Patents by Inventor W. Sibert

W. Sibert has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060277122
    Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.
    Type: Application
    Filed: May 16, 2006
    Publication date: December 7, 2006
    Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
  • Publication number: 20060248353
    Abstract: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment.
    Type: Application
    Filed: June 14, 2006
    Publication date: November 2, 2006
    Inventors: Victor Shear, W. Sibert, David Van Wie
  • Publication number: 20060212370
    Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.
    Type: Application
    Filed: May 4, 2006
    Publication date: September 21, 2006
    Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
  • Publication number: 20060206397
    Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.
    Type: Application
    Filed: May 16, 2006
    Publication date: September 14, 2006
    Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
  • Publication number: 20060200392
    Abstract: A rights management arrangement for storage media such as optical digital video disks (DVDs, also called digital versatile disks) provides adequate copy protection in a limited, inexpensive mass-produceable, low-capability platform such as a dedicated home consumer disk player and also provides enhanced, more flexible security techniques and methods when the same media are used with platforms having higher security capabilities. A control object (or set) defines plural rights management rules for instance, price for performance or rules governing redistribution. Low capability platforms may enable only a subset of the control rules such as controls on copying or marking of played material. Higher capability platforms may enable all (or different subsets) of the rules. Cryptographically strong security is provided by encrypting at least some of the information carried by the media and enabling decryption based on the control set and/or other limitations.
    Type: Application
    Filed: May 4, 2006
    Publication date: September 7, 2006
    Inventors: Victor Shear, W. Sibert, David VanWie, Robert Weber
  • Publication number: 20060123249
    Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
    Type: Application
    Filed: January 23, 2006
    Publication date: June 8, 2006
    Applicant: Intertrust Technologies Corporation
    Inventors: Umesh Maheshwari, Radek Vingralek, W. Sibert
  • Publication number: 20060123250
    Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
    Type: Application
    Filed: January 25, 2006
    Publication date: June 8, 2006
    Applicant: Intertrust Technologies Corporation
    Inventors: Umesh Maheshwari, Radek Vingralek, W. Sibert
  • Publication number: 20060036732
    Abstract: The present invention provides systems and methods for conducting electronic transactions in a distributed computing environment. A communications protocol is provided that enables reliable transactional state synchronization for peers participating in a distributed transaction. A transaction processing application is deployed on a local computer system to manage transactions thereon. The local computer system contacts a remote computer system to obtain authorization to execute a transaction. The local computer system initiates a failure-recovery job that is operable to automatically resend status signals and other information to the remote system if the communication with the remote system exhibits certain predefined fault conditions. The remote system is able to dynamically adjust the definition of the predefined fault conditions. If the transaction concludes without triggering the predefined fault conditions, the failure-recovery job is cancelled.
    Type: Application
    Filed: September 15, 2004
    Publication date: February 16, 2006
    Applicant: InterTrust Technologies Corporation
    Inventors: Marc Strohwig, John McGinty, W. Sibert
  • Publication number: 20050210275
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: May 11, 2005
    Publication date: September 22, 2005
    Applicant: InterTrust Technologies Corporation
    Inventors: James Homing, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Home, Andrew Wright, Lesley Matheson, Susan Owicki
  • Publication number: 20050204348
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: May 13, 2005
    Publication date: September 15, 2005
    Applicant: Inter Trust Technologies Corporation
    Inventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
  • Publication number: 20050183072
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: April 7, 2005
    Publication date: August 18, 2005
    Applicant: InterTrust Technologies Corporation
    Inventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
  • Publication number: 20050108555
    Abstract: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.
    Type: Application
    Filed: December 2, 2004
    Publication date: May 19, 2005
    Inventor: W. Sibert
  • Publication number: 20050060560
    Abstract: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.
    Type: Application
    Filed: September 24, 2004
    Publication date: March 17, 2005
    Inventor: W. Sibert
  • Patent number: 6441164
    Abstract: Wurster's crown ligands comprise a macrocyclic ligand such as a crown ether in which a hetero atom is substituted with a 1,4-phenylenediamine group. The phenylenediamine group is covalently bound to the macrocyclic ligand by one or both of the amine nitrogens, the amine nitrogen thereby substituting for the hetero atom of the macrocyclic ligand. The resulting compounds are redox active. Methods of making and using the compounds are also disclosed.
