Patents by Inventor Charles Tresser
Charles Tresser has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11190530Abstract: A computer system and computer implemented method of detecting attacks on physical systems are disclosed. The system may include one or more databases and one or more controller configured to execute instructions. The instructions may include the following method steps: receiving at least one signal related to a monitored physical system; de-noising the at least one signal to extract a smooth portion of the signal; detecting one or more states of the monitored physical system by analyzing the smooth portion of the signal; obtaining a noise portion of the signal by subtracting the de-noised smooth portion from the at least one signal; classifying the noise portion; determining expected states of the system based on the classified noise portion; comparing the expected states to the detected one or more states; and detecting an attack on the monitored physical system based on the comparison.Type: GrantFiled: September 19, 2017Date of Patent: November 30, 2021Assignee: APERIO SYSTEMS (2020) LTD.Inventors: Yevgeni Nogin, Itay Baruchi, Charles Tresser
-
Publication number: 20200186549Abstract: A computer system and computer implemented method of detecting attacks on physical systems are disclosed. The system may include one or more databases and one or more controller configured to execute instructions. The instructions may include the following method steps: receiving at least one signal related to a monitored physical system; de-nosing the at least one signal to extract a smooth portion of the signal; detecting one or more states of the monitored physical system by analyzing the smooth proton of the signal; obtaining a noise portion of the signal by subtracting the de-noised smooth portion from the at least one signal; classifying the noise portion; determining expected states of the system based on the classified noise portion; comparing the expected states to the detected one or more states; and detecting an attack on the monitored physical system based on the comparison.Type: ApplicationFiled: September 19, 2017Publication date: June 11, 2020Applicant: Aperio Technology Pte. Ltd.Inventors: Yevgeni NOGIN, Itay BARUCH!, Charles TRESSER
-
Patent number: 7640432Abstract: A method and system for establishing and managing digital cash. This method is to emit and circulate secure electronic cash that allows to use non-homomorphic signature schemes, and avoids having to use blind signature techniques. With one specific embodiment, the method provides anonymous digital cash, and comprises the steps of providing an entity with a secure coprocessor, a user establishing a secure channel to a program running on said coprocessor, and the user sending a coin to be digitally signed to the coprocessor.Type: GrantFiled: December 11, 2000Date of Patent: December 29, 2009Assignee: International Business Machines CorporationInventors: Rosario Gennaro, Charles Tresser
-
Publication number: 20080061136Abstract: A method (and system) of discovering a significant subset in a collection of documents, includes identifying a set of documents from a plurality of documents based on a likelihood that documents in the set of documents carries an instance of information that is characteristic to the documents in the set of documents.Type: ApplicationFiled: October 30, 2007Publication date: March 13, 2008Inventors: Robert Hoch, Tayo Ibikunle, Ehud Kamin, William Liberis, Tomasz Nowicki, Michael Reilly, Howard Sachar, Charles Tresser, Eugene Walach
-
Publication number: 20060259441Abstract: A method (and system) of conducting business electronically between a first party and a second party, includes providing a third party who knows the identity of the first party but no privacy-compromising information regarding a proposed electronic business transaction between the first and second parties, and conducting the electronic business transaction between the first and second parties through the third party such that the identity of the first party is kept from the second party.Type: ApplicationFiled: July 17, 2006Publication date: November 16, 2006Applicant: International Business Machines CorporationInventor: Charles Tresser
-
Publication number: 20060255124Abstract: A method (and system) of discovering a significant subset in a collection of documents, includes identifying a set of documents from a plurality of documents based on a likelihood that documents in the set of documents carries an instance of information that is characteristic to the documents in the set of documents.Type: ApplicationFiled: May 11, 2005Publication date: November 16, 2006Applicants: JP Morgan Chase Bank, International Business Machines CorporationInventors: Robert Hoch, Tayo Ibikunle, Ehud Karnin, William Liberis, Tomasz Nowicki, Michael Reilly, Howard Sachar, Charles Tresser, Eugene Walach
-
Publication number: 20060177118Abstract: A method (and system) for extracting information from a document, includes segregating a set of documents from a plurality of documents based on a likelihood that at least one document in the set of documents carries an instance of a preset information.Type: ApplicationFiled: February 9, 2005Publication date: August 10, 2006Applicants: JP Morgan Chase Bank, International Business Machines CorporationInventors: Tayo Ibikunle, Ehud Karnin, William Liberis, Tomasz Nowicki, Michael Reilly, Howard Sachar, Charles Tresser, Eugene Walach, David Weeshoff
-
