Patents by Inventor Dan Boneh

Dan Boneh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200389312
    Abstract: Disclosed are aspects of an untrusted decentralized computing platform that includes an untrusted decentralized database which participant computing systems within the platform reach consensus on an accepted representation thereof. Some aspects of the databased include one or more directed acyclic graphs, which may include cryptographic hash pointers. Some aspects include an untrusted decentralized database architecture that includes two constituent chains. Some aspects of a consensus layer of the untrusted decentralized computing platform alternate a proof of space with a verifiable delay function to reduce compute resource waste relative to systems reliant on compute sources for proofs of work. In some aspects of a consensus layer alternating the proof-of-space and the proof-of-time, a single difficulty factors may be determined by multiplying their difficulty factors together to generate a single variable which accounts for difficulty for both proofs.
    Type: Application
    Filed: May 13, 2020
    Publication date: December 10, 2020
    Inventors: Dan Boneh, Krzysztof Pietrzak, Bram Cohen, Lipa Long, Richard Kiss, Alex Wice, Mariano Sorgente, Benedikt Bunz, Ben Fisch
  • Publication number: 20190164153
    Abstract: Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.
    Type: Application
    Filed: November 30, 2018
    Publication date: May 30, 2019
    Inventors: Shashank Agrawal, Karl Benedikt Bünz, Mahdi Zamani, Dan Boneh
  • Patent number: 10169253
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: January 1, 2019
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Publication number: 20170344496
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Application
    Filed: August 21, 2017
    Publication date: November 30, 2017
    Inventors: Xiaoxin CHEN, Carl A. WALDSPURGER, Pratap SUBRAHMANYAM, Tal GARFINKEL, Dan BONEH
  • Patent number: 9740637
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: October 8, 2013
    Date of Patent: August 22, 2017
    Assignee: VMware, Inc.
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Publication number: 20170185531
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Application
    Filed: October 8, 2013
    Publication date: June 29, 2017
    Applicant: VMware, Inc.
    Inventors: Xiaoxin CHEN, Carl A. WALDSPURGER, Pratap SUBRAHMANYAM, Tal GARFINKEL, Dan BONEH
  • Patent number: 9646306
    Abstract: A method for encrypting a passcode is disclosed. In one embodiment, the method includes: receiving an indication of a portion of the passcode from a user; encoding the portion of the passcode; encrypting the encoded portion into ciphertext using a homomorphic encryption system; updating a cumulative encryption string by executing a cumulative operation to aggregate the ciphertext corresponding to the encoded portion into the cumulative encryption string computed for a previous portion of the passcode, wherein the cumulative operation is dictated by a homomorphic property of the homomorphic encryption system; and generating a passcode message based at least in part on the cumulative encryption string, wherein the passcode message includes a message authentication code.
    Type: Grant
    Filed: March 13, 2014
    Date of Patent: May 9, 2017
    Assignee: SQUARE, INC.
    Inventors: Oliver S. C. Quigley, Jason Douglas Waddle, Benjamin Michael Adida, Max Joseph Guise, Dan Boneh
  • Patent number: 9356779
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. The sender uses a bilinear map to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110]. The receiver [110] uses the bilinear map to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
    Type: Grant
    Filed: February 8, 2012
    Date of Patent: May 31, 2016
    Assignees: The Board of Trustees of the Leland Stanford Junior University, The Regents of the University of California
    Inventors: Dan Boneh, Matthew Franklin
  • Publication number: 20150100791
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Application
    Filed: October 8, 2013
    Publication date: April 9, 2015
    Applicant: VMware, Inc.
    Inventors: Xiaoxin CHEN, Carl A. WALDSPURGER, Pratap SUBRAHMANYAM, Tal GARFINKEL, Dan BONEH
  • Patent number: 8971819
    Abstract: A system for measuring power consumption by a mobile device corresponding to access of web pages is provided. The system includes: the mobile device, configured to access web pages via a wireless network; a power measurement device connected to a battery of the mobile device, configured to measure parameters related to power consumption; and a server, in communication with the mobile device and the power measurement device, configured to control the mobile device's access of web pages and control the power measurement device's measurement of parameters, to receive measurements from the power measurement device, and to process the received measurements so as to correlate the mobile device's access of a web page with an amount of power consumed corresponding to the mobile device's access of the web page.
    Type: Grant
    Filed: June 15, 2012
    Date of Patent: March 3, 2015
    Assignees: Deutsche Telekom AG, The Board of Trustees of the Leland Stanford Junior University
    Inventors: Angela Nicoara, Narendan Thiagarajan, Gaurav Aggarwal, Dan Boneh
  • Patent number: 8839451
    Abstract: Methods, systems, and apparatus, including computer program products, for retaining the function of product activation schemes and other persistent state changes based on hardware identifiers, even when running in a virtual machine monitor. It can tie such schemes to a single identifier, e.g., a USB serial number, instead of the multiple hardware identifiers.
    Type: Grant
    Filed: August 7, 2007
    Date of Patent: September 16, 2014
    Assignee: Moka5, Inc.
    Inventors: Monica Sin-Ling Lam, Constantine P. Sapuntzakis, Dan Boneh, Ramesh U. V. Chandra
  • Patent number: 8555081
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: October 30, 2008
    Date of Patent: October 8, 2013
    Assignee: VMware, Inc.
