Patents by Inventor Marten E. Van Dijk
Marten E. Van Dijk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10116438Abstract: A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of criteria is applied to the request; and a result is determined based on the application of the set of criteria.Type: GrantFiled: August 23, 2017Date of Patent: October 30, 2018Assignee: EMC IP Holding Company LLCInventors: Marten E. Van Dijk, Todd A. Morneau, William M. Duane
-
Patent number: 9774446Abstract: A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of criteria is applied to the request; and a result is determined based on the application of the set of criteria.Type: GrantFiled: December 31, 2012Date of Patent: September 26, 2017Assignee: EMC IP Holding Company LLCInventors: Marten E. Van Dijk, Todd A. Morneau, William M. Duane
-
Patent number: 9323765Abstract: Example embodiments of the present invention provide authenticated file system that provides integrity and freshness of both data and metadata more efficiently than existing systems. The architecture of example embodiments of the present invention is natural to cloud settings involving a cloud service provider and enterprise-class tenants, thereby addressing key practical considerations, including garbage collection, multiple storage tiers, multi-layer caching, and checkpointing. Example embodiments of the present invention support a combination of strong integrity protection and practicality for large (e.g., petabyte-scale), high-throughput file systems. Further, example embodiments of the present invention support proofs of retrievability (PoRs) that let the cloud prove to the tenant efficiently at any time and for arbitrary workloads that the full file system (i.e.Type: GrantFiled: March 10, 2014Date of Patent: April 26, 2016Assignee: EMC CorporationInventors: Emil P. Stefanov, Marten E. Van Dijk, Alina M. Oprea, Ari Juels
-
Patent number: 8813234Abstract: A processing device comprises a processor coupled to a memory and implements a graph-based approach to protection of a system comprising information technology infrastructure from a persistent security threat. Attack-escalation states of the persistent security threat are assigned to respective nodes in a graph, and defensive costs for preventing transitions between pairs of the nodes are assigned to respective edges in the graph. A minimum cut of the graph is computed, and a defensive strategy is determined based on the minimum cut. The system comprising information technology infrastructure subject to the persistent security threat is configured in accordance with the defensive strategy in order to deter the persistent security threat.Type: GrantFiled: June 29, 2011Date of Patent: August 19, 2014Assignee: EMC CorporationInventors: Kevin D. Bowers, Marten E. van Dijk, Ari Juels, Alina M. Oprea, Ronald L. Rivest, Nikolaos Triandopoulos
-
Patent number: 8706701Abstract: Example embodiments of the present invention provide authenticated file system that provides integrity and freshness of both data and metadata more efficiently than existing systems. The architecture of example embodiments of the present invention is natural to cloud settings involving a cloud service provider and enterprise-class tenants, thereby addressing key practical considerations, including garbage collection, multiple storage tiers, multi-layer caching, and checkpointing. Example embodiments of the present invention support a combination of strong integrity protection and practicality for large (e.g., petabyte-scale), high-throughput file systems. Further, example embodiments of the present invention support proofs of retrievability (PoRs) that let the cloud prove to the tenant efficiently at any time and for arbitrary workloads that the full file system (i.e.Type: GrantFiled: June 30, 2011Date of Patent: April 22, 2014Assignee: EMC CorporationInventors: Emil P. Stefanov, Marten E. Van Dijk, Alina M. Oprea, Ari Juels
-
Patent number: 7653197Abstract: A secure solution is provided to the problem of secret key agreement. In particular, a method of reliable forward secret key sharing is disclosed between two legitimate correspondents whose profiles match sufficiently. The invention relies on a physical random function, sometimes referred to as a physical unclonable function (PUF) to provide a secure solution to the problem of secret key agreement. In one embodiment, a one-pass protocol is introduced based on Reed-Solomon codes leading to an unconditionally secure solution. In a further embodiment, the solution of the first embodiment is improved upon by providing a conditionally secure solution based on a pseudo random family of functions. In a still further embodiment, a two-pass protocol is introduced which is used exclusively for purposes of identification and authentication. In accordance with the principles of the two-pass protocol, two communications are required and unlike the one-pass protocol, the second correspondent selects the secret key K.Type: GrantFiled: October 28, 2004Date of Patent: January 26, 2010Assignee: Koninklijke Philips Electronics N.V.Inventor: Marten E. Van Dijk