Publication number: 20060104450Abstract: A method (and system) of securely communicating, includes using one of a preliminary secure transmission and exchange or acquisition of secret information that provides parties with a random sequence known only to first and second parties in communication with one another, and linking one of the first and second parties with a third party. The secure transmission of the secret information is made using a channel of communication at a time when fast communication is not desired.Type: ApplicationFiled: November 12, 2004Publication date: May 18, 2006Applicant: International Business Machines CorporationInventor: Charles Tresser
-
Publication number: 20060041436Abstract: A system, method, service method, and program product for defining and/or managing entitlements and/or authentication entitlements to resources in a computer networking environment is disclosed. Upon receiving one or more dynamic events, the invention verifies one or more users (a selected user) has (entitlement) attributes that satisfy one or more access criteria to access one or more resources. The invention then permits and/or provides access to one or more resources for the selected user over one or more networks without revealing the identity of the selected user to the resource provider.Type: ApplicationFiled: August 17, 2004Publication date: February 23, 2006Applicant: International Business Machines CorporationInventors: Carolyn Brodie, Maroun Touma, Charles Tresser, Catherine Wolf, Joel Wolf
-
Publication number: 20050275900Abstract: Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.Type: ApplicationFiled: May 28, 2004Publication date: December 15, 2005Applicant: International Business Machines CorporationInventors: Mikel Stanich, Gerhard Thompson, Charles Tresser, Chai Wu
-
Publication number: 20050225808Abstract: Pages of books are copied without distortion due to curvature of the page near the book binding or the distortion in a copied page is corrected using the spacing of equidistant bars on tape strips applied to the top and bottom edges of a page before copying. The tape is preferably transparent and rather narrow and easily attached to a page to be copied. The first step in the distortion correction procedure is to locate the bars at the top and bottom of the page. The distortion of the spacing between the imaged bars is computed based on the known distance between the equidistant bars. The computed distortion of the spacing is then input to a distortion correction algorithm. The output of the distortion correction algorithm generates a corrected image. This image may also optionally delete the bars so that they are not printed in the copy. The corrected image is then copied.Type: ApplicationFiled: June 7, 2005Publication date: October 13, 2005Inventors: Gordon Braudaway, Frank Giordano, Marco Martens, Charles Tresser, Chai Wu, Charles Micchelli
-
Publication number: 20050091524Abstract: Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a secure architecture in which: (1) access to data is limited to only approved or authorized entities; (2) confidential details in received data can be readily identified and concealed; and (3) confidential details that have become non-confidential can be identified and exposed.Type: ApplicationFiled: October 22, 2003Publication date: April 28, 2005Applicant: International Business Machines CorporationInventors: Naoki Abe, Carl Abrams, Chidanand Apte, Bishwaranjan Bhattacharjee, Kenneth Goldman, Matthias Gruetzner, Matthew Hilbert, John Langford, Sriram Padmanabhan, Charles Tresser, Kathleen Troidle, Philip Yu
-
Publication number: 20050083554Abstract: A method and system are provided to perform digital printing using error diffusion but without the usual problems of the anisotropy associated with that method. The method computes several error diffused digital images on a variety of rasters, and averages them with some chosen set of weights. The method works directly for printers with more than two choices per color per pixel, and can be implemented by defining super-pixels, even with the simpler printers that have only white and black or two color value per color coordinate.Type: ApplicationFiled: October 15, 2003Publication date: April 21, 2005Inventor: Charles Tresser
-
Publication number: 20020073318Abstract: A method and system for establishing and managing digital cash. This method is to emit and circulate secure electronic cash that allows to use non-homomorphic signature schemes, and avoids having to use blind signature techniques. With one specific embodiment, the method provides anonymous digital cash, and comprises the steps of providing an entity with a secure coprocessor, a user establishing a secure channel to a program running on said coprocessor, and the user sending a coin to be digitally signed to the coprocessor.Type: ApplicationFiled: December 11, 2000Publication date: June 13, 2002Inventors: Rosario Gennaro, Charles Tresser
-
Publication number: 20020073010Abstract: A method and system for digitally managing financial instruments. In accordance with this method, an owner of a financial instrument creates a title for the instrument, and this title includes (i) a message describing the title and how to contact the owner, and (ii) a digital signature of the owner. The owner transfers ownership of the financial instrument to another person. To do this, the owner, appends to the title a public part of a signature scheme of that other person, and the owner signs the title using a public signature scheme of the owner. Preferably, when ownership is transferred, a number is appended to the title indicating the number of successive owners of the title. Also, preferably, the owner keeps the public part of the signature of the other person and makes that public part available to potential subsequent buyers.Type: ApplicationFiled: December 11, 2000Publication date: June 13, 2002Inventors: Charles Tresser, Rosario Gennaro