Patents Assigned to InterTrust Technologies
-
Publication number: 20190149536Abstract: Systems and methods are provided for authentication by combining a Reverse Turing Test (RTT) with password-based user authentication protocols to provide improved resistance to brute force attacks. In accordance with one embodiment of the invention, a method is provided for user authentication, the method including receiving a username/password pair associated with a user; requesting one or more responses to a first Reverse Turing Test (RTT); and granting access to the user if a valid response to the first RTT is received and the username/password pair is valid.Type: ApplicationFiled: October 12, 2018Publication date: May 16, 2019Applicant: Intertrust Technologies CorporationInventors: Binyamin PINKAS, Tomas SANDER
-
Patent number: 10271197Abstract: A system for publishing digital content is described which, in one embodiment, includes a beacon device associated with a first user configured to transmit identification information and information indicating its current position. A browsing device includes a display configured and adapted to display to a second user a representation of a local geographical area, and to selectively display to the second user content information associated with the first user, based at least in part on whether the location of the beacon device is within the local geographical area.Type: GrantFiled: July 31, 2017Date of Patent: April 23, 2019Assignee: Intertrust Technologies CorporationInventor: Jarl A. Nilsson
-
Publication number: 20190108556Abstract: A method for distributing an electronic content item for consumption with advertisements is provided. In one embodiment, a content provider creates a license identifying one or more slots within an electronic content item at which advertisements are to be inserted. The license specifies one or more types of advertisements that are not permitted to be inserted into the slots, and also specifies criteria for dynamically selecting advertisements to insert into the one or more slots. The content provider securely associates the electronic license with the electronic content item and distributes the electronic content item and the electronic license to a third party for consumption or subsequent transfer to an end user.Type: ApplicationFiled: November 30, 2018Publication date: April 11, 2019Applicant: Intertrust Technologies CorporationInventors: David P. Maher, Prasad Khambete, Prasad Sanagavarapu, Sanjeev Tenneti, Laurent Grandhomme
-
Patent number: 10255440Abstract: This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.Type: GrantFiled: May 26, 2016Date of Patent: April 9, 2019Assignee: Intertrust Technologies CorporationInventors: Gilles Boccon-Gibod, Gary F. Ellison
-
Patent number: 10255414Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: GrantFiled: June 5, 2015Date of Patent: April 9, 2019Assignee: Intertrust Technologies CorporationInventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
-
Publication number: 20190098345Abstract: This disclosure relates to systems and methods for dynamically mapping content based on information relating to a user. In various embodiments, a segment associated with a user may be identified, and a content service may map the presentation of advertisements and/or other content within rendered content in a manner that is tailored to the identified segment. In this manner, advertisement and/or other content impressions may be targeted to the user based on their identified segment. Further embodiments facilitate defining and refining content maps for a particular segment until a content mapping meeting certain objective criteria is realized.Type: ApplicationFiled: September 25, 2018Publication date: March 28, 2019Applicant: Intertrust Technologies CorporationInventor: Steven Rahman
-
Publication number: 20190098001Abstract: Systems and methods for secure user authentication are described. In certain embodiments, a client device such as a smartphone may be provisioned with a secure key and/or other secret information. The client device may be used to generate unique secure tokens and/or other credentials used in connection with an authentication process. A user may provide the generated tokens and/or other credentials to a service provider in connection with a request to access a managed service. The validity of the generated tokens and/or other credentials may be verified by an authentication service in communication with the service provider.Type: ApplicationFiled: June 12, 2018Publication date: March 28, 2019Applicant: Intertrust Technologies CorporationInventors: Peng YANG, Jiahua GONG, Chitai Kenny HUANG
-
