Patents Assigned to InterTrust Technologies
-
Patent number: 9141788Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: GrantFiled: April 28, 2014Date of Patent: September 22, 2015Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
-
Patent number: 9123043Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: GrantFiled: November 4, 2013Date of Patent: September 1, 2015Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander, William G. Horne
-
Patent number: 9098682Abstract: Systems and methods are provided for protecting electronic content from the time it is packaged through the time it is experienced by an end user. Protection against content misuse is accomplished using a combination of encryption, watermark screening, detection of invalid content processing software and hardware, and/or detection of invalid content flows. Encryption protects the secrecy of content while it is being transferred or stored. Watermark screening protects against the unauthorized use of content. Watermark screening is provided by invoking a filter module to examine content for the presence of a watermark before the content is delivered to output hardware or software. The filter module is operable to prevent delivery of the content to the output hardware or software if it detects a predefined protection mark. Invalid content processing software is detected by a monitoring mechanism that validates the software involved in processing protected electronic content.Type: GrantFiled: August 12, 2013Date of Patent: August 4, 2015Assignee: Intertrust Technologies CorporationInventors: Michael K. MacKay, W. Olin Sibert, Richard A. Landsman, Eric J. Swenson, William Hunt
-
Publication number: 20150200782Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: ApplicationFiled: August 18, 2014Publication date: July 16, 2015Applicant: INTERTRUST TECHNOLOGIES CORP.Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Patent number: 9077545Abstract: The present invention provides systems and methods for making efficient trust management decisions. A trust management engine is provided that processes requests for system resources, authorizations or certificates, and the identity of one or more root authorities that are ultimately responsible for granting or denying the requests. To determine whether a request should be granted, the trust management engine identifies a set principals from whom authorization may flow, and interprets each of the certificates as a function of the state of one or more of the principals. The processing logic iteratively evaluates the functions represented by the certificates, updates the states of the principals, and repeats this process until a reliable determination can be made as to whether the request should be granted or denied.Type: GrantFiled: November 4, 2013Date of Patent: July 7, 2015Assignee: Intertrust Technologies CorporationInventors: Stephen P. Weeks, Xavier Serret-Avila
-
Patent number: 9064099Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: GrantFiled: February 25, 2013Date of Patent: June 23, 2015Assignee: INTERTRUST TECHNOLOGIES CORPORATIONInventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
-
Patent number: 9058394Abstract: A computer-implemented system and process for generating video search engine results page is disclosed. The system provides a query term and retrieves a collection of search results. Tags are generated for each search result and used to match media objects to each search result. The search results and video objects related to each search result are returned as a video search engine results page.Type: GrantFiled: April 29, 2013Date of Patent: June 16, 2015Assignee: Intertrust Technologies CorporationInventors: Kasian Franks, Raf Podowski
-
Publication number: 20150067837Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: ApplicationFiled: April 28, 2014Publication date: March 5, 2015Applicant: Intertrust Technologies CorporationInventors: William G. HORNE, Lesley R. MATHESON, Casey SHEEHAN, Robert E. TARJAN
-
Patent number: 8931106Abstract: Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. Rights management software/hardware is used to attach and detect these credentials, and to enforce rules that indicate how content and applications may be used if certain credentials are present or absent. In one embodiment an application may condition access to a piece of electronic content upon the content's possession of a credential from a first entity, while the content may condition access upon the application's possession of a credential from a second entity and/or the user's possession of a credential from a third entity. Use of credentials in this manner enables a wide variety of relatively complex and flexible control arrangements to be put in place and enforced with relatively simple rights management technology.Type: GrantFiled: March 19, 2010Date of Patent: January 6, 2015Assignee: Intertrust Technologies CorporationInventors: David P. Maher, James M. Rudd, Eric J. Swenson, Richard A. Landsman
-
Publication number: 20140380408Abstract: An integrated, modular array of administrative and support services are provided for electronic commerce and electronic rights and transaction management. These administrative and support services supply a secure foundation for conducting transaction-related capabilities over electronic networks, and can also be adapted to the specific needs of electronic commerce value chains. In one embodiment a Distributed Commerce Utility having a secure, programmable, distributed architecture provides these administrative and support services. The Distributed Commerce Utility may comprise a number of Commerce Utility Systems. These Commerce Utility Systems provide a web of infrastructure support available to, and reusable by, the entire electronic community and/or many of its participants. Different support functions can be collected together in hierarchical and/or networked relationships to suit various business models or other objectives.Type: ApplicationFiled: May 14, 2014Publication date: December 25, 2014Applicant: Intertrust Technologies CorporationInventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie, Robert P. Weber