-
Publication number: 20080044027Abstract: A secure solution is provided to the problem of secret key agreement. In particular, a method of reliable forward secret key sharing is disclosed between two legitimate correspondents whose profiles match sufficiently. The invention relies on a physical random function, sometimes referred to as a physical unclonable function (PUF) to provide a secure solution to the problem of secret key agreement. In one embodiment, a one-pass protocol is introduced based on Reed-Solomon codes leading to an unconditionally secure solution. In a further embodiment, the solution of the first embodiment is improved upon by providing a conditionally secure solution based on a pseudo random family of functions. In a still further embodiment, a two-pass protocol is introduced which is used exclusively for purposes of identification and authentication. In accordance with the principles of the two-pass protocol, two communications are required and unlike the one-pass protocol, the second correspondent selects the secret key K.Type: ApplicationFiled: October 28, 2004Publication date: February 21, 2008Applicant: KONINKLIJKE PHILIPS ELECTRNICS, N.V.Inventor: Marten E. Van Dijk
-
Patent number: 6650257Abstract: An information carrier includes runlength limited marks in a track. The runlengths of the marks represent main channel bits and variations of a further parameter of the marks representing secondary channel bits. Not all marks have the variations, only marks of at least a predetermined runlength have the variations.Type: GrantFiled: June 19, 2002Date of Patent: November 18, 2003Assignee: Koninklijke Philips Electronics N.V.Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen
-
Patent number: 6529147Abstract: An information carrier includes runlength limited marks in a track. The runlengths of the marks represent main channel bits and variations of a further parameter of the marks representing secondary channel bits. Not all marks have the variations, only marks of at least a predetermined runlength have the variations.Type: GrantFiled: March 23, 2000Date of Patent: March 4, 2003Assignee: Koninklijke Philips Electronics N.V.Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen
-
Publication number: 20020168088Abstract: Recently developed methods for copy protection rely on a watermark detector to judge whether multimedia content can be copied or not. In such copy protection schemes, a watermark detector examines the multimedia content and outputs a signal (D) indicating whether a watermark is present or not. Known watermark detectors determine a decision variable (y) indicating to which extent the watermark is present, for example, the amount of correlation between the input signal and a reference copy of the watermark to be detected. The watermark is detected if the decision variable exceeds a predetermined threshold (y2). Such a detector is vulnerable to an attack which is described in this patent application.Type: ApplicationFiled: May 9, 2002Publication date: November 14, 2002Applicant: Koninklijke Philips Electronics N.V.Inventors: Johan P.M.G. Linnartz, Maurice J.J.J-B. Maes, Antonius A.C.M. Kalker, Geert F.G. Depovere, Peter M.J. Rongen, Christianus W.F. Vriens, Marten E. Van Dijk
-
Publication number: 20020163453Abstract: The invention relates to an information carrier comprising runlength limited marks in a track. The runlengths of the marks represent main channel bits and variations of a further parameter of the marks representing secondary channel bits. Not all marks have said variations, only marks of at least a predetermined runlength have said variations.Type: ApplicationFiled: June 19, 2002Publication date: November 7, 2002Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen
-
