Patents by Inventor Dan Boneh

Dan Boneh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8839451
    Abstract: Methods, systems, and apparatus, including computer program products, for retaining the function of product activation schemes and other persistent state changes based on hardware identifiers, even when running in a virtual machine monitor. It can tie such schemes to a single identifier, e.g., a USB serial number, instead of the multiple hardware identifiers.
    Type: Grant
    Filed: August 7, 2007
    Date of Patent: September 16, 2014
    Assignee: Moka5, Inc.
    Inventors: Monica Sin-Ling Lam, Constantine P. Sapuntzakis, Dan Boneh, Ramesh U. V. Chandra
  • Patent number: 8555081
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Grant
    Filed: October 30, 2008
    Date of Patent: October 8, 2013
    Assignee: VMware, Inc.
    Inventors: Xiaoxin Chen, Carl A. Waldspurger, Pratap Subrahmanyam, Tal Garfinkel, Dan Boneh
  • Patent number: 8391488
    Abstract: A data encryption and decryption system securely geoencrypts data using location-dependent navigation signals. To increase the entropy of the cryptographic key to guard against a brute-force attack, geoencryption is made to depend on largely time-independent characteristics of the navigation signals that are not easily spoofed, including the time difference of arrival, the envelope-to-cycle difference, the differential signal-to-noise, the signal envelope shape, and the directions of arrival of the navigation signal set.
    Type: Grant
    Filed: January 15, 2009
    Date of Patent: March 5, 2013
    Assignees: Geocodex LLC, Leland Stanford Junior University
    Inventors: Di Qiu, Sherman Lo, Per Enge, Logan Scott, Dan Boneh, Ron Karpf
  • Publication number: 20120322387
    Abstract: A system for measuring power consumption by a mobile device corresponding to access of web pages is provided. The system includes: the mobile device, configured to access web pages via a wireless network; a power measurement device connected to a battery of the mobile device, configured to measure parameters related to power consumption; and a server, in communication with the mobile device and the power measurement device, configured to control the mobile device's access of web pages and control the power measurement device's measurement of parameters, to receive measurements from the power measurement device, and to process the received measurements so as to correlate the mobile device's access of a web page with an amount of power consumed corresponding to the mobile device's access of the web page.
    Type: Application
    Filed: June 15, 2012
    Publication date: December 20, 2012
    Applicants: The Board of Trustees of the Leland Stanford Junior University, DEUTSCHE TELEKOM AG
    Inventors: Angela Nicoara, Narendan Thiagarajan, Gaurav Aggarwal, Dan Boneh
  • Patent number: 8320559
    Abstract: Systems and methods for supporting symmetric-bilinear-map and asymmetric-bilinear-map identity-based-encryption (IBE) key exchange and encryption schemes are provided. IBE key exchange schemes use an IBE encapsulation engine to produce a secret key and an encapsulated version of the secret key. An IBE unencapsulation engine is used to unencapsulate the encapsulated key. IBE encryption schemes use an IBE encryption engine to produce ciphertext from plaintext. An IBE decryption engine is used to decrypt the ciphertext to reveal the plaintext. The IBE unencapsulation engine and decryption engines use bilinear maps. The IBE encapsulation and encryption engines perform group multiplication operations without using bilinear maps, improving efficiency. IBE private keys for use in decryption and unencapsulation operations may be generated using a distributed key arrangement in which each IBE private key is assembled from private key shares.
    Type: Grant
    Filed: August 6, 2009
    Date of Patent: November 27, 2012
    Assignee: Voltage Security, Inc.
    Inventors: Dan Boneh, Xavier Boyen
  • Patent number: 8315389
    Abstract: In a geo-security system, a device receives RF signals from multiple distinct classes of RF communication systems and extracts location-dependent signal parameters. A current geotag is computed from the parameters by fuzzy extractors involving quantization of the parameters and Reed-Solomon decoding to provide a reproducible unique geotag. The current geotag is compared with a stored geotag, and a geo-secured function of the device is executed based on the result of the comparison. The use of multiple signal sources of different types, combined with special fuzzy extractors provides a robust geotag that allows both lower false rejection rate and lower false acceptance rate.
