Patents by Inventor Simone D'Onofrio

Simone D'Onofrio has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220141039
    Abstract: Establishing secure communications by sending a server certificate message, the certificate message including a first certificate associated with a first encryption algorithm and a second certificate associated with a second encryption algorithm, the first certificate and second certificate bound to each other, signing a first message associated with client-server communications using a first private key, the first private key associated with the first certificate, signing a second message associated with the client-server communications using a second private key, the second private key associated with the second certificate, the second message including the signed first message, and sending a server certificate verify message, the server certificate verify message comprising the signed first message and the signed second message.
    Type: Application
    Filed: November 2, 2020
    Publication date: May 5, 2022
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Matthew Green, Peter T. Waltenberg
  • Publication number: 20220116468
    Abstract: Systems and methods are disclosed for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising. One method includes: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
    Type: Application
    Filed: December 21, 2021
    Publication date: April 14, 2022
    Inventors: Nicholas P. MILLER, Simon D. EDWARDS, Alan J. MILFORD, Denys P. KIM, Bart W.R. SCHELFHOUT
  • Publication number: 20220096450
    Abstract: The present invention relates to the discovery of compounds that can be used to treat and/or prevent heart failure in a subject. In certain embodiments, the compounds of the invention are sulfide:quinone oxidoreductase (SQOR) inhibitors. In other embodiments, the compounds of the invention increase physiological levels of H2S in the subject. In yet other embodiments, administration of the compounds of the invention treats, ameliorates, and/or prevents hypertension, and/or atherosclerosis, and/or pathological cardiac remodeling that leads to heart failure in the subject.
    Type: Application
    Filed: January 9, 2020
    Publication date: March 31, 2022
    Inventors: Marilyn S. JORNS, Michael R. JACKSON, Kristie D. COX, Patrick Y. S. LAM, Simon D. P. BAUGH
  • Publication number: 20220038278
    Abstract: Transport Layer Security (TLS) connection establishment between a client and a server for a new session is enabled using an ephemeral (temporary) key pair. In response to a request, the server generates a temporary certificate by signing an ephemeral public key using the server's private key. A certificate chain comprising at least the temporary certificate that includes the ephemeral public key, together with a server certificate, is output to the client by the server, which acts as a subordinate Certificate Authority. The client validates the certificates, generates a session key and outputs the session key wrapped by the ephemeral public key. To complete the connection establishment, the server applies the ephemeral private key to recover the session key derived at the client for the new session. The client and server thereafter use the session key to encrypt and decrypt data over the link. The ephemeral key pair is not reused.
    Type: Application
    Filed: October 15, 2021
    Publication date: February 3, 2022
    Applicant: International Business Machines Corporation
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Matthew Green, Simon D. McMahon, Leigh S. McLean, Stephen J. McKenzie, Luvita Burgess, Peter T. Waltenberg
  • Patent number: 11240327
    Abstract: Systems and methods are disclosed for associating a plurality of Internet-enabled devices with a common user profile for targeting Internet content or advertising. One method includes: receiving, from a plurality of Internet-enabled devices, a plurality of requests for electronic content or advertising; extracting, from each of the plurality of requests, a source IP address and a unique identifier associated with the respective Internet-enabled device; for each source IP address for which requests were received over a predetermined time period from a number of Internet-enabled devices below a threshold number of devices, identifying each possible pair of devices from which requests were received; and for each possible pair of devices, calculating a probability that the pair of devices are owned or operated by a common user.
    Type: Grant
    Filed: September 17, 2020
    Date of Patent: February 1, 2022
    Assignee: Verizon Media Inc.
    Inventors: Nicholas P. Miller, Simon D. Edwards, Alan J. Milford, Denys P. Kim, Bart W. R. Schelfhout
  • Publication number: 20220006835
    Abstract: A method and a system for integrating post quantum cryptographic algorithms into TLS. The method includes transmitting a client hello message to a server including a request for post quantum cryptographic (PQC) mode of operation and a PQC public client key, receiving a server hello message from the server in response to the client hello message including a PQC server key exchange generated from the PQC public client key. The method includes determining the server hello message includes an authorization to operate the PQC mode of operation. The method also includes transmitting a second client hello message to the server including a PQC encrypted client key share. The PQC encrypted client key share is encrypted using a client encryption key. The method includes receiving a second server hello message that includes a PQC encrypted server key share and decrypting the PQC encrypted server key share using a server encryption key.
