Patents by Inventor Marten E. Van Dijk

Marten E. Van Dijk has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10116438
    Abstract: A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of criteria is applied to the request; and a result is determined based on the application of the set of criteria.
    Type: Grant
    Filed: August 23, 2017
    Date of Patent: October 30, 2018
    Assignee: EMC IP Holding Company LLC
    Inventors: Marten E. Van Dijk, Todd A. Morneau, William M. Duane
  • Patent number: 9774446
    Abstract: A method is used in managing use of security keys. Based on a request for use of a key that serves as part of a data security system, a set of criteria to apply to the request is determined. The set of criteria pertain to security management of the key that is subject of the request. The set of criteria is applied to the request; and a result is determined based on the application of the set of criteria.
    Type: Grant
    Filed: December 31, 2012
    Date of Patent: September 26, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Marten E. Van Dijk, Todd A. Morneau, William M. Duane
  • Patent number: 9323765
    Abstract: Example embodiments of the present invention provide authenticated file system that provides integrity and freshness of both data and metadata more efficiently than existing systems. The architecture of example embodiments of the present invention is natural to cloud settings involving a cloud service provider and enterprise-class tenants, thereby addressing key practical considerations, including garbage collection, multiple storage tiers, multi-layer caching, and checkpointing. Example embodiments of the present invention support a combination of strong integrity protection and practicality for large (e.g., petabyte-scale), high-throughput file systems. Further, example embodiments of the present invention support proofs of retrievability (PoRs) that let the cloud prove to the tenant efficiently at any time and for arbitrary workloads that the full file system (i.e.
    Type: Grant
    Filed: March 10, 2014
    Date of Patent: April 26, 2016
    Assignee: EMC Corporation
    Inventors: Emil P. Stefanov, Marten E. Van Dijk, Alina M. Oprea, Ari Juels
  • Patent number: 8813234
    Abstract: A processing device comprises a processor coupled to a memory and implements a graph-based approach to protection of a system comprising information technology infrastructure from a persistent security threat. Attack-escalation states of the persistent security threat are assigned to respective nodes in a graph, and defensive costs for preventing transitions between pairs of the nodes are assigned to respective edges in the graph. A minimum cut of the graph is computed, and a defensive strategy is determined based on the minimum cut. The system comprising information technology infrastructure subject to the persistent security threat is configured in accordance with the defensive strategy in order to deter the persistent security threat.
    Type: Grant
    Filed: June 29, 2011
    Date of Patent: August 19, 2014
    Assignee: EMC Corporation
    Inventors: Kevin D. Bowers, Marten E. van Dijk, Ari Juels, Alina M. Oprea, Ronald L. Rivest, Nikolaos Triandopoulos
  • Patent number: 8706701
    Abstract: Example embodiments of the present invention provide authenticated file system that provides integrity and freshness of both data and metadata more efficiently than existing systems. The architecture of example embodiments of the present invention is natural to cloud settings involving a cloud service provider and enterprise-class tenants, thereby addressing key practical considerations, including garbage collection, multiple storage tiers, multi-layer caching, and checkpointing. Example embodiments of the present invention support a combination of strong integrity protection and practicality for large (e.g., petabyte-scale), high-throughput file systems. Further, example embodiments of the present invention support proofs of retrievability (PoRs) that let the cloud prove to the tenant efficiently at any time and for arbitrary workloads that the full file system (i.e.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: April 22, 2014
    Assignee: EMC Corporation
    Inventors: Emil P. Stefanov, Marten E. Van Dijk, Alina M. Oprea, Ari Juels
  • Patent number: 7653197
    Abstract: A secure solution is provided to the problem of secret key agreement. In particular, a method of reliable forward secret key sharing is disclosed between two legitimate correspondents whose profiles match sufficiently. The invention relies on a physical random function, sometimes referred to as a physical unclonable function (PUF) to provide a secure solution to the problem of secret key agreement. In one embodiment, a one-pass protocol is introduced based on Reed-Solomon codes leading to an unconditionally secure solution. In a further embodiment, the solution of the first embodiment is improved upon by providing a conditionally secure solution based on a pseudo random family of functions. In a still further embodiment, a two-pass protocol is introduced which is used exclusively for purposes of identification and authentication. In accordance with the principles of the two-pass protocol, two communications are required and unlike the one-pass protocol, the second correspondent selects the secret key K.