-
Patent number: 8904188Abstract: Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. Encryption and hashing are integrated with a low-level data model in which data and meta-data are secured uniformly. Synergies between data validation and log-structured storage are exploited.Type: GrantFiled: June 10, 2013Date of Patent: December 2, 2014Assignee: Intertrust Technologies CorporationInventors: Umesh Maheshwari, Radek Vingralek, W. Olin Sibert
-
Publication number: 20140351911Abstract: Systems and methods for secure user authentication are described. In certain embodiments, a client device such as a smartphone may be provisioned with a secure key and/or other secret information. The client device may be used to generate unique secure tokens and/or other credentials used in connection with an authentication processes. A user may provide the generated tokens and/or other credentials to a service provider in connection with a request to access a managed service. The validity of the generated tokens and/or other credentials may be verified by an authentication service in communication with the service provider.Type: ApplicationFiled: May 23, 2014Publication date: November 27, 2014Applicant: Intertrust Technologies CorporationInventors: Peng YANG, Jiahua GONG, Chitai Kenny HUANG
-
Patent number: 8892893Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: GrantFiled: January 10, 2013Date of Patent: November 18, 2014Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Publication number: 20140325587Abstract: The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other bioinformatic information. Certain embodiments may facilitate policy-based governance of access to and/or use of bioinformatic information, improved interaction with and/or use of distributed bioinformatic information, parallelization of various processes involving bioinformatic information, and/or reduced user involvement in bioinformatic workflow processes, and/or the like. Further embodiments may provide for memoization processes that may persistently store final and/or intermediate results of computations performed using genomic data for use in connection with future computations.Type: ApplicationFiled: April 24, 2014Publication date: October 30, 2014Applicant: Intertrust Technologies CorporationInventors: Jarl NILSSON, William Knox CAREY
-
Patent number: 8874896Abstract: This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.Type: GrantFiled: June 17, 2011Date of Patent: October 28, 2014Assignee: Intertrust Technologies CorporationInventors: Gilles Boccon-Gibod, Gary Ellison
-
Patent number: 8850195Abstract: Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. In another embodiment, a method of using extended SCSI commands to communicate over a USB connection is provided.Type: GrantFiled: July 23, 2008Date of Patent: September 30, 2014Assignee: Intertrust Technologies CorporationInventors: Gilles Boccon-Gibod, Julien Boeuf, Gary F. Ellison, David P. Maher
-
Patent number: 8850214Abstract: Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved from electronic data using the keys. A statistical indicia of randomness is generated based on the payloads, and the presence of a watermark is determined when the indicia is below a threshold.Type: GrantFiled: May 10, 2013Date of Patent: September 30, 2014Assignee: Intertrust Technologies CorporationInventors: Xavier Serret-Avila, Gilles Boccon-Gibod
-
Publication number: 20140230010Abstract: Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).Type: ApplicationFiled: August 30, 2013Publication date: August 14, 2014Applicant: Intertrust Technologies CorporationInventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie, Robert P. Weber
-
Publication number: 20140229277Abstract: Embodiments of a mobile device and server system are described. The mobile devices communicate with the server system and present targeted content, such as advertisements to the mobile device users. The content is targeted based on usage statistics stored on the server system which were previously collected from the mobile device. The server receives the usage statistics collected from the mobile device, makes inferences about preferences of users by tracking application and/or content usage behaviors of the users, generates recommendations for advertisements targeted toward the users of the mobile devices based on usage statistics; and transmits the recommendations to one or more of the mobile devices for presentation to the user(s).Type: ApplicationFiled: February 11, 2014Publication date: August 14, 2014Applicant: Intertrust Technologies CorporationInventors: Prasad M. KHAMBETE, Sanjeev TENNETI
-
Patent number: 8793808Abstract: Systems and methods are described for applying digital rights management techniques to manage zones in electronic content. In one embodiment, zones are defined in a piece of electronic content, and a license is associated with the electronic content that indicates how the zones are to be accessed or otherwise used. A digital rights management engine governs access to or other use of the zoned content in accordance with the license.Type: GrantFiled: July 23, 2008Date of Patent: July 29, 2014Assignee: Intertrust Technologies CorporationInventor: Gilles Boccon-Gibod