Patents by Inventor Rafail Ostrovsky
Rafail Ostrovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9904789Abstract: A hardware module has a plug to interface with an audio channel of a speech communication device. A scrambler connected to the plug is configured to receive a local audio input signal and form an encrypted audio output signal in a human audible range that is applied to the audio channel of the speech communication device. The scrambler also receives a remote encrypted audio input signal in a human audible range and forms a remote audio output signal corresponding to the remote encrypted audio input signal.Type: GrantFiled: March 14, 2016Date of Patent: February 27, 2018Assignee: Stealth Software Technologies, Inc.Inventors: Brett Falk, Quinn Grier, Steve Naichia Lu, Rafail Ostrovsky, William E. Skeith, III
-
Publication number: 20170249460Abstract: We present the first provably secure defense against software viruses. We hide a secret in the program code in a way that ensures that, as long as the system does not leak information about it, any injection of malware will destroy the secret with very?-high probability. Once the secret is destroyed, its destruction and therefore also the injection of malware will be quickly detected.Type: ApplicationFiled: September 23, 2015Publication date: August 31, 2017Applicant: THE REGENTS OF THE UNIVERSITY OF CALIFORNIAInventors: Richard J. Lipton, Rafail Ostrovsky, Vassilis Zikas
-
Publication number: 20150379066Abstract: A database system includes an input to a database server configured to deliver a data stream formed of a sequence of elements, D={p1, p2, . . . , pm} of size m of numbers from {1, . . . , n} to the database server. The system further includes a computer program that causes a processor to approximate frequency moments (Fk) in the data stream, such that a frequency of an element (i) is defined as fi=|{j:pj=i}| and a k-th frequency moment of D is defined as F k = ? i = 1 n ? m i k in a single pass through the data stream. The processor is caused to carry out the steps of locating elements (i) with a frequency ?Fk in the data stream as heavy elements and approximating fi as ? a fraction of fi to limit memory resources used by the processor to estimate Fk to O(n1?2/k log(n)) bits.Type: ApplicationFiled: September 8, 2015Publication date: December 31, 2015Inventors: Vladimir Braverman, Rafail Ostrovsky
-
Patent number: 9158822Abstract: A database system includes an input to a database server configured to deliver a data stream formed of a sequence of elements, D={p1, p2, . . . , pm} of size m of numbers from {1, . . . , n} to the database server. The system further includes a computer program that causes a processor to approximate frequency moments (Fk) in the data stream, such that a frequency of an element (i) is defined as fi=|{j:pj=i}| and a k-th frequency moment of D is defined as F k = ? i = 1 n ? m i k ? ? in ? ? a single pass through the data stream. The processor is caused to carry out the steps of locating elements (i) with a frequency ?Fk in the data stream as heavy elements and approximating fi as ? a fraction of fi to limit memory resources used by the processor to estimate Fk to O(n1?2/k log(n)) bits.Type: GrantFiled: November 23, 2012Date of Patent: October 13, 2015Assignees: THE JOHNS HOPKINS UNIVERSITY, THE REGENTS OF THE UNIVERSITY OF CALIFORNIAInventors: Vladimir Braverman, Rafail Ostrovsky
-
Patent number: 9055038Abstract: In one embodiment, a non-transitory computer readable storage medium includes executable instructions to perform a series of operations represented by a first garbled program received from a client on garbled data received from the client. A second garbled program is obtained as a result of execution of the first garbled program. The second garbled program includes a first garbled portion and a second garbled portion. The second garbled portion includes a third garbled portion generated through execution of the first garbled portion, such that the series of operations can be performed without interaction with the client and while maintaining as hidden the underlying content of the first garbled program and the garbled data.Type: GrantFiled: October 23, 2013Date of Patent: June 9, 2015Assignee: Stealth Software Technologies, Inc.Inventors: Steve Lu, Rafail Ostrovsky
-
Publication number: 20150112884Abstract: Aspects of the invention include determining relatedness between genomes without compromising privacy. In one aspect, secure genome sketches of genomes can be made publicly available without compromising privacy. These are compared to privately held (unsecured) genome sketches to determine relatedness.Type: ApplicationFiled: October 21, 2014Publication date: April 23, 2015Inventors: Rafail Ostrovsky, Amit Sahai, Eleazar Eskin
-
Patent number: 8984297Abstract: A routing protocol is used to transmit messages from a sender to a receiver over a network of nodes, where adversaries can control links between the nodes and can also control the behavior of a large number of nodes. Various techniques can be used, along or in combination, to combat these effects. In one approach, certain trigger conditions are identified, the occurrence of which signals malicious behavior within the network. When signaled, the sender requests status reports from the intermediate nodes in an effort to determine which nodes are malicious. The information for the status reports is generated by nodes as packets are passed from one node to the next.Type: GrantFiled: March 13, 2009Date of Patent: March 17, 2015Assignees: The Regents of the University of Calfiornia, The Johns Hopkins UniversityInventors: Yair Amir, Paul Bunn, Rafail Ostrovsky
