Patents by Inventor Pradeep K. Dubey
Pradeep K. Dubey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7650491Abstract: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms a request, which includes the client serial number, encrypts the request with the server public key, and sends the download request to the server. The server decrypts the request with the server's private key and authenticates the client. The received client serial number is used to search for a client public key that corresponds to the embedded client private key. The server encrypts its response, which includes the requested information, with the client public key of the requesting client, and only the private key in the requesting client can be used to decrypt the information downloaded from the server.Type: GrantFiled: November 29, 2008Date of Patent: January 19, 2010Assignee: International Business Machines CorporationInventors: David John Craft, Pradeep K. Dubey, Harm Peter Hofstee, James Allan Kahle
-
Patent number: 7603703Abstract: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms a request, which includes the client serial number, encrypts the request with the server public key, and sends the download request to the server. The server decrypts the request with the server's private key and authenticates the client. The received client serial number is used to search for a client public key that corresponds to the embedded client private key. The server encrypts its response, which includes the requested information, with the client public key of the requesting client, and only the private key in the requesting client can be used to decrypt the information downloaded from the server.Type: GrantFiled: April 12, 2001Date of Patent: October 13, 2009Assignee: International Business Machines CorporationInventors: David John Craft, Pradeep K. Dubey, Harm Peter Hofstee, James Allan Kahle
-
Publication number: 20090083542Abstract: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms a request, which includes the client serial number, encrypts the request with the server public key, and sends the download request to the server. The server decrypts the request with the server's private key and authenticates the client. The received client serial number is used to search for a client public key that corresponds to the embedded client private key. The server encrypts its response, which includes the requested information, with the client public key of the requesting client, and only the private key in the requesting client can be used to decrypt the information downloaded from the server.Type: ApplicationFiled: November 29, 2008Publication date: March 26, 2009Inventors: David John Craft, Pradeep K. Dubey, Harm Peter Hofstee, James Allan Kahle
-
Patent number: 6873977Abstract: A method and system offer confidential purchase of electronic data which can be used without any need of knowledge in cryptography nor mastery of computer use beyond usual usage of the World Wide Web (WWW). The method and system which guarantee confidentiality as long as there is no collusion between agents working for a large number of reputable companies whose references can be easily checked on the Internet before proceeding to the order. In addition, the method and system allow for guaranteed payment and offer recourse in case of improper delivery.Type: GrantFiled: May 11, 2000Date of Patent: March 29, 2005Assignee: International Business Machines CorporationInventors: Alok Aggarwal, Pradeep K. Dubey, Charanjit Singh Jutla, Vijay Kumar, Marco Martens, Michael Ira Shub, Charles P. Tresser, Chai Wah Wu
-
Patent number: 6834344Abstract: A method is presented for marking high-quality digital images with a robust and invisible watermark. It requires the mark to survive and remain detectable and authenticatable through all image manipulations that in themselves do not damage the image beyond useability. These manipulations include JPEG “lossy” compression and, in the extreme, the printing and rescanning of the image. The watermark also has the property that it can detect if the essential contents of the image has changed. The first phase of the method comprises extracting a digest or number N from the image so that N only (or mostly) depends on the essential information content, such that the same number N can be obtained from a scan of a high quality print of the image, from the compressed form of the image, or in general, from the image after minor modifications (introduced inadvertently by processing, noise etc.). The second phase comprises the marking.Type: GrantFiled: September 17, 1999Date of Patent: December 21, 2004Assignee: International Business Machines CorporationInventors: Gaurav Aggarwal, Pradeep K. Dubey, Ashutosh Kulshreshtha, Marco Martens, Charles P. Tresser, Chai W. Wu
-
Patent number: 6766344Abstract: Efficient parallel processing of algorithms involving Galois Field arithmetic use data slicing techniques to execute arithmetic operations on a computing hardware having SIMD (single-instruction, multiple-data) architectures. A W-bit wide word computer capable of operating on one or more sets of k-bit operands executes Galois Field arithmetic by mapping arithmetic operations of Galois Field GF(2n) to corresponding operations in subfields lower order (m<n), which one selected on the basis of an appropriate cost function. These corresponding operations are able to be simultaneously executed on the W-bit wide computer such that the results of the arithmetic operations in Galois Field GF(2n) are obtained in k/W as many cycles of the W-bit computer compared with execution of the corresponding operations on a k-bit computer.Type: GrantFiled: May 8, 2001Date of Patent: July 20, 2004Assignee: International Business Machines CorporationInventors: Pradeep K Dubey, Charanjit Jutla, Josyula R Rao, Pankaj Rohatgi, Atri Rudra, Vijay Kumar
-
Publication number: 20030055858Abstract: Efficient parallel processing of algorithms involving Galois Field arithmetic use data slicing techniques to execute arithmetic operations on a computing hardware having SIMD architectures. A W-bit wide word computer capable of operating on one or more sets of k-bit operands executes Galois Field arithmetic by mapping arithmetic operations of Galois Field GF(2n) to corresponding operations in subfields lower order (m<n), which one selected on the basis of an appropriate cost function. These corresponding operations are able to be simultaneously executed on the W-bit wide computer such that the results of the arithmetic operations in Galois Field GF(2n) are obtained in k/W as many cycles of the W-bit computer compared with execution of the corresponding operations on a k-bit computer.Type: ApplicationFiled: May 8, 2001Publication date: March 20, 2003Applicant: International Business Machines CorporationInventors: Pradeep K. Dubey, Charanjit Jutla, Josyula R. Rao, Pankaj Rohatgi, Atri Rudra, Vijay Kumar
-
Publication number: 20020150243Abstract: A secure communication methodology is presented. The client device is configured to download application code and/or content data from a server operated by a service provider. Embedded within the client is a client private key, a client serial number, and a copy of a server public key. The client forms a request, which includes the client serial number, encrypts the request with the server public key, and sends the download request to the server. The server decrypts the request with the server's private key and authenticates the client. The received client serial number is used to search for a client public key that corresponds to the embedded client private key. The server encrypts its response, which includes the requested information, with the client public key of the requesting client, and only the private key in the requesting client can be used to decrypt the information downloaded from the server.Type: ApplicationFiled: April 12, 2001Publication date: October 17, 2002Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David John Craft, Pradeep K. Dubey, Harm Peter Hofstee, James Allan Kahle