Patents by Inventor W. Sibert
W. Sibert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20060277122Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.Type: ApplicationFiled: May 16, 2006Publication date: December 7, 2006Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
-
Publication number: 20060248353Abstract: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment.Type: ApplicationFiled: June 14, 2006Publication date: November 2, 2006Inventors: Victor Shear, W. Sibert, David Van Wie
-
Publication number: 20060212370Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.Type: ApplicationFiled: May 4, 2006Publication date: September 21, 2006Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
-
Publication number: 20060206397Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.Type: ApplicationFiled: May 16, 2006Publication date: September 14, 2006Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
-
Publication number: 20060200392Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.Type: ApplicationFiled: May 4, 2006Publication date: September 7, 2006Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
-
Publication number: 20060123249Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.Type: ApplicationFiled: January 23, 2006Publication date: June 8, 2006Applicant: Intertrust Technologies CorporationInventors: Umesh Maheshwari, Radek Vingralek, W. Sibert
-
Publication number: 20060123250Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.Type: ApplicationFiled: January 25, 2006Publication date: June 8, 2006Applicant: Intertrust Technologies CorporationInventors: Umesh Maheshwari, Radek Vingralek, W. Sibert
-
Publication number: 20060036732Abstract: The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction processing application is deployed on a local computer system to manage transactions thereon. The local computer system contacts a remote computer system to obtain authorization to execute a transaction. The local computer system initiates a failure-recovery job that is operable to automatically resend status signals and other information to the remote system if the communication with the remote system exhibits certain predefined fault conditions. The remote system is able to dynamically adjust the definition of the predefined fault conditions. If the transaction concludes without triggering the predefined fault conditions, the failure-recovery job is cancelled.Type: ApplicationFiled: September 15, 2004Publication date: February 16, 2006Applicant: InterTrust Technologies CorporationInventors: Marc Strohwig, John McGinty, W. Sibert
-
Publication number: 20050210275Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: May 11, 2005Publication date: September 22, 2005Applicant: InterTrust Technologies CorporationInventors: James Homing, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Home, Andrew Wright, Lesley Matheson, Susan Owicki
-
Publication number: 20050204348Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: May 13, 2005Publication date: September 15, 2005Applicant: Inter Trust Technologies CorporationInventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
-
Publication number: 20050183072Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: April 7, 2005Publication date: August 18, 2005Applicant: InterTrust Technologies CorporationInventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
-
Publication number: 20050108555Abstract: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.Type: ApplicationFiled: December 2, 2004Publication date: May 19, 2005Inventor: W. Sibert
-
Publication number: 20050060560Abstract: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.Type: ApplicationFiled: September 24, 2004Publication date: March 17, 2005Inventor: W. Sibert
-
Patent number: 6441164Abstract: Wurster's crown ligands comprise a macrocyclic ligand such as a crown ether in which a hetero atom is substituted with a 1,4-phenylenediamine group. The phenylenediamine group is covalently bound to the macrocyclic ligand by one or both of the amine nitrogens, the amine nitrogen thereby substituting for the hetero atom of the macrocyclic ligand. The resulting compounds are redox active. Methods of making and using the compounds are also disclosed.Type: GrantFiled: July 12, 2001Date of Patent: August 27, 2002Assignee: East Carolina UniversityInventor: John W. Sibert
-
Publication number: 20010047095Abstract: Wurster's crown ligands comprise a macrocyclic ligand such as a crown ether in which a hetero atom is substituted with a 1,4-phenylenediamine group. The phenylenediamine group is covalently bound to the macrocyclic ligand by one or both of the amine nitrogens, the amine nitrogen thereby substituting for the hetero atom of the macrocyclic ligand. The resulting compounds are redox active. Methods of making and using the compounds are also disclosed.Type: ApplicationFiled: July 12, 2001Publication date: November 29, 2001Inventor: John W. Sibert
-
Patent number: 6262258Abstract: Wurster's crown ligands comprise a macrocyclic ligand such as a crown ether in which a hetero atom is substituted with a 1,4-phenylenediamine group. The phenylenediamine group is covalently bound to the macrocyclic ligand by one or both of the amine nitrogens, the amine nitrogen thereby substituting for the hetero atom of the macrocyclic ligand. The resulting compounds are redox active. Methods of making and using the compounds are also disclosed.Type: GrantFiled: September 7, 1999Date of Patent: July 17, 2001Assignee: East Carolina UniversityInventor: John W. Sibert
-
Patent number: 5296007Abstract: A process for reducing the sulfur content of coal containing pyritic and organic sulfur comprising: contacting the coal with less than the molar stoichiometric amount of at least one +5 vanadium component and at least one reducible manganese component at selected conditions effective to oxidize at least a portion of the sulfur in the coal; reducing the sulfur content of the oxidized sulfur-containing coal; and recovering a coal product having a reduced sulfur content.In another embodiment, the process involves the use of certain plant derived ortho-quinone containing components, in particular, certain lignin and/or tannin derived components containing ortho-quinone functionality, to oxidize at least a portion of at least one of the pyritic and organic sulfur materials in the coal.Preferred compositions comprise at least one ligno sulfonate component containing ortho-quinone functionality.Type: GrantFiled: November 24, 1992Date of Patent: March 22, 1994Assignee: ENSCI Inc.Inventors: Thomas J. Clough, John W. Sibert
-
Patent number: 4946578Abstract: A process for chemically modifying at least one component of a hydrocarbon-based material comprising: contacting the hydrocarbon-based material with at least one metal component selected from the group consisting of vanadium components in which vanadium is present in the 5+ oxidation state in an amount effective to promote the chemical modification of at least one component of the hydrocarbon-based material, iron components in which iron is present in the 3+ oxidation state in an amount effective to promote the chemical modification of at least one component of the hydrocarbon-based material, managanese components in which manganese is present in the 3+ oxidation state in an amount effective to promote the chemical modification of at least one component of the hydrocarbon-based material and mixtures thereof, and at least one oxygen transfer agent in an amount effective to do at least one of the following: maintain at least partially the promoting activity of the metal component; produce at least a portion ofType: GrantFiled: May 25, 1989Date of Patent: August 7, 1990Assignee: Ensci, Inc.Inventors: Thomas J. Clough, John W. Sibert
-
Patent number: 4801329Abstract: A process for recovering a first metal, e.g., gold, from a carbonaceous ore comprising contacting the ore with an added metal component other than an alkali metal or alkaline earth metal component in an amount effective to at least promote the oxidation of carbonaceous material in the ore, the contacting occurring at conditions effective to (1) chemically oxidize at least a portion of the carbonaceous material, and (2) at least partially liberate the first metal from the ore; and recovering the first metal from the ore.Type: GrantFiled: March 12, 1987Date of Patent: January 31, 1989Assignee: Ensci IncorporatedInventors: Thomas J. Clough, John W. Sibert, Arthur C. Riese
-
Patent number: 4765827Abstract: A process for at least one of (1) recovering at least one first metal other than manganese from a first ore containing reducible manganese, and (2) recovering at least one second metal from a second ore containing the second metal and at least one metal sulfide of a metal other than the second metal and manganese; the process comprising at least one of: (A) contacting the first ore with an aqueous composition and a material containing at least one metal sulfide in the presence of a metal redox couple more positive than about +0.1 versus the standard hydrogen electrode, W. M.Type: GrantFiled: January 20, 1987Date of Patent: August 23, 1988Assignee: Ensci, Inc.Inventors: Thomas J. Clough, John W. Sibert, Arthur C. Riese