-
Publication number: 20140149364Abstract: A database system includes an input to a database server configured to deliver a data stream formed of a sequence of elements, D={p1, p2, . . . , pm} of size m of numbers from {1, . . . , n} to the database server. The system further includes a computer program that causes a processor to approximate frequency moments (Fk) in the data stream, such that a frequency of an element (i) is defined as fi=|{j:pj=i}| and a k-th frequency moment of D is defined as F k = ? i = 1 n ? m i k ? ? in ? ? a single pass through the data stream. The processor is caused to carry out the steps of locating elements (i) with a frequency ?Fk in the data stream as heavy elements and approximating fi as ? a fraction of fi to limit memory resources used by the processor to estimate Fk to O(n1?2/k log(n)) bits.Type: ApplicationFiled: November 23, 2012Publication date: May 29, 2014Inventors: Vladimir Braverman, Rafail Ostrovsky
-
Patent number: 8364979Abstract: instructions to: (1) process first data by encrypting based on a first key and re-arranging based on a first mapping to obtain second data, where a first element included in the first data is associated with a first index corresponding to a location in a first memory; (2) request to store the second data in a second memory at locations determined based on the first mapping; (3) in response to determining that the first element is not stored in the first memory, request a second element from the second memory; and (4) in response to determining that the first element is stored in the first memory: (a) retrieve the first element from the first memory; and (b) request a third element from the second memory that has not been previously requested, without requesting the second element from the second memory.Type: GrantFiled: April 27, 2010Date of Patent: January 29, 2013Assignee: Stealth Software Technologies, Inc.Inventor: Rafail Ostrovsky
-
Patent number: 8291237Abstract: A method for private keyword searching on streaming data such that the searching does not reveal what keywords are being searched for and does not reveal whether any such keywords have been located nor which documents in the data stream are saved.Type: GrantFiled: February 28, 2006Date of Patent: October 16, 2012Assignee: The Regents of the University of CaliforniaInventors: Rafail Ostrovsky, William E. Skeith, III
-
Patent number: 8060808Abstract: A method of embedding the edit distance metric into the Hamming distance metric with low distortion. In other words, two input character strings are mapped to two corresponding output bit strings such that the Hamming distance between the output strings is approximately proportional to the edit distance between the two corresponding input strings.Type: GrantFiled: February 28, 2006Date of Patent: November 15, 2011Assignees: The Regents of the University of California, The TRDF Research & Development Foundation LtdInventors: Rafail Ostrovsky, Yuval Rabani
-
Publication number: 20110016316Abstract: A routing protocol is used to transmit messages from a sender to a receiver over a network of nodes, where adversaries can control links between the nodes and can also control the behavior of a large number of nodes. Various techniques can be used, along or in combination, to combat these effects. In one approach, certain trigger conditions are identified, the occurrence of which signals malicious behavior within the network. When signaled, the sender requests status reports from the intermediate nodes in an effort to determine which nodes are malicious. The information for the status reports is generated by nodes as packets are passed from one node to the next.Type: ApplicationFiled: March 13, 2009Publication date: January 20, 2011Applicants: The Regents of the University of California, The Johns Hopkins UniversityInventors: Yair Amir, Paul Bunn, Rafail Ostrovsky
-
Publication number: 20080294909Abstract: A method for private keyword searching on streaming data such that the searching does not reveal what keywords are being searched for and does not reveal whether any such keywords have been located nor which documents in the data stream are saved.Type: ApplicationFiled: February 28, 2006Publication date: November 27, 2008Applicant: THE REGENTS OF THE UNIVERSITY OF CALIFORNIAInventors: Rafail Ostrovsky, William E. Skeith, III
-
Publication number: 20080114722Abstract: A method of embedding the edit distance metric into the Hamming distance metric with low distortion.Type: ApplicationFiled: February 28, 2006Publication date: May 15, 2008Applicant: THE REGENTS OF THE UNIVERSITY OF CALIFORNIAInventors: Yuval Rabani, Rafail Ostrovsky
-
Patent number: 6813358Abstract: A method and system are provided for timed-release cryptography. A sender encrypts data in a timed-release fashion such that a receiver based on information exchanged with a server decrypts the encrypted data at or after a release time without revealing to the server any information about the sender, the data, and the release time. In one embodiment, the sender encrypts a key and a release time based on a public key of the receiver and encrypts the data based on the encrypted key. The server determines a condition, which is a function of the encrypted key, the encrypted release time, and a current time. The server then sends the condition to the receiver using a conditional oblivious transfer method. If the current time as determined by the server is greater than or equal to the release time, the receiver determines the encrypted key based on the condition. The receiver then uses the encrypted key to decrypt the encrypted data.Type: GrantFiled: November 17, 1999Date of Patent: November 2, 2004Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di Crescenzo, Rafail Ostrovsky, Sivaramakris Rajagopalan
