Patents by Inventor Shlomo Dolev

Shlomo Dolev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10467389
    Abstract: A method of providing a distributed scheme for executing a RAM program, without revealing any information regarding the program, the data and the results, according to which the instructions of the program are simulated using SUBLEQ instructions and the execution of the program is divided among a plurality of participating computational resources such as one or more clouds, which do not communicate with each other, while secret sharing all the program's SUBLEQ instructions, to hide their nature of operation and the sequence of operations. Private string matching is secretly performed by comparing strings represented in secret shares, for ensuring the execution of the right instruction sequence. Then arithmetic operations are performed over secret shared bits and branch operations are performed according to the secret shared sign bit of the result.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: November 5, 2019
    Assignee: SECRETSKYDBLTD
    Inventors: Shlomo Dolev, Yin Li
  • Publication number: 20180011996
    Abstract: A method of providing a distributed scheme for executing a RAM program, without revealing any information regarding the program, the data and the results, according to which the instructions of the program are simulated using SUBLEQ instructions and the execution of the program is divided among a plurality of participating computational resources such as one or more clouds, which do not communicate with each other, while secret sharing all the program's SUBLEQ instructions, to hide their nature of operation and the sequence of operations. Private string matching is secretly performed by comparing strings represented in secret shares, for ensuring the execution of the right instruction sequence. Then arithmetic operations are performed over secret shared bits and branch operations are performed according to the secret shared sign bit of the result.
    Type: Application
    Filed: January 14, 2016
    Publication date: January 11, 2018
    Inventors: Shlomo Dolev, Yin Li
  • Patent number: 9742739
    Abstract: A method of securely executing practically unbounded input stream of symbols, by non-interactive, multi-party computation, according to which the input stream is distributed among a plurality of parties, which do not communicate among themselves throughout execution, by a dealer with a secret initial state. The dealer distributes shares of the secret state between the parties. The input stream is executed by a finite-state automaton which may be an accumulating automaton with accumulating nodes or an automaton that is defined by a series of cascaded equations. During any execution stage, the input stream and the current state of the original automaton are concealed from any coalition of participants being smaller than a given threshold. Upon receiving a signal from the dealer, the parties terminate the execution and submit their internal state to the dealer, which computes the current state that defines the computation result.
    Type: Grant
    Filed: April 23, 2014
    Date of Patent: August 22, 2017
    Assignee: SECRETSKYDB LTD.
    Inventors: Shlomo Dolev, Niv Gilboa, Ximing Li
  • Publication number: 20160149866
    Abstract: A method of securely executing practically unbounded input stream of symbols, by non-interactive, multi-party computation, according to which the input stream is distributed among a plurality of parties, which do not communicate among themselves throughout execution, by a dealer with a secret initial state. The dealer distributes shares of the secret state between the parties. The input stream is executed by a finite-state automaton which may be an accumulating automaton with accumulating nodes or an automaton that is defined by a series of cascaded equations. During any execution stage, the input stream and the current state of the original automaton are concealed from any coalition of participants being smaller than a given threshold. Upon receiving a signal from the dealer, the parties terminate the execution and submit their internal state to the dealer, which computes the current state that defines the computation result.
    Type: Application
    Filed: April 23, 2014
    Publication date: May 26, 2016
    Inventors: Shlomo Dolev, Niv Gilboa, Ximing Li
  • Patent number: 7808911
    Abstract: Method for protecting an NSP data network against data overflow, according to which the NSP data network is divided to a protected sub-network and an unprotected sub-network. Connectivity to external data networks is allowed through the unprotected sub-network via a set of predefined controlled data ports. A maximum available bandwidth that can be processed by a user is determined for each user and maximal sub-bandwidth is allocated for each router. Whenever the data packet flow intended to the user exceeds the sub-bandwidth at one of the routers, the excess packet flow is filtered.
    Type: Grant
    Filed: February 15, 2008
    Date of Patent: October 5, 2010
    Assignee: Deutsche Telekom AG
    Inventor: Shlomo Dolev
  • Publication number: 20080212481
    Abstract: Method for protecting an NSP data network against data overflow, according to which the NSP data network is divided to a protected sub-network and an unprotected sub-network. Connectivity to external data networks is allowed through the unprotected sub-network via a set of predefined controlled data ports. Each user is connected to the protected sub-network via a proxy router and to the unprotected sub-network via gateway routers that are connected to the proxy router through interconnected intermediating routers and to unprotected sub-network via the set of controlled data ports. A maximum available bandwidth that can be processed by a user is determined for each user and maximal sub-bandwidth is allocated for each router, such that the sub-bandwidth is smaller than the bandwidth.
    Type: Application
    Filed: February 15, 2008
    Publication date: September 4, 2008
    Applicant: Deutsche Telekom AG
    Inventor: Shlomo Dolev
  • Patent number: 7130093
    Abstract: Method and an optical computation device for obtaining an indication about the existence of a feasible solution for a bounded instance of a problem that belongs to the non-deterministic polynomial class of problems, using parallel optical computations employing a multitude of light rays simultaneously propagating along paths in an optical arrangement. An optical arrangement that can implement a universal non deterministic Turing Machine that can solve bounded instances of problems of the class is determined. An initial incoming ray is directed to a point in the optical arrangement, that represents the initial configuration of the universal non deterministic Turing Machine, such that the initial configuration corresponds to the bounded instance. Each incoming ray is split within the optical arrangement into two or more outgoing rays at pre-determined locations in the optical arrangement.
    Type: Grant
    Filed: May 18, 2004
    Date of Patent: October 31, 2006
    Inventors: Shlomo Dolev, Yuval Nir
  • Publication number: 20050013531
    Abstract: Method and an optical computation device for obtaining an indication about the existence of a feasible solution for a bounded instance of a problem that belongs to the non-deterministic polynomial class of problems, using parallel optical computations employing a multitude of light rays simultaneously propagating along paths in an optical arrangement. An optical arrangement that can implement a universal non deterministic Turing Machine that can solve bounded instances of problems of the class is determined. An initial incoming ray is directed to a point in the optical arrangement, that represents the initial configuration of the universal non deterministic Turing Machine, such that the initial configuration corresponds to the bounded instance. Each incoming ray is split within the optical arrangement into two or more outgoing rays at pre-determined locations in the optical arrangement.
    Type: Application
    Filed: May 18, 2004
    Publication date: January 20, 2005
    Inventors: Shlomo Dolev, Yuval Nir