    Type: Grant
    Filed: October 28, 2004
    Date of Patent: January 26, 2010
    Assignee: Koninklijke Philips Electronics N.V.
    Inventor: Marten E. Van Dijk
  • Publication number: 20080044027
    Abstract: A secure solution is provided to the problem of secret key agreement. In particular, a method of reliable forward secret key sharing is disclosed between two legitimate correspondents whose profiles match sufficiently. The invention relies on a physical random function, sometimes referred to as a physical unclonable function (PUF) to provide a secure solution to the problem of secret key agreement. In one embodiment, a one-pass protocol is introduced based on Reed-Solomon codes leading to an unconditionally secure solution. In a further embodiment, the solution of the first embodiment is improved upon by providing a conditionally secure solution based on a pseudo random family of functions. In a still further embodiment, a two-pass protocol is introduced which is used exclusively for purposes of identification and authentication. In accordance with the principles of the two-pass protocol, two communications are required and unlike the one-pass protocol, the second correspondent selects the secret key K.
    Type: Application
    Filed: October 28, 2004
    Publication date: February 21, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRNICS, N.V.
    Inventor: Marten E. Van Dijk
  • Patent number: 6650257
    Abstract: An information carrier includes runlength limited marks in a track. The runlengths of the marks represent main channel bits and variations of a further parameter of the marks representing secondary channel bits. Not all marks have the variations, only marks of at least a predetermined runlength have the variations.
    Type: Grant
    Filed: June 19, 2002
    Date of Patent: November 18, 2003
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen
  • Patent number: 6529147
    Abstract: An information carrier includes runlength limited marks in a track. The runlengths of the marks represent main channel bits and variations of a further parameter of the marks representing secondary channel bits. Not all marks have the variations, only marks of at least a predetermined runlength have the variations.
    Type: Grant
    Filed: March 23, 2000
    Date of Patent: March 4, 2003
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen
  • Publication number: 20020168088
    Abstract: Recently developed methods for copy protection rely on a watermark detector to judge whether multimedia content can be copied or not. In such copy protection schemes, a watermark detector examines the multimedia content and outputs a signal (D) indicating whether a watermark is present or not. Known watermark detectors determine a decision variable (y) indicating to which extent the watermark is present, for example, the amount of correlation between the input signal and a reference copy of the watermark to be detected. The watermark is detected if the decision variable exceeds a predetermined threshold (y2). Such a detector is vulnerable to an attack which is described in this patent application.
    Type: Application
    Filed: May 9, 2002
    Publication date: November 14, 2002
    Applicant: Koninklijke Philips Electronics N.V.
    Inventors: Johan P.M.G. Linnartz, Maurice J.J.J-B. Maes, Antonius A.C.M. Kalker, Geert F.G. Depovere, Peter M.J. Rongen, Christianus W.F. Vriens, Marten E. Van Dijk
  • Publication number: 20020163453
    Abstract: The invention relates to an information carrier comprising runlength limited marks in a track. The runlengths of the marks represent main channel bits and variations of a further parameter of the marks representing secondary channel bits. Not all marks have said variations, only marks of at least a predetermined runlength have said variations.
    Type: Application
    Filed: June 19, 2002
    Publication date: November 7, 2002
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen
  • Patent number: 6415040
    Abstract: A watermark detector is disclosed to judge whether multimedia content can be copied or not. The watermark detector examines the multimedia content and outputs a signal indicating whether a watermark is present or not. A decision variable indicating to which extent the watermark is present is determined, for example, the amount of correlation between the input signal and a reference copy of the watermark to be detected. The watermark is detected if the decision variable exceeds a predetermined threshold (y2). The detector also generates a random output signal for a predetermined range of decision values between the threshold (y2) and a further threshold (y1).
