Patents by Inventor Saghar Estehghari

Saghar Estehghari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9779284
    Abstract: A system and method for preserving privacy of evidence are provided. In the method, an encrypted first image is generated by encrypting a first image acquired at a first location with a symmetric cryptographic key that is based on first information such as a license plate number extracted from the first image and first metadata associated with the first image, such as a time at which the first image was acquired. When a link is established between a second image and the first image, for example, through visual signature matching, the symmetric cryptographic key can be reconstructed, without having access to the first image, but based instead on the first metadata and information extracted from the second image. The reconstructed symmetric cryptographic key can then be used for decryption of the encrypted image to establish evidence that the license plate number was indeed extracted from the first image.
    Type: Grant
    Filed: December 17, 2013
    Date of Patent: October 3, 2017
    Assignee: Conduent Business Services, LLC
    Inventors: Jean-Luc Meunier, Saghar Estehghari, Herve Poirier
  • Patent number: 9749128
    Abstract: A method for data matching includes providing two sets of encrypted data elements by converting data elements to respective sets of vectors and encrypting each vector with a public key of a homomorphic encryption scheme. Each data element includes a sequence of characters drawn from an alphabet. For pairs of encrypted data elements, a comparison measure is computed between the sets of encrypted vectors. An obfuscated vector is generated for each encrypted data element in the first set, which renders the first encrypted data element indecipherable when the comparison measure does not meet a threshold for at least one of the pairs of data encrypted elements comprising that encrypted data element. The obfuscated vectors can be decrypted with a private key, allowing data elements in the first set to be deciphered if the comparison measure meets the threshold for at least one of the data elements in the second set.
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: August 29, 2017
    Assignee: XEROX CORPORATION
    Inventors: Ioan Calapodescu, Saghar Estehghari, Johan Clier
  • Patent number: 9646161
    Abstract: Disclosed is a relational database fingerprinting system and method to identify a user of the relational database, the fingerprint provided by an originator of the relational database. According to an exemplary method, a fingerprint bit string is generated including a data user identification code and a secret key unknown to the user, and the fingerprint bit string is embedded in a plurality of pseudorandomly selected values based on a pseudorandom function seeded with primary keys associated with the relational database.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: May 9, 2017
    Assignee: Xerox Corporation
    Inventors: Saghar Estehghari, Nicolas Guerin
  • Patent number: 9589143
    Abstract: A system and method provide for shared access to a database in a semi-trusted platform. In the method, for each of a set of users, provision is made for regenerating a respective user key, based on a respective predefined user input, such as a hashed password. One or more of the users is authorized to have access to an encrypted database. For each of these, the method includes encrypting a key for the encrypted database with the respective user's user key to generate an encrypted database key. During a user session, one of the authorized users is provided with access to the encrypted database by decrypting the database key from the encrypted database key with the respective user's user key, and decrypting the database, from the encrypted database, with the database key. The database key and each user's user key are not stored on the platform and are thus inaccessible to platform administrators and unauthorized users between user sessions.
    Type: Grant
    Filed: April 17, 2014
    Date of Patent: March 7, 2017
    Assignee: XEROX CORPORATION
    Inventors: Saghar Estehghari, Nicolas Guerin, Nicolas Monet
  • Patent number: 9501769
    Abstract: A system and method incorporating a multi-function printer (MFP), a mobile device and a server to effect payment of MFP services. The MFP generates and displays a session prepayment code containing identification information for the MFP and for a specific session initiated by a user. The code is entered into the mobile device and the mobile device transmits it to the server. In response, the server transmits a menu of MFP functions and costs to the mobile device, allowing the user to estimate and prepay the cost of the specific session through a service accessible on the mobile device. Once proof of prepayment is received, the server transmits an authorization code to the mobile device and the user inputs it into the MFP. The MFP verifies the authorization code with the server and performs user-selected functions until a time allotted for the specific session ends or until available credit is used, whichever comes first.
