Patents by Inventor Michael A. Kendrick

Michael A. Kendrick has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9674210
    Abstract: A processing device comprises a processor coupled to a memory and is configured to obtain data characterizing host devices of a computer network of an enterprise. The data is applied to a logistic regression model to generate malware infection risk scores for respective ones of the host devices. The malware infection risk scores indicate likelihoods that the respective host devices will become infected with malware. The logistic regression model incorporates features of the host devices including at least user demographic features, virtual private network (VPN) activity features and web activity features of the host devices, and the data characterizing the host devices comprises data for the incorporated features. Proactive measures are taken to prevent malware infection in a subset of the host devices based at least in part on the malware infection risk scores. The processing device may be implemented in the computer network or an associated network security system.
    Type: Grant
    Filed: November 26, 2014
    Date of Patent: June 6, 2017
    Assignees: EMC IP Holding Company LLC, University of North Carolina at Chapel Hill
    Inventors: Alina M. Oprea, Ting-Fang Yen, Viktor Heorhiadi, Michael Kendrick Reiter, Ari Juels
  • Patent number: 9660995
    Abstract: The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live.
    Type: Grant
    Filed: February 20, 2014
    Date of Patent: May 23, 2017
    Assignees: The University of North Carolina at Chapel Hill, Indiana University Research & Technology Corporation
    Inventors: Michael Kendrick Reiter, Apu Chandrasen Kapadia, Alana Libonati
  • Patent number: 9547104
    Abstract: The present invention is directed to methods and systems for oil field downhole sensing and communication during drilling and/or production, wherein such methods and systems utilize coaxial cable to transmit electromagnetic (EM) energy, continuously or as a pulse, to passive downhole sensors.
    Type: Grant
    Filed: September 4, 2008
    Date of Patent: January 17, 2017
    Assignee: CHEVRON U.S.A. INC.
    Inventors: Don M. Coates, M. Clark Thompson, David W. Beck, Manuel E. Gonzalez, Michael A. Kendrick, Daniel L. Neagley
  • Publication number: 20150381624
    Abstract: The subject matter described herein includes methods, systems, and computer readable media for combating mobile device theft with user notarization. One method includes providing a supplicant video notarization system application executable on a supplicant device for initiating an interactive video call between a supplicant and a notary as a condition to the supplicant accessing a protected electronic resource. The method further includes providing a notary video notarization system application executable on a notary device through which the notary receives the interactive video call and interacts with the supplicant via the interactive video call to confirm the identity of the supplicant and that video of the supplicant provided in the call is live.
    Type: Application
    Filed: February 20, 2014
    Publication date: December 31, 2015
    Inventors: Michael Kendrick Reiter, Apu Chandrasen Kapadia, Alana Libonati
  • Patent number: 9009385
    Abstract: At least one virtual machine implemented on a given physical machine in an information processing system is able to detect the presence of one or more other virtual machines that are also co-resident on that same physical machine. More particularly, at least one virtual machine is configured to avoid usage of a selected portion of a memory resource of the physical machine for a period of time, and to monitor the selected portion of the memory resource for activity during the period of time. Detection of a sufficient level of such activity indicates that the physical machine is also being shared by at least one other virtual machine. The memory resource of the physical machine may comprise, for example, a cache memory, and the selected portion of the memory resource may comprise one or more randomly selected sets of the cache memory.
    Type: Grant
    Filed: June 30, 2011
    Date of Patent: April 14, 2015
    Assignee: EMC Corporation
    Inventors: Ari Juels, Alina M. Oprea, Michael Kendrick Reiter, Yinqian Zhang
  • Patent number: 8689282
    Abstract: Cloud infrastructure of a cloud service provider comprises a processing platform implementing a security policy enforcement framework. The security policy enforcement framework comprises a policy analyzer that is configured to identify at least one security policy associated with at least one tenant of the cloud service provider, to analyze the security policy against configuration information characterizing the cloud infrastructure of the cloud service provider, and to control execution of one or more applications of said at least one tenant within the cloud infrastructure in accordance with the security policy, based at least in part on one or more results of the analysis of the security policy. The security policy enforcement framework may be implemented in a platform-as-a-service (PaaS) layer of the cloud infrastructure, and may comprise a runtime controller, an operating system controller, a hypervisor controller and a PaaS controller.
    Type: Grant
    Filed: December 23, 2011
    Date of Patent: April 1, 2014
    Assignees: EMC Corporation, University of North Carolina at Chapel Hill
    Inventors: Alina M. Oprea, Yinqian Zhang, Vijay Ganti, John P. Field, Ari Juels, Michael Kendrick Reiter
  • Publication number: 20090174409
    Abstract: The present invention is directed to methods and systems for oil field downhole sensing and communication during drilling and/or production, wherein such methods and systems utilize coaxial cable to transmit electromagnetic (EM) energy, continuously or as a pulse, to passive downhole sensors.
    Type: Application
    Filed: September 4, 2008
    Publication date: July 9, 2009
    Applicant: Chevron U.S.A., Inc.
    Inventors: Don M. COATES, M. Clark Thompson, David W. Beck, Manuel E. Gonzalez, Michael A. Kendrick, Daniel L. Neagley
  • Patent number: 7373499
    Abstract: Improved cryptographic techniques are provided by which a device that performs private key operations (e.g., signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i.e., confirmation of the password guess) from the originally designated entity or party to another designated entity or party.
    Type: Grant
    Filed: June 26, 2002
    Date of Patent: May 13, 2008
    Assignee: Lucent Technologies Inc.
    Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
  • Patent number: 7155524
    Abstract: A system for and method of implementing a backoff protocol and a computer network incorporating the system or the method. In one embodiment, the system includes: (1) a client subsystem that generates a request for access to a shared resource and (2) a server subsystem that receives the request, returns a LOCKED indicator upon an expectation that the shared resource is unavailable and otherwise returns a FREE indicator, the client subsystem responding to the LOCKED indicator by waiting before regenerating the request for the access.
    Type: Grant
    Filed: December 4, 2001
    Date of Patent: December 26, 2006
    Assignees: Lucent Technologies Inc., Hebrew University
    Inventors: Michael Kendrick Reiter, Gregory Chockler, Dahlia Malkhi
  • Patent number: 7149311
    Abstract: Techniques are provided by which a device that performs private key operations (e.g., signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i.e., its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.
    Type: Grant
    Filed: February 7, 2002
    Date of Patent: December 12, 2006
    Assignee: Lucent Technologies Inc.
    Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
  • Patent number: 7107269
    Abstract: Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.
    Type: Grant
    Filed: June 12, 2001
    Date of Patent: September 12, 2006
    Assignee: Lucent Technologies Inc.
    Inventors: Robert M. Arlein, Ben Jai, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter
  • Patent number: 7003110
    Abstract: A software program is configured in accordance with a software aging process such that one or more files generated by the program are at least partially encrypted using a cryptographic key associated with a current time interval for which the files are generated. The cryptographic key may be a symmetric key used for both encryption and decryption operations, such that cryptographic key used for encryption in a given interval is also required to decrypt files encrypted during that interval. Periodic updates of the software program are provided to a legitimate user of the software program, with a given one of the updates including a different cryptographic key associated with a subsequent time interval. The cryptographic key associated with a particular one of the time intervals may be common to each of a set of legitimate copies of the software program that have received the corresponding version of the periodic update.
    Type: Grant
    Filed: November 14, 2000
    Date of Patent: February 21, 2006
    Assignee: Lucent Technologies Inc.
    Inventors: Bjorn Markus Jakobsson, Michael Kendrick Reiter
  • Patent number: 6901145
    Abstract: A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e.g. keystroke dynamics) the keystroke is entered.
    Type: Grant
    Filed: February 10, 2000
    Date of Patent: May 31, 2005
    Assignee: Lucent Technologies Inc.
    Inventors: Philip L. Bohannon, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter, Susanne Gudrun Wetzel
  • Publication number: 20030059041
    Abstract: Techniques are provided for sharing the DSA signature function, so that two parties can efficiently generate a DSA signature with respect to a given public key but neither can alone. In an illustrative embodiment, the invention provides a DSA signature protocol that allows a proof of security for concurrent execution in the random oracle model. The invention also allows a proof of security for sequential execution without random oracles.
    Type: Application
    Filed: June 26, 2002
    Publication date: March 27, 2003
    Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
  • Publication number: 20030048909
    Abstract: Improved cryptographic techniques are provided by which a device that performs private key operations (e.g., signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i.e., confirmation of the password guess) from the originally designated entity or party to another designated entity or party.
    Type: Application
    Filed: June 26, 2002
    Publication date: March 13, 2003
    Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
  • Publication number: 20020156747
    Abstract: A name-to-target binding system generates certificates for use in authenticating a target key. In the system the certificate includes a first key. At least one attribute is assigned to the first key. A liability value is assigned to the combination of the first key and the at least one attribute. The system includes a second key used to sign a combination of the first key, the at least one attribute and the liability value wherein the second key is associated with the insurer agreeing to be liable for the liability value.
    Type: Application
    Filed: April 25, 2002
    Publication date: October 24, 2002
    Inventors: Michael Kendrick Reiter, Stuart Gerald Stubblebine
  • Publication number: 20020141594
    Abstract: Techniques are provided by which a device that performs private key operations (e.g., signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i.e., its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.
    Type: Application
    Filed: February 7, 2002
    Publication date: October 3, 2002
    Inventors: Philip D. MacKenzie, Michael Kendrick Reiter
  • Publication number: 20020133500
    Abstract: Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.
    Type: Application
    Filed: January 23, 2002
    Publication date: September 19, 2002
    Inventors: Robert M. Arlein, Ben Jai, Bjorn Markus Jakobsson, Fabian Monrose, Michael Kendrick Reiter
  • Patent number: 6405313
    Abstract: A name-to-target binding system generates certificates for use in authenticating a target key. In the system the certificate includes a first key. At least one attribute is assigned to the first key. A liability value is assigned to the combination of the first key and the at least one attribute. The system includes a second key used to sign a combination of the first key, the at least one attribute and the liability value wherein the second key is associated with the insurer agreeing to be liable for the liability value.
    Type: Grant
    Filed: April 23, 1998
    Date of Patent: June 11, 2002
    Assignee: AT&T Corp.
    Inventors: Michael Kendrick Reiter, Stuart Gerald Stubblebine
  • Patent number: 6263436
    Abstract: A method and apparatus for fairly exchanging documents. A first document is shared between principal Y and third party Z. A second document is shared between principal X and third party Z. Z verifies that the sharing of the first and second documents has been performed correctly without Z understanding either document. If verified, Z sends its shares of the first and second documents to Y and X, respectively. X and Y verify that Z's shares are authentic.
    Type: Grant
    Filed: December 17, 1996
    Date of Patent: July 17, 2001
    Assignee: AT&T Corp.
    Inventors: Matthew Keith Franklin, Michael Kendrick Reiter