Patents by Inventor Giovanni Di-Crescenzo
Giovanni Di-Crescenzo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9094206Abstract: The inventive system for providing strong security for UDP communications in networks comprises a server, a client, and a secure communication protocol wherein authentication of client and server, either unilaterally or mutually, is performed using identity based encryption, the secure communication protocol preserves privacy of the client, achieves significant bandwidth savings, and eliminates overheads associated with certificate management. VDTLS also enables session mobility across multiple IP domains through its session resumption capability.Type: GrantFiled: October 27, 2008Date of Patent: July 28, 2015Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Stanley Pietrowicz, Hyong Sop Shim, Tao Zhang
-
Patent number: 9032202Abstract: A server receives from a client at least one interest pseudonym produced by a double application of a pseudo random function to at least one interest of the client. The server encrypts an item. The server computes at least one intermediate topic pseudonym for at least one topic associated with the item by applying the function to each of the at least one topic associated with the item. The server transmits the at least one intermediate topic pseudonym, the at least one interest pseudonym, and the encrypted item to a third party. The third party may apply the function to the at least one intermediate topic pseudonym to produce at least one topic pseudonym associated with the item and transmit the encrypted item to the client for decryption when one of the at least one masked topic pseudonym is equal to one of the at least one interest pseudonym of the client.Type: GrantFiled: February 25, 2013Date of Patent: May 12, 2015Assignee: Vencore Labs, Inc.Inventor: Giovanni Di Crescenzo
-
Patent number: 8990566Abstract: A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of a topic as a root and at least one client as a leaf. The server encrypts a key associated with a conditional oblivious transfer protocol using the topic-based key. The server encrypts an item with the key associated with the conditional oblivious transfer protocol. The server transmits the encrypted key and the encrypted item to a plurality of clients. The encrypted item is decryptable by the at least one client with the key associated with the conditional oblivious transfer protocol when the key associated with the conditional oblivious transfer protocol is decryptable with an interest-based key associated with a tree structure having a pseudonym of an interest as a root and the at least one client as a leaf.Type: GrantFiled: February 25, 2013Date of Patent: March 24, 2015Assignee: TT Government Solutions, Inc.Inventor: Giovanni Di Crescenzo
-
Patent number: 8767965Abstract: An inventive scheme for detecting parties responsible for repeated malicious activities in secure and anonymous communication is presented. The scheme comprises generating a pool of keys, distributing to and associating with each party a small number of keys chosen randomly from the pool, revoking a key when it is detected as used in a malicious activity, creating a set of parties associated with the revoked key, revoking additional keys randomly chosen among the keys not currently revoked, selecting new keys, and when a party requests an updated key, sending the updated key selected from among the new keys to the requesting party, wherein if an other malicious activity is detected, creating another set of the parties associated with the other malicious activity and identifying the parties in both sets. The steps of the inventive scheme are repeated until only one party is in the intersection set.Type: GrantFiled: July 18, 2008Date of Patent: July 1, 2014Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Tao Zhang, Robert G. White
-
Patent number: 8645282Abstract: A Secure Virtual Point of Service (SVPOS) that coordinates the authentication, authorization, and identity, settlement, arbitration and non-repudiation for an electronic commercial transaction. For each commercial transaction, both the buyer and merchant authenticate itself to the SVPOS and create two unique transaction encryption keys, one for the buyer and one for the merchant. The merchant uses both encryption keys to encrypt a package that include at least product identification. The merchant and buyer calculate a hash of the package and transmit the calculated hash to the SVPOS for comparison to prevent repudiation. If the calculated hash is identical the buyer receives the merchants encryption key and decrypts the package. Payment is released by the SVPOS if the buyer is satisfied with the package via a Parlay system. If the buyer is not satisfied, said SVPOS performs arbitration between the buyer and merchant to determine if the package is correct.Type: GrantFiled: May 16, 2006Date of Patent: February 4, 2014Assignee: TTI Inventions C LLCInventors: Faramak Vakil, Vijay K. Varma, Raquel Morera Sempere, Giovanni Di Crescenzo
-
