Patents by Inventor Giovanni Di-Crescenzo

Giovanni Di-Crescenzo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9094206
    Abstract: The inventive system for providing strong security for UDP communications in networks comprises a server, a client, and a secure communication protocol wherein authentication of client and server, either unilaterally or mutually, is performed using identity based encryption, the secure communication protocol preserves privacy of the client, achieves significant bandwidth savings, and eliminates overheads associated with certificate management. VDTLS also enables session mobility across multiple IP domains through its session resumption capability.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: July 28, 2015
    Assignee: Telcordia Technologies, Inc.
    Inventors: Giovanni Di Crescenzo, Stanley Pietrowicz, Hyong Sop Shim, Tao Zhang
  • Patent number: 9032202
    Abstract: A server receives from a client at least one interest pseudonym produced by a double application of a pseudo random function to at least one interest of the client. The server encrypts an item. The server computes at least one intermediate topic pseudonym for at least one topic associated with the item by applying the function to each of the at least one topic associated with the item. The server transmits the at least one intermediate topic pseudonym, the at least one interest pseudonym, and the encrypted item to a third party. The third party may apply the function to the at least one intermediate topic pseudonym to produce at least one topic pseudonym associated with the item and transmit the encrypted item to the client for decryption when one of the at least one masked topic pseudonym is equal to one of the at least one interest pseudonym of the client.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: May 12, 2015
    Assignee: Vencore Labs, Inc.
    Inventor: Giovanni Di Crescenzo
  • Patent number: 8990566
    Abstract: A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of a topic as a root and at least one client as a leaf. The server encrypts a key associated with a conditional oblivious transfer protocol using the topic-based key. The server encrypts an item with the key associated with the conditional oblivious transfer protocol. The server transmits the encrypted key and the encrypted item to a plurality of clients. The encrypted item is decryptable by the at least one client with the key associated with the conditional oblivious transfer protocol when the key associated with the conditional oblivious transfer protocol is decryptable with an interest-based key associated with a tree structure having a pseudonym of an interest as a root and the at least one client as a leaf.
    Type: Grant
    Filed: February 25, 2013
    Date of Patent: March 24, 2015
    Assignee: TT Government Solutions, Inc.
    Inventor: Giovanni Di Crescenzo
  • Patent number: 8767965
    Abstract: An inventive scheme for detecting parties responsible for repeated malicious activities in secure and anonymous communication is presented. The scheme comprises generating a pool of keys, distributing to and associating with each party a small number of keys chosen randomly from the pool, revoking a key when it is detected as used in a malicious activity, creating a set of parties associated with the revoked key, revoking additional keys randomly chosen among the keys not currently revoked, selecting new keys, and when a party requests an updated key, sending the updated key selected from among the new keys to the requesting party, wherein if an other malicious activity is detected, creating another set of the parties associated with the other malicious activity and identifying the parties in both sets. The steps of the inventive scheme are repeated until only one party is in the intersection set.
    Type: Grant
    Filed: July 18, 2008
    Date of Patent: July 1, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: Giovanni Di Crescenzo, Tao Zhang, Robert G. White
  • Patent number: 8645282
    Abstract: A Secure Virtual Point of Service (SVPOS) that coordinates the authentication, authorization, and identity, settlement, arbitration and non-repudiation for an electronic commercial transaction. For each commercial transaction, both the buyer and merchant authenticate itself to the SVPOS and create two unique transaction encryption keys, one for the buyer and one for the merchant. The merchant uses both encryption keys to encrypt a package that include at least product identification. The merchant and buyer calculate a hash of the package and transmit the calculated hash to the SVPOS for comparison to prevent repudiation. If the calculated hash is identical the buyer receives the merchants encryption key and decrypts the package. Payment is released by the SVPOS if the buyer is satisfied with the package via a Parlay system. If the buyer is not satisfied, said SVPOS performs arbitration between the buyer and merchant to determine if the package is correct.
    Type: Grant
    Filed: May 16, 2006
    Date of Patent: February 4, 2014
    Assignee: TTI Inventions C LLC
    Inventors: Faramak Vakil, Vijay K. Varma, Raquel Morera Sempere, Giovanni Di Crescenzo
  • Patent number: 8635681
    Abstract: A method and system for public key infrastructure key and certificate management provides anonymity to certificate holders and protects the privacy of certificate holders from the compromise of a certificate authority. Functional separation is provided in the authorization of a certificate request and the assignment of certificates and key pairs. The authorizing certificate authority approves or denies each certificate request from a requestor whose identity is not made available to the assigning certificate authority. The assigning certificate authority, upon approval from the authorizing certificate authority, issues one or more certificates and optionally generates and provides the associated key pairs to the requester without disclosing these certificates and key pairs to the authorizing certificate authority.
