Patents by Inventor Marcel Mordechay Yung
Marcel Mordechay Yung has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8800032Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.Type: GrantFiled: February 17, 2011Date of Patent: August 5, 2014Inventors: Marcel Mordechay Yung, Yoram Ofek
-
Publication number: 20130173471Abstract: A method for providing a warranty relating to a transaction between two parties in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each party being a client of at least one of the institutions, the method comprising: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party.Type: ApplicationFiled: November 26, 2012Publication date: July 4, 2013Applicant: Certco, Inc.Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
-
Patent number: 8321348Abstract: A method for providing a warranty relating to a transaction between two parties, each party being a client of at least one respective institution which provides services to the respective party, the method including: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party.Type: GrantFiled: January 24, 2012Date of Patent: November 27, 2012Assignee: Certco, Inc.Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
-
Publication number: 20120143723Abstract: A method for providing a warranty relating to a transaction between two parties, each party being a client of at least one respective institution which provides services to the respective party, the method including: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client; and transmitting a response to the request from the respective location to the one party.Type: ApplicationFiled: January 24, 2012Publication date: June 7, 2012Applicant: CERTCO, Inc.Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
-
Patent number: 8121949Abstract: A method for providing a warranty relating to a transaction between two parties, each party having a data communications device, in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each location having a computer system, a database coupled to the computer system and storing information about each client of the institution and a data communications device coupled to the computer system for communication with the data communications device of any one party, each party being a client of at least one of the institutions, the method containing the steps of: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange ofType: GrantFiled: March 10, 2008Date of Patent: February 21, 2012Assignee: CertCoInventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
-
Publication number: 20110167490Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.Type: ApplicationFiled: February 17, 2011Publication date: July 7, 2011Inventors: MARCEL MORDECHAY YUNG, Yoram Ofek
-
Patent number: 7895643Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.Type: GrantFiled: August 14, 2002Date of Patent: February 22, 2011Assignee: Trustedflow Systems, Inc.Inventors: Marcel Mordechay Yung, Yoram Ofek
-
Publication number: 20080221914Abstract: A method for providing a warranty relating to a transaction between two parties, each party having a data communications device, in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, each location having a computer system, a database coupled to the computer system and storing information about each client of the institution and a data communications device coupled to the computer system for communication with the data communications device of any one party, each party being a client of at least one of the institutions, the method containing the steps of: transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction; conducting an exchange of infType: ApplicationFiled: March 10, 2008Publication date: September 11, 2008Applicant: CertCoInventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
-
Patent number: 7367045Abstract: This invention discloses a method and system for communication that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated and encrypted within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets. The method further comprises of means for coordinating the initialization of the end station and network interface.Type: GrantFiled: August 14, 2002Date of Patent: April 29, 2008Assignee: TrustedFlow Systems, Inc.Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi
-
Patent number: 7343346Abstract: A method for facilitating provision of a warranty relating to a transaction between two parties in a system which includes an infrastructure composed of a plurality of locations each associated with a respective institution which provides services to clients, the method containing the steps of transmitting a request for a warranty from one party to the transaction which is a client of the respective institution to a respective location associated with the respective institution, which request includes information identifying the other party to the transaction and information about the nature of the transaction conducting an exchange of information between the respective location and a location associated with a institution of which the other party is a client and transmitting a response to the request from the respective location to the one party.Type: GrantFiled: January 11, 2002Date of Patent: March 11, 2008Assignee: CertCo, Inc.Inventors: Yair Frankel, David William Kravitz, Charles Thomas Montgomery, Marcel Mordechay Yung
-
Patent number: 7343619Abstract: The objective of this invention is to ensure that programs that generate and send data packets are well behaved. This invention discloses a method and system that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets.Type: GrantFiled: August 14, 2002Date of Patent: March 11, 2008Assignee: TrustedFlow Systems, Inc.Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi, David Howard Sitrick
-
Patent number: 7305704Abstract: This invention discloses a method and system for detecting and reacting to unexpected communications patterns. The system consists of a plurality of end stations and a plurality of network interfaces, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The system further consists of a plurality of secure management servers, which continuously exchange management messages with the network interfaces. Consequently, the secure management servers have the information for detecting unexpected communications patterns. The method allows the control of end stations, and when an unexpected communication pattern is detected, selectively only packets from authenticated programs can be allowed to be transmitted.Type: GrantFiled: August 14, 2002Date of Patent: December 4, 2007Assignee: TrustedFlow Systems, Inc.Inventors: Yoram Ofek, Marcel Mordechay Yung
-
