Patents by Inventor David W. Aucsmith
David W. Aucsmith has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10032211Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: GrantFiled: April 8, 2013Date of Patent: July 24, 2018Assignee: INTEL CORPORATIONInventors: Robert R. Sullivan, Jr., David W. Aucsmith
-
Publication number: 20180165752Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: ApplicationFiled: April 8, 2013Publication date: June 14, 2018Applicant: Intel CorporationInventors: Robert R. Sullivan, JR., David W. Aucsmith
-
Patent number: 9886714Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: GrantFiled: April 8, 2013Date of Patent: February 6, 2018Assignee: INTEL CORPORATIONInventors: Robert R. Sullivan, Jr., David W. Aucsmith
-
Publication number: 20140136374Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: ApplicationFiled: April 8, 2013Publication date: May 15, 2014Inventors: Robert R. Sullivan, JR., David W. Aucsmith
-
Patent number: 8417216Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: GrantFiled: April 17, 2007Date of Patent: April 9, 2013Assignee: Intel CorporationInventors: Robert R. Sullivan, Jr., David W. Aucsmith
-
Patent number: 7434261Abstract: The present invention provides a system and method of tracing the spread of computer malware in a communication network. One aspect of the present invention is a method that traces the spread of computer malware in a communication network. When suspicious data characteristic of malware is identified in a computing device connected to the communication network, the method causes data that describes the state of the computing device to be stored in a database. After a specific attack against the communication network is confirmed, computing devices that are infected with the malware are identified. Then, the spread of the malware between computing devices in the communication network is traced back to a source.Type: GrantFiled: September 27, 2004Date of Patent: October 7, 2008Assignee: Microsoft CorporationInventors: Mihai Costea, David W Aucsmith
-
Patent number: 7242921Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: GrantFiled: December 29, 2000Date of Patent: July 10, 2007Assignee: Intel CorporationInventors: Rob Sullivan, David W. Aucsmith
-
Patent number: 7054479Abstract: The present invention is a method and apparatus to segment a three-dimensional scene having foreground and background regions. Regions in stereo images of the 3-D scene are matched. The stereo images include left and right images. Ranges of matched regions are computed. The foreground region is separated from the background region using the computed ranges of the matched regions.Type: GrantFiled: July 12, 2004Date of Patent: May 30, 2006Assignee: Intel CorporationInventors: David W. Aucsmith, David A. Romrell
-
Patent number: 6873723Abstract: The present invention is a method and apparatus to segment a three-dimensional scene having foreground and background regions. Regions in stereo images of the 3-D scene are matched. The stereo images include left and right images. Ranges of matched regions are computed. The foreground region is separated from the background region using the computed ranges of the matched regions.Type: GrantFiled: June 30, 1999Date of Patent: March 29, 2005Assignee: Intel CorporationInventors: David W. Aucsmith, David A. Romrell
-
Publication number: 20040247176Abstract: The present invention is a method and apparatus to segment a three-dimensional scene having foreground and background regions. Regions in stereo images of the 3-D scene are matched. The stereo images include left and right images. Ranges of matched regions are computed. The foreground region is separated from the background region using the computed ranges of the matched regions.Type: ApplicationFiled: July 12, 2004Publication date: December 9, 2004Inventors: David W. Aucsmith, David A. Romrell
-
Publication number: 20030110392Abstract: Detecting intrusions includes detecting a possible security problem at a client location, transmitting notice of the possible security problem across a network in real time to a home location remotely located from the client location, determining at the home location an anomaly based on at least the possible security problem, and transmitting notice of the anomaly in real time to the client location.Type: ApplicationFiled: December 6, 2001Publication date: June 12, 2003Inventors: David W. Aucsmith, John W. Richardson
-
Publication number: 20020086660Abstract: Techniques are disclosed for protecting privacy of parties to electronic transactions, such as transactions conducted through a GSM network. An anonymity service provider receives orders directed from its subscriber to a recipient for goods or services, along with information about its subscriber. The anonymity service provider relays the order to the recipient but withholds information about the subscriber, as the subscriber directs. The recipient receives payment for the good or service by way of a voucher from the anonymity service provider.Type: ApplicationFiled: December 29, 2000Publication date: July 4, 2002Inventors: Rob Sullivan, David W. Aucsmith
-
Patent number: 6253323Abstract: Briefly, in accordance with one embodiment of the invention, a method of using a digital signature includes: electronically referencing at least one plurality of electronic signals with a digital signature remotely stored from the plurality.Type: GrantFiled: November 1, 1996Date of Patent: June 26, 2001Assignee: Intel CorporationInventors: George W. Cox, David W. Aucsmith, Paul E. Onnen
-
