Patents by Inventor Dulce B. Ponceleón

Dulce B. Ponceleón has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190122155
    Abstract: A method, computer system, and a computer program product for blockchain enabled crowdsourcing is provided. The present invention may include receiving an asset from a content provider. The present invention may also include deploying a smart contract based on the received asset, wherein the deployed smart contract includes a plurality of compensation rules. The present invention then may include partitioning the received asset into a plurality of fragments based on the deployed smart contract. The present invention may further include releasing the partitioned plurality of fragments into a blockchain network. The present invention may also include tracking each fragment within the released plurality of fragments using the smart contract.
    Type: Application
    Filed: October 20, 2017
    Publication date: April 25, 2019
    Inventors: Jeronimo Irazabal, Raul O. Laprida, Diego A. Masini, Dulce B. Ponceleon
  • Publication number: 20190042620
    Abstract: An example operation may include one or more of identifying a blockchain transaction, storing the blockchain transaction in a blockchain, assigning the blockchain transaction a transaction number and a block number, hashing a portion of blockchain transaction data associated with the blockchain transaction, and updating a blockchain index based on the hashed portion of the blockchain transaction.
    Type: Application
    Filed: August 1, 2017
    Publication date: February 7, 2019
    Inventors: Andres Garagiola, Jeronimo Irazabal, Raul Laprida, Guillermo R. Lopez, Diego Masini, Dulce B. Ponceleon
  • Publication number: 20190026821
    Abstract: An example operation may include one or more of identifying a first conferred asset exchange request from a first user account and a second conferred asset exchange request from a second user account which are capable of being used to settle each other, requesting an intermediary blockchain to perform a conferred asset settlement transaction for the first and second conferred asset exchange requests, determining that first conferred assets of the first user account and second conferred assets of the second user account have been transferred to temporary intermediary trading addresses, respectively, and releasing the first conferred assets to the second user account and the second loyalty assets to the first user account, in response to the determining.
    Type: Application
    Filed: July 21, 2017
    Publication date: January 24, 2019
    Inventors: Luis Angel D. Bathen, Pawan R. Chowdhary, Andres Garagiola, Shun Jiang, Diego A. Masini, Guangjie Ren, Dulce B. Ponceleon, Chung-hao Tan
  • Patent number: 9998420
    Abstract: Live events attendance smart transportation and planning. A social media profile and a social media friends list corresponding to the user is retrieved by the event service. The event service generates and transmits an event recommendation list to the user. The event service receives the ticket confirmation of the user obtaining a ticket to an event and receives a user transportation preference to attend the event. The event service retrieves a transportation preference for a friend from the social media friends list who obtained the admissions ticket to the event and generates a transportation recommendation to the event for the user and the friend from the social media friends list based on each of their transportation preferences for the event. The event service transmits the transportation recommendation to the user and the friend from the social media friends list.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Priscilla Fernanda Jimenez Pazmino, Dulce B. Ponceleon
  • Publication number: 20180019879
    Abstract: One example method of operation may include receiving a request, from an entity, for one or more tokens based on one or more attributes, encrypting and masking the one or more attributes, adding the encrypted and masked one or more attributes to the one or more tokens, and transmitting the one or more tokens to the entity.
    Type: Application
    Filed: May 9, 2017
    Publication date: January 18, 2018
    Inventors: David W. Kravitz, Dulce B. Ponceleon, Diego A. Masini, Raul O. Laprida, Andres Garagiola, John B. Geagan, III
  • Publication number: 20180019993
    Abstract: One example method may include generating a template transaction certificate by one or more entities which verify proof of ownership of attributes incorporated into the template transaction certificate, and generating one or more operational transaction certificates by the one or more entities which verified proof of ownership of the template transaction certificate.
    Type: Application
    Filed: June 23, 2017
    Publication date: January 18, 2018
    Inventors: David W. Kravitz, Dulce B. Ponceleon, Diego A. Masini, John B. Geagan, III, Brian K. Smith
  • Patent number: 9866373
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: July 7, 2017
    Date of Patent: January 9, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John B. Geagan, III, Dulce B. Ponceleon
  • Publication number: 20170337351
    Abstract: An encryption scheme is provided in which subset-difference lists are generated by blacklisting subsets corresponding to compromised devices and splitting subset difference lists corresponding to the blacklisted subsets into multiple subset difference lists. In some embodiments, a subset-difference tree is generated. The subset-difference tree includes a plurality of subsets. The subset-difference tree covers a plurality of nodes. Each of the plurality of subsets has an apex node among the plurality of nodes. At least one blacklisted node of the plurality of nodes is determined. A first subset among the plurality of subsets is identified that covers the at least one blacklisted node. A plurality of substitute subsets is determined. Each of the plurality of substitute subsets overlaps the first subset and does not cover the at least one blacklisted node. The plurality of substitute subsets are substituted for the first subset.
    Type: Application
    Filed: May 18, 2016
    Publication date: November 23, 2017
    Inventors: John B. Geagan, Dulce B. Ponceleon
  • Publication number: 20170337141
    Abstract: A system architecture providing memory encryption suitable for protection against liquid nitrogen and trace probe attacks. In one embodiment, a method of and system for memory encryption are provided. A write request is received at a memory controller. The write request includes first data and a first address. The memory controller is embedded in a CPU and is operatively coupled to memory external to the CPU. The first data are encrypted at the memory controller to generate encrypted first data. The encrypted first data are written to the memory.
    Type: Application
    Filed: May 18, 2016
    Publication date: November 23, 2017
    Inventors: John B. Geagan, Dulce B. Ponceleon
  • Patent number: 9817899
    Abstract: Embodiments of the present invention relate to searching for secret data through an untrusted searcher without exposing the secret data. In one embodiment, a method of and computer program product for searching for secret data through an untrusted searcher is provided. A secret value is read from a storage medium. The secret value is divided into a plurality of portions. Each of the plurality of portions is ranked. A subset of the secret value is determined from the ranking of the plurality of portions. A search string is constructed from the subset. The search string is transmitted to a searcher via a network. Search results are received from the searcher via the network. The search results are compared to the secret value to determine whether the searcher found the secret value.
    Type: Grant
    Filed: August 26, 2013
    Date of Patent: November 14, 2017
    Assignee: GLOBALFOUNDRIES
    Inventors: John Bernard Geagan, III, Dulce B. Ponceleon
  • Publication number: 20170310461
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Application
    Filed: July 7, 2017
    Publication date: October 26, 2017
    Inventors: John B. Geagan, III, Dulce B. Ponceleon
  • Patent number: 9735954
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: November 1, 2016
    Date of Patent: August 15, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John B. Geagan, III, Dulce B. Ponceleon
  • Publication number: 20170163591
    Abstract: Live events attendance smart transportation and planning. A social media profile and a social media friends list corresponding to the user is retrieved by the event service. The event service generates and transmits an event recommendation list to the user. The event service receives the ticket confirmation of the user obtaining a ticket to an event and receives a user transportation preference to attend the event. The event service retrieves a transportation preference for a friend from the social media friends list who obtained the admissions ticket to the event and generates a transportation recommendation to the event for the user and the friend from the social media friends list based on each of their transportation preferences for the event. The event service transmits the transportation recommendation to the user and the friend from the social media friends list.
    Type: Application
    Filed: December 4, 2015
    Publication date: June 8, 2017
    Inventors: Priscilla Fernanda Jimenez Pazmino, Dulce B. Ponceleon
  • Publication number: 20170085373
    Abstract: Space-efficient key allocations in broadcast encryption systems are provided. In some embodiments, a key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. A plurality of encrypted keys is received. Each encrypted key has an associated identifier. A first encrypted key is selected from the plurality of encrypted keys such that the key identifier of the first encrypted is equivalent to the first key identifier. A first cryptographic function is determined corresponding to the first cryptographic function identifier. The first cryptographic function is applied to the first encrypted key using the first cryptographic key to obtain a first intermediate cryptographic key. A content cryptographic key is determined using the first intermediate cryptographic key. The content cryptographic key is adapted for decryption of encrypted content.
    Type: Application
    Filed: April 28, 2016
    Publication date: March 23, 2017
    Inventor: Dulce B. Ponceleon
  • Publication number: 20170054551
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Application
    Filed: November 1, 2016
    Publication date: February 23, 2017
    Inventors: John B. Geagan, Dulce B. Ponceleon
  • Patent number: 9559840
    Abstract: Embodiments of the present invention relate to time delayed release of previously distributed digital content. In one embodiment, a method of and computer program product for low-bandwidth time-embargoed content disclosure are provided. A first cryptographic key is received. Encrypted content is received, encoded in a computer readable medium. A correction value is received. A predetermined function is applied to the first cryptographic key and the correction value to determine a second cryptographic key. The second cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: January 31, 2017
    Assignee: GlobalFoundries Inc.
    Inventors: Dulce B. Ponceleon, John Bernard Geagan, III
  • Patent number: 9537652
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: January 3, 2017
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: John B. Geagan, III, Dulce B. Ponceleon
  • Publication number: 20160285622
    Abstract: Embodiments of the present invention relate to encryption key allocation with additional security elements to lessen vulnerability to certain attacks. In one embodiment, a method and computer program product is provided for broadcast encryption. A key bundle encoded in a non-transient machine-readable medium is received. The key bundle comprises a first cryptographic key and an associated first cryptographic function identifier. Encrypted content is received. A key block corresponding to a subset difference tree is received. A first cryptographic triple function corresponding to the first cryptographic function identifier is determined. The subset difference tree is traversed using the first cryptographic key and the first cryptographic triple function to obtain a content cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Application
    Filed: March 27, 2015
    Publication date: September 29, 2016
    Inventors: John B. Geagan, III, Dulce B. Ponceleon
  • Patent number: 9363075
    Abstract: Space-efficient key allocations in broadcast encryption systems are provided. In some embodiments, a key bundle is read. The key bundle includes a first cryptographic key, an associated first key identifier, and an associated first cryptographic function identifier. Encrypted content is received. A plurality of encrypted keys is received. Each encrypted key has an associated identifier. A first encrypted key is selected from the plurality of encrypted keys such that the key identifier of the first encrypted is equivalent to the first key identifier. A first cryptographic function is determined corresponding to the first cryptographic function identifier. The first cryptographic function is applied to the first encrypted key using the first cryptographic key to obtain a first intermediate cryptographic key. A content cryptographic key is determined using the first intermediate cryptographic key. The content cryptographic key is applied to the encrypted content to obtain decrypted content.
    Type: Grant
    Filed: October 18, 2013
    Date of Patent: June 7, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Dulce B. Ponceleon
  • Patent number: 9147178
    Abstract: A visual media de-identification system is described. The system includes an image merger and a de-identifying engine. The image merger is configured to merge a sequence of images from a set of visual media data into an averaged image. The de-identifying engine is configured to: bound portions of the averaged image that are determined to be relatively fixed, wherein each bounded portion is identified by a corresponding position in the averaged image; generate a template comprising the bounded portions and the corresponding position for each bounded portion in the averaged image; and de-identify the sequence of images by obfuscating content in the bounded portions.
    Type: Grant
    Filed: January 16, 2012
    Date of Patent: September 29, 2015
    Assignee: International Business Machines Corporation
    Inventors: Tanveer F. Syeda-Mahmood, David J. Beymer, Omar U. F. Choque, Dulce B. Ponceleon, Dai Shi