Patents by Inventor Stephen Carl Kaufman

Stephen Carl Kaufman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8200982
    Abstract: A method of processing semiotic data includes receiving semiotic data including at least one data set P, selecting a function h, and for at least one of each data set P to be collected, computing h(P), destroying data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P). The method further includes selecting a private key/public key (K, k) once for all cases, one of destroying the private key K and sending the private key K to a trusted party, and choosing function h as the public encryption function corresponding to k.
    Type: Grant
    Filed: March 19, 2010
    Date of Patent: June 12, 2012
    Assignee: International Business Machines Corporation
    Inventors: Andrea Califano, Stephen Carl Kaufman, Marco Martens, William Robert Pulleyblank, Gustavo Alejandro Stolovitzky, Charles Philippe Tresser, Chai Wah Wu
  • Patent number: 7761715
    Abstract: A method (as well as system and signal-bearing medium) of processing biometric data, includes receiving biometric data including a data set P, selecting a secure hash function h, and for each data set P to be collected, computing h(P), destroying the data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P).
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: July 20, 2010
    Assignee: International Business Machines Corporation
    Inventors: Andrea Califano, Stephen Carl Kaufman, Marco Martens, William Robert Pulleyblank, Gustavo Alejandro Stolovitzky, Charles Philippe Tresser, Chai Wah Wu
  • Publication number: 20100172495
    Abstract: A method of processing semiotic data includes receiving semiotic data including at least one data set P, selecting a function h, and for at least one of each data set P to be collected, computing h(P), destroying data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P). The method further includes selecting a private key/public key (K, k) once for all cases, one of destroying the private key K and sending the private key K to a trusted party, and choosing function h as the public encryption function corresponding to k.
    Type: Application
    Filed: March 19, 2010
    Publication date: July 8, 2010
    Applicant: International Business Machines Corporation
    Inventors: Andrea Califano, Stephen Carl Kaufman, Marco Martens, William Robert Pulleyblank, Gustavo Alejandro Stolovitzky, Charles Philippe Tresser, Chai Wah Wu