Patents by Inventor Stuart A. Haber
Stuart A. Haber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20160277385Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: May 27, 2016Publication date: September 22, 2016Inventors: Binyamin PINKAS, Stuart A. HABER, Robert E. TARJAN, Tomas SANDER
-
Publication number: 20160229629Abstract: A vehicle for collecting and compacting waste for disposal including a compaction chamber, configured to receive and compact waste, having an opening for inserting waste to be compacted and a plurality of apertures in at least one internal surface of the compaction chamber. The compactor is configured to apply pressure to the waste in the compaction chamber to reduce the volume of the waste. When the compactor applies pressure to the waste, liquid and residual solid waste exits the compaction chamber through the plurality of apertures. There is a liquid collection system, configured to collect the liquid and the residual solid waste from the plurality of apertures and the liquid collection system includes an evaporation system configured to evaporate at least a portion of the liquid removed from the waste.Type: ApplicationFiled: September 29, 2015Publication date: August 11, 2016Inventors: Joseph Abner, Stephen Armstrong, Steven Chase, David Rich, Matthew Young, Aaron Salter, Stuart Haber, William Dalpe
-
Patent number: 9408025Abstract: A method for authenticating a user's location in a femtocell-based network is disclosed. A user is associated to a femtocell connected to a connection point in the wireless network. An indication of the user's location is provided to a remote user. A characteristic of a connection between the femtocell and the connection point is monitored. The monitored characteristic is provided to the remote user to verify user's location.Type: GrantFiled: October 11, 2011Date of Patent: August 2, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: John T. Brassil, Stuart Haber, Pratyusa Kumar Manadhata, Ravi Arun Netravali, Prasad V Rao
-
Patent number: 9399552Abstract: A vehicle for collecting and compacting waste for disposal including a compaction chamber, configured to receive and compact waste, having an opening for inserting waste to be compacted and a plurality of apertures in at least one internal surface of the compaction chamber. The compactor is configured to apply pressure to the waste in the compaction chamber to reduce the volume of the waste. When the compactor applies pressure to the waste, liquid and residual solid waste exits the compaction chamber through the plurality of apertures. There is a liquid collection system, configured to collect the liquid and the residual solid waste from the plurality of apertures and the liquid collection system includes an evaporation system configured to evaporate at least a portion of the liquid removed from the waste.Type: GrantFiled: September 29, 2015Date of Patent: July 26, 2016Assignee: MSW Power CorporationInventors: Joseph Abner, Stephen Armstrong, Steven Chase, David Rich, Matthew Young, Aaron Salter, Stuart Haber, William Dalpe
-
Patent number: 9356929Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: GrantFiled: April 19, 2012Date of Patent: May 31, 2016Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 9336194Abstract: A method for submatch extraction may include receiving an input string, receiving a regular expression, and converting the regular expression with capturing groups into a plurality of finite automata to extract submatches. The method further includes using a first automaton to determine whether the input string is in a language described by the regular expression, and to process the input string, and using states of the first automaton in a second automaton to extract the submatches.Type: GrantFiled: March 13, 2012Date of Patent: May 10, 2016Assignee: Hewlett Packard Enterprises Development LPInventors: Pratyusa Kumar Manadhata, Stuart Haber, Miranda Jane Felicity Mowbray, Prasad V Rao, William G Horne
-
Patent number: 9032527Abstract: Systems, computer-readable media storing instructions, and methods can infer a state of behavior. Such a method can include constructing a graph including nodes representing hosts and domains based on an event dataset. The graph can be seeded with information external to the event dataset. A belief whether each of the nodes is in a particular state of behavior can be calculated based on marginal probability estimation.Type: GrantFiled: April 3, 2012Date of Patent: May 12, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Pratyusa Kumar Manadhata, Sandeep Yadav, Prasad V. Rao, Marc R. Eisenbarth, William G. Horne, Stuart Haber
-
Patent number: 8943332Abstract: A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit record in the set corresponds to at least one value of the first set. The method further comprises generating a second set of values based on an audit record and a corresponding value of the first set for each audit record in the set and generating a summary value based on the second set of values. The method further comprises certifying the summary value to generate an integrity certificate enabling verification of the integrity of the audit record set and storing the audit record set and at least one of the first set of values and the generated digital signature.Type: GrantFiled: October 31, 2006Date of Patent: January 27, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: William Horne, Stuart Haber, Tomas Sander
-
