Patents by Inventor Micah Sherr

Micah Sherr has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20200084206
    Abstract: Embodiments of the present systems and methods may provide techniques for two-factor authentication (2FA) that leverage voice assistant devices such as Google Home and Amazon Echo. For example, in an embodiment, a computer-implemented method of authentication may comprise receiving an authentication request for a user of a service, authenticating the user using two-factor authentication, wherein at least one factor of the two-factor authentication is audio, and validating the authentication request upon validation of both factors of the two-factor authentication.
    Type: Application
    Filed: September 9, 2019
    Publication date: March 12, 2020
    Applicant: Georgetown University
    Inventors: Tavish Vaidya, Micah Sherr
  • Patent number: 10437993
    Abstract: A mechanism called time-deterministic replay (TOR) that can reproduce the execution of a program, including its precise timing. Without TOR, reproducing the timing of an execution is difficult because there are many sources of timing variability. TOR uses a combination of techniques to either mitigate or eliminate most of these sources of variability. Using a prototype implementation of TOR in a Java Virtual Machine, we show it is possible to reproduce the timing to within 1.85% of the original execution. A study of one of the applications of TOR is described: the detection of a covert timing channel. Timing channels can be used to exfiltrate information from a compromised machine by subtly varying timing of the machine's outputs, TOR can detect this variation. Unlike prior solutions, which generally look for a specific type of timing channel, our approach can detect a wide variety of channels with high accuracy.
    Type: Grant
    Filed: October 5, 2015
    Date of Patent: October 8, 2019
    Assignees: THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIA, GEORGETOWN UNIVERSITY
    Inventors: Ang Chen, Hanjun Xiao, William Bradley Moore, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou
  • Publication number: 20170213028
    Abstract: A mechanism called time-deterministic replay (TOR) that can reproduce the execution of a program, including its precise timing. Without TOR, reproducing the timing of an execution is difficult because there are many sources of timing variability. TOR uses a combination of techniques to either mitigate or eliminate most of these sources of variability. Using a prototype implementation of TOR in a Java Virtual Machine, we show it is possible to reproduce the timing to within 1.85% of the original execution. A study of one of the applications of TOR is described: the detection of a covert timing channel. Timing channels can be used to exfiltrate information from a compromised machine by subtly varying timing of the machine's outputs, TOR can detect this variation. Unlike prior solutions, which generally look for a specific type of timing channel, our approach can detect a wide variety of channels with high accuracy.
    Type: Application
    Filed: October 5, 2015
    Publication date: July 27, 2017
    Inventors: Ang Chen, Hanjun Xiao, William Bradley Moore, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, Wenchao Zhou
  • Patent number: 9191811
    Abstract: A method and apparatus that protect information on a mobile device. The method and mobile device obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.
    Type: Grant
    Filed: July 15, 2014
    Date of Patent: November 17, 2015
    Assignee: Georgetown University
    Inventors: Ophir Frieder, Micah Sherr, Jordan Wilberding
  • Publication number: 20140329499
    Abstract: A method and apparatus that protect information on a mobile device. The method and mobile device obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.
    Type: Application
    Filed: July 15, 2014
    Publication date: November 6, 2014
    Inventors: Ophir FRIEDER, Micah Sherr, Jordan Wilberding
  • Patent number: 8819448
    Abstract: A system and method for protecting information on a mobile device. The method and apparatus obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.
    Type: Grant
    Filed: April 29, 2011
    Date of Patent: August 26, 2014
    Assignee: Georgetown University
    Inventors: Ophir Frieder, Micah Sherr, Jordan Wilberding
  • Publication number: 20120278633
    Abstract: A system and method for protecting information on a mobile device. The method and apparatus obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.
    Type: Application
    Filed: April 29, 2011
    Publication date: November 1, 2012
    Applicant: Georgetown University
    Inventors: Ophir Frieder, Micah Sherr, Jordan Wilberding