-
Patent number: 6438554Abstract: A method and system for privately retrieving selected information from a database. The method includes determining, at a server, a first commodity and a second commodity, communicating the first commodity to an inquiring processor and the second commodity to the database, and retrieving the selected information from the database based on the first commodity and the second commodity such that the selected information is not revealed to the database. The first and second commodities may, for example, include a random address in the database and a private information retrieval query for encoding the random address, respectively. The inquiring processor determines an address offset based on the random address and the address of selected information in the database, and sends the address offset to the database. The database cyclically shift its contents according the address offset, and executes the query on the cyclically shifted contents.Type: GrantFiled: October 11, 2000Date of Patent: August 20, 2002Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky
-
Patent number: 6397329Abstract: In a system using digital identities, such as a public key cryptosystem using public key certificates, each certificate is part of a data revocation structure of tokens maintained by a certification authority (CA). Certificates may then share tokens with other certificates. By updating certain of these tokens periodically to indicate valid (unrevoked and unexpired) certificates, the number of updated records is reduced. Moreover, in response to a status query, a single token is transmitted in response. This results in a more efficient overall use of both computing and communications network resources. In one version of the invention, the data revocation structure is a binary tree. Each certificate includes each zero token for each node in its path from leaf to root of the tree. The tree is updated periodically to indicate valid and revoked certificates.Type: GrantFiled: November 20, 1998Date of Patent: May 28, 2002Assignee: Telcordia Technologies, Inc.Inventors: William Aiello, Sachin Lodha, Rafail Ostrovsky
-
Patent number: 6301664Abstract: A method and system perform non-malleable and non-interactive commitment of data, which is communicated by a sender to a receiver. At a commitment phase, the sender selects a first string having a first portion and a second portion, and based on the first portion of the first string, establishes a first commitment to an authentication key. The sender divides the second portion of the first string into a set of segments each including two or more sub-segments, and based on the first commitment, selects one of the subsegments in each of the segments. The sender combines the selected sub-segments together, and establishes a second commitment to the data based on the combined selected sub-segments such that the second commitment is equivocable. The sender authenticates the second commitment by using the authenticating key. At a de-commitment phase, the sender de-commits the data and the authentication key.Type: GrantFiled: November 18, 1998Date of Patent: October 9, 2001Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky
-
Patent number: 6226640Abstract: A method and system identify in a database one or more data entries that are the nearest neighbors of a query. The database prebuilds a first set of strings by probabilistically selecting values of respective bits in each of the first set of strings based on a probability that depends on a first hamming distance. Based on the first set of strings, the database predetermines the trace values of each data entry in the database, respectively, and stores the predetermined trace values as entries in a trace table. For each trace value entry, the database identifies the data entries whose trace values are within a second hamming distance of the trace value entry, and stores the addresses of the identified data entries in the trace value entry. When the database receives a query, by identifying the trace value entry in the trace table that match the trace value of the query, the database identifies the data entries that are within the first hamming distance of the query.Type: GrantFiled: November 17, 1998Date of Patent: May 1, 2001Assignee: Telecordia Technologies, Inc.Inventors: Rafail Ostrovsky, Yuval Rabani
-
Patent number: 6216128Abstract: A method and system for privately retrieving selected information from a database. The method includes determining, at a server, a first commodity and a second commodity, communicating the first commodity to an inquiring processor and the second commodity to the database, and retrieving the selected information from the database based on the first commodity and the second commodity such that the selected information is not revealed to the database. The first and second commodities may, for example, include a random address in the database and a private information retrieval query for encoding the random address, respectively. The inquiring processor determines an address offset based on the random address and the address of selected information in the database, and sends the address offset to the database. The database cyclically shift its contents according the address offset, and executes the query on the cyclically shifted contents.Type: GrantFiled: March 2, 1999Date of Patent: April 10, 2001Assignee: Telcordia Technologies, Inc.Inventors: Giovanni Di-Crescenzo, Yuval Ishai, Rafail Ostrovsky