    Type: Grant
    Filed: May 20, 1998
    Date of Patent: July 2, 2002
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: Johan P. M. G. Linnartz, Maurice J. J. J-B. Maes, Antonius A. C. M. Kalker, Geert F. G. Depovere, Peter M. J. Rongen, Christianus W. F. Vriens, Marten E. Van Dijk
  • Patent number: 6378100
    Abstract: Multiword information is encoded as based on multibit symbols in relative contiguity with respect to a medium, whilst providing wordwise interleaving and wordwise error protection code facilities. This may provide error locative clues across words of multiword groups, that originate in high protectivity clue words and point to low protectivity target words. The clue words may have a first uniform size and be interspersed in a first uniform manner. The target words may have a second uniform size and be interspersed in a second uniform manner. The organization may be applied for use with optical storage. Sectors may get provisional protectivity as a low-latency error correction mechanism.
    Type: Grant
    Filed: December 22, 1998
    Date of Patent: April 23, 2002
    Assignee: U.S. Philips Corporation
    Inventors: Marten E. Van Dijk, Ludovicus M. G. M. Tolhuizen, Constant P. M. J. Baggen
  • Patent number: 6367049
    Abstract: Multiword information is based on multibit symbols disposed in relative contiguity with respect to a medium, and is encoded with a wordwise interleaving and wordwise error protection code for providing error locative clues across multiword groups. In particular, the clues originate in high protectivity clue words (BIS) that are interleaved among clue columns, and also in synchronizing columns constituted from synchronizing bit groups. The synchronizing columns are located where the clue columns are relatively scarcer disposed. The clues are directed to low protectivity target words (LDS) that are interleaved in a substantially uniform manner among target columns which form uniform-sized column groups between periodic arrangements of clue columns and synchronizing columns.
    Type: Grant
    Filed: July 26, 1999
    Date of Patent: April 2, 2002
    Assignees: U.S. Philips Corp., Sony Corp.
    Inventors: Marten E. Van Dijk, Ludovicus M. G. M. Tolhuizen, Josephus A. H. M. Kahlman, Constant P. M. J. Baggen, Masayuk Hattori, Kouhei Yamamoto, Tatsuya Narahara, Susumu Senshu
  • Patent number: 6366673
    Abstract: An encrypting exponentiation modulo M is effected by a modular multiplication X*YmodM, where M is a temporally steady but instance-wise non-uniform modulus. The method involves an iterative series of steps. Each step executes one or two first multiplications to produce a first result, and a trim-down reduction of the size of the first result by one or more second multiplications to produce a second result. The method furthermore takes a distinctive measure for keeping the final result of each step below a predetermined multiplicity of the modulus. In particular, the method postpones substantially any subtraction of the modulus as pertaining to the measure to a terminal phase of the modular exponentiation. This is possible through choosing in an appropriate manner one or more parameters figuring in the method. This further maintains overall temporal performance.
    Type: Grant
    Filed: September 15, 1998
    Date of Patent: April 2, 2002
    Assignee: U.S. Philips Corporation
    Inventors: Hendrik D. L. Hollmann, Marten E. Van Dijk, Petrus J. Lenoir
  • Patent number: 6362754
    Abstract: A stream of channel bits, of a signal relating to a binary channel, is decoded into a stream of source bits, of a signal relating to a binary source. This binary channel includes a main channel and a secondary channel. This secondary channel is embedded in the main channel. Errors in the stream of secondary channel bits are corrected using a stream of corrected main channel bits. This stream of corrected main channel bits is reconstructed from a stream of corrected source bits. The secondary channel can be embedded in the main channel in different manners, e.g. via multi-level coding or via merging-bit coding.
    Type: Grant
    Filed: March 16, 2000
    Date of Patent: March 26, 2002
    Assignee: U.S. Philips Corporation
    Inventors: Marten E. Van Dijk, Willem M. J. M. Coene, Constant P. M. J. Baggen