Patents by Inventor Michael O. Rabin

Michael O. Rabin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8526621
    Abstract: In one embodiment, a Time-Lapse Cryptography Service is provided based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+.delta., at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components.
    Type: Grant
    Filed: November 30, 2007
    Date of Patent: September 3, 2013
    Assignee: President And Fellows of Harvard College
    Inventors: Michael O. Rabin, Christopher A. Thorpe
  • Patent number: 8327453
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Grant
    Filed: April 27, 2010
    Date of Patent: December 4, 2012
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Publication number: 20110295752
    Abstract: A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable to computations on encrypted bids.
    Type: Application
    Filed: August 10, 2011
    Publication date: December 1, 2011
    Applicant: PRESIDENT AND FELLOWS OF HARVARD COLLEGE
    Inventors: David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher A. Thorpe
  • Patent number: 8024274
    Abstract: A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable computations on encrypted bids.
    Type: Grant
    Filed: May 7, 2007
    Date of Patent: September 20, 2011
    Assignee: President and Fellows of Harvard College
    Inventors: David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher A. Thorpe
  • Patent number: 7991995
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Grant
    Filed: June 20, 2008
    Date of Patent: August 2, 2011
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Publication number: 20100212019
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Application
    Filed: April 27, 2010
    Publication date: August 19, 2010
    Applicant: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, Sean Rolinson, David Molnar
  • Publication number: 20100185863
    Abstract: According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, “Time-Lapse Cryptography”, with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided (“the Service”) based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+?, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key.
    Type: Application
    Filed: November 30, 2007
    Publication date: July 22, 2010
    Inventors: Michael O. Rabin, Christopher A. Thorpe
  • Patent number: 7747873
    Abstract: A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor's and owner's rights in software, cannot be modified.
    Type: Grant
    Filed: March 4, 2005
    Date of Patent: June 29, 2010
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20090327141
    Abstract: Presented are methods and systems for highly efficient proofs of correctness of computations that preserve secrecy of the input values and calculations. One embodiment includes a method for verifiably determining at least one output for a secrecy preserving computations where the method includes acts of calculating an output from submitted inputs according to an announced calculation, translating a value in the calculation into two components that are a randomized representation of that value, publishing commitments to the at least two components, revealing a portion of the randomized representation in response to a verification request, and enabling verification of the calculation of the output using the revealed portion of the randomized representation. According to one aspect of the secrecy preserving verification the numbers involved in the secrecy preserving calculation are represented by a randomly constructed representing pair.
    Type: Application
    Filed: April 18, 2008
    Publication date: December 31, 2009
    Inventors: Michael O. Rabin, Rocco A. Servedio, Christopher Thorpe
  • Publication number: 20090182667
    Abstract: A system and method for conducting verifiably correct auctions that preserves the secrecy of the bids while providing for verifiable correctness and trustworthiness of the auction is disclosed. Some of the elements of the method and apparatus are that the auction operator accepts all bids submitted and follows the published rules of the auction. In one embodiment, the bids are maintained secret from the auctioneer and all bidders until the auction closes and no bidder is able to change or repudiate her bid. In another embodiment, the auction operator computes the auction results and publishes proofs of the results' correctness. In yet another embodiment, any party can check these proofs of correctness via publicly verifiable computations on encrypted bids.
    Type: Application
    Filed: May 7, 2007
    Publication date: July 16, 2009
    Inventors: David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher A. Thorpe
  • Publication number: 20080282086
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Application
    Filed: June 20, 2008
    Publication date: November 13, 2008
    Applicant: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Patent number: 7406593
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Grant
    Filed: May 2, 2003
    Date of Patent: July 29, 2008
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson
  • Patent number: 7287159
    Abstract: Software is identified while in main memory by examining small portions of its executable image or by examining the results of its execution. These portions, or an encoding of them, are then compared with previously stored identifying information about at least one Software through an approximate matching process.
    Type: Grant
    Filed: April 1, 2004
    Date of Patent: October 23, 2007
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Carleton J. Bosley, Ramon Caceres, Aaron Ingram, Timir Karia, David Molnar, Yossi Beinart
  • Patent number: 7131144
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: October 31, 2006
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Patent number: 7073197
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: July 4, 2006
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Patent number: 6889209
    Abstract: A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor's and owner's rights in software, cannot be modified.
    Type: Grant
    Filed: November 3, 2000
    Date of Patent: May 3, 2005
    Assignee: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20040133803
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Application
    Filed: December 16, 2003
    Publication date: July 8, 2004
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20040128515
    Abstract: System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software.
    Type: Application
    Filed: December 16, 2003
    Publication date: July 1, 2004
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Patent number: 6697948
    Abstract: A system, method, or apparatus for enabling owners and vendors of software products to protect the property rights of their software. The system and method utilizes a unique vendor tag system for each instant of a specific software product. This system interacts with a monitoring program, which, is running on the user's device to ensure that no unauthorized use takes place.
    Type: Grant
    Filed: May 5, 1999
    Date of Patent: February 24, 2004
    Inventors: Michael O. Rabin, Dennis E. Shasha
  • Publication number: 20030220882
    Abstract: A system for protecting software against piracy while protecting a user's privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
    Type: Application
    Filed: May 2, 2003
    Publication date: November 27, 2003
    Applicant: ShieldIP, Inc.
    Inventors: Michael O. Rabin, Dennis E. Shasha, Yossi Beinart, Ramon Caceres, Timir Karia, David Molnar, Sean Rolinson