Patents by Inventor John C. Mitchell

John C. Mitchell has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11188678
    Abstract: According to some examples, computer-implemented methods to detect a potential privacy violation as a result of a release of a database are described. An example computer-implemented method may include anonymizing a database and calculating a measure of entropy resulting from a release of the anonymized database without releasing the anonymized database. The method may also include determining whether the calculated measure of entropy satisfies a privacy threshold and, responsive to a determination that the calculated measure of entropy satisfies the privacy threshold, releasing the anonymized database. The method may further include, responsive to a determination that the calculated measure of entropy does not satisfy the privacy threshold, not allowing the release of the anonymized database.
    Type: Grant
    Filed: May 9, 2018
    Date of Patent: November 30, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Patent number: 11042634
    Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.
    Type: Grant
    Filed: December 21, 2018
    Date of Patent: June 22, 2021
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Patent number: 10728022
    Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: July 28, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Publication number: 20200201991
    Abstract: According to an aspect of an embodiment, a method of determining information leakage of a computer-readable program may include obtaining a first component of the computer-readable program. The first component may have a first information leakage that may be unknown. The first component may be comprised of a second component and a third component. The method may also include obtaining a second information leakage of the second component. The method may also include obtaining a third information leakage of the third component. The method may also include determining a relationship between the second component and the third component relative to the first component. The method may also include determining the first information leakage based on the second information leakage, the third information leakage, and the relationship.
    Type: Application
    Filed: December 21, 2018
    Publication date: June 25, 2020
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Patent number: 10691829
    Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.
    Type: Grant
    Filed: April 13, 2017
    Date of Patent: June 23, 2020
    Assignee: FUJITSU LIMITED
    Inventors: Avradip Mandal, Arnab Roy, Hart Montgomery, John C. Mitchell
  • Publication number: 20190347443
    Abstract: According to some examples, computer-implemented methods to detect a potential privacy violation as a result of a release of a database are described. An example computer-implemented method may include anonymizing a database and calculating a measure of entropy resulting from a release of the anonymized database without releasing the anonymized database. The method may also include determining whether the calculated measure of entropy satisfies a privacy threshold and, responsive to a determination that the calculated measure of entropy satisfies the privacy threshold, releasing the anonymized database. The method may further include, responsive to a determination that the calculated measure of entropy does not satisfy the privacy threshold, not allowing the release of the anonymized database.
    Type: Application
    Filed: May 9, 2018
    Publication date: November 14, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Publication number: 20190207752
    Abstract: A method of secure hash table implementation includes performing a secret key exchange between a server enclave of a server device and a client enclave of a client device and establishing an encrypted channel between the server enclave and the client enclave using the exchanged secret keys. The method includes generating a random key for a keyed hash function or a pseudo random function (PRF) and communicating the random key to the client enclave. The method includes receiving hashes of input data at the server enclave. The method includes building a hash table based on key-value pairs included in the received hashes. The method includes receiving a hash table query that includes keys. The method includes retrieving values that correspond to the keys. The method includes returning the retrieved values that correspond to the keys or a null if a value has not been inserted into the hash table for one of the keys.
    Type: Application
    Filed: December 28, 2017
    Publication date: July 4, 2019
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Publication number: 20180300502
    Abstract: An anonymization system may include a merger to merge a public database and a private database to create a merged database. The merged database may include multiple blank entries and multiple initial values associated with multiple user identifiers. The anonymization system may include a value generator to fill values for the blank entries via a machine learning algorithm and based on the initial values to create a filled database including the initial values and the fill values. The anonymization system may include a perturber to perturb one or more of the initial values or the fill values of the filled database to create a perturbed database. The anonymization system may include a releaser to release at least a portion of the perturbed database.
    Type: Application
    Filed: April 13, 2017
    Publication date: October 18, 2018
    Applicant: FUJITSU LIMITED
    Inventors: Avradip MANDAL, Arnab ROY, Hart MONTGOMERY, John C. MITCHELL
  • Publication number: 20120143778
    Abstract: The complexity of regulations in healthcare, financial services, and other industries makes it difficult for enterprises to design and deploy effective compliance systems. The present invention supports compliance by using formalized portions of applicable laws to regulate business processes that use information systems. An embodiment of the present invention uses a stratified fragment of Prolog with limited use of negation to formalize a portion of the US Health Insurance Portability and Accountability Act (HIPAA). An embodiment of the invention provides for deployment in a prototypical hospital that implements a Web portal messaging system.
    Type: Application
    Filed: August 27, 2011
    Publication date: June 7, 2012
    Applicant: The Board of Trustees of the Leland Stanford, Junior, University
    Inventors: Sharada Sundaram, Peifung E. Lam, John C. Mitchell
  • Publication number: 20120114936
    Abstract: Embodiments of the present invention relate to coating deposition and coatings for dental and orthopedic devices that provide prevention or reduction of ion leakage and, in some situations, improved aesthetic appearances.
    Type: Application
    Filed: January 20, 2012
    Publication date: May 10, 2012
    Applicant: Oregon Health & Science University
    Inventor: John C. Mitchell
  • Patent number: 8124180
    Abstract: Embodiments of the present invention relate to coating deposition and coatings for dental and orthopedic devices that provide prevention or reduction of ion leakage and, in some situations, improved aesthetic appearances.
    Type: Grant
    Filed: December 28, 2007
    Date of Patent: February 28, 2012
    Assignee: Oregon Health & Science University
    Inventor: John C. Mitchell
  • Patent number: 7870610
    Abstract: Various approaches for detecting unauthorized actions on a computing platform are disclosed. In one approach, a memory region is designated as tainted if data is received from an untrusted source (such as the network) and written to that region. Thereafter, destination regions may be designated as tainted based on an operation having source and destination parameters in which at least a portion of an address range of the source overlaps an address range of a tainted memory region, and data from the source is used to update the destination. If an argument in an invocation of a function call references a tainted memory region, the call is determined to be unauthorized and data is output indicative of the unauthorized call.
    Type: Grant
    Filed: March 16, 2007
    Date of Patent: January 11, 2011
    Assignee: The Board of Directors of the Leland Stanford Junior University
    Inventors: John C. Mitchell, Elizabeth A. Stinson
  • Publication number: 20080160193
    Abstract: Embodiments of the present invention relate to coating deposition and coatings for dental and orthopedic devices that provide prevention or reduction of ion leakage and, in some situations, improved aesthetic appearances.
    Type: Application
    Filed: December 28, 2007
    Publication date: July 3, 2008
    Applicant: OREGON HEALTH & SCIENCE UNIVERSITY
    Inventor: John C. Mitchell
  • Patent number: 6961700
    Abstract: Data processing apparatus for receiving recognition data from a speech recognition engine and its corresponding dictated audio data where the recognition data includes recognized words or characters. A display displays the recognized words or characters and the recognized words or characters are stored as a file together with the corresponding audio data. The recognized words or characters can be processed and link data is formed to link the position of the words or characters in the file and the position of the corresponding audio component in the audio data.
    Type: Grant
    Filed: March 18, 2002
    Date of Patent: November 1, 2005
    Assignee: AllVoice Computing PLC
    Inventors: John C. Mitchell, Alan James Heard, Steven Norman Corbett, Nicholas John Daniel
  • Patent number: 6899591
    Abstract: A circular knit bra is provided. The bra has a pair of breast cups, a central gore disposed between the breast cups, and a pair of side panels. Each of the breast cups has at least two different areas of stretchability. Each different area of stretchability has a different stitch density.
    Type: Grant
    Filed: December 4, 2003
    Date of Patent: May 31, 2005
    Assignee: Sara Lee Corporation
    Inventor: John C Mitchell
  • Patent number: 6886367
    Abstract: A circularly knitted garment having a body portion and a shaped band is provided. The body portion has a first area defined therein. The shaped band is also defined in the body portion such that a seamless interface is formed between the body portion and the shaped band.
    Type: Grant
    Filed: April 1, 2003
    Date of Patent: May 3, 2005
    Assignee: Sara Lee Corporation
    Inventors: John C. Mitchell, Andrew Ratcliffe, Chris Williamson
  • Publication number: 20040198178
    Abstract: A circularly knitted garment having a body portion and a shaped band is provided. The body portion has a first area defined therein. The shaped band is also defined in the body portion such that a seamless interface is formed between the body portion and the shaped band.
    Type: Application
    Filed: April 1, 2003
    Publication date: October 7, 2004
    Applicant: SARA LEE CORPORATION
    Inventors: John C. Mitchell, Andrew Ratcliffe, Chris Williamson
  • Patent number: 6779367
    Abstract: The present invention relates to a method of manufacturing a single knit tubular blank, and the resultant blank and products. The method provides two circular knit brassieres each having first and second layers, thereby minimizing the steps in the process of manufacturing.
    Type: Grant
    Filed: May 22, 2003
    Date of Patent: August 24, 2004
    Assignee: Sara Lee Corporation
    Inventors: John C Mitchell, Robert T Spillane
  • Publication number: 20040137822
    Abstract: A circular knit bra is provided. The bra has a pair of breast cups, a central gore disposed between the breast cups, and a pair of side panels. Each of the breast cups has at least two different areas of stretchability. Each different area of stretchability has a different stitch density.
    Type: Application
    Filed: December 4, 2003
    Publication date: July 15, 2004
    Applicant: SARA LEE CORPORATION
    Inventor: John C. Mitchell
  • Publication number: 20030230120
    Abstract: The present invention relates to a method of manufacturing a single knit tubular blank, and the resultant blank and products. The method provides two circular knit brassieres each having first and second layers, thereby minimizing the steps in the process of manufacturing.
    Type: Application
    Filed: May 22, 2003
    Publication date: December 18, 2003
    Applicant: SARA LEE CORPORATION
    Inventors: John c. Mitchell, Robert T. Spillane