Patents by Inventor Ilya Mironov

Ilya Mironov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8619984
    Abstract: User rating data may be received at a correlation engine through a network. The user rating data may include ratings generated by a plurality of users for a plurality of items. Correlation data may be generated from the received user rating data by the correlation engine. The correlation data may identify correlations between the items based on the user generated ratings. Noise may be generated by the correlation engine, and the generated noise may be added to the generated correlation data by the correlation engine to provide differential privacy protection to the user rating data.
    Type: Grant
    Filed: September 11, 2009
    Date of Patent: December 31, 2013
    Assignee: Microsoft Corporation
    Inventors: Frank D. McSherry, Ilya Mironov
  • Publication number: 20110064221
    Abstract: User rating data may be received at a correlation engine through a network. The user rating data may include ratings generated by a plurality of users for a plurality of items. Correlation data may be generated from the received user rating data by the correlation engine. The correlation data may identify correlations between the items based on the user generated ratings. Noise may be generated by the correlation engine, and the generated noise may be added to the generated correlation data by the correlation engine to provide differential privacy protection to the user rating data.
    Type: Application
    Filed: September 11, 2009
    Publication date: March 17, 2011
    Applicant: Microsoft Corporation
    Inventors: Frank D. McSherry, Ilya Mironov
  • Patent number: 7657029
    Abstract: An addition chain is first generated, and then an integer x is derived from it. Doubling and star steps may be implemented in the addition chain. This approach eliminates the computationally expensive step of generating the addition chain from an exponent, and therefore can greatly reduce the computation time of the modular exponentiation.
    Type: Grant
    Filed: March 1, 2005
    Date of Patent: February 2, 2010
    Assignee: Microsoft Corporation
    Inventors: Anton Mityagin, Ilya Mironov, Yaacov Nissim Kobliner
  • Patent number: 7571319
    Abstract: A system and method for verifying messages. The method may include the steps of receiving an inbound message and characterizing the inbound message by analyzing a latent cryptographic identifier in the inbound message. The identifier is generated by a recognized message system, which may be the receiving system itself, for an outbound message. Characterizing may involve detecting if the latent cryptographic identifier is present and determining if the cryptographic identifier is valid. The step of determining can be performed using symmetric or asymmetric methods of verifying the authenticity of the message.
    Type: Grant
    Filed: October 14, 2004
    Date of Patent: August 4, 2009
    Assignee: Microsoft Corporation
    Inventors: Eliot C. Gillum, Chun Yu Wong, Ilya Mironov, Aditya Bansod
  • Patent number: 7505588
    Abstract: Techniques are disclosed to limit short-term correlations associated with outputs of stream cipher keystream generators. Output values of a generator are paired such that the paired outputs are sufficiently far apart to be considered independent. In one described implementation, a method includes sequentially storing a plurality of results provided by a stream cipher output rule in a first, second, and third storage units. A pairing function pairs individual values from the first and third storage units that are at least a threshold value apart. Upon reaching the threshold value of the output rule results, the contents of the first, second, and third storage units are rotated serially.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: March 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Ilya Mironov, Ramarathnam Venkatesan
  • Publication number: 20080046741
    Abstract: A message is hashed with a first hash function to generate a first hashed message, and then the first hashed message is hashed with a second hash function to generate a second hashed message. The second hashed message is then signed. The first hash function may be a domain extender, such as a TCR (target-collision resistant) hash. The second hash function may be a random oracle. The second hash function may be slower than the first hash function. A signature scheme such as DSA, PSS-RSA, or Cramer-Shoup may be used.
    Type: Application
    Filed: August 14, 2006
    Publication date: February 21, 2008
    Applicant: Microsoft Corporation
    Inventor: Ilya Mironov
  • Publication number: 20070150437
    Abstract: Systems and methods are provided for obscuring an amount of a resource used to process an item. In general, contemplated techniques comprise assigning a maximum allowable amount of the resource for processing a sub-part of the item. If the maximum allowable amount of the resource is reached, processing the sub-part may be terminated. Once all sub-parts are processed, a noisy quantity of the resource that was consumed in processing the item may be released. The noisy quantity is determined by adding a positive amount of the resource, combined with a noise value, to an actual quantity of the resource that was consumed.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Applicant: Microsoft Corporation
    Inventors: Cynthia Dwork, Frank McSherry, Ilya Mironov
  • Publication number: 20060198516
    Abstract: An addition chain is first generated, and then an integer x is derived from it. Doubling and star steps may be implemented in the addition chain. This approach eliminates the computationally expensive step of generating the addition chain from an exponent, and therefore can greatly reduce the computation time of the modular exponentiation.
    Type: Application
    Filed: March 1, 2005
    Publication date: September 7, 2006
    Applicant: Microsoft Corporation
    Inventors: Anton Mityagin, Ilya Mironov, Yaacov Nissim Kobliner
  • Publication number: 20050220302
    Abstract: Techniques are disclosed to limit short-term correlations associated with outputs of stream cipher keystream generators. Output values of a generator are paired such that the paired outputs are sufficiently far apart to be considered independent. In one described implementation, a method includes sequentially storing a plurality of results provided by a stream cipher output rule in a first, second, and third storage units. A pairing function pairs individual values from the first and third storage units that are at least a threshold value apart. Upon reaching the threshold value of the output rule results, the contents of the first, second, and third storage units are rotated serially.
    Type: Application
    Filed: March 31, 2004
    Publication date: October 6, 2005
    Inventors: Ilya Mironov, Ramarathnam Venkatesan