    Type: Grant
    Filed: February 1, 2008
    Date of Patent: January 21, 2014
    Assignee: Telcordia Technologies, Inc.
    Inventors: Tao Zhang, Eric Van Den Berg, Andrew Burnette, Giovanni Di Crescenzo, Richard Ferrer, Stanley Pietrowicz, Robert G. White
  • Patent number: 8578498
    Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: November 5, 2013
    Assignee: TTI Inventions C LLC
    Inventors: Giovanni Di Crescenzo, Faramak Vakil
  • Patent number: 8572743
    Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.
    Type: Grant
    Filed: February 29, 2012
    Date of Patent: October 29, 2013
    Assignee: TTI Inventions C LLC
    Inventors: Giovanni Di Crescenzo, Faramak Vakil
  • Publication number: 20130246791
    Abstract: A method and system for providing privacy in a publish-subscribe protocol is provided. A server receives from a third party a topic-based key associated with a tree structure having a pseudonym of a topic as a root and at least one client as a leaf. The server encrypts a key associated with a conditional oblivious transfer protocol using the topic-based key. The server encrypts an item with the key associated with the conditional oblivious transfer protocol. The server transmits the encrypted key and the encrypted item to a plurality of clients. The encrypted item is decryptable by the at least one client with the key associated with the conditional oblivious transfer protocol when the key associated with the conditional oblivious transfer protocol is decryptable with an interest-based key associated with a tree structure having a pseudonym of an interest as a root and the at least one client as a leaf.
    Type: Application
    Filed: February 25, 2013
    Publication date: September 19, 2013
    Applicant: APPLIED COMMUNICATIONS SCIENCES
    Inventor: Giovanni Di Crescenzo
  • Patent number: 8528060
    Abstract: Efficient secure password protocols are constructed that remain secure against offline dictionary attacks even when a large, but bounded, part of the storage of a server responsible for password verification is retrieved by an adversary through a remote or local connection. A registration algorithm and a verification algorithm accomplish the goal of defeating a dictionary attack. A password protocol where a server, on input of a login and a password, carefully selects several locations from the password files, properly combines their content according to some special function, and stores the result of this function as a tag that can be associated with this password and used in a verification phase to verify access by users.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: September 3, 2013
    Assignee: Telcordia Technologies, Inc.
    Inventors: Giovanni Di Crescenzo, Richard J. Lipton, Sheldon Walfish
  • Patent number: 8387126
    Abstract: A system and method is provided for authenticating a first device to a second device. This involves providing images to the second device, receiving an indication of selected ones of the images as authenticating images, and identifying an authenticating code associated with the second device. This also involves receiving a transaction request from the second device, the first device providing a display page to the second device, the display page including the authenticating images at locations identified by the authenticating code.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: February 26, 2013
    Assignee: Telcordia Technologies, Inc.
    Inventor: Giovanni Di Crescenzo
  • Patent number: 8363832
    Abstract: The present invention advantageously provides techniques to solve problems with combinatorial anonymous certificate management by addressing critical issues concerning its feasibility, scalability, and performance. Methods and procedures to manage IEEE 1609.2 anonymous and identifying cryptographic keys and certificates in the Vehicle Infrastructure Integration (VII) system are presented, along with methods for management of identifying and anonymous certificates in a partitioned Certificate Authority architecture designed to enhance vehicle privacy. Novel methods for vehicles to dynamically change an anonymous certificate for use while maintaining vehicle privacy are given. Refinements to basic combinatorial schemes are presented including probabilistic key replacement, rekey counter decrement, dynamic rekey threshold, geographic attack isolation and proofs of geographic position.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: January 29, 2013
    Assignee: Telcordia Technologies, Inc.
    Inventors: Giovanni Di Crescenzo, Stanley Pietrowicz, Eric Van Den Berg, Robert G. White, Tao Zhang
  • Publication number: 20120167223
    Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.
    Type: Application
    Filed: February 29, 2012
    Publication date: June 28, 2012
    Applicant: TTI INVENTIONS C LLC
    Inventors: Giovanni Di Crescenzo, Faramak Vakil
  • Publication number: 20120159181
    Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.
