Patents by Inventor Richard Lipton

Richard Lipton has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10044748
    Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.
    Type: Grant
    Filed: February 9, 2016
    Date of Patent: August 7, 2018
    Assignees: Georgia Tech Research Corporation, Georgia Institute of Technology
    Inventors: David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard Lipton, Anirudh Ramachandran
  • Publication number: 20160156660
    Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.
    Type: Application
    Filed: February 9, 2016
    Publication date: June 2, 2016
    Inventors: David DAGON, Nick FEAMSTER, Wenke LEE, Robert EDMONDS, Richard LIPTON, Anirudh RAMACHANDRAN
  • Patent number: 9306969
    Abstract: Collect Domain Name System (DNS) data, the DNS data generated by a DNS server and/or similar device, wherein the DNS data comprises DNS queries, wherein the collected DNS data comprises DNS query rate information. Examine the collected DNS data relative to DNS data from known compromised and/or uncompromised computers. Determine an existence of the collection of compromised networks and/or computers, and/or an identity of compromised networks and/or computers, based on the examination.
    Type: Grant
    Filed: August 30, 2013
    Date of Patent: April 5, 2016
    Assignee: GEORGIA TECH RESEARCH CORPORATION
    Inventors: David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard Lipton, Anirudh Ramachandran
  • Publication number: 20140245436
    Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.
    Type: Application
    Filed: August 30, 2013
    Publication date: August 28, 2014
    Applicant: GEORGIA TECH RESEARCH CORPORATION
    Inventors: David DAGON, Nick FEAMSTER, Wenke LEE, Robert EDMONDS, Richard LIPTON, Anirudh RAMACHANDRAN
  • Patent number: 8566928
    Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.
    Type: Grant
    Filed: October 3, 2006
    Date of Patent: October 22, 2013
    Assignee: Georgia Tech Research Corporation
    Inventors: David Dagon, Nick Feamster, Wenke Lee, Robert Edmonds, Richard Lipton, Anirudh Ramachandran
  • Publication number: 20080028463
    Abstract: A system and method for detecting a first network of compromised computers in a second network of computers, comprising: collecting Domain Name System (DNS) data for the second network; examining the collected data relative to DNS data from known comprised and/or uncompromised computers in the second network; and determining the existence of the first network and/or the identity of compromised computers in the second network based on the examination.
    Type: Application
    Filed: October 3, 2006
    Publication date: January 31, 2008
    Applicant: Damballa, Inc.
    Inventors: David Dagon, Nick Feamster, Weake Lee, Robert Edmonds, Richard Lipton, Anirudh Ramachandran
  • Publication number: 20070180260
    Abstract: Efficient secure password protocols are constructed that remain secure against offline dictionary attacks even when a large, but bounded, part of the storage of a server responsible for password verification is retrieved by an adversary through a remote or local connection. A registration algorithm and a verification algorithm accomplish the goal of defeating a dictionary attack. A password protocol where a server, on input of a login and a password, carefully selects several locations from the password files, properly combines their content according to some special function, and stores the result of this function as a tag that can be associated with this password and used in a verification phase to verify access by users.
    Type: Application
    Filed: December 22, 2006
    Publication date: August 2, 2007
    Inventors: Giovanni Crescenzo, Richard Lipton, Sheldon Walfish
  • Patent number: 6965673
    Abstract: A useful method of verifying the integrity of a cryptosystem involves using erroneous outputs to obtain secret information. In certain signature schemes which use the Chinese Remainder Theorem, a correct signature of a message and an erroneous signature of the same message permit the modulus to be easily obtained. If the content of the message is known, such cryptosystems may be cracked with only an erroneous signature of the message. Certain other authorization schemes may be cracked by analyzing a number of erroneous outputs caused by a particular type of error called a “register fault.” A security expert or cryptosystem designer may intentionally induce a tamper proof device generate a faulty computation by subjecting the device, such as a smart card, to physical stress, such as certain types of radiation, atypical voltage levels, or a higher clock rate than the device was designed to accommodate. Cryptosystems should be impervious to the attacks described herein.
    Type: Grant
    Filed: March 1, 2000
    Date of Patent: November 15, 2005
    Assignee: Telcordia Technologies, Inc.
    Inventors: Dan Boneh, Richard Lipton, Richard A. DeMillo
  • Patent number: D407108
    Type: Grant
    Filed: August 6, 1997
    Date of Patent: March 23, 1999
    Assignee: Adobe Systems Incorporated
    Inventor: Richard Lipton
  • Patent number: D426570
    Type: Grant
    Filed: December 1, 1998
    Date of Patent: June 13, 2000
    Assignee: Adobe Systems Incorporated
    Inventor: Richard Lipton