Patents by Inventor Gideon Yuval
Gideon Yuval has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7711861Abstract: A secure communication channel between first and second radio frequency communication devices is indicated by the synchronized indicators on each of the two devices. The indicator may be a light or speaker. After a secure channel is established, the indicators may be simultaneously operated so that a user may definitively and positively determine that the two devices are securely connected to each other. Any interloper devices would not be indicating on the same pattern and thereby be identified.Type: GrantFiled: August 30, 2006Date of Patent: May 4, 2010Assignee: Microsoft CorporationInventor: Gideon Yuval
-
Patent number: 7427926Abstract: Motion detection notification is described. In an embodiment, a motion detector in a portable device detects a motion of the device and issues an activation signal when the detected motion has a magnitude greater than a preset threshold. A detection notification component in the portable device then receives the activation signal and initiates communication with an additional device that detects a corresponding motion to the motion of the portable device and is configured for communication with the portable device.Type: GrantFiled: January 26, 2006Date of Patent: September 23, 2008Assignee: Microsoft CorporationInventors: Michael Sinclair, Kenneth Hinckley, Darko Kirovski, Gideon Yuval, Tom Blank
-
Publication number: 20080125038Abstract: A secure communication channel between first and second radio frequency communication devices is indicated by the synchronized indicators on each of the two devices. The indicator may be a light or speaker. After a secure channel is established, the indicators may be simultaneously operated so that a user may definitively and positively determine that the two devices are securely connected to each other. Any interloper devices would not be indicating on the same pattern and thereby be identified.Type: ApplicationFiled: August 30, 2006Publication date: May 29, 2008Applicant: Microsoft CorporationInventor: Gideon Yuval
-
Publication number: 20070188323Abstract: Motion detection notification is described. In an embodiment, a motion detector in a portable device detects a motion of the device and issues an activation signal when the detected motion has a magnitude greater than a preset threshold. A detection notification component in the portable device then receives the activation signal and initiates communication with an additional device that detects a corresponding motion to the motion of the portable device and is configured for communication with the portable device.Type: ApplicationFiled: January 26, 2006Publication date: August 16, 2007Applicant: Microsoft CorporationInventors: Michael Sinclair, Kenneth Hinckley, Darko Kirovski, Gideon Yuval, Tom Blank
-
Publication number: 20070086586Abstract: A computer-implemented system and method for configuring and operating a white-box cipher is disclosed. In one implementation, the system employs a method for configuring pseudorandom data derived from a key to perform key-scheduling functionality associated with rounds of the cipher. Additionally, the system employs a method for generating white-box executable code, wherein the code hides the pseudorandom data by incorporating it into mathematical operations performed during execution of the rounds. Accordingly, the cipher is suited for white-box applications managing digital rights, such as decoding audio, video and other content.Type: ApplicationFiled: October 14, 2005Publication date: April 19, 2007Applicant: Microsoft CorporationInventors: Mariusz Jakubowski, Ramarathnam Venkatesan, Gideon Yuval, Yacov Yacobi, Matthew Cary
-
Publication number: 20070076881Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: December 16, 2005Publication date: April 5, 2007Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20060294386Abstract: Systems and/or methods are described that strengthen secure hash functions. These systems and/or methods may, in some embodiments, create a random-appearing element based on a message and using a process. The element may then be assembled with the message. This assembly may be hashed using a secure hash function. Using the same process and secure hash function, the message may later be authenticated.Type: ApplicationFiled: June 28, 2005Publication date: December 28, 2006Applicant: Microsoft CorporationInventors: Gideon Yuval, Ramarathnam Venkatesan
-
Publication number: 20060174128Abstract: Systems and methods are described herein for embedding and detecting a watermark in a digital content file, such as an audio file or a video file. If the watermark is detected in the digital content, a certificate associated with the digital content is located. The certificate contains copyright information that indicates permissible uses of the digital content file, e.g., the digital content file may be played one time, five times, any number of times during a specified time period, etc. If the watermark is not detected, the file is processed. In one implementation, a device configured to process the digital content file is also configured to locate a certificate associated with the digital content file before processing it. If the certificate is not found, the file is not played. If the certificate is found, the device only processes the file in accordance with instructions in the associated certificate.Type: ApplicationFiled: April 14, 2006Publication date: August 3, 2006Applicant: Microsoft CorporationInventor: Gideon Yuval
-
Publication number: 20060107048Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: December 19, 2005Publication date: May 18, 2006Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20050273862Abstract: Methods and systems are described that enable protection of digital content, such as movies and the like, by making pirated copies traceable back to a unique decryption key that was utilized to decrypt the originally encrypted content. The innovative advancements do not rely on post-distribution watermarking or fingerprinting techniques, and yet intrinsically link any unauthorized copies back to a unique cryptographic key or key collection that was used when the genuine copy was reproduced. In one embodiment, digital content is provided and comprises multiple partition sets, with each partition set comprising a first partition and at least one different version of the first partition. Each partition of each partition set is uniquely marked and encrypted with a different key. Individual unique key collections are then defined to contain, for each partition set, one key that was used to encrypt a partition from the partition set and no two key collections are identical.Type: ApplicationFiled: July 28, 2005Publication date: December 8, 2005Applicant: Microsoft CorporationInventors: Josh Benaloh, Andrew Rosen, Gideon Yuval
-
Publication number: 20050207577Abstract: Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized use are described. Encrypted video signals are transmitted from a source device, e.g., display adapter, to a display device, e.g., monitor, over analog signal lines after the identity of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices. The source and destination devices each include a pseudo-random number generator driven by the session key. As part of the encryption process a false video signal is generated. The false video signal and R, G, B video signals are transmitted to the display device over four lines. The lines used to transmit the R, G, B and false video signals are periodically swapped as a function of the output of the pseudo random number generator to encrypt, e.g., scramble, the video signals.Type: ApplicationFiled: May 20, 2005Publication date: September 22, 2005Applicant: Microsoft CorporationInventors: Paul England, Andrew Rosen, Yacov Yacobi, Gideon Yuval
-
Publication number: 20050195976Abstract: System for protecting copyrighted information, e.g., video signals, from unauthorized copying. Analog red (R), green (G) and blue (B) video signals are transmitted from a source device, e.g., a display adapter, to a display device, e.g., a monitor, over corresponding analog signal lines after the identify of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices after the identification of the destination device is confirmed. The source and destination devices each includes a pseudo-random number generator driven by the session key. The lines that carry the R, G and B video signals are changed, e.g., swapped, on a periodic basis as a function of the output of the pseudo-random number generator in the source device.Type: ApplicationFiled: March 17, 2005Publication date: September 8, 2005Applicant: Microsoft CorporationInventors: Yacov Yacobi, Paul England, Gideon Yuval
-
Publication number: 20050190914Abstract: Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.Type: ApplicationFiled: February 27, 2004Publication date: September 1, 2005Inventors: Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon Yuval
-
Publication number: 20050168481Abstract: An imaging or other sensory reproduction system efficiently converts image or other sensory data between a perceptual color space (e.g., the sRGB color space) and a physical color space (unity gamma) or other perceptual/physical sensory models that are related by an expression involving a computationally expensive exponential function. The imaging system calculates exponential functions that can be composed from computationally inexpensive operations, such as square root, square, reciprocal, as well as multiplications and/or additions and subtractions. These computationally less expensive functions are then combined, such as in a weighted and/or offset mean, summation or difference to approximate the computationally expensive exponential function. The imaging system evaluates the expression using the approximation to efficiently yield the converted image data.Type: ApplicationFiled: March 29, 2005Publication date: August 4, 2005Applicant: Microsoft CorporationInventors: Nicholas Wilt, Gideon Yuval, Michael Stokes
-
Publication number: 20050168487Abstract: An imaging or other sensory reproduction system efficiently converts image or other sensory data between a perceptual color space (e.g., the sRGB color space) and a physical color space (unity gamma) or other perceptual/physical sensory models that are related by an expression involving a computationally expensive exponential function. The imaging system calculates exponential functions that can be composed from computationally inexpensive operations, such as square root, square, reciprocal, as well as multiplications and/or additions and subtractions. These computationally less expensive functions are then combined, such as in a weighted and/or offset mean, summation or difference to approximate the computationally expensive exponential function. The imaging system evaluates the expression using the approximation to efficiently yield the converted image data.Type: ApplicationFiled: March 29, 2005Publication date: August 4, 2005Applicant: Microsoft CorporationInventors: Nicholas Wilt, Gideon Yuval, Michael Stokes
-
Publication number: 20050066184Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: November 10, 2004Publication date: March 24, 2005Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20050066183Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: November 10, 2004Publication date: March 24, 2005Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20050066185Abstract: An exclusive encryption system is established using multiple computing devices. The exclusive encryption system allows for the exclusion of certain plaintext (e.g., by one of the computing devices) and ciphertext (e.g., by another of the computing devices) while at the same time maintaining the privacy created by the encryption (e.g., so the other computing device cannot see the plaintext). The exclusive encryption system may be implemented as part of a serverless distributed file system with directory entries (e.g., file names or folder names) being the plaintext, or alternatively as part of other systems.Type: ApplicationFiled: November 10, 2004Publication date: March 24, 2005Applicant: Microsoft CorporationInventors: John Douceur, Josh Benaloh, Gideon Yuval, Atul Adya
-
Publication number: 20050010891Abstract: Each component binary in a heterogeneous program is translated from a platform-specific instruction set into a set of intermediate representation (IR) instructions that are platform-neutral. The IR instructions are grouped into IR code blocks, the IR code blocks into IR procedures, and the IR procedures into IR components to create an intermediate representation hierarchy for the program. An application program interface is provided that permits user access to the IR hierarchy for instrumentation, optimization, navigation, and manipulation of the IR hierarchy. The transformed IR hierarchy is then translated into platform-specific instructions and output as a modified binary. The user can designate a different platform for the output translation of a code block than the platform for which the code block was originally written. Prologue and epilog code is added to contiguous blocks that are translated into different architectures.Type: ApplicationFiled: August 4, 2004Publication date: January 13, 2005Applicant: Microsoft CorporationInventors: Ronnie Chaiken, Hon Keat Chan, Andrew Edwards, Gregory Eigsti, David Gillies, Bruce Kuramoto, John Lefor, Ken Pierce, Amitabh Srivastava, Hoi Vo, Gideon Yuval
-
Patent number: 5103420Abstract: A method and apparatus for performing SRT division, in which Gray coded quotient bit signals are generated during each iteration from a divisor signal having Gray coded bits, and a dividend signal. Preferably, only the two most significant bits of the divisor signal are encoded into Gray code at the start of the division process, and the Gray coded quotient bit signals are decoded after each iteration, or after the final iteration, for use in generating the final quotient. In a preferred embodiment, the invention is a circuit capable of performing both single-precision and double-precision operations, and includes a pair of alternately operating divider block circuits each for generating a pair of quotient bits during each iteration cycle.Type: GrantFiled: December 4, 1989Date of Patent: April 7, 1992Inventors: Dror Avnon, Zvi Greenfeld, Gideon Yuval, Yair Baydach