    Type: Grant
    Filed: August 20, 2014
    Date of Patent: November 22, 2016
    Assignee: Xerox Corporation
    Inventors: Nicolas Guérin, Saghar Estehghari
  • Publication number: 20160180097
    Abstract: Disclosed is a relational database fingerprinting system and method to identify a user of the relational database, the fingerprint provided by an originator of the relational database. According to an exemplary method, a fingerprint bit string is generated including a data user identification code and a secret key unknown to the user, and the fingerprint bit string is embedded in a plurality of pseudorandomly selected values based on a pseudorandom function seeded with primary keys associated with the relational database.
    Type: Application
    Filed: December 23, 2014
    Publication date: June 23, 2016
    Inventors: Saghar Estehghari, Nicolas Guerin
  • Publication number: 20160119119
    Abstract: A method for data matching includes providing two sets of encrypted data elements by converting data elements to respective sets of vectors and encrypting each vector with a public key of a homomorphic encryption scheme. Each data element includes a sequence of characters drawn from an alphabet. For pairs of encrypted data elements, a comparison measure is computed between the sets of encrypted vectors. An obfuscated vector is generated for each encrypted data element in the first set, which renders the first encrypted data element indecipherable when the comparison measure does not meet a threshold for at least one of the pairs of data encrypted elements comprising that encrypted data element. The obfuscated vectors can be decrypted with a private key, allowing data elements in the first set to be deciphered if the comparison measure meets the threshold for at least one of the data elements in the second set.
    Type: Application
    Filed: May 15, 2014
    Publication date: April 28, 2016
    Applicant: Xeror Corporation
    Inventors: Ioan Calapodescu, Saghar Estehghari, Johan Clier
  • Publication number: 20160055477
    Abstract: A system and method incorporating a multi-function printer (MFP), a mobile device and a server to effect payment of MFP services. The MFP generates and displays a session prepayment code containing identification information for the MFP and for a specific session initiated by a user. The code is entered into the mobile device and the mobile device transmits it to the server. In response, the server transmits a menu of MFP functions and costs to the mobile device, allowing the user to estimate and prepay the cost of the specific session through a service accessible on the mobile device. Once proof of prepayment is received, the server transmits an authorization code to the mobile device and the user inputs it into the MFP. The MFP verifies the authorization code with the server and performs user-selected functions until a time allotted for the specific session ends or until available credit is used, whichever comes first.
    Type: Application
    Filed: August 20, 2014
    Publication date: February 25, 2016
    Inventors: Nicolas Guérin, Saghar Estehghari
  • Publication number: 20150304315
    Abstract: A system and method provide for shared access to a database in a semi-trusted platform. In the method, for each of a set of users, provision is made for regenerating a respective user key, based on a respective predefined user input, such as a hashed password. One or more of the users is authorized to have access to an encrypted database. For each of these, the method includes encrypting a key for the encrypted database with the respective user's user key to generate an encrypted database key. During a user session, one of the authorized users is provided with access to the encrypted database by decrypting the database key from the encrypted database key with the respective user's user key, and decrypting the database, from the encrypted database, with the database key. The database key and each user's user key are not stored on the platform and are thus inaccessible to platform administrators and unauthorized users between user sessions.
    Type: Application
    Filed: April 17, 2014
    Publication date: October 22, 2015
    Applicant: Xerox Corporation
    Inventors: Saghar Estehghari, Nicolas Guerin, Nicolas Monet
  • Publication number: 20150172056
    Abstract: A system and method for preserving privacy of evidence are provided. In the method, an encrypted first image is generated by encrypting a first image acquired at a first location with a symmetric cryptographic key that is based on first information such as a license plate number extracted from the first image and first metadata associated with the first image, such as a time at which the first image was acquired. When a link is established between a second image and the first image, for example, through visual signature matching, the symmetric cryptographic key can be reconstructed, without having access to the first image, but based instead on the first metadata and information extracted from the second image. The reconstructed symmetric cryptographic key can then be used for decryption of the encrypted image to establish evidence that the license plate number was indeed extracted from the first image.
    Type: Application
    Filed: December 17, 2013
    Publication date: June 18, 2015
    Applicant: Xerox Corporation
    Inventors: Jean-Luc Meunier, Saghar Estehghari, Herve Poirier