, Arsen Vladimirskiy