Patent number: 6415040Abstract: A watermark detector is disclosed to judge whether multimedia content can be copied or not. The watermark detector examines the multimedia content and outputs a signal indicating whether a watermark is present or not. A decision variable indicating to which extent the watermark is present is determined, for example, the amount of correlation between the input signal and a reference copy of the watermark to be detected. The watermark is detected if the decision variable exceeds a predetermined threshold (y2). The detector also generates a random output signal for a predetermined range of decision values between the threshold (y2) and a further threshold (y1).Type: GrantFiled: May 20, 1998Date of Patent: July 2, 2002Assignee: Koninklijke Philips Electronics N.V.Inventors: Johan P. M. G. Linnartz, Maurice J. J. J-B. Maes, Antonius A. C. M. Kalker, Geert F. G. Depovere, Peter M. J. Rongen, Christianus W. F. Vriens, Marten E. Van Dijk
-
Patent number: 6378100Abstract: Multiword information is encoded as based on multibit symbols in relative contiguity with respect to a medium, whilst providing wordwise interleaving and wordwise error protection code facilities. This may provide error locative clues across words of multiword groups, that originate in high protectivity clue words and point to low protectivity target words. The clue words may have a first uniform size and be interspersed in a first uniform manner. The target words may have a second uniform size and be interspersed in a second uniform manner. The organization may be applied for use with optical storage. Sectors may get provisional protectivity as a low-latency error correction mechanism.Type: GrantFiled: December 22, 1998Date of Patent: April 23, 2002Assignee: U.S. Philips CorporationInventors: Marten E. Van Dijk, Ludovicus M. G. M. Tolhuizen, Constant P. M. J. Baggen
-
Patent number: 6366673Abstract: An encrypting exponentiation modulo M is effected by a modular multiplication X*YmodM, where M is a temporally steady but instance-wise non-uniform modulus. The method involves an iterative series of steps. Each step executes one or two first multiplications to produce a first result, and a trim-down reduction of the size of the first result by one or more second multiplications to produce a second result. The method furthermore takes a distinctive measure for keeping the final result of each step below a predetermined multiplicity of the modulus. In particular, the method postpones substantially any subtraction of the modulus as pertaining to the measure to a terminal phase of the modular exponentiation. This is possible through choosing in an appropriate manner one or more parameters figuring in the method. This further maintains overall temporal performance.Type: GrantFiled: September 15, 1998Date of Patent: April 2, 2002Assignee: U.S. Philips CorporationInventors: Hendrik D. L. Hollmann, Marten E. Van Dijk, Petrus J. Lenoir
-
Patent number: 6367049Abstract: Multiword information is based on multibit symbols disposed in relative contiguity with respect to a medium, and is encoded with a wordwise interleaving and wordwise error protection code for providing error locative clues across multiword groups. In particular, the clues originate in high protectivity clue words (BIS) that are interleaved among clue columns, and also in synchronizing columns constituted from synchronizing bit groups. The synchronizing columns are located where the clue columns are relatively scarcer disposed. The clues are directed to low protectivity target words (LDS) that are interleaved in a substantially uniform manner among target columns which form uniform-sized column groups between periodic arrangements of clue columns and synchronizing columns.Type: GrantFiled: July 26, 1999Date of Patent: April 2, 2002Assignees: U.S. Philips Corp., Sony Corp.Inventors: Marten E. Van Dijk, Ludovicus M. G. M. Tolhuizen, Josephus A. H. M. Kahlman, Constant P. M. J. Baggen, Masayuk Hattori, Kouhei Yamamoto, Tatsuya Narahara, Susumu Senshu
-
Patent number: 6362754Abstract: A stream of channel bits, of a signal relating to a binary channel, is decoded into a stream of source bits, of a signal relating to a binary source. This binary channel includes a main channel and a secondary channel. This secondary channel is embedded in the main channel. Errors in the stream of secondary channel bits are corrected using a stream of corrected main channel bits. This stream of corrected main channel bits is reconstructed from a stream of corrected source bits. The secondary channel can be embedded in the main channel in different manners, e.g. via multi-level coding or via merging-bit coding.Type: GrantFiled: March 16, 2000Date of Patent: March 26, 2002Assignee: U.S. Philips CorporationInventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen