Patents by Inventor Florian Pestoni

Florian Pestoni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060129490
    Abstract: Enhanced multimedia content on physical media interacts with the user through a media player and the Internet. Enhanced multimedia utilizes IDs for pieces of content on the media and a media key block. On the enhanced media is a file with a list of URLs. As the enhanced media plays a title requiring an external permission for decryption, the media player accesses the URL for that title and obtains the permission. The permission may be purchased or provided for free. Secure encryption and transmission of permission is accomplished by broadcast encryption using a media key block. Each media has a unique set of keys that allow the media player to process the media key block; however, each media follows a unique path through the media key block. All legitimate media players obtain the media key; circumvention devices cannot decipher the media key block.
    Type: Application
    Filed: December 10, 2004
    Publication date: June 15, 2006
    Applicants: International Business Machines Corporation, Warner Bros Entertainment Inc., Intel Corporation
    Inventors: Bradley Collar, Jeffrey Bruce Lotspiech, Florian Pestoni, Michael Ripley, Spencer Stephens
  • Publication number: 20050177740
    Abstract: A title key protection system includes a title key with recordable media content; storage in a repository is not required. The title key is decrypted when needed by a clearinghouse, and then re-encrypted. The title key confers rights from the content owners to the user to play and copy the content for personal use. A user downloads encrypted content from a content repository. The user's media recording device extracts an encrypted title key from the content and obtains a media key block and media ID from the physical media on which the content will be recorded. The encrypted title key, media key block, and media ID are transmitted to a clearinghouse. The clearinghouse decrypts the title key and derives a media unique key from the media key block and media ID. The clearinghouse re-encrypts the title key with the media unique key and returns this re-encrypted title key to the media recording device for recording with the content on the physical media.
    Type: Application
    Filed: February 9, 2004
    Publication date: August 11, 2005
    Applicant: International Business Machines Corporation
    Inventors: Deirdre Athaide, Kevin Driver, Lara Lewis, Jeffrey Lotspiech, Florian Pestoni, Savitha Srinivasan, Vladimir Zbarsky
  • Publication number: 20050111663
    Abstract: Enhanced multimedia content on physical media interacts with the user through a media player and the Internet. Enhanced multimedia utilizes IDs for pieces of content on the media and a media key block. On the enhanced media is a file with a list of URLs. As the enhanced media plays a section requiring a set of keys for decryption, the media player accesses the URL for that section and obtains the decryption key. The decryption key may be purchased or provided for free. Secure encryption and transmission of these keys is accomplished by broadcast encryption using a media key block. Each media has a unique set of keys that allow the media player to process the media key block; however, each media follows a unique path through the media key block. All legitimate media players obtain the media key; circumvention devices cannot decipher the media key block.
    Type: Application
    Filed: November 26, 2003
    Publication date: May 26, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Lotspiech, Florian Pestoni
  • Patent number: 6888944
    Abstract: Sets of encryption keys useful by devices for decrypting encrypted content are defined using an error-correcting code such as a Reed-Solomon code to define vectors of length “n” over an alphabet of (0, . . . , N?1), wherein “n” is the number of columns in a key matrix and “N” is the number of rows in the matrix. Each vector represents a set of keys that can be assigned to a device. With this invention, overlap between sets of keys can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the key set of a compromised device is revoked. Also, only the generating matrix of the error-correcting code and the index of one set of keys need be stored in memory, since all previously defined key sets can be regenerated if need be from just the generating matrix and index.
    Type: Grant
    Filed: February 5, 2001
    Date of Patent: May 3, 2005
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo Ismael Nin, Florian Pestoni
  • Publication number: 20050086532
    Abstract: A device removal system securely removes an item of content or a device from a content-protected home network. An authorization table maintains a list of devices in the content-protected home network in addition to removed devices. The authorization table also maintains a list of deleted content. Through management of various cryptographic keys and techniques, devices and content will not play on a content-protected home network after they have been removed. A secret network ID reduces the possibility of unauthorized playing of content on the content-protected home network. A web server may join the content-protected home network as a device, providing backup for the secret network ID. Otherwise, the device manufacturer will provide the secret network ID in case of a device failure. Storing a verification value in each device ensures integrity of critical cryptographic values. This verification value is compared to network values to ensure network values have not been corrupted.
    Type: Application
    Filed: October 21, 2003
    Publication date: April 21, 2005
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Lotspiech, Kevin McCurley, Florian Pestoni
  • Publication number: 20030198350
    Abstract: A method, system and program product for managing a size of a key management block (KMB) during content distribution is provided. Specifically, a first KMB corresponding to a first subtree of devices is received along with content as encrypted with a title key. If a size of the first KMB exceeds a predetermined threshold, a second subtree will be created. A second KMB corresponding to the second subtree of devices will then be generated. The second KMB contains an entry revoking the entire first subtree of devices and, as such, is smaller than the first KMD. Any compliant devices from the first subtree are migrated to the second subtree.
    Type: Application
    Filed: April 18, 2002
    Publication date: October 23, 2003
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Foster, Jeffrey B. Lotspiech, Florian Pestoni, Wilfred E. Plouffe, Frank A. Schaffa
  • Publication number: 20030198351
    Abstract: The present invention provides a method, system and program product for modifying content usage conditions during broadcast content distribution. Specifically, the present invention allows protected (e.g., encrypted, secured, etc.) content to be received along with content usage conditions, an encrypted combination of the content usage conditions and a title key (e.g., a MAC), and a key management block. Using the key management block, a key encrypting key can be determined for decrypting the combination. Once the combination is decrypted, the content usage conditions can be modified (e.g., edited, added to, etc.).
    Type: Application
    Filed: April 18, 2002
    Publication date: October 23, 2003
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Foster, Jeffrey B. Lotspiech, Dalit Naor, Sigfredo I. Nin, Florian Pestoni, Wilfred E. Plouffe, Frank A. Schaffa
  • Publication number: 20030200176
    Abstract: A method and system for attaching a title key to encrypted content for synchronized transmission to, or storage by, a recipient is provided. Specifically, under the present invention, an elementary media stream is parceled into content units that each include a content packet and a header. The content packets are encrypted with one or more title keys. Once the content packets have been encrypted, the title keys are themselves encrypted with a key encrypting key. The encrypted title keys are then attached to the corresponding encrypted content packets for synchronized transmission to a recipient.
    Type: Application
    Filed: April 18, 2002
    Publication date: October 23, 2003
    Applicant: International Business Machines Corporation
    Inventors: Eric M. Foster, Jeffrey B. Lotspiech, Florian Pestoni, Wilfred E. Plouffe, Frank A. Schaffa
  • Publication number: 20030037157
    Abstract: A networked virtual jukebox renders audible music or other audio files to all within audio range of the virtual jukebox. The order of rendering is determined by requesting methods, which include networked peer-voting input, recent play history, random selection and voting. Voting is received from each networked device in communication with the networked virtual jukebox using all types of input methods such as keyboard, mouse, and voice input. The networked virtual jukebox can also operate unattended by playing music and/or audio files based on random selection of past voting.
    Type: Application
    Filed: August 14, 2001
    Publication date: February 20, 2003
    Applicant: INTERNATIONAL BUSINESS CORPORATION
    Inventors: Florian Pestoni, Clemens Drews
  • Publication number: 20030037144
    Abstract: A method and system give an audience the ability to gain more control over the content they receive. The system learns about each user's individual preferences and builds profiles for users and channels. The content for a given channel is selected either directly by the users or indirectly by software that uses a collaborative content programming method. Collaborative content programming offers an intermediate solution in which users with similar preferences jointly decide what content is included in a specific channel.
    Type: Application
    Filed: August 14, 2001
    Publication date: February 20, 2003
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Florian Pestoni, Joel L. Wolf
  • Publication number: 20020106087
    Abstract: Sets of encryption keys useful by devices for decrypting encrypted content are defined using an error-correcting code such as a Reed-Solomon code to define vectors of length “n” over an alphabet of (0, . . . , N−1), wherein “n” is the number of columns in a key matrix and “N” is the number of rows in the matrix. Each vector represents a set of keys that can be assigned to a device. With this invention, overlap between sets of keys can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the key set of a compromised device is revoked. Also, only the generating matrix of the error-correcting code and the index of one set of keys need be stored in memory, since all previously defined key sets can be regenerated if need be from just the generating matrix and index.
    Type: Application
    Filed: February 5, 2001
    Publication date: August 8, 2002
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo Ismael Nin, Florian Pestoni
  • Publication number: 20020104001
    Abstract: A method for enforcing compliance in both the copy protect domain and service subscription domain for streamed multicast data. Each content is encrypted with a title key that itself is encrypted with a channel unique key which is a hash of a session key and a channel key. A compliant player is given the channel key upon registration for a subscription service (representing subscription protection) and is also given device keys upon activation (representing copy protection) for decrypting the session key. Consequently, the channel unique key can be obtained (and, hence, the content decrypted) only by a player that is compliant with both copy protection rules and subscription rules. The channel key can be refreshed periodically as subscriptions change or expire.
    Type: Application
    Filed: January 8, 2002
    Publication date: August 1, 2002
    Applicant: International Business Machines Corporation
    Inventors: Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo Ismael Nin, Florian Pestoni
  • Publication number: 20020095384
    Abstract: The present invention provides for the protection of and ability to upgrade to new formats of digital content by providing consumers of the digital content the capability of purchasing content insurance on digital content they consume. By purchasing insurance on content, at a later time consumers are able to return to the content distribution channels and re-obtain the previously purchased content in the same, or new format as the original purchased.
    Type: Application
    Filed: January 16, 2001
    Publication date: July 18, 2002
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Florian Pestoni, Dalit Naor
  • Publication number: 20020062338
    Abstract: A network computing device, known as a CyberHub, based on low-cost hardware and Java programming provides an architecture for extensible and inexpensive network connectivity and can be thought of as a combination of router and server in a box. The CyberHub provides all necessary functions with a small footprint and lightweight components, so that it can perform as an embedded device or thin server. The CyberHub can be employed in many different applications, ranging from an “instant office” to embedded network connectivity for remote devices.
    Type: Application
    Filed: September 30, 1998
    Publication date: May 23, 2002
    Inventors: KEVIN SNOW MCCURLEY, FLORIAN PESTONI, BENJAMIN CLAY REED, STEVEN RAY WELCH, JASON YEONG ZIEN
  • Patent number: 6126203
    Abstract: A machine-readable check comprising a check and a machine-readable image block printed on the check. Preferably, the image block is a two-dimensional print code.
    Type: Grant
    Filed: March 11, 1997
    Date of Patent: October 3, 2000
    Assignee: International Business Machines Corporation
    Inventors: Cynthia Dwork, Moni Naor, Florian Pestoni
  • Patent number: 6081610
    Abstract: A system and method are provided for producing verified signatures on documents such as checks and affidavits. Initially, a customer who is to obtain a verified signature, at some point in time, registers with a signatory authority, and a secret key, having public and private components, is established uniquely for that customer. When a document requires a verified signature, the customer presents the document and proof of his/her identity, such as a preprogrammed computer-interfacable card, to a signature system. Typically, such a system is to be available at an institution, such as an office, bank, or post office, where such services will routinely be used. The system accesses the archive of the private portion of the customer's key, and generates an encoded signature based, in part, on the content of the document. Accordingly, when a recipient of the document later wishes to verify the signature, the recipient uses the customer's public key to decode the signature.
    Type: Grant
    Filed: December 29, 1995
    Date of Patent: June 27, 2000
    Assignee: International Business Machines Corporation
    Inventors: Cynthia Dwork, Moni Naor, Florian Pestoni
  • Patent number: 5926551
    Abstract: A system and method are provided for facilitating proof that a specific item, such as a document, has been sent via a communication medium, such as the mail service of the United States Postal Service, at a specific time. A bit map image is produced, such as by scanning a hard copy document. Preferably the bit map is compressed into a data string and hashed. The hash file is signed by a certifying authority, such as the USPS, using an existentially unforgeable signature scheme. The original document, a code representation of the string, and a code representation of the signature are sent via the communication medium. As a result, the combination of materials sent provides proof of the authenticity of the content of the document.
    Type: Grant
    Filed: December 28, 1995
    Date of Patent: July 20, 1999
    Assignee: International Business Machines Corporation
    Inventors: Cynthia Dwork, Moni Naor, Florian Pestoni
  • Patent number: 5778011
    Abstract: A method and apparatus for encoding and detecting data which can be represented in a physical array of modules recorded on a medium. Information is encoded in "image-blocks". An image-block comprises a plurality of "sub-blocks". Sub-blocks comprise a plurality of "modules". A module is the smallest unit of information within the image-block. Discrete contiguous portions of each sub-block of an image-block taken together are encoded into an outer codeword. A plurality of these outer codewords are generated and recorded across each sub-block. A portion of the information that is to be recorded within each sub-block is encoded in a plurality of inner error detection and correction codewords, each preferably stored entirely within one corresponding sub-block. Accordingly, small scattered random errors can be corrected locally by using information entirely contained within the sub-block.
    Type: Grant
    Filed: June 7, 1995
    Date of Patent: July 7, 1998
    Assignee: International Business Machines Corporation
    Inventors: Mario Blaum, Jehoshua Bruck, Florian Pestoni, Felix Gustavo Emilio Safar, Jorge L. C. Sanz