    Type: Application
    Filed: July 2, 2020
    Publication date: January 6, 2022
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Matthew Green, Leigh S. McLean, Peter T. Waltenberg
  • Publication number: 20210396112
    Abstract: Processes are provided for conformance control in the production of hydrocarbons from reservoirs, involving the distribution of mobilizing injection fluids into a formation through a number of injection fluid distribution points spaced apart along an injection well. The volume and/or position of mobilizing fluid outflows at the distribution points is adjusted based on criteria that include selected reservoir parameters measured at spatially distributed measurement points in the reservoir. An operational system is provided so that these measurements provide a proxy for recovery chamber conformance.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 23, 2021
    Inventors: Simon D. GITTINS, Jason R. C. GRIFFITHS, Michael MILLER
  • Publication number: 20210396111
    Abstract: Disclosed are methods of producing hydrocarbons and recovering solvent from a subterranean reservoir that is penetrated by an injection well and a production well. The methods comprise orchestrating a production phase that involves injecting solvent (and optionally steam) to mobilize viscous hydrocarbons. The methods also comprise a solvent-recovery phase that involves non-condensable gas injection. The production phase and the solvent-recovery phase are each defined by an injection profile. The solvent-recovery-phase injection profile is selected: (i) based on the production-phase injection profile, and (ii) to ensure the pressure/temperature conditions in proximity to the production well favour gas-phase solvent recovery.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 23, 2021
    Inventors: Prince AZOM, Amos BEN-ZVI, Simon D GITTINS, Ishan Deep Singh KOCHHAR, Ryan MILLER
  • Publication number: 20210396110
    Abstract: Methods for producing hydrocarbons from subterranean reservoirs are disclosed herein. The methods utilize a production well that comprises a plurality of fluid-inlet components are spaced apart to define a plurality of production-well fluid-inlet zones. The methods comprise injecting an injection fluid comprising a solvent into the reservoir, such that a drainage fluid comprising a liquid phase and a gas phase occupies one or more of the production-well fluid-inflow zones. The method further comprises producing a production fluid at a production-flow rate via a pump, and modulating the gas phase:liquid phase ratio of the production fluid by orchestrating variations in the pump speed and one or more of the plurality of fluid-inlet components to prioritize hydraulic communication with a subset of the plurality of production-well fluid-inlet zones.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 23, 2021
    Inventors: Amos BEN-ZVI, Amin FARDI, Simon D GITTINS, Michael MILLER, Ryan MILLER, Trenton M SCHRADER
  • Publication number: 20210396106
    Abstract: Methods for producing hydrocarbons from subterranean reservoirs are disclosed herein. The methods utilize a production well that comprises a plurality of fluid-inlet components that are spaced apart to define a plurality of production-well fluid-inlet zones. The methods comprise injecting an injection fluid comprising a non-condensable gas (NCG) into the reservoir, such that a drainage fluid comprising at least a portion of the NCG occupies the production-well fluid-inlet zones. The method further comprises modulating the gas phase:liquid phase ratio of a production fluid by orchestrating variations in pump speed and the flow states of the plurality of fluid-inlet components to prioritize hydraulic communication with a subset of the plurality of production-well fluid-inlet zones that are not plagued by high NCG content.
    Type: Application
    Filed: June 18, 2021
    Publication date: December 23, 2021
    Inventors: Amos Ben-Zvi, Amin Fardi, Simon D. Gittins, Michael Miller, Ryan Miller, Trenton M. Schrader
  • Patent number: 11206135
    Abstract: Transport Layer Security (TLS) connection establishment between a client and a server for a new session is enabled using an ephemeral (temporary) key pair. In response to a request, the server generates a temporary certificate by signing an ephemeral public key using the server's private key. A certificate chain comprising at least the temporary certificate that includes the ephemeral public key, together with a server certificate, is output to the client by the server, which acts as a subordinate Certificate Authority. The client validates the certificates, generates a session key and outputs the session key wrapped by the ephemeral public key. To complete the connection establishment, the server applies the ephemeral private key to recover the session key derived at the client for the new session. The client and server thereafter use the session key to encrypt and decrypt data over the link. The ephemeral key pair is not reused.
    Type: Grant
    Filed: November 11, 2019
    Date of Patent: December 21, 2021
    Assignee: International Business Machines Corporation
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Matthew Green, Simon D. McMahon, Leigh S. McLean, Stephen J. McKenzie, Luvita Burgess, Peter T. Waltenberg
  • Publication number: 20210370028
    Abstract: Angioplasty balloons coated with at least one limus drug, which may be in crystalline form, optionally with at least one excipient, and methods for manufacturing such coated angioplasty balloons.
    Type: Application
    Filed: May 29, 2020
    Publication date: December 2, 2021
    Inventors: Simone D'Onofrio, Massimo Morero, Federica Bellucci, Bradley E. Steele, Diane M. Haen
  • Publication number: 20210376199
    Abstract: In an embodiment an optoelectronic component includes a radiation emitting semiconductor chip configured to emit primary electromagnetic radiation from a radiation emission surface, a conversion element configured to convert the primary electromagnetic radiation into electromagnetic secondary radiation, a first potting covering at least one side surface of the semiconductor chip, a second potting arranged on the first potting and an adhesion promoter with which the conversion element is fixed on the radiation emission surface of the semiconductor chip, wherein the adhesion promoter is arranged on a top surface of the first potting, wherein the first potting includes first filler particles, wherein the second potting includes second filler particles, and wherein a mass fraction of the first filler particles is greater than a mass fraction of the second filler particles per volume element.