Publication number: 20030177374Abstract: This invention discloses a method and system for processing logic modules, each having a separate functionality, into a unique functionality that is to be executed in an interlocked mode as a unique functionality. The method is based on taking logic modules (programs and data) with known functionality and transforming them into a hidden program by integrating modules to execute together into a logic which is partially obfuscated and/or encrypted and/or physically hidden. The hidden program is being updated dynamically to strengthen it against reverse engineering efforts. The program includes the functionality for generating security signals, which are unpredictable by observers, such as a pseudo random sequence of security signals. Only elements that share the means for producing the security signals can check their validity. The modules include operational tasks and performance parameters for this operation.Type: ApplicationFiled: August 14, 2002Publication date: September 18, 2003Inventors: Marcel Mordechay Yung, Yoram Ofek
-
Publication number: 20030177382Abstract: The objective of this invention is to ensure that programs that generate and send data packets are well behaved. This invention discloses a method and system that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets.Type: ApplicationFiled: August 14, 2002Publication date: September 18, 2003Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi, David Howard Sitrick
-
Publication number: 20030177381Abstract: This invention discloses a method and system for communication that consist of an end station and a network interface, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The method is based on using a hidden program that was obfuscated and encrypted within the program that is used to generate and send data packets from the end station. The hidden program is being updated dynamically and it includes the functionality for generating a pseudo random sequence of security signals. Only the network interface knows how the pseudo random sequence of security signals were generated, and therefore, the network interface is able to check the validity of the pseudo random sequence of security signals, and thereby, verify the authenticity of the programs used to generate and send data packets. The method further comprises of means for coordinating the initialization of the end station and network interface.Type: ApplicationFiled: August 14, 2002Publication date: September 18, 2003Inventors: Yoram Ofek, Marcel Mordechay Yung, Mario Baldi
-
Publication number: 20030177383Abstract: This invention discloses a method and system for detecting and reacting to unexpected communications patterns. The system consists of a plurality of end stations and a plurality of network interfaces, such that, the network interface is capable of determining the authenticity of the program used by the end station to generate and send data packets. The system further consists of a plurality of secure management servers, which continuously exchange management messages with the network interfaces. Consequently, the secure management servers have the information for detecting unexpected communications patterns. The method allows the control of end stations, and when an unexpected communication pattern is detected, selectively only packets from authenticated programs can be allowed to be transmitted.Type: ApplicationFiled: August 14, 2002Publication date: September 18, 2003Inventors: Yoram Ofek, Marcel Mordechay Yung
-
Publication number: 20030163686Abstract: A system and method facilitates reliance among members of a community that communicates electronically. Each member has a private credential for use in a computing environment. Each member obtains the credential in accordance with a credential-issuance process. The process need not include a certification authority. Credentials may be generated directly by the members themselves. They system includes a database that contains at least one credential entry for each member . The system also includes a management process with authority to sanction (e.g., approve) reliance by the community on a member's credential. Such sanction authority is separate from the credential-issuance process. The system also includes a rule set defining a scope of reliance the community may make on a member's credential.Type: ApplicationFiled: August 6, 2002Publication date: August 28, 2003Inventors: Jean Renard Ward, Marcel Mordechay Yung, Robert James Stewart
-
Patent number: 6581106Abstract: The routing address lookup problem is one of the major bottlenecks in high performance routers and deals with forwarding of packets. In the Internet domain it is known as “IP address lookup problem.” This invention provides a new and easy way to preprocess routing tables which gives efficient packet/message forwarding and is feasible in the time and the space it consumes. More precisely, the method for m-bit IP addresses gives a balanced trade-off between performing a binary search on T with O(log|T|) accesses, where |T| is the number of entries in T, and executing a single access on a table of 2m entries obtained by fully expanding T. While the prior art starts out from space-efficient data structures and aim at lowering the O(log|T|) access cost, the invention starts out from the expanded table with 2m entries and aim at compressing it without an excessive increase in the number of accesses.Type: GrantFiled: January 13, 2000Date of Patent: June 17, 2003Inventors: Pierluigi Crescenzi, Leandro Dardini, Roberto Grossi, Marcel Mordechay Yung
-
Patent number: 6473508Abstract: A method is provided for digital signature infrastructure that provides public keys which are effective only for verifying digital signatures, and are not effective for encrypting information in a way that is unrecoverable by law-enforcement entities. The method can be implemented in software, thus avoiding the need for tamper-proof hardware. The method has the property that signing private keys are not escrowed, since the corresponding public keys cannot be used effectively for criminal communications. As a result no one can impersonate the user; alternatively users can prove impersonations. Furthermore, the system is shadow public key resistant. A shadow public key is a public key which is not escrowed and which can be used for untappable communications. Therefore, the method presented here cannot be used to publish public keys which are not escrowed. All information displayed by the certificate authorities, and even the digital signatures of users, are shadow public key resistant.Type: GrantFiled: December 22, 1998Date of Patent: October 29, 2002Inventors: Adam Lucas Young, Marcel Mordechay Yung
-
Patent number: RE38375Abstract: A method and system for detecting authorized programs within a data processing system. The present invention creates a validation structure for validating a program. The validation structure is embedded in the program and in response to an initiation of the program, a determination is made as to whether the program is an authorized program. The determination is made using the validation structure.Type: GrantFiled: April 27, 2000Date of Patent: December 30, 2003Assignee: International Business Machines CorporationInventors: Amir Herzberg, Hugo Mario Krawczyk, Shay Kutten, An Van Le, Stephen Michael Matyas, Marcel Mordechay Yung