Patents by Inventor John C. Mitchell
John C. Mitchell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11188678Abstract: According to some examples, computer-implemented methods to detect a potential privacy violation as a result of a release of a database are described. An example computer-implemented method may include anonymizing a database and calculating a measure of entropy resulting from a release of the anonymized database without releasing the anonymized database. The method may also include determining whether the calculated measure of entropy satisfies a privacy threshold and, responsive to a determination that the calculated measure of entropy satisfies the privacy threshold, releasing the anonymized database. The method may further include, responsive to a determination that the calculated measure of entropy does not satisfy the privacy threshold, not allowing the release of the anonymized database.Type: GrantFiled: May 9, 2018Date of Patent: November 30, 2021Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
-
Patent number: 11042634Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.Type: GrantFiled: December 21, 2018Date of Patent: June 22, 2021Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
-
Patent number: 10728022Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.Type: GrantFiled: December 28, 2017Date of Patent: July 28, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
-
Publication number: 20200201991Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.Type: ApplicationFiled: December 21, 2018Publication date: June 25, 2020Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Patent number: 10691829Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.Type: GrantFiled: April 13, 2017Date of Patent: June 23, 2020Assignee: FUJITSU LIMITEDInventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
-
Publication number: 20190347443Abstract: According to some examples, computer-implemented methods to detect a potential privacy violation as a result of a release of a database are described. An example computer-implemented method may include anonymizing a database and calculating a measure of entropy resulting from a release of the anonymized database without releasing the anonymized database. The method may also include determining whether the calculated measure of entropy satisfies a privacy threshold and, responsive to a determination that the calculated measure of entropy satisfies the privacy threshold, releasing the anonymized database. The method may further include, responsive to a determination that the calculated measure of entropy does not satisfy the privacy threshold, not allowing the release of the anonymized database.Type: ApplicationFiled: May 9, 2018Publication date: November 14, 2019Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Publication number: 20190207752Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.Type: ApplicationFiled: December 28, 2017Publication date: July 4, 2019Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Publication number: 20180300502Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.Type: ApplicationFiled: April 13, 2017Publication date: October 18, 2018Applicant: FUJITSU LIMITEDInventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
-
Publication number: 20120143778Abstract: The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance systems. The present invention supports compliance by using formalized portions of applicable laws to regulate business processes that use information systems. An embodiment of the present invention uses a stratified fragment of Prolog with limited use of negation to formalize a portion of the US Health Insurance Portability and Accountability Act (HIPAA). An embodiment of the invention provides for deployment in a prototypical hospital that implements a Web portal messaging system.Type: ApplicationFiled: August 27, 2011Publication date: June 7, 2012Applicant: The Board of Trustees of the Leland Stanford, Junior, UniversityInventors: Sharada Sundaram, Peifung E. Lam, John C. Mitchell
-
Publication number: 20120114936Abstract: Embodiments of the present invention relate to coating deposition and coatings for dental and orthopedic devices that provide prevention or reduction of ion leakage and, in some situations, improved aesthetic appearances.Type: ApplicationFiled: January 20, 2012Publication date: May 10, 2012Applicant: Oregon Health & Science UniversityInventor: John C. Mitchell
-
Patent number: 8124180Abstract: Embodiments of the present invention relate to coating deposition and coatings for dental and orthopedic devices that provide prevention or reduction of ion leakage and, in some situations, improved aesthetic appearances.Type: GrantFiled: December 28, 2007Date of Patent: February 28, 2012Assignee: Oregon Health & Science UniversityInventor: John C. Mitchell
-