    Type: Grant
    Filed: July 12, 2001
    Date of Patent: August 27, 2002
    Assignee: East Carolina University
    Inventor: John W. Sibert
  • Publication number: 20010047095
    Abstract: Wurster's crown ligands comprise a macrocyclic ligand such as a crown ether in which a hetero atom is substituted with a 1,4-phenylenediamine group. The phenylenediamine group is covalently bound to the macrocyclic ligand by one or both of the amine nitrogens, the amine nitrogen thereby substituting for the hetero atom of the macrocyclic ligand. The resulting compounds are redox active. Methods of making and using the compounds are also disclosed.
    Type: Application
    Filed: July 12, 2001
    Publication date: November 29, 2001
    Inventor: John W. Sibert
  • Patent number: 6262258
    Abstract: Wurster's crown ligands comprise a macrocyclic ligand such as a crown ether in which a hetero atom is substituted with a 1,4-phenylenediamine group. The phenylenediamine group is covalently bound to the macrocyclic ligand by one or both of the amine nitrogens, the amine nitrogen thereby substituting for the hetero atom of the macrocyclic ligand. The resulting compounds are redox active. Methods of making and using the compounds are also disclosed.
    Type: Grant
    Filed: September 7, 1999
    Date of Patent: July 17, 2001
    Assignee: East Carolina University
    Inventor: John W. Sibert
  • Patent number: 5296007
    Abstract: A process for reducing the sulfur content of coal containing pyritic and organic sulfur comprising: contacting the coal with less than the molar stoichiometric amount of at least one +5 vanadium component and at least one reducible manganese component at selected conditions effective to oxidize at least a portion of the sulfur in the coal; reducing the sulfur content of the oxidized sulfur-containing coal; and recovering a coal product having a reduced sulfur content.In another embodiment, the process involves the use of certain plant derived ortho-quinone containing components, in particular, certain lignin and/or tannin derived components containing ortho-quinone functionality, to oxidize at least a portion of at least one of the pyritic and organic sulfur materials in the coal.Preferred compositions comprise at least one ligno sulfonate component containing ortho-quinone functionality.
    Type: Grant
    Filed: November 24, 1992
    Date of Patent: March 22, 1994
    Assignee: ENSCI Inc.
    Inventors: Thomas J. Clough, John W. Sibert
  • Patent number: 4946578
    Abstract: A process for chemically modifying at least one component of a hydrocarbon-based material comprising: contacting the hydrocarbon-based material with at least one metal component selected from the group consisting of vanadium components in which vanadium is present in the 5+ oxidation state in an amount effective to promote the chemical modification of at least one component of the hydrocarbon-based material, iron components in which iron is present in the 3+ oxidation state in an amount effective to promote the chemical modification of at least one component of the hydrocarbon-based material, managanese components in which manganese is present in the 3+ oxidation state in an amount effective to promote the chemical modification of at least one component of the hydrocarbon-based material and mixtures thereof, and at least one oxygen transfer agent in an amount effective to do at least one of the following: maintain at least partially the promoting activity of the metal component; produce at least a portion of
    Type: Grant
    Filed: May 25, 1989
    Date of Patent: August 7, 1990
    Assignee: Ensci, Inc.
    Inventors: Thomas J. Clough, John W. Sibert
  • Patent number: 4801329
    Abstract: A process for recovering a first metal, e.g., gold, from a carbonaceous ore comprising contacting the ore with an added metal component other than an alkali metal or alkaline earth metal component in an amount effective to at least promote the oxidation of carbonaceous material in the ore, the contacting occurring at conditions effective to (1) chemically oxidize at least a portion of the carbonaceous material, and (2) at least partially liberate the first metal from the ore; and recovering the first metal from the ore.
    Type: Grant
    Filed: March 12, 1987
    Date of Patent: January 31, 1989
    Assignee: Ensci Incorporated
    Inventors: Thomas J. Clough, John W. Sibert, Arthur C. Riese
  • Patent number: 4765827
    Abstract: A process for at least one of (1) recovering at least one first metal other than manganese from a first ore containing reducible manganese, and (2) recovering at least one second metal from a second ore containing the second metal and at least one metal sulfide of a metal other than the second metal and manganese; the process comprising at least one of: (A) contacting the first ore with an aqueous composition and a material containing at least one metal sulfide in the presence of a metal redox couple more positive than about +0.1 versus the standard hydrogen electrode, W. M.
    Type: Grant
    Filed: January 20, 1987
    Date of Patent: August 23, 1988
    Assignee: Ensci, Inc.
    Inventors: Thomas J. Clough, John W. Sibert, Arthur C. Riese