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Patent number: 8391488
    Abstract: A data encryption and decryption system securely geoencrypts data using location-dependent navigation signals. To increase the entropy of the cryptographic key to guard against a brute-force attack, geoencryption is made to depend on largely time-independent characteristics of the navigation signals that are not easily spoofed, including the time difference of arrival, the envelope-to-cycle difference, the differential signal-to-noise, the signal envelope shape, and the directions of arrival of the navigation signal set.
    Type: Grant
    Filed: January 15, 2009
    Date of Patent: March 5, 2013
    Assignees: Geocodex LLC, Leland Stanford Junior University
    Inventors: Di Qiu, Sherman Lo, Per Enge, Logan Scott, Dan Boneh, Ron Karpf
  • Publication number: 20120322387
    Abstract: A system for measuring power consumption by a mobile device corresponding to access of web pages is provided. The system includes: the mobile device, configured to access web pages via a wireless network; a power measurement device connected to a battery of the mobile device, configured to measure parameters related to power consumption; and a server, in communication with the mobile device and the power measurement device, configured to control the mobile device's access of web pages and control the power measurement device's measurement of parameters, to receive measurements from the power measurement device, and to process the received measurements so as to correlate the mobile device's access of a web page with an amount of power consumed corresponding to the mobile device's access of the web page.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 20, 2012
    Applicants: The Board of Trustees of the Leland Stanford Junior University, DEUTSCHE TELEKOM AG
    Inventors: Angela Nicoara, Narendan Thiagarajan, Gaurav Aggarwal, Dan Boneh
  • Patent number: 8320559
    Abstract: Systems and methods for supporting symmetric-bilinear-map and asymmetric-bilinear-map identity-based-encryption (IBE) key exchange and encryption schemes are provided. IBE key exchange schemes use an IBE encapsulation engine to produce a secret key and an encapsulated version of the secret key. An IBE unencapsulation engine is used to unencapsulate the encapsulated key. IBE encryption schemes use an IBE encryption engine to produce ciphertext from plaintext. An IBE decryption engine is used to decrypt the ciphertext to reveal the plaintext. The IBE unencapsulation engine and decryption engines use bilinear maps. The IBE encapsulation and encryption engines perform group multiplication operations without using bilinear maps, improving efficiency. IBE private keys for use in decryption and unencapsulation operations may be generated using a distributed key arrangement in which each IBE private key is assembled from private key shares.
    Type: Grant
    Filed: August 6, 2009
    Date of Patent: November 27, 2012
    Assignee: Voltage Security, Inc.
    Inventors: Dan Boneh, Xavier Boyen
  • Patent number: 8315389
    Abstract: In a geo-security system, a device receives RF signals from multiple distinct classes of RF communication systems and extracts location-dependent signal parameters. A current geotag is computed from the parameters by fuzzy extractors involving quantization of the parameters and Reed-Solomon decoding to provide a reproducible unique geotag. The current geotag is compared with a stored geotag, and a geo-secured function of the device is executed based on the result of the comparison. The use of multiple signal sources of different types, combined with special fuzzy extractors provides a robust geotag that allows both lower false rejection rate and lower false acceptance rate.
    Type: Grant
    Filed: January 25, 2010
    Date of Patent: November 20, 2012
    Assignee: The Board of Trustees of the Leland Stanford Junior University
    Inventors: Di Qiu, Sherman Lo, David S. De Lorenzo, Dan Boneh, Per Enge
  • Publication number: 20120159604
    Abstract: An embodiment of the present invention includes a system for communicating digital data from a preferably small battery powered device (e.g., key-chain or pocket-sized form-factor) to a personal electronic device (e.g., a smartphone such as an iPhone or a Nexus One). The communication mechanism of the present invention can be used as second factor authentication. The present invention can also be used as a key for accessing physical locations such as building. Alternatively, the present invention can be used as a manner for transmitting digital data to a personal electronic device such as a smart phone.
    Type: Application
    Filed: August 11, 2011
    Publication date: June 21, 2012
    Applicant: The Board of Trustees of the Leland Stanford, Junior, University
    Inventors: Hristo Bojinov, Dan Boneh
  • Publication number: 20120159188
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. The sender uses a bilinear map to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110]. The receiver [110] uses the bilinear map to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
    Type: Application
    Filed: February 8, 2012
    Publication date: June 21, 2012
    Inventors: Dan Boneh, Matthew Franklin
  • Patent number: 8130964
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s.
    Type: Grant
    Filed: October 28, 2009
    Date of Patent: March 6, 2012
    Assignees: The Board of Trustees of the Leland Stanford Junior University, The Regents of the University of California, Davis
    Inventors: Dan Boneh, Matthew Franklin
  • Patent number: 8120533
    Abstract: Location systems and methods are implemented using a variety of arrangements and methods. Using one such system location information is provided in response to a utility-line arrangement propagating signals that represent a wireless radio-frequency (RF) communication originating from one or more remote transmitters. The system includes a receiver circuit communicatively coupled and responsive to the utility-line arrangement. The system also includes a signal-processing logic circuit, communicatively coupled and responsive to the utility-line arrangement. The signal processing logic circuit is arranged to derive location information from characteristics of the signals that are indicative of a location of the receiver circuit relative to the remote transmitters.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: February 21, 2012
    Assignee: The Board of Trustees of the Leland Stanford Junior University
    Inventors: Sherman Chih Lo, Per Enge, C. O. Lee Boyce, Jr., Nicolai V. Alexeev, Dan Boneh