Patents by Inventor Dennis E. Shasha
Dennis E. Shasha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11689372Abstract: The basic idea of this invention is to send one or more cubesats into orbit, each equipped with a hardware security module. Users would send their transaction to the cubesats which would collect them into blocks, sign them, and send (bounce) them back to earth (and to one another). Bounce Blockchain provides scalability through sharding (transactions will be partitioned over cubesats). Because modern hardware security modules are tamper-resistant (become inoperable if tampered with) or tamper-responsive (erase their keys if tampered with), take their keys from physical processes, and have been validated, socio-technical protocols can ensure that it is infeasible to forge the identity of a hardware security module in a cubesat with another cubesat. If, however, some cubesats are destroyed, the blockchain will continue to execute correctly though some transactions will be lost. New cubesats can be sent up in short order as they are quite cheap to launch.Type: GrantFiled: January 2, 2020Date of Patent: June 27, 2023Assignee: New York UniversityInventor: Dennis E. Shasha
-
Publication number: 20200220732Abstract: The basic idea of this invention is to send one or more cubesats into orbit, each equipped with a hardware security module. Users would send their transaction to the cubesats which would collect them into blocks, sign them, and send (bounce) them back to earth (and to one another). Bounce Blockchain provides scalability through sharding (transactions will be partitioned over cubesats). Because modern hardware security modules are tamper-resistant (become inoperable if tampered with) or tamper-responsive (erase their keys if tampered with), take their keys from physical processes, and have been validated, socio-technical protocols can ensure that it is infeasible to forge the identity of a hardware security module in a cubesat with another cubesat. If, however, some cubesats are destroyed, the blockchain will continue to execute correctly though some transactions will be lost. New cubesats can be sent up in short order as they are quite cheap to launch.Type: ApplicationFiled: January 2, 2020Publication date: July 9, 2020Applicant: New York UniversityInventor: Dennis E. Shasha
-
Patent number: 8327453Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.Type: GrantFiled: April 27, 2010Date of Patent: December 4, 2012Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
-
Patent number: 7991995Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.Type: GrantFiled: June 20, 2008Date of Patent: August 2, 2011Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
-
Publication number: 20100212019Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.Type: ApplicationFiled: April 27, 2010Publication date: August 19, 2010Applicant: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, Sean Rolinson, David Molnar
-
Patent number: 7747873Abstract: A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor's and owner's rights in software, cannot be modified.Type: GrantFiled: March 4, 2005Date of Patent: June 29, 2010Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha
-
Publication number: 20080282086Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.Type: ApplicationFiled: June 20, 2008Publication date: November 13, 2008Applicant: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
-
Patent number: 7406593Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.Type: GrantFiled: May 2, 2003Date of Patent: July 29, 2008Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
-
Patent number: 7287159Abstract: Software is identified while in main memory by examining small portions of its executable image or by examining the results of its execution. These portions, or an encoding of them, are then compared with previously stored identifying information about at least one Software through an approximate matching process.Type: GrantFiled: April 1, 2004Date of Patent: October 23, 2007Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Carleton J. Bosley, Ramon Caceres, Aaron Ingram, Timir Karia, David Molnar, Yossi Beinart
-
Patent number: 7131144Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.Type: GrantFiled: December 16, 2003Date of Patent: October 31, 2006Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha
-
Patent number: 7073197Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.Type: GrantFiled: December 16, 2003Date of Patent: July 4, 2006Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha
-
Patent number: 6889209Abstract: A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor's and owner's rights in software, cannot be modified.Type: GrantFiled: November 3, 2000Date of Patent: May 3, 2005Assignee: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha
-
Publication number: 20040133803Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.Type: ApplicationFiled: December 16, 2003Publication date: July 8, 2004Inventors: Michael O. Rabin, Dennis E. Shasha
-
Publication number: 20040128515Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.Type: ApplicationFiled: December 16, 2003Publication date: July 1, 2004Inventors: Michael O. Rabin, Dennis E. Shasha
-
Patent number: 6697948Abstract: A system, method, or apparatus for enabling owners and vendors of software products to protect the property rights of their software. The system and method utilizes a unique vendor tag system for each instant of a specific software product. This system interacts with a monitoring program, which, is running on the user's device to ensure that no unauthorized use takes place.Type: GrantFiled: May 5, 1999Date of Patent: February 24, 2004Inventors: Michael O. Rabin, Dennis E. Shasha
-
Publication number: 20030220882Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.Type: ApplicationFiled: May 2, 2003Publication date: November 27, 2003Applicant: ShieldIP, Inc.Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
-
Patent number: 6138118Abstract: A method and system for reconciling in a scheduling database the execution of a high priority stream of transactions that is concurrent with a low priority stream of transactions comprise the steps of copying a portion of the database into a temporary storage, establishing the high priority stream in the database, establishing the low priority stream in the temporary storage, reconciling the low priority stream with the high priority stream, and establishing some or all of the low priority stream of transactions in the database such that the high priority stream has data priority over the low priority stream and the resulting database satisfies certain safety and liveness constraints.Type: GrantFiled: July 30, 1998Date of Patent: October 24, 2000Assignee: Telcordia Technologies, Inc.Inventors: Peter E. A. Koppstein, Benjamin James Park, Dennis E. Shasha