    Type: Application
    Filed: October 14, 2019
    Publication date: December 2, 2021
    Inventors: Günter Spath, Daniel Leisen, Simon D. Jerebic, Matthias Kiessling
  • Publication number: 20210367771
    Abstract: A method, a computer program product, and a system for removing padding oracles in encryption techniques. The method includes padding a plaintext message using a padding scheme producing a padded plaintext message. The method also includes encrypting the padded plaintext message using a block cipher generating an encrypted data block of fixed-size as well as a hash value. The method further includes randomly generating an ephemeral key and an initialization vector. The method also includes prepending the hash value, the ephemeral key, and the initialization vector to the encrypted data block. The method includes performing an encryption technique to the encrypted data block prepended with the hash value, the ephemeral key, and the initialization vector.
    Type: Application
    Filed: May 19, 2020
    Publication date: November 25, 2021
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Matthew Green, Simon D. McMahon, Leigh S. McLean
  • Publication number: 20210351932
    Abstract: A method, a computer program product, and a system for embedding a message in a random value. The method includes generating a random value and applying a hash function to the random value to produce a hash value. Starting with the hash value, the method further includes reapplying the hash function in an iterative or recursive manner, with a new hash value produced by the hash function acting as an initial value that is applied to the hash function for a next iteration, until a bit sequence representing a message is produced in a message hash value. The method further includes utilizing the message hash value as a new random value that can be used by an encryption algorithm.
    Type: Application
    Filed: May 8, 2020
    Publication date: November 11, 2021
    Inventors: Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Matthew Green, Stephen J. McKenzie, Michael James Thomas
  • Publication number: 20210344486
    Abstract: Extending the useful life of finite lifetime asymmetric cryptographic keys by referencing the number of uses of the keys in conjunction with or instead of the elapsed time since generation of the finite lifetime keys. By integrating asymmetric cryptographic keys into a limited use security scheme, the lifetime of finite lifetime asymmetric cryptographic keys is based on the practical risk of security breach during use rather than an arbitrary duration in which the keys are valid.
    Type: Application
    Filed: April 29, 2020
    Publication date: November 4, 2021
    Inventors: Narayana Aditya Madineni, Peter T. WALTENBERG, Simon D. McMahon
  • Patent number: 11153299
    Abstract: A method, computer system, and a computer program product for secure transport of data is provided. The present invention may include defining a trust relationship based on a secret. The present invention may also include associating a trusted transport key identity (TTKI) based on the defined trust relationship. The present invention may then include receiving a trusted transport key (TTK), wherein the TTK is digitally signed and encrypted with the TTKI. The present invention may further include verifying the digitally signed TTK. The present invention may also include enveloping the secret with the TTK.
    Type: Grant
    Filed: March 11, 2019
    Date of Patent: October 19, 2021
    Assignee: International Business Machines Corporation
    Inventors: Michael W. Gray, Narayana A. Madineni, Simon D. McMahon, Leigh S. McLean, Luvita Burgess, Stephen J. McKenzie, Matthew Green, Peter T. Waltenberg
  • Publication number: 20210281608
    Abstract: A method, a computer program product, and a system for transport layer security protocol functions in separate instances. The method includes receiving, by a handshake processor instance, a TLS connection request from a client to a server. The method further includes establishing a TLS connection including connection secrets by the handshake processor instance. Once established, the method proceeds by transmitting the connection secrets to a connection processor instance. The method further includes deleting the connection secrets stored on the handshake processor instance and processing application data by the connection processor instance.
    Type: Application
    Filed: March 5, 2020
    Publication date: September 9, 2021
    Inventors: Matthew Green, Narayana Aditya Madineni, Peter T. Waltenberg, Michael W. Gray, Leigh S. McLean, Alexander John Hennekam, Simon D. McMahon
  • Publication number: 20210258296
    Abstract: A computer-implemented method for identity authentication in a data processing system, including: receiving, by the processor, an authentication request from a user; receiving, by the processor, real-time data from one or more Internet of Things (IoT) devices associated with the user; generating, by the processor, one or more questions based on the real-time data; receiving, by the processor, one or more responses to the one or more questions from the user; comparing, by the processor, the one or more responses from the user with one or more correct answers identified by the processor. If the one or more responses match the one or more correct answers, providing, by the processor, the user with a successful identity authentication.
    Type: Application
    Filed: February 18, 2020
    Publication date: August 19, 2021
    Inventors: Stephen J. McKenzie, Narayana A. Madineni, Simon D. McMahon, Pranab Agarwal
  • Publication number: 20210257344
    Abstract: In an embodiment an apparatus includes a delimiting device and a holding device configured to hold the delimiting device at a distance above an optoelectronic light-emitting device and form a layer of a material provided in a flowable state between the delimiting device and the light-emitting device, wherein a bottom side of the delimiting device, which faces the light-emitting device, has a structuring so that a structure complementary to the structuring is producible on an upper side of the layer.
    Type: Application
    Filed: September 13, 2019
    Publication date: August 19, 2021
    Inventors: Simon D. Jerebic, Daniel Leisen