    Type: Grant
    Filed: January 25, 2010
    Date of Patent: November 20, 2012
    Assignee: The Board of Trustees of the Leland Stanford Junior University
    Inventors: Di Qiu, Sherman Lo, David S. De Lorenzo, Dan Boneh, Per Enge
  • Publication number: 20120159188
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. The sender uses a bilinear map to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110]. The receiver [110] uses the bilinear map to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
    Type: Application
    Filed: February 8, 2012
    Publication date: June 21, 2012
    Inventors: Dan Boneh, Matthew Franklin
  • Publication number: 20120159604
    Abstract: An embodiment of the present invention includes a system for communicating digital data from a preferably small battery powered device (e.g., key-chain or pocket-sized form-factor) to a personal electronic device (e.g., a smartphone such as an iPhone or a Nexus One). The communication mechanism of the present invention can be used as second factor authentication. The present invention can also be used as a key for accessing physical locations such as building. Alternatively, the present invention can be used as a manner for transmitting digital data to a personal electronic device such as a smart phone.
    Type: Application
    Filed: August 11, 2011
    Publication date: June 21, 2012
    Applicant: The Board of Trustees of the Leland Stanford, Junior, University
    Inventors: Hristo Bojinov, Dan Boneh
  • Patent number: 8130964
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s.
    Type: Grant
    Filed: October 28, 2009
    Date of Patent: March 6, 2012
    Assignees: The Board of Trustees of the Leland Stanford Junior University, The Regents of the University of California, Davis
    Inventors: Dan Boneh, Matthew Franklin
  • Patent number: 8120533
    Abstract: Location systems and methods are implemented using a variety of arrangements and methods. Using one such system location information is provided in response to a utility-line arrangement propagating signals that represent a wireless radio-frequency (RF) communication originating from one or more remote transmitters. The system includes a receiver circuit communicatively coupled and responsive to the utility-line arrangement. The system also includes a signal-processing logic circuit, communicatively coupled and responsive to the utility-line arrangement. The signal processing logic circuit is arranged to derive location information from characteristics of the signals that are indicative of a location of the receiver circuit relative to the remote transmitters.
    Type: Grant
    Filed: September 28, 2007
    Date of Patent: February 21, 2012
    Assignee: The Board of Trustees of the Leland Stanford Junior University
    Inventors: Sherman Chih Lo, Per Enge, C. O. Lee Boyce, Jr., Nicolai V. Alexeev, Dan Boneh
  • Publication number: 20110181470
    Abstract: In a geo-security system, a device receives RF signals from multiple distinct classes of RF communication systems and extracts location-dependent signal parameters. A current geotag is computed from the parameters by fuzzy extractors involving quantization of the parameters and Reed-Solomon decoding to provide a reproducible unique geotag. The current geotag is compared with a stored geotag, and a geo-secured function of the device is executed based on the result of the comparison. The use of multiple signal sources of different types, combined with special fuzzy extractors provides a robust geotag that allows both lower false rejection rate and lower false acceptance rate.
    Type: Application
    Filed: January 25, 2010
    Publication date: July 28, 2011
    Inventors: Di Qiu, Sherman Lo, David S. De Lorenzo, Dan Boneh, Per Enge
  • Patent number: 7970141
    Abstract: The present invention relates to a method for traitor tracing. One embodiment of a method for determining at least one traced private key used by a decoder to decrypt an encrypted message includes defining an input ciphertext, the input ciphertext being associated with a tracing private key and having a sublinear size, calling the decoder on the input ciphertext, and associating the tracing private key with a set of traced private keys if the decoder is able to correctly decrypt the encrypted message in accordance with the input ciphertext, the set of traced private keys including at least one private key.
    Type: Grant
    Filed: September 13, 2007
    Date of Patent: June 28, 2011
    Assignees: The Regents of the University of California, SRI International, The Board of Trustees of the Leland Stanford Junior University
    Inventors: Dan Boneh, Amit Sahai, Brent Waters
  • Publication number: 20100208895
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s.
    Type: Application
    Filed: October 28, 2009
    Publication date: August 19, 2010
    Inventors: Dan Boneh, Matthew Franklin
  • Patent number: 7757278
    Abstract: A method and apparatus are provided for protecting sensitive information within server or other computing environments. Numerous electronic requests addressed to a server system are received over network couplings and evaluated. The evaluation scans for sensitive information including credit card information and private user information. Upon detecting sensitive data, cryptographic operations are applied to the sensitive data. When the sensitive data is being transferred to the server system, the cryptographic operations encrypt the sensitive data prior to transfer among components of the server system. When sensitive data is being transferred from the server system, the cryptographic operations decrypt the sensitive data prior to transfer among the network couplings. The cryptographic operations also include hash, and keyed hash operations.
