Patents by Inventor Robert E. Tarjan

Robert E. Tarjan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150006211
    Abstract: Methods, systems, and computer-readable and executable instructions are provided for resource planning. Resource planning can include identifying a resource capacity for a given resource planning horizon, identifying a resource pool guideline that defines a priority of resources from which to satisfy a full-time equivalent (FTE) resource planning requirement, and performing resource planning by satisfying the FTE requirement based on the resource capacity and the resource pool guideline.
    Type: Application
    Filed: April 26, 2012
    Publication date: January 1, 2015
    Inventors: Cipriano A. Santos, Maria Teresa Gonzalez Diaz, Juan Antonio Orozco Guzman, Marcos Cesar Vargas-Magana, Ivan Lopez- Sanchez, Carlos Enrique Valencia Olefa, Lyle H. Ramshaw, Robert E. Tarjan, Shailendra K. Jain
  • Patent number: 8892893
    Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
    Type: Grant
    Filed: January 10, 2013
    Date of Patent: November 18, 2014
    Assignee: Intertrust Technologies Corporation
    Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
  • Publication number: 20140297985
    Abstract: A shiftable memory supporting in-memory data structures employs built-in data shifting capability. The shiftable memory includes a memory having built-in shifting capability to shift a contiguous subset of data from a first location to a second location within the memory. The shiftable memory further includes a data structure defined on the memory to contain data comprising the contiguous subset. The built-in shifting capability of the memory to facilitate one or more of movement of the data, insertion of the data and deletion of the data within the data structure.
    Type: Application
    Filed: October 27, 2011
    Publication date: October 2, 2014
    Inventors: Goetz Graefe, Terence P. Kelly, Harumi Kuno, Robert E. Tarjan
  • Patent number: 8713326
    Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: April 29, 2014
    Assignee: Intertrust Technologies Corporation
    Inventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
  • Patent number: 8639562
    Abstract: A method for cost entity matching can include constructing a first graph including a number of first entities and a number of second entities, and assigning a number of first cost values to each of a number of first edges connecting one of the number of first entities to one of the number of second entities in the first graph; adding a second graph to the first graph, wherein the second graph includes the number of first entities and the number of second entities, and assigning a second cost value to each of a number of second edges connecting one of the number of first entities in the first graph to the corresponding first entity in the second graph; and, matching each one of the number of second entities to one of the number of first entities based on the number of first cost values and the second cost values.
    Type: Grant
    Filed: April 26, 2012
    Date of Patent: January 28, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Marcos Cesar Vargas-Magana, Cipriano A. Santos, Carlos Valencia, Lyle H. Ramshaw, Robert E. Tarjan, Ivan Lopez-Sanchez, Maria Teresa Gonzalez Diaz
  • Publication number: 20130290049
    Abstract: A method for cost entity matching can include constructing a first graph including a number of first entities and a number of second entities, and assigning a number of first cost values to each of a number of first edges connecting one of the number of first entities to one of the number of second entities in the first graph; adding a second graph to the first graph, wherein the second graph includes the number of first entities and the number of second entities, and assigning a second cost value to each of a number of second edges connecting one of the number of first entities in the first graph to the corresponding first entity in the second graph; and, matching each one of the number of second entities to one of the number of first entities based on the number of first cost values and the second cost values.
    Type: Application
    Filed: April 26, 2012
    Publication date: October 31, 2013
    Inventors: Marcos Cesar Vargas-Magana, Cipriano A. Santos, Carlos Valencia, Lyle H. Ramshaw, Robert E. Tarjan, Ivan Lopez-Sanchez, Maria Teresa Gonzalez Diaz
  • Publication number: 20130232343
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: February 25, 2013
    Publication date: September 5, 2013
    Applicant: INTERTRUST TECHNOLOGIES CORPORATION
    Inventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
  • Patent number: 8387022
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Grant
    Filed: August 11, 2010
    Date of Patent: February 26, 2013
    Assignee: Intertrust Technologies Corp.
    Inventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Home, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
  • Patent number: 8370634
    Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
    Type: Grant
    Filed: May 20, 2010
    Date of Patent: February 5, 2013
    Assignee: Intertrust Technologies Corp.
    Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Homing, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan Owicki
  • Patent number: 8352747
    Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
    Type: Grant
    Filed: August 12, 2011
    Date of Patent: January 8, 2013
    Assignee: Intertrust Technologies Corporation
    Inventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
  • Patent number: 8335924
    Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
    Type: Grant
    Filed: June 29, 2010
    Date of Patent: December 18, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: William G. Home, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
  • Publication number: 20120204246
    Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.
    Type: Application
    Filed: April 19, 2012
    Publication date: August 9, 2012
    Inventors: Binyamin PINKAS, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
  • Patent number: 8220036
    Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.
    Type: Grant
    Filed: December 12, 2006
    Date of Patent: July 10, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
  • Patent number: 8209742
    Abstract: A method includes providing a bipartite graph having vertices of a first type, vertices of a second type, and a plurality of edges, wherein each edge joins a vertex of the first type with a vertex of the second type. A unipartite edge dual graph is generated from the bipartite graph, and a minimum clique partition of the edge dual graph is recursively determined. A biclique is then created in the bipartite graph corresponding to each clique in the minimum clique partition of the edge dual graph.
    Type: Grant
    Filed: January 7, 2009
    Date of Patent: June 26, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Robert S. Schreiber, Alina Ene, Nikola Milosavljevic, Robert E. Tarjan, Mehul A. Shah
  • Patent number: 8140850
    Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
    Type: Grant
    Filed: December 8, 2008
    Date of Patent: March 20, 2012
    Assignee: Intertrust Technologies Corporation
    Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
  • Publication number: 20110302424
    Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
    Type: Application
    Filed: August 12, 2011
    Publication date: December 8, 2011
    Inventors: William G Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
  • Patent number: 8001388
    Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
    Type: Grant
    Filed: July 16, 2009
    Date of Patent: August 16, 2011
    Assignee: Intertrust Technologies Corporation
    Inventors: William G. Home, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
  • Publication number: 20110035733
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: August 11, 2010
    Publication date: February 10, 2011
    Applicant: Intertrust Technologies Corp.
    Inventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
  • Patent number: 7886055
    Abstract: To perform resource allocation in a system having plural tiers, one of plural resource allocation algorithms is selected in response to determining, based on one or more conditions, which of the plural resource allocation algorithms to select. The selected resource allocation algorithm is used to allocate resources for the plural tiers of the system.
    Type: Grant
    Filed: April 28, 2005
    Date of Patent: February 8, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Yunhong Zhou, Anshul Kothari, Kamalika Chaudhuri, Ram Swaminathan, Robert E. Tarjan
  • Patent number: 7823135
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Grant
    Filed: April 7, 2005
    Date of Patent: October 26, 2010
    Assignee: Intertrust Technologies Corporation
    Inventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan Owicki