Patent number: 8635681Abstract: A method and system for public key infrastructure key and certificate management provides anonymity to certificate holders and protects the privacy of certificate holders from the compromise of a certificate authority. Functional separation is provided in the authorization of a certificate request and the assignment of certificates and key pairs. The authorizing certificate authority approves or denies each certificate request from a requestor whose identity is not made available to the assigning certificate authority. The assigning certificate authority, upon approval from the authorizing certificate authority, issues one or more certificates and optionally generates and provides the associated key pairs to the requester without disclosing these certificates and key pairs to the authorizing certificate authority.Type: GrantFiled: February 1, 2008Date of Patent: January 21, 2014Assignee: Telcordia Technologies, Inc.Inventors: Tao Zhang, Eric Van Den Berg, Andrew Burnette, Giovanni Di Crescenzo, Richard Ferrer, Stanley Pietrowicz, Robert G. White
-
Patent number: 8578498Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.Type: GrantFiled: February 29, 2012Date of Patent: November 5, 2013Assignee: TTI Inventions C LLCInventors: Giovanni Di Crescenzo, Faramak Vakil
-
Patent number: 8572743Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.Type: GrantFiled: February 29, 2012Date of Patent: October 29, 2013Assignee: TTI Inventions C LLCInventors: Giovanni Di Crescenzo, Faramak Vakil
-
Publication number: 20130246791Abstract: A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of a topic as a root and at least one client as a leaf. The server encrypts a key associated with a conditional oblivious transfer protocol using the topic-based key. The server encrypts an item with the key associated with the conditional oblivious transfer protocol. The server transmits the encrypted key and the encrypted item to a plurality of clients. The encrypted item is decryptable by the at least one client with the key associated with the conditional oblivious transfer protocol when the key associated with the conditional oblivious transfer protocol is decryptable with an interest-based key associated with a tree structure having a pseudonym of an interest as a root and the at least one client as a leaf.Type: ApplicationFiled: February 25, 2013Publication date: September 19, 2013Applicant: APPLIED COMMUNICATIONS SCIENCESInventor: Giovanni Di Crescenzo
-
Patent number: 8528060Abstract: Efficient secure password protocols are constructed that remain secure against offline dictionary attacks even when a large, but bounded, part of the storage of a server responsible for password verification is retrieved by an adversary through a remote or local connection. A registration algorithm and a verification algorithm accomplish the goal of defeating a dictionary attack. A password protocol where a server, on input of a login and a password, carefully selects several locations from the password files, properly combines their content according to some special function, and stores the result of this function as a tag that can be associated with this password and used in a verification phase to verify access by users.Type: GrantFiled: December 22, 2006Date of Patent: September 3, 2013Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Richard J. Lipton, Sheldon Walfish
-
Patent number: 8387126Abstract: A system and method is provided for authenticating a first device to a second device. This involves providing images to the second device, receiving an indication of selected ones of the images as authenticating images, and identifying an authenticating code associated with the second device. This also involves receiving a transaction request from the second device, the first device providing a display page to the second device, the display page including the authenticating images at locations identified by the authenticating code.Type: GrantFiled: December 14, 2009Date of Patent: February 26, 2013Assignee: Telcordia Technologies, Inc.Inventor: Giovanni Di Crescenzo
-
Patent number: 8363832Abstract: The present invention advantageously provides techniques to solve problems with combinatorial anonymous certificate management by addressing critical issues concerning its feasibility, scalability, and performance. Methods and procedures to manage IEEE 1609.2 anonymous and identifying cryptographic keys and certificates in the Vehicle Infrastructure Integration (VII) system are presented, along with methods for management of identifying and anonymous certificates in a partitioned Certificate Authority architecture designed to enhance vehicle privacy. Novel methods for vehicles to dynamically change an anonymous certificate for use while maintaining vehicle privacy are given. Refinements to basic combinatorial schemes are presented including probabilistic key replacement, rekey counter decrement, dynamic rekey threshold, geographic attack isolation and proofs of geographic position.Type: GrantFiled: March 19, 2008Date of Patent: January 29, 2013Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Stanley Pietrowicz, Eric Van Den Berg, Robert G. White, Tao Zhang
-
Publication number: 20120167223Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.Type: ApplicationFiled: February 29, 2012Publication date: June 28, 2012Applicant: TTI INVENTIONS C LLCInventors: Giovanni Di Crescenzo, Faramak Vakil
