Patents by Inventor Robert Tarjan

Robert Tarjan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230367853
    Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.
    Type: Application
    Filed: July 24, 2023
    Publication date: November 16, 2023
    Applicant: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
  • Patent number: 11748455
    Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.
    Type: Grant
    Filed: May 23, 2019
    Date of Patent: September 5, 2023
    Assignee: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
  • Publication number: 20220311609
    Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.
    Type: Application
    Filed: May 31, 2022
    Publication date: September 29, 2022
    Applicant: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, David P. Maher
  • Patent number: 11362824
    Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.
    Type: Grant
    Filed: May 23, 2019
    Date of Patent: June 14, 2022
    Assignee: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, David P. Maher
  • Publication number: 20190363883
    Abstract: This disclosure relates to systems and methods for managing protected electronic content using proxy reencryption techniques. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Proxy reencryption techniques consistent with aspects of the disclosed embodiments may enable transformation of a ciphertext under one public key to a ciphertext containing the same plaintext under another public key. Consistent with embodiments disclosed herein, proxy reencryption processes may be implemented using indistinguishability obfuscation and puncturable public-key encryption schemes, functional encryption, and/or white box obfuscation techniques.
    Type: Application
    Filed: May 23, 2019
    Publication date: November 28, 2019
    Applicant: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, David P. Maher
  • Publication number: 20190362055
    Abstract: This disclosure relates to systems and methods for managing protected electronic content that employ relatively efficient messaging schemes. Rights management architectures are described that may, among other things, provide end-to-end protection of content keys from their point of origination at a content creator and/or content service to end user devices. Certain embodiments may further provide for message protocols where fewer messages are sent in connection with a protected content license request process, thereby reducing latency associated with license request and provisioning processes.
    Type: Application
    Filed: May 23, 2019
    Publication date: November 28, 2019
    Applicant: Intertrust Technologies Corporation
    Inventors: Vanishree Rao, Robert Tarjan, Jarl Nilsson
  • Publication number: 20150256450
    Abstract: A system and method for generating shape graphs for a routing table are described herein. The method includes splitting a binary trie representing a routing table of a router into a number of layers, wherein each layer includes a number of nodes. The method also includes, for each layer, determining a number of groups of isomorphic nodes and merging the isomorphic nodes within each group to generate a shape graph.
    Type: Application
    Filed: September 28, 2012
    Publication date: September 10, 2015
    Inventors: Siyu Yang, Zhi-Yong Shen, Peng Xie, Tang Yong, Ping Luo, Jun-Qing Xie, Linpeng Tang, Mihalis Yannakakis, Robert Tarjan, David Lee
  • Publication number: 20080046986
    Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.
    Type: Application
    Filed: December 12, 2006
    Publication date: February 21, 2008
    Applicant: Intertrust Technologies Corp.
    Inventors: Binyamin Pinkas, Stuart Haber, Robert Tarjan, Tomas Sander
  • Publication number: 20080028474
    Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
    Type: Application
    Filed: April 19, 2007
    Publication date: January 31, 2008
    Inventors: William Horne, Umesh Maheshwari, Robert Tarjan, James Horning, W. Sibert, Lesley Matheson, Andrew Wright, Susan Owicki
  • Publication number: 20070234070
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: August 17, 2006
    Publication date: October 4, 2007
    Applicant: Intertrust Technologies Corp.
    Inventors: James Horning, W. Sibert, Robert Tarjan, Urnesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
  • Publication number: 20050281195
    Abstract: A method of controlling transmission of content in a network. The method includes the step of applying a quality degradation procedure to content being transmitted between nodes of the network.
    Type: Application
    Filed: June 17, 2004
    Publication date: December 22, 2005
    Inventors: Kan Zhang, Andrew Fitzhugh, Robert Tarjan
  • Publication number: 20050210275
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: May 11, 2005
    Publication date: September 22, 2005
    Applicant: InterTrust Technologies Corporation
    Inventors: James Homing, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Home, Andrew Wright, Lesley Matheson, Susan Owicki
  • Publication number: 20050204348
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: May 13, 2005
    Publication date: September 15, 2005
    Applicant: Inter Trust Technologies Corporation
    Inventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki
  • Publication number: 20050183072
    Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.
    Type: Application
    Filed: April 7, 2005
    Publication date: August 18, 2005
    Applicant: InterTrust Technologies Corporation
    Inventors: James Horning, W. Sibert, Robert Tarjan, Umesh Maheshwari, William Horne, Andrew Wright, Lesley Matheson, Susan Owicki