Patents by Inventor Michael A. Kendrick
Michael A. Kendrick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9674210Abstract: A processing device comprises a processor coupled to a memory and is configured to obtain data characterizing host devices of a computer network of an enterprise. The data is applied to a logistic regression model to generate malware infection risk scores for respective ones of the host devices. The malware infection risk scores indicate likelihoods that the respective host devices will become infected with malware. The logistic regression model incorporates features of the host devices including at least user demographic features, virtual private network (VPN) activity features and web activity features of the host devices, and the data characterizing the host devices comprises data for the incorporated features. Proactive measures are taken to prevent malware infection in a subset of the host devices based at least in part on the malware infection risk scores. The processing device may be implemented in the computer network or an associated network security system.Type: GrantFiled: November 26, 2014Date of Patent: June 6, 2017Assignees: EMC IP Holding Company LLC, University of North Carolina at Chapel HillInventors: Alina M. Oprea, Ting-Fang Yen, Viktor Heorhiadi, Michael Kendrick Reiter, Ari Juels
-
Patent number: 9660995Abstract: The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live.Type: GrantFiled: February 20, 2014Date of Patent: May 23, 2017Assignees: The University of North Carolina at Chapel Hill, Indiana University Research & Technology CorporationInventors: Michael Kendrick Reiter, Apu Chandrasen Kapadia, Alana Libonati
-
Patent number: 9547104Abstract: The present invention is directed to methods and systems for oil field downhole sensing and communication during drilling and/or production, wherein such methods and systems utilize coaxial cable to transmit electromagnetic (EM) energy, continuously or as a pulse, to passive downhole sensors.Type: GrantFiled: September 4, 2008Date of Patent: January 17, 2017Assignee: CHEVRON U.S.A. INC.Inventors: Don M. Coates, M. Clark Thompson, David W. Beck, Manuel E. Gonzalez, Michael A. Kendrick, Daniel L. Neagley
-
Publication number: 20150381624Abstract: The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live.Type: ApplicationFiled: February 20, 2014Publication date: December 31, 2015Inventors: Michael Kendrick Reiter, Apu Chandrasen Kapadia, Alana Libonati
-
Patent number: 9009385Abstract: At least one virtual machine implemented on a given physical machine in an information processing system is able to detect the presence of one or more other virtual machines that are also co-resident on that same physical machine. More particularly, at least one virtual machine is configured to avoid usage of a selected portion of a memory resource of the physical machine for a period of time, and to monitor the selected portion of the memory resource for activity during the period of time. Detection of a sufficient level of such activity indicates that the physical machine is also being shared by at least one other virtual machine. The memory resource of the physical machine may comprise, for example, a cache memory, and the selected portion of the memory resource may comprise one or more randomly selected sets of the cache memory.Type: GrantFiled: June 30, 2011Date of Patent: April 14, 2015Assignee: EMC CorporationInventors: Ari Juels, Alina M. Oprea, Michael Kendrick Reiter, Yinqian Zhang
-
Patent number: 8689282Abstract: Cloud infrastructure of a cloud service provider comprises a processing platform implementing a security policy enforcement framework. The security policy enforcement framework comprises a policy analyzer that is configured to identify at least one security policy associated with at least one tenant of the cloud service provider, to analyze the security policy against configuration information characterizing the cloud infrastructure of the cloud service provider, and to control execution of one or more applications of said at least one tenant within the cloud infrastructure in accordance with the security policy, based at least in part on one or more results of the analysis of the security policy. The security policy enforcement framework may be implemented in a platform-as-a-service (PaaS) layer of the cloud infrastructure, and may comprise a runtime controller, an operating system controller, a hypervisor controller and a PaaS controller.Type: GrantFiled: December 23, 2011Date of Patent: April 1, 2014Assignees: EMC Corporation, University of North Carolina at Chapel HillInventors: Alina M. Oprea, Yinqian Zhang, Vijay Ganti, John P. Field, Ari Juels, Michael Kendrick Reiter
-
Publication number: 20090174409Abstract: The present invention is directed to methods and systems for oil field downhole sensing and communication during drilling and/or production, wherein such methods and systems utilize coaxial cable to transmit electromagnetic (EM) energy, continuously or as a pulse, to passive downhole sensors.Type: ApplicationFiled: September 4, 2008Publication date: July 9, 2009Applicant: Chevron U.S.A., Inc.Inventors: Don M. COATES, M. Clark Thompson, David W. Beck, Manuel E. Gonzalez, Michael A. Kendrick, Daniel L. Neagley
-
Patent number: 7373499Abstract: Improved cryptographic techniques are provided by which a device that performs private key operations (e.g., signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i.e., confirmation of the password guess) from the originally designated entity or party to another designated entity or party.Type: GrantFiled: June 26, 2002Date of Patent: May 13, 2008Assignee: Lucent Technologies Inc.Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
-
Patent number: 7155524Abstract: A system for and method of implementing a backoff protocol and a computer network incorporating the system or the method. In one embodiment, the system includes: (1) a client subsystem that generates a request for access to a shared resource and (2) a server subsystem that receives the request, returns a LOCKED indicator upon an expectation that the shared resource is unavailable and otherwise returns a FREE indicator, the client subsystem responding to the LOCKED indicator by waiting before regenerating the request for the access.Type: GrantFiled: December 4, 2001Date of Patent: December 26, 2006Assignees: Lucent Technologies Inc., Hebrew UniversityInventors: Michael Kendrick Reiter, Gregory Chockler, Dahlia Malkhi