-
Publication number: 20120159181Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.Type: ApplicationFiled: February 29, 2012Publication date: June 21, 2012Applicant: TTI INVENTIONS C LLCInventors: Giovanni Di Crescenzo, Faramak Vakil
-
Patent number: 8191146Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods are provided for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.Type: GrantFiled: October 30, 2007Date of Patent: May 29, 2012Assignee: TTI Inventions C LLCInventors: Giovanni Di Crescenzo, Faramak Vakil
-
Patent number: 8171283Abstract: The present invention advantageously provides a system and method for management of cryptographic keys and certificates for a plurality of vehicles. Each vehicle of the plurality of vehicles generates public/private key pairs, requests multiple time-distributed certificates, creates an encrypted identity, and surrenders expired certificates. An assigning authority receives the public/private key pairs, the request for multiple time-distributed certificates, the encrypted identity, and the expired certificates from said vehicle. The assigning authority authorizes the vehicle with an authorizing authority, validates the expired certificates, proves ownership, and distributes the requested time-distributed certificates to said vehicle. Validation can comprise checking expired certificates against misused, compromised and/or previously surrendered certificates.Type: GrantFiled: March 19, 2008Date of Patent: May 1, 2012Assignee: Telcordia Technologies, Inc.Inventors: Stanley Pietrowicz, Giovanni Di Crescenzo, Robert G. White, Tao Zhang
-
Publication number: 20110231656Abstract: A system and method are provided for authenticating a first device to a second device. This involves determining, at the directory, a secret key and a first set of images by communicating with the first device; receiving, at the directory, a transaction request from the second device to authenticate the first device; and generating, at the directory, a tag using said secret key and first information associated with said transaction request. This also involves selecting a second set of images from said first set of images according to said tag, and sending said second set of images from the directory to the second device. Moreover, using said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device.Type: ApplicationFiled: March 16, 2010Publication date: September 22, 2011Applicant: TELCORDIA TECHNOLOGIES, INC.Inventor: Giovanni Di Crescenzo
-
Publication number: 20110210973Abstract: A method for generating mathematical analysis of a communication protocol in a vehicular communications network. The method defines features of a vehicular network, which may include a graph of a street map within a geographic area. A random geometric graph with a plurality of parameters is generated. A plurality of communications protocols on the vehicular network are defined. A communication protocol over the random geometric graph is redefined. A communication protocol's basic properties and associated features on the random geometric graph are analyzed. Results of the analysis are generated. The results of the analysis based on the random geometric graph's parameters are translated into results based on the vehicular network features. The random geometric graph with the parameters are displayed. The parameters may include: a number of graph nodes; and a probability that any two nodes are communicably connected being expressed as a function of the vehicular network features.Type: ApplicationFiled: August 27, 2010Publication date: September 1, 2011Applicant: TELCORDIA TECHNOLOGIES, INC.Inventors: Giovanni Di Crescenzo, Yogesh Kondareddy, Tao Zhang
-
Publication number: 20110145901Abstract: A system and method is provided for authenticating a first device to a second device. This involves providing images to the second device, receiving an indication of selected ones of the images as authenticating images, and identifying an authenticating code associated with the second device. This also involves receiving a transaction request from the second device, the first device providing a display page to the second device, the display page including the authenticating images at locations identified by the authenticating code.Type: ApplicationFiled: December 14, 2009Publication date: June 16, 2011Applicant: TELCORDIA TECHNOLOGIES, INC.Inventor: Giovanni Di Crescenzo
-
Publication number: 20100031042Abstract: The inventive system for providing strong security for UDP communications in networks comprises a server, a client, and a secure communication protocol wherein authentication of client and server, either unilaterally or mutually, is performed using identity based encryption, the secure communication protocol preserves privacy of the client, achieves significant bandwidth savings, and eliminates overheads associated with certificate management. VDTLS also enables session mobility across multiple IP domains through its session resumption capability.Type: ApplicationFiled: October 27, 2008Publication date: February 4, 2010Applicant: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Stanley Pietrowicz, Hyong Sop Shim, Tao Zhang