Patents by Inventor Alexander Tarpinian

Alexander Tarpinian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8724811
    Abstract: Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: May 13, 2014
    Assignee: International Business Machines Corporation
    Inventors: Thomas A. Bellwood, Robert B. Chumbley, Matthew F. Rutkowski, Alexander Tarpinian
  • Publication number: 20130022200
    Abstract: Provided are techniques for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 24, 2013
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Thomas A. Bellwood, Robert B. Chumbley, Matthew F. Rutkowski, Alexander Tarpinian
  • Patent number: 8325926
    Abstract: Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
    Type: Grant
    Filed: February 7, 2006
    Date of Patent: December 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Thomas A. Bellwood, Robert B. Chumbley, Matthew F. Rutkowski, Alexander Tarpinian
  • Publication number: 20070240123
    Abstract: Provided is a method for defining and organizing computer breakpoints for use during a debugging operation of a software application. The claimed subject matter provides flexible breakpoints that are called depending upon the condition of the corresponding call-stack or, in other words, depending upon a specific calling sequence through which the module containing the breakpoint was reached. A novel type of breakpoint is provided that, rather than causing a halt in execution of a module, changes the state of one or more other breakpoints. In an alternative embodiment, a breakpoint is provided that determines whether or not to execute based upon an examination of the call-stack.
    Type: Application
    Filed: February 9, 2006
    Publication date: October 11, 2007
    Inventors: Leugim Bustelo, Andrew Hately, Julio Ruano, Alexander Tarpinian
  • Publication number: 20070183597
    Abstract: Provided is a method for providing a home or business security system that relies upon data encryption for both communication and the storage of content. The disclosed technology incorporates all the devices necessary for a comprehensive security system, including, but not limited to, controllers, monitors, alarms and communication media. The system may include an unlimited number of devices and, further, individual devices may be added and removed as needed. Users may define and change the boundaries of a security system or, in other words, decide what devices to include or not include in such a system. A defined boundary does not need to be confined to a single location. In one embodiment, the claimed subject matter incorporates xCP based broadcast encryption technology.
    Type: Application
    Filed: February 7, 2006
    Publication date: August 9, 2007
    Inventors: Thomas Bellwood, Robert Chumbley, Matthew Rutkowski, Alexander Tarpinian
  • Publication number: 20070016956
    Abstract: Provided is a method for enabling a device without a secure clock to make a determination on the expiration of encrypted content. When the device receives content, the device also receives the content provider's policy on access. This information provides an ATI in UTI units which is to be associated with the content for the purpose of managing the content's expiration. The ATI is converted to the device's DTI units and the DTI is then used to control the availability of the content for decryption and use. The claimed subject matter permits the existence of tolerance, determined by content policy, in the conversion between UTI and the DTI, as well as in the depletion of the ATI. To move or copy content which has an associated remaining ATI, the device converts the ATI into UTI units and provides converted ATI to the target device in conjunction with the associated content.
    Type: Application
    Filed: July 5, 2005
    Publication date: January 18, 2007
    Inventors: Thomas Bellwood, Robert Chumbley, Matthew Rutkowski, Alexander Tarpinian
  • Publication number: 20060265338
    Abstract: A system and method for usage based key management rebinding using logical partitions that intelligently organizes the scheduling and re-encryption processing of title keys into logical groups. Candidate title keys of the present invention are sorted into logical groups based upon content meta-data. This meta-data can be based upon content classification, usage patterns, frequency of use, currency of access and other configurable parameters. Title keys are partitioned based on meta-data and priority can be established between partitions. Title keys are re-encrypted with current binding information based on partition priority. Said title keys are tracked to ensure they are re-encrypted.
    Type: Application
    Filed: May 17, 2005
    Publication date: November 23, 2006
    Inventors: Matt Rutkowski, Thomas Bellwood, Robert Chumbley, Alexander Tarpinian