Patents Assigned to InterTrust Technologies Corp.
  • Patent number: 8307212
    Abstract: Electronic steganographic techniques can be used to encode a rights management control signal onto an information signal carried over an insecure communications channel. Steganographic techniques ensure that the digital control information is substantially invisibly and substantially indelibly carried by the information signal. These techniques can provide end-to-end rights management protection of an information signal irrespective of transformations between analog and digital. An electronic appliance can recover the control information and use it for electronic rights management to provide compatibility with a Virtual Distribution Environment. In one example, the system encodes low data rate pointers within high bandwidth time periods of the content signal to improve overall control information read/seek times.
    Type: Grant
    Filed: July 10, 2003
    Date of Patent: November 6, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: David M. Van Wie, Robert P. Weber
  • Publication number: 20120266000
    Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
    Type: Application
    Filed: June 22, 2012
    Publication date: October 18, 2012
    Applicant: Intertrust Technologies Corp.
    Inventors: Umesh Maheshwari, Radek Vingralek, W. Olin Sibert
  • Patent number: 8291238
    Abstract: The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions.
    Type: Grant
    Filed: July 12, 2007
    Date of Patent: October 16, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Karl L. Ginter, Victor H. Shear, W. Olin Sibert, Francis J. Spahn, David M. Van Wie
  • Publication number: 20120197890
    Abstract: A computer-implemented system and method for extracting Human Generated Lists from an electronic database is described. The system searches for objects of the same class within a context window to identify Human Generated Lists and stores them to an archive, The archive may be used to generate a relationship network. The system generates variable length data vectors to represent the relationships between the objects within each Human Generated List. This relationship network can then be queried to discover relationships between the objects in the Human Generated Lists and to provide related objects as recommendations.
    Type: Application
    Filed: December 21, 2011
    Publication date: August 2, 2012
    Applicant: Intertrust Technologies Corp.
    Inventors: Kasian Franks, Mike Muldoon, Raf Podowski
  • Patent number: 8234387
    Abstract: Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL.
    Type: Grant
    Filed: June 7, 2004
    Date of Patent: July 31, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: William Bradley, David Maher, Gilles Boccon-Gibod
  • Patent number: 8220036
    Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.
    Type: Grant
    Filed: December 12, 2006
    Date of Patent: July 10, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
  • Patent number: 8209544
    Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.
    Type: Grant
    Filed: May 21, 2010
    Date of Patent: June 26, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Umesh Maheshwari, Radek Vingralek, W. Olin Sibert
  • Patent number: 8185478
    Abstract: Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: May 22, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Binyamin Pinkas, Tomas Sander, William G. Home
  • Patent number: 8181021
    Abstract: The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection. Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions.
    Type: Grant
    Filed: August 20, 2007
    Date of Patent: May 15, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Karl L. Ginter, Victor H. Shear, W. Olin Sibert, Francis J. Spahn, David M. Van Wie
  • Patent number: 8104075
    Abstract: Systems and methods are presented for facilitating the configuration of a trust management framework for use in conjunction with web services, digital rights management systems, and/or other applications. A method for configuring a trust management framework involves providing graphical user interfaces (GUIs) to a user that prompt the user to define certain aspects of the trust management framework in a self-consistent manner. In one embodiment, a method comprises providing a roles GUI that prompts a user to define roles, a services GUI that prompts the user to define services corresponding to the roles, a principals GUI that prompts the user to define principals, including associating at least one of the roles with a principal, and a nodes GUI that presents role bindings for principals that are designated to function as nodes and that prompts the user to define interactions between nodes.
    Type: Grant
    Filed: August 9, 2007
    Date of Patent: January 24, 2012
    Assignee: Intertrust Technologies Corp.
