Patents by Inventor Corinne Dive-Reclus
Corinne Dive-Reclus has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9201701Abstract: An approach is provided for backend based computation closure oriented distributed computing. A computational processing support infrastructure receives a request for specifying one or more processes executing on a device for distribution over a computation space. The computational processing support infrastructure also causes, at least in part, serialization of the one or more processes as one or more closure primitives, the one or more closure primitives representing computation closures of the one or more processes. The computational processing support infrastructure further causes, at least in part, distribution of the one or more closure primitives over the computation space based, at least in part, on a cost function.Type: GrantFiled: May 16, 2011Date of Patent: December 1, 2015Assignee: Nokia Technologies OyInventors: Sergey Boldyrev, Seppo Juhani Pyhälammi, Mika Juhani Mannermaa, Ian Justin Oliver, Ora Lassila, Corinne Dive-Reclus
-
Patent number: 8205094Abstract: A mobile wireless device operable to install code on a removable medium, in which the device is programmed to calculate and store a digest of this code into a persistent non-removable store inside the device. When the removable medium is plugged back, and when the code is invoked, the device recalculates a digest from the code it wants to load from the removable medium and compares it with the one stored inside the persistent non-removable store. If they do not match, the code has been tampered with and therefore cannot be trusted by the device. The digest is accessible only by components in the Trusted Computing Base so is itself secure. The digest may be a hash or other unique and representative value.Type: GrantFiled: May 28, 2003Date of Patent: June 19, 2012Assignee: Nokia CorporationInventor: Corinne Dive-Reclus
-
Publication number: 20120072917Abstract: An approach is provided for backend based computation closure oriented distributed computing. A computational processing support infrastructure receives a request for specifying one or more processes executing on a device for distribution over a computation space. The computational processing support infrastructure also causes, at least in part, serialization of the one or more processes as one or more closure primitives, the one or more closure primitives representing computation closures of the one or more processes. The computational processing support infrastructure further causes, at least in part, distribution of the one or more closure primitives over the computation space based, at least in part, on a cost function.Type: ApplicationFiled: May 16, 2011Publication date: March 22, 2012Applicant: Nokia CorporationInventors: Sergey Boldyrev, Seppo Juhani Pyhälammi, Mika Juhani Mannermaa, Ian Justin Oliver, Ora Lassila, Corinne Dive-Reclus
-
Patent number: 7882352Abstract: A secure mobile wireless device in which executable code to be installed on the device is assigned a set of capabilities which define the protected resource(s) on the device which it can access. Hence, the present invention takes the idea of capabilities (known in the context of defining the capabilities or access privileges of different users in a multi-user system) and applies it to defining the capabilities or access privileges of different native executable code for secure, single-user mobile wireless devices.Type: GrantFiled: May 28, 2003Date of Patent: February 1, 2011Assignee: Nokia CorporationInventors: Corinne Dive-Reclus, Jonathan Harris, Dennis May
-
Publication number: 20100306517Abstract: An installer for a computing device determines firstly whether or not a software package for installation has been signed. If the package is signed it is installed on the device. However, if the package is unsigned, the installer will only install the package on the device if it contains a non-null VID (vendor identity).Type: ApplicationFiled: August 8, 2006Publication date: December 2, 2010Applicant: SYMBIAN SOFTWARE LTD.Inventors: Corinne Dive-Reclus, Geoff Preston, Andrew Harker
-
Publication number: 20080250082Abstract: Installable files installed on a first computing device are backed up to a second computing device and restored from the second device to the first device and/or a further device using the same means to verify the integrity of the files as used for the original installation of the files on the first device.Type: ApplicationFiled: April 29, 2005Publication date: October 9, 2008Applicant: SYMBIAN SOFTWARE LIMITEDInventor: Corinne Dive-Reclus
-