Publication number: 20140372105Abstract: A method for submatch extraction may include receiving an input string, receiving a regular expression, and converting the regular expression with capturing groups into a plurality of finite automata to extract submatches. The method further includes using a first automaton to determine whether the input string is in a language described by the regular expression, and to process the input string, and using states of the first automaton in a second automaton to extract the submatches.Type: ApplicationFiled: March 13, 2012Publication date: December 18, 2014Inventors: Pratyusa Kumar Manadhata, Stuart Haber, Miranda Jane Felicity Mowbray, Prasad V. Rao, William G. Horne
-
Publication number: 20140213293Abstract: A method for authenticating a user's location in a femtocell-based network is disclosed. A user is associated to a femtocell connected to a connection point in the wireless network. An indication of the user's location is provided to a remote user. A characteristic of a connection between the femtocell and the connection point is monitored. The monitored characteristic is provided to the remote user to verify user's location.Type: ApplicationFiled: October 11, 2011Publication date: July 31, 2014Inventors: John T. Brassil, Stuart Haber, Pratyusa Kumar Manadhata, Ravi Arun Netravali, Prasad V Rao
-
Publication number: 20130290356Abstract: A method for submatch extraction may include receiving an input string, receiving a regular expression. The method may further include converting the regular expression with capturing groups into ordered binary decision diagrams (OBDDs) to extract submatches.Type: ApplicationFiled: April 30, 2012Publication date: October 31, 2013Inventors: Liu YANG, Prasad V. Rao, Pratyusa Kumar Manadhata, William G. Horne, Stuart Haber
-
Publication number: 20130194636Abstract: In one implementation, a physical version of a document is converted to a digital representation of the physical version and a new certificate is computed for the digital representation of the physical version. The new certificate is computed based on the digital representation of the physical version, at least one processing step performed on the digital representation, and a prior certificate computed for a prior digital representation indicative of the physical version. In another implementation, a document is validated.Type: ApplicationFiled: January 30, 2012Publication date: August 1, 2013Inventors: Stuart HABER, Prasad V. RAO
-
Publication number: 20130179974Abstract: Systems, computer-readable media storing instructions, and methods can infer a state of behavior. Such a method can include constructing a graph including nodes representing hosts and domains based on an event dataset. The graph can be seeded with information external to the event dataset. A belief whether each of the nodes is in a particular state of behavior can be calculated based on marginal probability estimation.Type: ApplicationFiled: April 3, 2012Publication date: July 11, 2013Inventors: Pratyusa Kumar Manadhata, Sandeep Yadav, Prasad V. Rao, Marc R. Eisenbarth, William G. Horne, Stuart Haber
-
Patent number: 8266439Abstract: One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.Type: GrantFiled: September 12, 2007Date of Patent: September 11, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao
-
Publication number: 20120204246Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: April 19, 2012Publication date: August 9, 2012Inventors: Binyamin PINKAS, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 8220036Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: GrantFiled: December 12, 2006Date of Patent: July 10, 2012Assignee: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 7584223Abstract: A first version of a database is accessed. The first version includes the identities of items of information included in the database. A second version of the database is generated. The second version includes changed identities created by applying a function to the identities of the first version. In response to a query that seeks to determine whether a particular item is in the first version, the function is applied to the particular item to generate a changed identity for the particular item. Verification information is provided to demonstrate that the changed identity for the particular item was determined using the same function used to create the changed identities in the second version. A determination is made whether or not the particular item is in the second version and hence in the first version of the database, without requiring a release of the identities in the first version.Type: GrantFiled: June 28, 2006Date of Patent: September 1, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Binyamin Pinkas, Stuart Haber
-
Publication number: 20090070361Abstract: One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.Type: ApplicationFiled: September 12, 2007Publication date: March 12, 2009Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Stuart HABER, William G. HORNE, Tomas SANDER, Danfeng YAO
-
Publication number: 20080104407Abstract: A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit record in the set corresponds to at least one value of the first set. The method further comprises generating a second set of values based on an audit record and a corresponding value of the first set for each audit record in the set and generating a summary value based on the second set of values. The method further comprises certifying the summary value to generate an integrity certificate enabling verification of the integrity of the audit record set and storing the audit record set and at least one of the first set of values and the generated digital signature.Type: ApplicationFiled: October 31, 2006Publication date: May 1, 2008Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: William Horne, Stuart Haber, Tomas Sander
-
Publication number: 20080046986Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: December 12, 2006Publication date: February 21, 2008Applicant: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Stuart Haber, Robert Tarjan, Tomas Sander