    Inventor: Vadim O. Spector
  • Patent number: 8099601
    Abstract: Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in a data signal. The data signal is divided into a sequence of blocks, and a digital signature for each block is embedded in the signal via a watermark. The data signal is then stored and distributed on, e.g., a compact disc, a DVD, or the like. When a user attempts to access or use a portion of the data signal, the signal is checked for the presence of a watermark containing the digital signature for the desired portion of the signal. If the watermark is found, the digital signature is extracted and used to verify the authenticity of the desired portion of the signal. If the signature-containing watermark is not found, the signal is checked for the presence of the strong watermark.
    Type: Grant
    Filed: May 26, 2010
    Date of Patent: January 17, 2012
    Assignee: Intertrust Technologies Corp.
    Inventors: Xavier Serret-Avila, Gilles Boccon-Gibod
  • Publication number: 20110238982
    Abstract: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied.
    Type: Application
    Filed: March 29, 2011
    Publication date: September 29, 2011
    Applicant: Intertrust Technologies Corp.
    Inventors: Stephen P. Weeks, Xavier Serret-Avila
  • Patent number: 7987514
    Abstract: Systems and methods are disclosed for using an arbitrary fixed channel to carry third-party information. In one embodiment, the present invention provides systems and methods for enabling existing content rendering devices to accept content encoded in a proprietary format, such as an encoding format used by a digital rights management system. The encoded content is rendered by the device in the normal manner, and decoded by a retrofitting appliance connected to the device's output. The retrofitting appliance may apply decoded rules and controls to the decoded content, thereby managing use of the content.
    Type: Grant
    Filed: March 12, 2007
    Date of Patent: July 26, 2011
    Assignee: Intertrust Technologies Corp.
    Inventor: Talal G. Shamoon
  • Patent number: 7971055
    Abstract: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied.
    Type: Grant
    Filed: June 26, 2008
    Date of Patent: June 28, 2011
    Assignee: Intertrust Technologies Corp.
    Inventors: Stephen P. Weeks, Xavier Serret-Avila
  • Patent number: 7933829
    Abstract: Some of the embodiments provided herein disclose receiving a plurality of bids, each bid being submitted by a bidder, and each bid having a bid value; assigning a weighting factor to each bid, the weighting factor being based, at least in part, on the bid value; selecting a first bid from the plurality of bids, the first bid having been submitted by a first bidder; selecting a second bid from the plurality of bids, the second bid being selected in a manner that is dependent, at least in part, on the weighting factor assigned to the second bid; performing a comparison of the value of the first bid with the value of the second bid; using the results of the comparison to determine whether to vend a copy of the digital file to the first bidder; and sending a copy of the digital file to the first bidder.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: April 26, 2011
    Assignee: Intertrust Technologies Corp.
    Inventors: Andrew V. Goldberg, Jason D. Hartline, Andrew K. Wright
  • Patent number: 7925898
    Abstract: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment.
    Type: Grant
    Filed: June 14, 2006
    Date of Patent: April 12, 2011
    Assignee: Intertrust Technologies Corp.
    Inventors: Victor H. Shear, W. Olin Sibert, David M. Van Wie
  • Patent number: 7904707
    Abstract: Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment.
    Type: Grant
    Filed: August 20, 2007
    Date of Patent: March 8, 2011
    Assignee: Intertrust Technologies Corp.
    Inventors: Victor H. Shear, W. Olin Sibert, David M. Van Wie
  • Publication number: 20110035733
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: August 11, 2010
    Publication date: February 10, 2011
    Applicant: Intertrust Technologies Corp.
    Inventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
  • Publication number: 20110029780
    Abstract: Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly.
    Type: Application
    Filed: September 30, 2010
    Publication date: February 3, 2011
    Applicant: Intertrust Technologies Corp.
    Inventors: Binyamin Pinkas, Tomas Sander, William G. Home
  • Patent number: 7882351
    Abstract: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain.
    Type: Grant
    Filed: February 27, 2008
    Date of Patent: February 1, 2011
    Assignee: Intertrust Technologies Corp.
    Inventor: Xavier Serret-Avila