Patent number: 6243793Abstract: A method and apparatus for arbitrating access to a shared memory is disclosed. A memory marking unit in the shared memory is read to determine whether the shared memory is currently being accessed by another processor. If the shared memory is not being accessed by another processor, a processor seeking access is granted access. The processor changes the contents of the memory marking unit to lock out other processors from the shared memory. The last task performed on the shared memory space is identified and used to determine whether a task with high priority exists. If a task with high priority exists, the task is performed. If a task with high priority does not exist, the processor having access to the shared memory space accesses the shared memory space for its intended purpose. After the processor is finished accessing the shared memory space, it records the identity of the task performed and unlocks the shared memory space.Type: GrantFiled: July 25, 1997Date of Patent: June 5, 2001Assignee: Intel CorporationInventors: David W. Aucsmith, Robert C. Knauerhase, James C. Stanley
-
Patent number: 6205550Abstract: In one apparatus, a number of obfuscated programming instructions are equipped to self-verify whether execution of the obfuscated programming instructions is being observed. In another apparatus, a number of obfuscated programming instruction are equipped to determine whether the apparatus is being operated in a mode that supports single step execution of the obfuscated programming instructions. In yet another apparatus, a number of obfuscated programming instruction are equipped to verify whether an amount of elapsed execution time has exceeded a threshold. In yet another apparatus, a first and a second group of obfuscated programming instruction are provided to implement a first and a second tamper resistant technique respectively, with the first and the second group of programming instructions sharing a storage location for a first and a second key value corresponding to the first and the second tamper resistant technique.Type: GrantFiled: September 5, 1997Date of Patent: March 20, 2001Assignee: Intel CorporationInventors: Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
-
Patent number: 6178509Abstract: In one apparatus, a number of obfuscated programming instructions is provided to perform integrity verification on a number of other plain text programming instructions. In another apparatus, a number of obfuscated programming instructions is provided to self-verify an invocation of the obfuscated programming instructions is not originated from an intruder.Type: GrantFiled: September 5, 1997Date of Patent: January 23, 2001Assignee: Intel CorporationInventors: Joseph M. Nardone, Richard T. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
-
Patent number: 6175626Abstract: A method and apparatus of communicating information comprising providing a datum which includes a digital certificate containing data. The digital certificate including an extension which includes: a first identifier which specifies a major classification of the data; a second identifier which specifies a minor classification of the data; and data in a format according to the major classification and the minor classification, the data indicating an owner of the datum and a use for which the datum is intended. The certificate allows authentication of the certificate itself and the data contained therein, and the data contained in the certificate can include information allowing verification of the identity of the holder of the certificate.Type: GrantFiled: October 30, 1998Date of Patent: January 16, 2001Assignee: Intel CorporationInventors: David W. Aucsmith, George Cox, Paul E. Onnen
-
Patent number: 6175925Abstract: In one apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a descrambler that descrambles scrambled content to generate descrambled content. In another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an authenticator that provides appropriate authentication challenges to a scrambled content provider, and generates appropriate authentication responses to authentication challenges from the scrambled content provider. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement an integrity verifier that performs integrity verification on a decoder. In yet another apparatus, a group of plain text and obfuscated cells of programming instructions is provided to implement a secrets holder that holds a number of secrets associated with playing scrambled contents.Type: GrantFiled: September 5, 1997Date of Patent: January 16, 2001Assignee: Intel CorporationInventors: Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith, Richard L. Maliszewski, Gary L. Graunke
-
Patent number: 6134551Abstract: A method of updating a locally cached revocation list of digital certificates in a client computer with a current data base of revoked certificates stored in a host computer. Upon receipt of a digital certificate submitted to the client computer for verification, the client computer checks the submitted digital certificate against the locally cached revocation list. If the submitted digital certificate is not on the locally cached revocation list, the client computer confirms the validity of the submitted digital certificate and the transaction is consummated. If however, the submitted digital certificate is on the revocation list, the client computer establishes a communication link with the host computer and determines if the submitted digital certificate is in the data base of revoked certificates on the host computer. Without breaking the communication link, the client may request that an updated revocation list to be downloaded.Type: GrantFiled: January 8, 1996Date of Patent: October 17, 2000Assignee: Intel CorporationInventor: David W. Aucsmith
-
Patent number: 6069647Abstract: A system featuring an interface unit connected to a programmable unit is described. The interface unit is capable of containing a time-sensitive key. The programmable unit is allowed to receive digital content from the interface unit upon establishing that the time-sensitive key is also contained therein.Type: GrantFiled: January 29, 1998Date of Patent: May 30, 2000Assignee: Intel CorporationInventors: Robert R. Sullivan, John M. Acken, David W. Aucsmith