    Type: Grant
    Filed: January 2, 2002
    Date of Patent: July 13, 2010
    Assignee: SafeNet, Inc.
    Inventors: Dan Boneh, Rajeev Chawla, Alan Frindell, Eu-Jin Goh, Nagendra Modadugu, Panagiotis Tsirigotis
  • Publication number: 20090316900
    Abstract: A data encryption and decryption system securely geoencrypts data using location-dependent navigation signals. To increase the entropy of the cryptographic key to guard against a brute-force attack, geoencryption is made to depend on largely time-independent characteristics of the navigation signals that are not easily spoofed, including the time difference of arrival, the envelope-to-cycle difference, the differential signal-to-noise, the signal envelope shape, and the directions of arrival of the navigation signal set.
    Type: Application
    Filed: January 15, 2009
    Publication date: December 24, 2009
    Inventors: Di QIU, Sherman LO, Per ENGE, Logan SCOTT, Dan BONEH, Ron KARPF
  • Patent number: 7634087
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s.
    Type: Grant
    Filed: May 9, 2006
    Date of Patent: December 15, 2009
    Assignees: The Board of Trustees of the Leland Stanford Junior University, The Regents of the University of California, Davis
    Inventors: Dan Boneh, Matthew Franklin
  • Patent number: 7590236
    Abstract: Systems and methods for supporting symmetric-bilinear-map and asymmetric-bilinear-map identity-based-encryption (IBE) key exchange and encryption schemes are provided. IBE key exchange schemes use an IBE encapsulation engine to produce a secret key and an encapsulated version of the secret key. An IBE unencapsulation engine is used to unencapsulate the encapsulated key. IBE encryption schemes use an IBE encryption engine to produce ciphertext from plaintext. An IBE decryption engine is used to decrypt the ciphertext to reveal the plaintext. The IBE unencapsulation engine and decryption engines use bilinear maps. The IBE encapsulation and encryption engines perform group multiplication operations without using bilinear maps, improving efficiency. IBE private keys for use in decryption and unencapsulation operations may be generated using a distributed key arrangement in which each IBE private key is assembled from private key shares.
    Type: Grant
    Filed: March 25, 2005
    Date of Patent: September 15, 2009
    Assignees: Voltage Security, Inc., The Board of Trustees of the Leland Stanford Junior University
    Inventors: Dan Boneh, Xavier Boyen
  • Patent number: 7587605
    Abstract: In at least one implementation, described herein, P and Q1, . . . , Qn are public points on an elliptic curve over a finite field, but the ratios of Qi to P are private. Those ratios are the components (?1, . . . , ?n) of a private key, where Qi=?i P. This implementation generates short digital ciphers (i.e., signatures), at least in part, by mapping a message M to a point T on the elliptic curve and then scaling that point T based upon the private key ? to get S. At least one other implementation, described herein, verifies those ciphers by comparing pairing values of two pairs, where one pair is the public point P and the scaled point S and another pair is public Q and the point T. This implementation tests whether log(Q)/log(P)=log(S)/log(T), without computing any elliptic curve discrete logarithm directly.
    Type: Grant
    Filed: March 19, 2004
    Date of Patent: September 8, 2009
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Dan Boneh, Peter L. Montgomery, Victor Boyko
  • Publication number: 20090113216
    Abstract: A virtual-machine-based system that may protect the privacy and integrity of application data, even in the event of a total operating system compromise. An application is presented with a normal view of its resources, but the operating system is presented with an encrypted view. This allows the operating system to carry out the complex task of managing an application's resources, without allowing it to read or modify them. Different views of “physical” memory are presented, depending on a context performing the access. An additional dimension of protection beyond the hierarchical protection domains implemented by traditional operating systems and processors is provided.
    Type: Application
    Filed: October 30, 2008
    Publication date: April 30, 2009
    Applicant: VMware, Inc.
    Inventors: Xiaoxin CHEN, Carl A. WALDSPURGER, Pratap SUBRAHMANYAM, Tal GARFINKEL, Dan BONEH
  • Publication number: 20090034714
    Abstract: A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s.
    Type: Application
    Filed: May 9, 2006
    Publication date: February 5, 2009
    Inventors: Dan Boneh, Matthew Franklin