Patent number: 10244340Abstract: Systems and method are disclosed for facilitating efficient calibration of filters for correcting room and/or speaker-based distortion and/or binaural imbalances in audio reproduction, and/or for producing three-dimensional sound in stereo system environments. According to some embodiments, using a portable device such as a smartphone or tablet, a user can calibrate speakers by initiating playback of a test signal, detecting playback of the test signal with the portable device's microphone, and repeating this process for a number of speakers and/or device positions (e.g., next to each of the user's ears). A comparison can be made between the test signal and the detected signal, and this can be used to more precisely calibrate rendering of future signals by the speakers.Type: GrantFiled: January 3, 2018Date of Patent: March 26, 2019Assignee: Intertrust Technologies CorporationInventors: David P. Maher, Gilles Boccon-Gibod, Steve Mitchell
-
Publication number: 20190065680Abstract: The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other sensitive information. Certain embodiments may use a virtualized execution environment to execute code and/or programs that wish to access and/or otherwise use genomic and/or other sensitive information. In some embodiments, data requests from the code and/or programs may be routed through a transparent data access proxy configured to transform requests and/or associated responses to protect the integrity of the genomic and/or other sensitive information.Type: ApplicationFiled: August 23, 2018Publication date: February 28, 2019Applicant: Intertrust Technologies CorporationInventors: W. Knox CAREY, Jarl A. NILSSON, Bart GRANTHAM
-
Publication number: 20190065702Abstract: Systems and methods are described that protect intellectual property rights in connection with 3-dimensional printing processes. In certain embodiments, an object a user would like to render with a 3-dimensional printing device may be compared with one or more managed objects having certain associated intellectual property rights. If the object is found to be similar to a managed object (e.g., similar in shape, function, composition, etc.), policy associated with the managed object may be enforced in connection with rendering the object. In this manner, intellectual property rights associated with the managed objects may be enforced.Type: ApplicationFiled: August 3, 2018Publication date: February 28, 2019Applicant: Intertrust Technologies CorporationInventor: Jarl A. NILSSON
-
Publication number: 20190065705Abstract: Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager packages content into fragments and generates a manifest including policies and metadata associated with the content. A downloader obtains the manifest, and uses it to obtain the content from one or more uploaders. For example, a downloader might forward a search request to one or more trackers, which, in turn, are operable to locate one or more uploaders that can meet the request, subject to any relevant policy limitations. The uploaders forward fragments to the downloader, subject to any relevant policy. The downloader assembles the content from the fragments. The operations and interactions of the entities can be subject to policy limitations associated with the fragments, the content as a whole, or the like.Type: ApplicationFiled: June 12, 2018Publication date: February 28, 2019Applicant: Intertrust Technologies CorporationInventor: William Benjamin BRADLEY
-
Patent number: 10216551Abstract: This disclosure relates to systems and methods for determining information associated with a user. In certain embodiments, various attributes, interest, and/or other demographic information related to a user may be determined based on information may be obtained from personal electronic devices associated with the user. User attribute models used to predict user attributes and/or demographics may be generated and trained based on inferred user interests and available label data. In some embodiments, information reflecting which applications and/or types of applications are installed and/or frequently used by a user on their personal electronic devices may be used in connection with determining interests associated with the user. Further embodiments of the systems and methods disclosed herein relate to determining various information associated with a user based on location information indicative of a user's location obtained from one or more personal electronic devices associated with the user.Type: GrantFiled: February 28, 2017Date of Patent: February 26, 2019Assignee: Intertrust Technologies CorporationInventors: Sanjiv Kumar Jha, Vipul Agrawal, Prisdha Dharma, Rehan Asif, Nilanjan Sengupta
-
Publication number: 20190057196Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: ApplicationFiled: March 9, 2018Publication date: February 21, 2019Applicant: Intertrust Technologies CorporationInventors: David P. Maher, James M. RUDD, Eric J. SWENSON, Richard A. LANDSMAN
-