Publication number: 20080066187Abstract: A mobile wireless device programmed with a file system which is partitioned into multiple root directories. The partitioning of the file system ‘cages’ processes as it prevents them from seeing any files they should not have access to. A Trusted Computing Base verifies whether or not a process has the required privileges or capabilities to access root sub-trees. The particular directory a file is placed into automatically determines its accessibility to different processes—i.e. a process can only access files in certain root directories.Type: ApplicationFiled: November 5, 2007Publication date: March 13, 2008Applicant: SYMBIAN SOFTWARE LTD.Inventors: Corinne Dive-Reclus, Andrew Thoelke, Mark Dowman
-
Publication number: 20070214453Abstract: To install software on a computing device, a decision phase is used to decide whether or not to install the software followed by an installation phase for installing the software. Information required by the decision phase is provided in the form of metadata having an integrity protected by a digital signature and including a respective hash for files to be installed so as to enable the integrity of the file data to be verified before commencing the installation phase.Type: ApplicationFiled: April 29, 2005Publication date: September 13, 2007Applicant: SYMBIAN SOFTWARE LIMITEDInventor: Corinne Dive-Reclus
-
Publication number: 20060053426Abstract: A secure mobile wireless device in which executable code to be installed on the device is assigned a set of capabilities which define the protected resource(s) on the device which it can access. Hence, the present invention takes the idea of capabilities (known in the context of defining the capabilities or access privileges of different users in a multi-user system) and applies it to defining the capabilities or access privileges of different native executable code for secure, single-user mobile wireless devices.Type: ApplicationFiled: May 28, 2003Publication date: March 9, 2006Applicant: SYMBIAN LIMITEDInventors: Corinne Dive-Reclus, Jonathan Harris, Dennis May
-
Publication number: 20050216907Abstract: A mobile wireless device operable to install code on a removable medium, in which the device is programmed to calculate and store a digest of this code into a persistent non-removable store inside the device. When the removable medium is plugged back, and when the code is invoked, the device recalculates a digest from the code it wants to load from the removable medium and compares it with the one stored inside the persistent non-removable store. If they do not match, the code has been tampered with and therefore cannot be trusted by the device. The digest is accessible only by components in the Trusted Computing Base so is itself secure. The digest may be a hash or other unique and representative value.Type: ApplicationFiled: May 28, 2003Publication date: September 29, 2005Inventor: Corinne Dive-Reclus
-
Publication number: 20050204127Abstract: A mobile wireless device programmed with a file system which is partitioned into multiple root directories. The partitioning of the file system ‘cages’ processes as it prevents them from seeing any files they should not have access to. A Trusted Computing Base verifies whether or not a process has the required privileges or capabilities to access root sub-trees. The particular directory a file is placed into automatically determines its accessibility to different processes—i.e. a process can only access files in certain root directories. This is a light weight approach since there is no need for a process to interrogate an access control list associated with a file to determine its access rights over the file—the location of the file taken in conjunction with the access capabilities of a process intrinsically define the accessibility of the file to the process.Type: ApplicationFiled: May 28, 2003Publication date: September 15, 2005Inventors: Corinne Dive-Reclus, Andrew Thoelke, Mark Dowman
-
Publication number: 20050166064Abstract: A mobile wireless device programmed with software which provides a trusted user interface for the device by allowing the content of a secure screen memory to be modifiable only by authorised applications. Normally, the entire screen memory address is public information, making the entire screen memory fully available to any application; hence, even sensitive dialogs would use screen memory which can in theory be looked at by malicious software, enabling that malicious code to grab PIN data etc. or corrupt a trusted user interface. But with the present invention, unauthorised applications are prevented from accessing the data displayed by the secure frame buffer because they are able to access only the non-secure screen memory. Hence, malicious applications cannot retrieve data from a trusted dialog or compromise that data. Further, as the present invention is a software only solution, it requires no new hardware per se—the only requirement is that components (e.g. a software window server; a video chip etc.Type: ApplicationFiled: May 28, 2003Publication date: July 28, 2005Applicant: Symbian LimitedInventors: Corinne Dive-Reclus, Andrew Thoelke, Dennis May