Patents by Inventor Robert E. Tarjan
Robert E. Tarjan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10609019Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: GrantFiled: November 30, 2017Date of Patent: March 31, 2020Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 10423779Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: GrantFiled: March 14, 2018Date of Patent: September 24, 2019Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
-
Patent number: 10255414Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: GrantFiled: June 5, 2015Date of Patent: April 9, 2019Assignee: Intertrust Technologies CorporationInventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
-
Publication number: 20180336340Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: ApplicationFiled: March 14, 2018Publication date: November 22, 2018Applicant: Intertrust Technologies CorporationInventors: William G. HORNE, Lesley R. MATHESON, Casey SHEEHAN, Robert E. TARJAN
-
Publication number: 20180212949Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: November 30, 2017Publication date: July 26, 2018Applicant: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 9953159Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: GrantFiled: September 2, 2015Date of Patent: April 24, 2018Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
-
Publication number: 20170300670Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: ApplicationFiled: May 4, 2017Publication date: October 19, 2017Applicant: Intertrust Technologies CorporationInventors: William G. HORNE, Umesh MAHESHWARI, Robert E. TARJAN, James J. HORNING, W. Olin SIBERT, Lesley R. MATHESON, Andrew K. WRIGHT, Susan S. OWICKI
-
Patent number: 9659157Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: GrantFiled: May 2, 2016Date of Patent: May 23, 2017Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Patent number: 9606746Abstract: A shiftable memory supporting in-memory data structures employs built-in data shifting capability. The shiftable memory includes a memory having built-in shifting capability to shift a contiguous subset of data from a first location to a second location within the memory. The shiftable memory further includes a data structure defined on the memory to contain data comprising the contiguous subset. The built-in shifting capability of the memory to facilitate one or more of movement of the data, insertion of the data and deletion of the data within the data structure.Type: GrantFiled: October 27, 2011Date of Patent: March 28, 2017Assignee: Hewlett Packard Enterprise Development LPInventors: Goetz Graefe, Terence P. Kelly, Harumi Kuno, Robert E. Tarjan
-
Publication number: 20170076090Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: ApplicationFiled: September 2, 2015Publication date: March 16, 2017Inventors: William G. HORNE, Lesley R. MATHESON, Casey SHEEHAN, Robert E. TARJAN
-
Publication number: 20160277385Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: May 27, 2016Publication date: September 22, 2016Inventors: Binyamin PINKAS, Stuart A. HABER, Robert E. TARJAN, Tomas SANDER
-
Patent number: 9405921Abstract: One embodiment relates to a computer-implemented method for role discovery in access control systems. User accounts are selected according to a predetermined algorithm. For each selected user account, a new role is created covering a set of permissions including all permissions which the user account needs but is not yet covered by another role that the user account has. The new role is given to the user account so that all permissions needed by the user account are covered. Any additional user accounts which still need the set of permissions covered by the new role are also found, and the new role is given to these additional user accounts, if any. Other features, aspects and embodiments are also disclosed.Type: GrantFiled: July 31, 2007Date of Patent: August 2, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Robert Samuel Schreiber, Robert E. Tarjan, Mehul A. Shah, William G. Horne
-
Patent number: 9356929Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: GrantFiled: April 19, 2012Date of Patent: May 31, 2016Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 9350547Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: GrantFiled: August 18, 2014Date of Patent: May 24, 2016Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Publication number: 20150278491Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: June 5, 2015Publication date: October 1, 2015Inventors: James J. HORNING, W. Olin SIBERT, Robert E. Tarjan, Umesh MAHESHWARI, William G. HORNE, Andrew K. WRIGHT, Lesley R. MATHESON, Susan S. OWICKI
-
Patent number: 9141788Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: GrantFiled: April 28, 2014Date of Patent: September 22, 2015Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
-
Publication number: 20150200782Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: ApplicationFiled: August 18, 2014Publication date: July 16, 2015Applicant: INTERTRUST TECHNOLOGIES CORP.Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Patent number: 9064099Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: GrantFiled: February 25, 2013Date of Patent: June 23, 2015Assignee: INTERTRUST TECHNOLOGIES CORPORATIONInventors: James J. Horning, W. Olin Sibert, Robert E. Tarjan, Umesh Maheshwari, William G. Horne, Andrew K. Wright, Lesley R. Matheson, Susan S. Owicki
-
Patent number: 9021094Abstract: Plural sets of items corresponding to plural tiers of a multi-tiered system are defined, where the items represent amounts of resources to allocate to the tiers. Items from respective sets are selected based on a response time constraint and a target cost. Information is provided pertaining to allocation of amounts of resources to the respective tiers based on the selected items.Type: GrantFiled: April 28, 2005Date of Patent: April 28, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Yunhong Zhou, Anshul Kothari, Ram Swaminathan, Robert E. Tarjan
-
Publication number: 20150067837Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: ApplicationFiled: April 28, 2014Publication date: March 5, 2015Applicant: Intertrust Technologies CorporationInventors: William G. HORNE, Lesley R. MATHESON, Casey SHEEHAN, Robert E. TARJAN