Patent number: 7870610Abstract: Various approaches for detecting unauthorized actions on a computing platform are disclosed. In one approach, a memory region is designated as tainted if data is received from an untrusted source (such as the network) and written to that region. Thereafter, destination regions may be designated as tainted based on an operation having source and destination parameters in which at least a portion of an address range of the source overlaps an address range of a tainted memory region, and data from the source is used to update the destination. If an argument in an invocation of a function call references a tainted memory region, the call is determined to be unauthorized and data is output indicative of the unauthorized call.Type: GrantFiled: March 16, 2007Date of Patent: January 11, 2011Assignee: The Board of Directors of the Leland Stanford Junior UniversityInventors: John C. Mitchell, Elizabeth A. Stinson
-
Publication number: 20080160193Abstract: Embodiments of the present invention relate to coating deposition and coatings for dental and orthopedic devices that provide prevention or reduction of ion leakage and, in some situations, improved aesthetic appearances.Type: ApplicationFiled: December 28, 2007Publication date: July 3, 2008Applicant: OREGON HEALTH & SCIENCE UNIVERSITYInventor: John C. Mitchell
-
Patent number: 6961700Abstract: Data processing apparatus for receiving recognition data from a speech recognition engine and its corresponding dictated audio data where the recognition data includes recognized words or characters. A display displays the recognized words or characters and the recognized words or characters are stored as a file together with the corresponding audio data. The recognized words or characters can be processed and link data is formed to link the position of the words or characters in the file and the position of the corresponding audio component in the audio data.Type: GrantFiled: March 18, 2002Date of Patent: November 1, 2005Assignee: AllVoice Computing PLCInventors: John C. Mitchell, Alan James Heard, Steven Norman Corbett, Nicholas John Daniel
-
Patent number: 6899591Abstract: A circular knit bra is provided. The bra has a pair of breast cups, a central gore disposed between the breast cups, and a pair of side panels. Each of the breast cups has at least two different areas of stretchability. Each different area of stretchability has a different stitch density.Type: GrantFiled: December 4, 2003Date of Patent: May 31, 2005Assignee: Sara Lee CorporationInventor: John C Mitchell
-
Patent number: 6886367Abstract: A circularly knitted garment having a body portion and a shaped band is provided. The body portion has a first area defined therein. The shaped band is also defined in the body portion such that a seamless interface is formed between the body portion and the shaped band.Type: GrantFiled: April 1, 2003Date of Patent: May 3, 2005Assignee: Sara Lee CorporationInventors: John C. Mitchell, Andrew Ratcliffe, Chris Williamson
-
Publication number: 20040198178Abstract: A circularly knitted garment having a body portion and a shaped band is provided. The body portion has a first area defined therein. The shaped band is also defined in the body portion such that a seamless interface is formed between the body portion and the shaped band.Type: ApplicationFiled: April 1, 2003Publication date: October 7, 2004Applicant: SARA LEE CORPORATIONInventors: John C. Mitchell, Andrew Ratcliffe, Chris Williamson
-
Patent number: 6779367Abstract: The present invention relates to a method of manufacturing a single knit tubular blank, and the resultant blank and products. The method provides two circular knit brassieres each having first and second layers, thereby minimizing the steps in the process of manufacturing.Type: GrantFiled: May 22, 2003Date of Patent: August 24, 2004Assignee: Sara Lee CorporationInventors: John C Mitchell, Robert T Spillane
-
Publication number: 20040137822Abstract: A circular knit bra is provided. The bra has a pair of breast cups, a central gore disposed between the breast cups, and a pair of side panels. Each of the breast cups has at least two different areas of stretchability. Each different area of stretchability has a different stitch density.Type: ApplicationFiled: December 4, 2003Publication date: July 15, 2004Applicant: SARA LEE CORPORATIONInventor: John C. Mitchell
-
Publication number: 20030230120Abstract: The present invention relates to a method of manufacturing a single knit tubular blank, and the resultant blank and products. The method provides two circular knit brassieres each having first and second layers, thereby minimizing the steps in the process of manufacturing.Type: ApplicationFiled: May 22, 2003Publication date: December 18, 2003Applicant: SARA LEE CORPORATIONInventors: John c. Mitchell, Robert T. Spillane