Patents by Inventor Marcel Mordechay Yung

Marcel Mordechay Yung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8800032
    Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.
    Type: Grant
    Filed: February 17, 2011
    Date of Patent: August 5, 2014
    Inventors: Marcel Mordechay Yung, Yoram Ofek
  • Publication number: 20130173471
    Abstract: A method for providing a warranty relating to a transaction between two parties in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each party being a client of at least one of the institutions, the method comprising: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party.
    Type: Application
    Filed: November 26, 2012
    Publication date: July 4, 2013
    Applicant: Certco, Inc.
    Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
  • Patent number: 8321348
    Abstract: A method for providing a warranty relating to a transaction between two parties, each party being a client of at least one respective institution which provides services to the respective party, the method including: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party.
    Type: Grant
    Filed: January 24, 2012
    Date of Patent: November 27, 2012
    Assignee: Certco, Inc.
    Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
  • Publication number: 20120143723
    Abstract: A method for providing a warranty relating to a transaction between two parties, each party being a client of at least one respective institution which provides services to the respective party, the method including: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party.
    Type: Application
    Filed: January 24, 2012
    Publication date: June 7, 2012
    Applicant: CERTCO, Inc.
    Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
  • Patent number: 8121949
    Abstract: A method for providing a warranty relating to a transaction between two parties, each party having a data communications device, in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each location having a computer system, a database coupled to the computer system and storing information about each client of the institution and a data communications device coupled to the computer system for communication with the data communications device of any one party, each party being a client of at least one of the institutions, the method containing the steps of: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of
    Type: Grant
    Filed: March 10, 2008
    Date of Patent: February 21, 2012
    Assignee: CertCo
    Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
  • Publication number: 20110167490
    Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.
    Type: Application
    Filed: February 17, 2011
    Publication date: July 7, 2011
    Inventors: MARCEL MORDECHAY YUNG, Yoram Ofek
  • Patent number: 7895643
    Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.
    Type: Grant
    Filed: August 14, 2002
    Date of Patent: February 22, 2011
    Assignee: Trustedflow Systems, Inc.
    Inventors: Marcel Mordechay Yung, Yoram Ofek
  • Publication number: 20080221914
    Abstract: A method for providing a warranty relating to a transaction between two parties, each party having a data communications device, in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each location having a computer system, a database coupled to the computer system and storing information about each client of the institution and a data communications device coupled to the computer system for communication with the data communications device of any one party, each party being a client of at least one of the institutions, the method containing the steps of: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of inf
    Type: Application
    Filed: March 10, 2008
    Publication date: September 11, 2008
    Applicant: CertCo
    Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
  • Patent number: 7367045
    Abstract: This invention discloses a method and system for communication that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated and encrypted within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets. The method further comprises of means for coordinating the initialization of the end station and network interface.
    Type: Grant
    Filed: August 14, 2002
    Date of Patent: April 29, 2008
    Assignee: TrustedFlow Systems, Inc.
    Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi
  • Patent number: 7343346
    Abstract: A method for facilitating provision of a warranty relating to a transaction between two parties in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, the method containing the steps of transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client and transmitting a response to the request from the respective location to the one party.
    Type: Grant
    Filed: January 11, 2002
    Date of Patent: March 11, 2008
    Assignee: CertCo, Inc.
    Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
  • Patent number: 7343619
    Abstract: The objective of this invention is to ensure that programs that generate and send data packets are well behaved. This invention discloses a method and system that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets.
    Type: Grant
    Filed: August 14, 2002
    Date of Patent: March 11, 2008
    Assignee: TrustedFlow Systems, Inc.
    Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi, David Howard Sitrick
  • Patent number: 7305704
    Abstract: This invention discloses a method and system for detecting and reacting to unexpected communications patterns. The system consists of a plurality of end stations and a plurality of network interfaces, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The system further consists of a plurality of secure management servers, which continuously exchange management messages with the network interfaces. Consequently, the secure management servers have the information for detecting unexpected communications patterns. The method allows the control of end stations, and when an unexpected communication pattern is detected, selectively only packets from authenticated programs can be allowed to be transmitted.
    Type: Grant
    Filed: August 14, 2002
    Date of Patent: December 4, 2007
    Assignee: TrustedFlow Systems, Inc.
    Inventors: Yoram Ofek, Marcel Mordechay Yung
  • Publication number: 20030177374
    Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.
    Type: Application
    Filed: August 14, 2002
    Publication date: September 18, 2003
    Inventors: Marcel Mordechay Yung, Yoram Ofek
  • Publication number: 20030177382
    Abstract: The objective of this invention is to ensure that programs that generate and send data packets are well behaved. This invention discloses a method and system that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets.
    Type: Application
    Filed: August 14, 2002
    Publication date: September 18, 2003
    Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi, David Howard Sitrick
  • Publication number: 20030177381
    Abstract: This invention discloses a method and system for communication that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated and encrypted within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets. The method further comprises of means for coordinating the initialization of the end station and network interface.
    Type: Application
    Filed: August 14, 2002
    Publication date: September 18, 2003
    Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi
  • Publication number: 20030177383
    Abstract: This invention discloses a method and system for detecting and reacting to unexpected communications patterns. The system consists of a plurality of end stations and a plurality of network interfaces, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The system further consists of a plurality of secure management servers, which continuously exchange management messages with the network interfaces. Consequently, the secure management servers have the information for detecting unexpected communications patterns. The method allows the control of end stations, and when an unexpected communication pattern is detected, selectively only packets from authenticated programs can be allowed to be transmitted.
    Type: Application
    Filed: August 14, 2002
    Publication date: September 18, 2003
    Inventors: Yoram Ofek, Marcel Mordechay Yung
  • Publication number: 20030163686
    Abstract: A system and method facilitates reliance among members of a community that communicates electronically. Each member has a private credential for use in a computing environment. Each member obtains the credential in accordance with a credential-issuance process. The process need not include a certification authority. Credentials may be generated directly by the members themselves. They system includes a database that contains at least one credential entry for each member . The system also includes a management process with authority to sanction (e.g., approve) reliance by the community on a member's credential. Such sanction authority is separate from the credential-issuance process. The system also includes a rule set defining a scope of reliance the community may make on a member's credential.
    Type: Application
    Filed: August 6, 2002
    Publication date: August 28, 2003
    Inventors: Jean Renard Ward, Marcel Mordechay Yung, Robert James Stewart
  • Patent number: 6581106
    Abstract: The routing address lookup problem is one of the major bottlenecks in high performance routers and deals with forwarding of packets. In the Internet domain it is known as “IP address lookup problem.” This invention provides a new and easy way to preprocess routing tables which gives efficient packet/message forwarding and is feasible in the time and the space it consumes. More precisely, the method for m-bit IP addresses gives a balanced trade-off between performing a binary search on T with O(log|T|) accesses, where |T| is the number of entries in T, and executing a single access on a table of 2m entries obtained by fully expanding T. While the prior art starts out from space-efficient data structures and aim at lowering the O(log|T|) access cost, the invention starts out from the expanded table with 2m entries and aim at compressing it without an excessive increase in the number of accesses.
    Type: Grant
    Filed: January 13, 2000
    Date of Patent: June 17, 2003
    Inventors: Pierluigi Crescenzi, Leandro Dardini, Roberto Grossi, Marcel Mordechay Yung
  • Patent number: 6473508
    Abstract: A method is provided for digital signature infrastructure that provides public keys which are effective only for verifying digital signatures, and are not effective for encrypting information in a way that is unrecoverable by law-enforcement entities. The method can be implemented in software, thus avoiding the need for tamper-proof hardware. The method has the property that signing private keys are not escrowed, since the corresponding public keys cannot be used effectively for criminal communications. As a result no one can impersonate the user; alternatively users can prove impersonations. Furthermore, the system is shadow public key resistant. A shadow public key is a public key which is not escrowed and which can be used for untappable communications. Therefore, the method presented here cannot be used to publish public keys which are not escrowed. All information displayed by the certificate authorities, and even the digital signatures of users, are shadow public key resistant.
    Type: Grant
    Filed: December 22, 1998
    Date of Patent: October 29, 2002
    Inventors: Adam Lucas Young, Marcel Mordechay Yung
  • Patent number: RE38375
    Abstract: A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.
    Type: Grant
    Filed: April 27, 2000
    Date of Patent: December 30, 2003
    Assignee: International Business Machines Corporation
    Inventors: Amir Herzberg, Hugo Mario Krawczyk, Shay Kutten, An Van Le, Stephen Michael Matyas, Marcel Mordechay Yung