Patent number: 10205710Abstract: Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment associated with a software application. Embodiments of the disclosed systems and methods may, among other things, facilitate cryptographic operations within an execution environment associated with browser software of a client system while maintaining security of cryptographic keys imported into the environment. As the security of keys is maintained in an execution environment implementing embodiments of the disclosed systems and methods, users and/or systems may be more willing to consign their keys for use in connection with cryptographic operations performed in such environments.Type: GrantFiled: January 8, 2016Date of Patent: February 12, 2019Assignee: Intertrust Technologies CorporationInventor: Stephen G. Mitchell
-
Publication number: 20190042794Abstract: Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. In one embodiment, systems and methods are provided for enabling secure quasi-random access to a content file by constructing a hierarchy of hash values from the file, the hierarchy deriving its security in a manner similar to that used by the above-described chain.Type: ApplicationFiled: June 15, 2018Publication date: February 7, 2019Applicant: Intertrust Technologies CorporationInventor: Xavier SERRET-AVILA
-
Publication number: 20190042694Abstract: This disclosure relates to systems and methods for communicating, storing, and/or analyzing data that may include genomic data. In various embodiments, unaligned genomic sequence read data and/or portions thereof may be stored and/or communicated as a list of variants relative to a particular reference associated with a reference motif identified in the genomic sequence read data. In further embodiments, quality score information associated with a genomic dataset may be analyzed and and/or communicated as quality score parameter information. Additional embodiments may facilitate relatively efficient analysis of unaligned genomic sequence read data using metadata associated with reference motifs identified in the unaligned genomic sequence read data.Type: ApplicationFiled: August 7, 2018Publication date: February 7, 2019Applicant: Intertrust Technologies CorporationInventors: Jarl A. Nilsson, William Knox Carey
-
Patent number: 10200822Abstract: Systems and methods for recognizing and/or predicting activities of a user of a mobile device are disclosed. In certain embodiments, the systems and methods may predict a future activity and/or location of a mobile device user based on current and/or historical device data and/or other personal information relating to the user. In some embodiments, probabilistic determinations and/or other statistical models may be used to predict future activities and locations of a mobile device user. The disclosed systems and methods may further utilize location and/or activity recognition and/or prediction methods to deliver personalized services to a user of a mobile device at a particular time and/or location.Type: GrantFiled: May 10, 2018Date of Patent: February 5, 2019Assignee: Intertrust Technologies CorporationInventors: Jiawen Su, Yiming Ma
-
Patent number: 10191972Abstract: A method for distributing an electronic content item for consumption with advertisements is provided. In one embodiment, a content provider creates a license identifying one or more slots within an electronic content item at which advertisements are to be inserted. The license specifies one or more types of advertisements that are not permitted to be inserted into the slots, and also specifies criteria for dynamically selecting advertisements to insert into the one or more slots. The content provider securely associates the electronic license with the electronic content item and distributes the electronic content item and the electronic license to a third party for consumption or subsequent transfer to an end user.Type: GrantFiled: May 21, 2010Date of Patent: January 29, 2019Assignee: Intertrust Technologies CorporationInventors: David P. Maher, Prasad Khambete, Prasad Sanagavarapu, Sanjeev Tenneti, Laurent Grandhomme
-
Publication number: 20180367663Abstract: This disclosure relates to, among other things, systems and methods for authenticating a device with a network carrier using secure hardware and software systems. Embodiments disclosed herein may provide for a hybrid SIM implementation that uses both trusted software and hardware. A hybrid SIM implementation consistent with aspects of the disclosed embodiments may leverage a relatively small amount of trusted hardware in conjunction with secure software to perform SIM-related operations. In various embodiments, such a hybrid solution may provide a SIM implementation that is more secure than solutions implemented by software alone, while still relating retaining some of the benefits of software solutions including improved update flexibility and/or carrier portability.Type: ApplicationFiled: June 15, 2018Publication date: December 20, 2018Applicant: Intertrust Technologies CorporationInventor: Yutaka NAGAO
-
Publication number: 20180336340Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: ApplicationFiled: March 14, 2018Publication date: November 22, 2018Applicant: Intertrust Technologies CorporationInventors: William G. HORNE, Lesley R. MATHESON, Casey SHEEHAN, Robert E. TARJAN