    Type: Application
    Filed: February 29, 2012
    Publication date: June 21, 2012
    Applicant: TTI INVENTIONS C LLC
    Inventors: Giovanni Di Crescenzo, Faramak Vakil
  • Patent number: 8191146
    Abstract: Methods for using integrity checking techniques to identify and locate computer viruses are provided. A method for virus localization for each of three types of virus infections is provided, including the steps of computing a sequence of file blocks, calculating hashes for the sequences of file blocks from a host file and calculating hashes for the same or related sequences of file blocks from an infected file, and comparing the hashes from host file to the hashes from the infected file from the same or related sequences of file blocks such that when some of said first hashes and said second hashes do not match, a location of a virus is output. Methods are provided for computing the sequence of file blocks depending on the type of virus infection, and for calculating the hashes using a collision resistant hash function, a digital signature scheme, a message authentication code, or a pseudo-random function.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: May 29, 2012
    Assignee: TTI Inventions C LLC
    Inventors: Giovanni Di Crescenzo, Faramak Vakil
  • Patent number: 8171283
    Abstract: The present invention advantageously provides a system and method for management of cryptographic keys and certificates for a plurality of vehicles. Each vehicle of the plurality of vehicles generates public/private key pairs, requests multiple time-distributed certificates, creates an encrypted identity, and surrenders expired certificates. An assigning authority receives the public/private key pairs, the request for multiple time-distributed certificates, the encrypted identity, and the expired certificates from said vehicle. The assigning authority authorizes the vehicle with an authorizing authority, validates the expired certificates, proves ownership, and distributes the requested time-distributed certificates to said vehicle. Validation can comprise checking expired certificates against misused, compromised and/or previously surrendered certificates.
    Type: Grant
    Filed: March 19, 2008
    Date of Patent: May 1, 2012
    Assignee: Telcordia Technologies, Inc.
    Inventors: Stanley Pietrowicz, Giovanni Di Crescenzo, Robert G. White, Tao Zhang
  • Publication number: 20110231656
    Abstract: A system and method are provided for authenticating a first device to a second device. This involves determining, at the directory, a secret key and a first set of images by communicating with the first device; receiving, at the directory, a transaction request from the second device to authenticate the first device; and generating, at the directory, a tag using said secret key and first information associated with said transaction request. This also involves selecting a second set of images from said first set of images according to said tag, and sending said second set of images from the directory to the second device. Moreover, using said first set of images, said secret key, and said information associated with said transaction request, the first device may select a third set of images that, when sent to the second device, may be used at the second device, in comparison to said second set of images, to authenticate the first device.
    Type: Application
    Filed: March 16, 2010
    Publication date: September 22, 2011
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventor: Giovanni Di Crescenzo
  • Publication number: 20110210973
    Abstract: A method for generating mathematical analysis of a communication protocol in a vehicular communications network. The method defines features of a vehicular network, which may include a graph of a street map within a geographic area. A random geometric graph with a plurality of parameters is generated. A plurality of communications protocols on the vehicular network are defined. A communication protocol over the random geometric graph is redefined. A communication protocol's basic properties and associated features on the random geometric graph are analyzed. Results of the analysis are generated. The results of the analysis based on the random geometric graph's parameters are translated into results based on the vehicular network features. The random geometric graph with the parameters are displayed. The parameters may include: a number of graph nodes; and a probability that any two nodes are communicably connected being expressed as a function of the vehicular network features.
    Type: Application
    Filed: August 27, 2010
    Publication date: September 1, 2011
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventors: Giovanni Di Crescenzo, Yogesh Kondareddy, Tao Zhang
  • Publication number: 20110145901
    Abstract: A system and method is provided for authenticating a first device to a second device. This involves providing images to the second device, receiving an indication of selected ones of the images as authenticating images, and identifying an authenticating code associated with the second device. This also involves receiving a transaction request from the second device, the first device providing a display page to the second device, the display page including the authenticating images at locations identified by the authenticating code.
    Type: Application
    Filed: December 14, 2009
    Publication date: June 16, 2011
    Applicant: TELCORDIA TECHNOLOGIES, INC.
    Inventor: Giovanni Di Crescenzo
  • Publication number: 20100031042
    Abstract: The inventive system for providing strong security for UDP communications in networks comprises a server, a client, and a secure communication protocol wherein authentication of client and server, either unilaterally or mutually, is performed using identity based encryption, the secure communication protocol preserves privacy of the client, achieves significant bandwidth savings, and eliminates overheads associated with certificate management. VDTLS also enables session mobility across multiple IP domains through its session resumption capability.
    Type: Application
    Filed: October 27, 2008
    Publication date: February 4, 2010
    Applicant: Telcordia Technologies, Inc.
    Inventors: Giovanni Di Crescenzo, Stanley Pietrowicz, Hyong Sop Shim, Tao Zhang