Patents by Inventor Mikhail Atallah

Mikhail Atallah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7539872
    Abstract: A system and method that provide resilient watermarking of digital data, including numeric and categorical relational data. The method and system are premised upon a framework considering the higher level semantics to be preserved in the original data. The system and method also provides a technique for enabling user-level run-time control over the properties that are to be preserved, as well as the degree of change introduced. The system and method are resilient to various important classes of attacks, including subset selection, addition, alteration, or resorting, horizontal or vertical data partitioning, and attribute remapping. For numeric relational data, approximately 40-45% of the embedded watermark may survive approximately 45-50% of original data loss, while for categorical relational data, the watermark may survive approximately 80% of original data loss with only approximately 25% degradation of the watermark.
    Type: Grant
    Filed: May 24, 2004
    Date of Patent: May 26, 2009
    Assignee: Purdue Research Foundation
    Inventors: Radu Sion, Mikhail Atallah, Sunil Prabhakar
  • Publication number: 20070244693
    Abstract: A method, system and machine-readable medium are provided for watermarking natural language digital text. A deep structure may be generated and a group of features may be extracted from natural language digital text input. The deep structure may be modified based, at least partly, on a watermark. Natural language digital text output may be generated based on the modified deep structure.
    Type: Application
    Filed: April 14, 2006
    Publication date: October 18, 2007
    Applicant: AT&T Corp.
    Inventors: Mikhail Atallah, Srinivas Bangalore, Dilek Hakkani-Tur, Giuseppe Riccardi, Mercan Topkara, Umut Topkara
  • Publication number: 20070192864
    Abstract: A software system that transforms an original application into an STPM enabled application and runs the enabled application. At protect time, an anti-tamper tool accepts the original application, uses anti-tamper techniques to create a guarded application, creates a security wrapper according to a policy file, and wraps the guarded application to create the STPM enabled application. A trusted service provider is inserted at the entry point of the enabled application. A set of core services is made accessible to the enabled application through the trusted service provider. At runtime the trusted service provider creates a TSP thread and passes a security file to an STPM device driver implementing TPM functionality and protected by anti-tamper techniques. The TSP thread actively monitors the enabled application and interacts with the STPM device driver through the set of core services.
    Type: Application
    Filed: February 7, 2007
    Publication date: August 16, 2007
    Inventors: Eric Bryant, Avni Rambhia, Mikhail Atallah, John Rice
  • Publication number: 20070127721
    Abstract: A method and system for hiding an encryption key. The method including creating a directed graph having a plurality of vertices and edges, including a source and a sink vertex. Each vertex has a vertex value. The source vertices have a common source value, and the sink vertices have a common sink value, the sink value being a function of the source value and the encryption key. Each edge has an edge value that is a function of r(in)?1 and r(out) where r(in)?1 is the functional inverse of the vertex value of the predecessor vertex and r(out) is the vertex value of the successor vertex. A message enters a source vertex; flows along a path from the source vertex to a sink vertex; and leaves the sink vertex, where the output message is an encrypted or decrypted version of the input message using the private encryption key.
    Type: Application
    Filed: November 10, 2006
    Publication date: June 7, 2007
    Inventors: Mikhail Atallah, Eric Bryant
  • Publication number: 20060107070
    Abstract: Method and system for secure computational outsourcing and disguise of data, computer programs, pictures, and databases from unauthorized access, theft, and tampering using disguising and tamperproofing operations. In some embodiments, the disguising operation includes generating a random number for each data element, and modifying each data element with the random numbers. In some embodiments, the computer program, written in a first programming language, is partitioned into first and second programs; the first program determines whether access to the data is authorized, the second program entangles the second program and the data; and the second program is translated into a second programming language. An embodiment of the present invention comprises a method for identifying the subject of a first picture by comparison to a second picture. Embodiments comprise securing a computer program with real programming code by creating dummy program code and mixing the dummy and real program code.
    Type: Application
    Filed: October 17, 2005
    Publication date: May 18, 2006
    Inventors: John Rice, Mikhail Atallah
  • Publication number: 20060031686
    Abstract: Method of protecting host application code comprising a plurality of code blocks. The method includes steps of preprocessing the host application code; obfuscating the host application code; installing guards in the host application code to protect client blocks; randomly rearranging the code blocks of the host application code; linking the rearranged host application code with other resources to produce a binary executable image; and patching the binary executable image with data values to be used by the guard. The method can be used to install a plurality of guards to form a distributed network of guards that cooperatively protect the host application code and the other guards in the network. The installation of the guards can be performed automatically using a guard formation graph; and guard formation graph customization parameters. The obfuscation step can include control flow graph merging, cloning, and data-aliasing.
    Type: Application
    Filed: July 27, 2005
    Publication date: February 9, 2006
    Applicant: Purdue Research Foundation
    Inventors: Mikhail Atallah, Hoi Chang
  • Publication number: 20050055554
    Abstract: A system and method that provide resilient watermarking of digital data, including numeric and categorical relational data. The method and system are premised upon a framework considering the higher level semantics to be preserved in the original data. The system and method also provides a technique for enabling user-level run-time control over the properties that are to be preserved, as well as the degree of change introduced. The system and method are resilient to various important classes of attacks, including subset selection, addition, alteration, or resorting, horizontal or vertical data partitioning, and attribute remapping. For numeric relational data, approximately 40-45% of the embedded watermark may survive approximately 45-50% of original data loss, while for categorical relational data, the watermark may survive approximately 80% of original data loss with only approximately 25% degradation of the watermark.
    Type: Application
    Filed: May 24, 2004
    Publication date: March 10, 2005
    Inventors: Radu Sion, Mikhail Atallah, Sunil Prabhakar