Patents by Inventor Dennis E. Shasha

Dennis E. Shasha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11689372
    Abstract: The basic idea of this invention is to send one or more cubesats into orbit, each equipped with a hardware security module. Users would send their transaction to the cubesats which would collect them into blocks, sign them, and send (bounce) them back to earth (and to one another). Bounce Blockchain provides scalability through sharding (transactions will be partitioned over cubesats). Because modern hardware security modules are tamper-resistant (become inoperable if tampered with) or tamper-responsive (erase their keys if tampered with), take their keys from physical processes, and have been validated, socio-technical protocols can ensure that it is infeasible to forge the identity of a hardware security module in a cubesat with another cubesat. If, however, some cubesats are destroyed, the blockchain will continue to execute correctly though some transactions will be lost. New cubesats can be sent up in short order as they are quite cheap to launch.
    Type: Grant
    Filed: January 2, 2020
    Date of Patent: June 27, 2023
    Assignee: New York University
    Inventor: Dennis E. Shasha
  • Publication number: 20200220732
    Abstract: The basic idea of this invention is to send one or more cubesats into orbit, each equipped with a hardware security module. Users would send their transaction to the cubesats which would collect them into blocks, sign them, and send (bounce) them back to earth (and to one another). Bounce Blockchain provides scalability through sharding (transactions will be partitioned over cubesats). Because modern hardware security modules are tamper-resistant (become inoperable if tampered with) or tamper-responsive (erase their keys if tampered with), take their keys from physical processes, and have been validated, socio-technical protocols can ensure that it is infeasible to forge the identity of a hardware security module in a cubesat with another cubesat. If, however, some cubesats are destroyed, the blockchain will continue to execute correctly though some transactions will be lost. New cubesats can be sent up in short order as they are quite cheap to launch.
    Type: Application
    Filed: January 2, 2020
    Publication date: July 9, 2020
    Applicant: New York University
    Inventor: Dennis E. Shasha
  • Patent number: 8327453
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: December 4, 2012
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Patent number: 7991995
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Grant
    Filed: June 20, 2008
    Date of Patent: August 2, 2011
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Publication number: 20100212019
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Application
    Filed: April 27, 2010
    Publication date: August 19, 2010
    Applicant: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, Sean Rolinson, David Molnar
  • Patent number: 7747873
    Abstract: A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor's and owner's rights in software, cannot be modified.
    Type: Grant
    Filed: March 4, 2005
    Date of Patent: June 29, 2010
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20080282086
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Application
    Filed: June 20, 2008
    Publication date: November 13, 2008
    Applicant: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Patent number: 7406593
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Grant
    Filed: May 2, 2003
    Date of Patent: July 29, 2008
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Patent number: 7287159
    Abstract: Software is identified while in main memory by examining small portions of its executable image or by examining the results of its execution. These portions, or an encoding of them, are then compared with previously stored identifying information about at least one Software through an approximate matching process.
    Type: Grant
    Filed: April 1, 2004
    Date of Patent: October 23, 2007
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Carleton J. Bosley, Ramon Caceres, Aaron Ingram, Timir Karia, David Molnar, Yossi Beinart
  • Patent number: 7131144
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: October 31, 2006
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Patent number: 7073197
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: July 4, 2006
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Patent number: 6889209
    Abstract: A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor's and owner's rights in software, cannot be modified.
    Type: Grant
    Filed: November 3, 2000
    Date of Patent: May 3, 2005
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20040133803
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Application
    Filed: December 16, 2003
    Publication date: July 8, 2004
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20040128515
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Application
    Filed: December 16, 2003
    Publication date: July 1, 2004
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Patent number: 6697948
    Abstract: A system, method, or apparatus for enabling owners and vendors of software products to protect the property rights of their software. The system and method utilizes a unique vendor tag system for each instant of a specific software product. This system interacts with a monitoring program, which, is running on the user's device to ensure that no unauthorized use takes place.
    Type: Grant
    Filed: May 5, 1999
    Date of Patent: February 24, 2004
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20030220882
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Application
    Filed: May 2, 2003
    Publication date: November 27, 2003
    Applicant: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Patent number: 6138118
    Abstract: A method and system for reconciling in a scheduling database the execution of a high priority stream of transactions that is concurrent with a low priority stream of transactions comprise the steps of copying a portion of the database into a temporary storage, establishing the high priority stream in the database, establishing the low priority stream in the temporary storage, reconciling the low priority stream with the high priority stream, and establishing some or all of the low priority stream of transactions in the database such that the high priority stream has data priority over the low priority stream and the resulting database satisfies certain safety and liveness constraints.
    Type: Grant
    Filed: July 30, 1998
    Date of Patent: October 24, 2000
    Assignee: Telcordia Technologies, Inc.
    Inventors: Peter E. A. Koppstein, Benjamin James Park, Dennis E. Shasha