Patents by Inventor Robert Tarjan
Robert Tarjan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240346115Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.Type: ApplicationFiled: June 21, 2024Publication date: October 17, 2024Applicant: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
-
Publication number: 20240313964Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.Type: ApplicationFiled: May 14, 2024Publication date: September 19, 2024Applicant: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, David P. Maher
-
Patent number: 12045321Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures that provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.Type: GrantFiled: July 24, 2023Date of Patent: July 23, 2024Assignee: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
-
Patent number: 12021984Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.Type: GrantFiled: May 31, 2022Date of Patent: June 25, 2024Assignee: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, David P. Maher
-
Publication number: 20230367853Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.Type: ApplicationFiled: July 24, 2023Publication date: November 16, 2023Applicant: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
-
Patent number: 11748455Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.Type: GrantFiled: May 23, 2019Date of Patent: September 5, 2023Assignee: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
-
Publication number: 20220311609Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.Type: ApplicationFiled: May 31, 2022Publication date: September 29, 2022Applicant: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, David P. Maher
-
Patent number: 11362824Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.Type: GrantFiled: May 23, 2019Date of Patent: June 14, 2022Assignee: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, David P. Maher
-
Publication number: 20190363883Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.Type: ApplicationFiled: May 23, 2019Publication date: November 28, 2019Applicant: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, David P. Maher
-
Publication number: 20190362055Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.Type: ApplicationFiled: May 23, 2019Publication date: November 28, 2019Applicant: Intertrust Technologies CorporationInventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
-
Publication number: 20150256450Abstract: A system and method for generating shape graphs for a routing table are described herein. The method includes splitting a binary trie representing a routing table of a router into a number of layers, wherein each layer includes a number of nodes. The method also includes, for each layer, determining a number of groups of isomorphic nodes and merging the isomorphic nodes within each group to generate a shape graph.Type: ApplicationFiled: September 28, 2012Publication date: September 10, 2015Inventors: Siyu Yang, Zhi-Yong Shen, Peng Xie, Tang Yong, Ping Luo, Jun-Qing Xie, Linpeng Tang, Mihalis Yannakakis, Robert Tarjan, David Lee
-
Publication number: 20080046986Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: December 12, 2006Publication date: February 21, 2008Applicant: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Stuart Haber, Robert Tarjan, Tomas Sander
-
Publication number: 20080028474Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: ApplicationFiled: April 19, 2007Publication date: January 31, 2008Inventors: William Horne, Umesh Maheshwari, Robert Tarjan, James Horning, W. Sibert, Lesley Matheson, Andrew Wright, Susan Owicki
-
Publication number: 20070234070Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: August 17, 2006Publication date: October 4, 2007Applicant: Intertrust Technologies Corp.Inventors: James Horning, W. Sibert, Robert Tarjan, Urnesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
-
Publication number: 20050281195Abstract: A method of controlling transmission of content in a network. The method includes the step of applying a quality degradation procedure to content being transmitted between nodes of the network.Type: ApplicationFiled: June 17, 2004Publication date: December 22, 2005Inventors: Kan Zhang, Andrew Fitzhugh, Robert Tarjan
-
Publication number: 20050210275Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: May 11, 2005Publication date: September 22, 2005Applicant: InterTrust Technologies CorporationInventors: James Homing, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Home, Andrew Wright, Lesley Matheson, Susan Owicki
-
Publication number: 20050204348Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: May 13, 2005Publication date: September 15, 2005Applicant: Inter Trust Technologies CorporationInventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
-
Publication number: 20050183072Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: April 7, 2005Publication date: August 18, 2005Applicant: InterTrust Technologies CorporationInventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki