Patents by Inventor Amal Shaheen

Amal Shaheen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070100843
    Abstract: Provided is a method for the standardization of information management among different information sources and different information formats. With respect to information sources that employ different information storage formats, an organizational proxy, or “shadow,” of the organization structure of the first information source is created in the second information source and a shadow of the second information source is created in the first information source. Information stored in conjunction with the first information source is copied into the shadow within the second information source. The information in the first source is then either maintained or a link to corresponding information in the second information source is created within the first information source and the first information is deleted. The claimed subject matter provides a graphical user interface (GUI) so that a user can copy information from one information source to another by executing a “drag & drop” action.
    Type: Application
    Filed: October 20, 2005
    Publication date: May 3, 2007
    Inventors: Daniel Chen, Michael Quigley, Amal Shaheen, John Woods
  • Publication number: 20060233372
    Abstract: A system, method and computer program for enforcing network cluster proximity requirements using a proxy is useful in preventing unauthorized devices from receiving encrypted broadcast content intended for only authorized users within a network cluster. The current art allows users to remotely establish trust via a cryptographic handshake. This results in encrypted broadcast content being delivered to unauthorized devices. The present invention assures that encrypted broadcast content is delivered to only authorized devices, allowing authorized remote devices to receive encrypted broadcast content while preventing unauthorized remote devices from doing so. The present invention enforces network proximity requirements to authorized devices within a defined area by timing the cryptographic handshaking, and by authorizing device proxies within a geographic area for retransmitting to authorized remote devices outside said geographic area.
    Type: Application
    Filed: December 16, 2004
    Publication date: October 19, 2006
    Inventors: Amal Shaheen, Tommy McGuire
  • Publication number: 20060126831
    Abstract: Systems, methods and media for encrypting and decrypting content files are disclosed. More particularly, hardware and/or software for adding an additional level of indirection to a title key encryption scheme are disclosed. Embodiments may include generating by a cryptographic system a binding key based on binding information. Embodiments may also include encrypting by the cryptographic system a secret key with the binding key and generating a title key associated with at least one content file. Embodiments may also include encrypting by the cryptographic system the title key with the secret key and the at least one content file with the title key. Further embodiments may include receiving an indication that the binding information has changed, generating a new binding key based on the new changed binding information, and re-encrypting the secret key with the new binding key.
    Type: Application
    Filed: December 14, 2004
    Publication date: June 15, 2006
    Inventors: Julian Cerruti, Matthew Rutkowski, Amal Shaheen
  • Publication number: 20060059573
    Abstract: Methods, systems, and products are disclosed for controlling with rights objects delivery of broadcast encryption content for a network cluster from a content server outside the cluster that include receiving in the content server from a network device a key management block for the cluster, a unique data token for the cluster, and an encrypted cluster id; calculating a binding key for the cluster in dependence upon the key management block for the cluster, the unique data token for the cluster, and the encrypted cluster id; inserting a title key into a rights object defining rights for the broadcast encryption content; and sending the rights object to the cluster. In typical embodiments, the rights for content include an authorization for a play period and an authorized number of copies of the broadcast encryption content to devices outside the cluster.
    Type: Application
    Filed: August 26, 2004
    Publication date: March 16, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eunjin Jung, Amal Shaheen
  • Publication number: 20060048232
    Abstract: Methods, systems, and products are disclosed for delivering broadcast encryption content. Embodiments of the present invention typically include receiving in a cluster broadcast encryption content; receiving in a cluster a rights object defining device-oriented digital rights for broadcast encryption content; and administering the broadcast encryption content on one or more network devices in the cluster in dependence upon the digital rights. In some embodiments, administering the broadcast encryption content on one or more network devices in the cluster in dependence upon the digital rights include mapping the device-oriented digital rights to digital rights supported in the cluster, excluding device-oriented rights not supported in the cluster. In some embodiments, mapping the device-oriented digital rights to digital rights supported in the cluster includes supporting in the cluster only those device-oriented digital rights having direct analogs in the cluster.
    Type: Application
    Filed: August 26, 2004
    Publication date: March 2, 2006
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eunjin Jung, Amal Shaheen
  • Publication number: 20050226416
    Abstract: Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster that include receiving in the content server from the network device a key management block for the cluster, a unique data token for the cluster, and an encrypted cluster id and calculating a binding key for the cluster in dependence upon the key management block for the cluster, the unique data token for the cluster, and the encrypted cluster id. In typical embod0iments, calculating a binding key includes calculating a management key from the key management block for the cluster; calculating a content server device key from the management key and the content server device id; decrypting the encrypted cluster id with the content server device key; and calculating the binding key with the management key, the unique data token for the cluster, and the cluster id.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 13, 2005
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Eunjin Jung, Amal Shaheen