-
Patent number: 7149311Abstract: Techniques are provided by which a device that performs private key operations (e.g., signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i.e., its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.Type: GrantFiled: February 7, 2002Date of Patent: December 12, 2006Assignee: Lucent Technologies Inc.Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
-
Patent number: 7107269Abstract: Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.Type: GrantFiled: June 12, 2001Date of Patent: September 12, 2006Assignee: Lucent Technologies Inc.Inventors: Robert M. Arlein, Ben Jai, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter
-
Patent number: 7003110Abstract: A software program is configured in accordance with a software aging process such that one or more files generated by the program are at least partially encrypted using a cryptographic key associated with a current time interval for which the files are generated. The cryptographic key may be a symmetric key used for both encryption and decryption operations, such that cryptographic key used for encryption in a given interval is also required to decrypt files encrypted during that interval. Periodic updates of the software program are provided to a legitimate user of the software program, with a given one of the updates including a different cryptographic key associated with a subsequent time interval. The cryptographic key associated with a particular one of the time intervals may be common to each of a set of legitimate copies of the software program that have received the corresponding version of the periodic update.Type: GrantFiled: November 14, 2000Date of Patent: February 21, 2006Assignee: Lucent Technologies Inc.Inventors: Bjorn Markus Jakobsson, Michael Kendrick Reiter
-
Patent number: 6901145Abstract: A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e.g. keystroke dynamics) the keystroke is entered.Type: GrantFiled: February 10, 2000Date of Patent: May 31, 2005Assignee: Lucent Technologies Inc.Inventors: Philip L. Bohannon, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter, Susanne Gudrun Wetzel
-
Publication number: 20030059041Abstract: Techniques are provided for sharing the DSA signature function, so that two parties can efficiently generate a DSA signature with respect to a given public key but neither can alone. In an illustrative embodiment, the invention provides a DSA signature protocol that allows a proof of security for concurrent execution in the random oracle model. The invention also allows a proof of security for sequential execution without random oracles.Type: ApplicationFiled: June 26, 2002Publication date: March 27, 2003Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
-
Publication number: 20030048909Abstract: Improved cryptographic techniques are provided by which a device that performs private key operations (e.g., signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i.e., confirmation of the password guess) from the originally designated entity or party to another designated entity or party.Type: ApplicationFiled: June 26, 2002Publication date: March 13, 2003Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
-
Publication number: 20020156747Abstract: A name-to-target binding system generates certificates for use in authenticating a target key. In the system the certificate includes a first key. At least one attribute is assigned to the first key. A liability value is assigned to the combination of the first key and the at least one attribute. The system includes a second key used to sign a combination of the first key, the at least one attribute and the liability value wherein the second key is associated with the insurer agreeing to be liable for the liability value.Type: ApplicationFiled: April 25, 2002Publication date: October 24, 2002Inventors: Michael Kendrick Reiter, Stuart Gerald Stubblebine
-
Publication number: 20020141594Abstract: Techniques are provided by which a device that performs private key operations (e.g., signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i.e., its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.Type: ApplicationFiled: February 7, 2002Publication date: October 3, 2002Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
-
Publication number: 20020133500Abstract: Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.Type: ApplicationFiled: January 23, 2002Publication date: September 19, 2002Inventors: Robert M. Arlein, Ben Jai, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter
-
Patent number: 6405313Abstract: A name-to-target binding system generates certificates for use in authenticating a target key. In the system the certificate includes a first key. At least one attribute is assigned to the first key. A liability value is assigned to the combination of the first key and the at least one attribute. The system includes a second key used to sign a combination of the first key, the at least one attribute and the liability value wherein the second key is associated with the insurer agreeing to be liable for the liability value.Type: GrantFiled: April 23, 1998Date of Patent: June 11, 2002Assignee: AT&T Corp.Inventors: Michael Kendrick Reiter, Stuart Gerald Stubblebine
-
Patent number: 6263436Abstract: A method and apparatus for fairly exchanging documents. A first document is shared between principal Y and third party Z. A second document is shared between principal X and third party Z. Z verifies that the sharing of the first and second documents has been performed correctly without Z understanding either document. If verified, Z sends its shares of the first and second documents to Y and X, respectively. X and Y verify that Z's shares are authentic.Type: GrantFiled: December 17, 1996Date of Patent: July 17, 2001Assignee: AT&T Corp.Inventors: Matthew Keith Franklin, Michael Kendrick Reiter