Patents by Inventor Stuart A. Haber
Stuart A. Haber has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11563566Abstract: According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.Type: GrantFiled: October 27, 2014Date of Patent: January 24, 2023Assignee: Micro Focus LLCInventors: Stuart Haber, Liqun Chen
-
Patent number: 11095625Abstract: Examples disclosed herein relate to data objects associated with private set intersection (PSI). Some examples disclosed herein may enable identifying a set of server elements and a set of data objects. Each data object of the set of data objects may be associated with at least one server element of the set of server elements. Some examples further enable sending the set of server elements and the set of data objects to a client computing device that has a set of client elements. A private set intersection (PSI) between the set of server elements and the set of client elements may be inaccessible by the client computing device, and a subset of the set of data objects that are associated with the PSI may be accessible by the client computing device.Type: GrantFiled: March 18, 2016Date of Patent: August 17, 2021Assignee: Micro Focus LLCInventors: Liqun Chen, Stuart Haber, Tomas Sander
-
Patent number: 10896267Abstract: Examples relate to Input/Output (I/O) data encryption and decryption. In an example, an encryption/decryption engine on an Integrated Circuit (IC) of a computing device obtains at least one plaintext data. Some examples determine, by the encryption/decryption engine, whether the at least one plaintext data is to be sent to a memory in the computing device or to an I/O device. Some examples apply, when the at least one plaintext data is to be sent to the I/O device and by the encryption/decryption engine, an encryption primitive of a block cipher encryption algorithm to the at least one plaintext data to create output encrypted data, wherein an initialization vector that comprises a random number is applied to the encryption primitive.Type: GrantFiled: January 31, 2017Date of Patent: January 19, 2021Assignee: Hewlett Packard Enterprise Development LPInventors: Geoffrey Ndu, Pratyusa K Manadhata, Christopher L. Dalton, Adrian Shaw, Stuart Haber
-
Patent number: 10778441Abstract: In one implementation, a redactable document signature system includes an encoding engine, a reordering engine, and a signature engine. The encoding engine is to access a plurality of subdocuments of a document, to generate a plurality of commitment values from the plurality of subdocuments, and to generate a plurality of dummy values. Each dummy value is indistinguishable from a commitment value. The reordering engine is to define an order of the plurality of commitment values and the plurality of dummy values independent of an order of the subdocuments. The signature engine is to calculate a signature value for the document using the plurality of commitment values and the plurality of dummy values according to the order.Type: GrantFiled: January 29, 2019Date of Patent: September 15, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Stuart Haber, William G. Horne, Miaomiao Zhang
-
Patent number: 10671546Abstract: A technique includes receiving a request to initialize a region of a memory. Content that is stored in the region is encrypted based at least in part on a stored nonce value and a key. The technique includes, in response to the request, performing cryptographic-based initialization of the memory, including altering the stored nonce value to initialize the region of the memory.Type: GrantFiled: September 30, 2015Date of Patent: June 2, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Amro J. Awad, Pratyusa K. Manadhata, Stuart Haber, William G. Horne
-
Patent number: 10609019Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: GrantFiled: November 30, 2017Date of Patent: March 31, 2020Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Patent number: 10389518Abstract: A blockchain includes blocks that each store a hash value computed using a hash function from data of the block. Another hash value is computed for each block using a different hash function, and added to the block within the blockchain. New blocks subsequently added to the blockchain have hash values computed using just the different hash function.Type: GrantFiled: January 27, 2017Date of Patent: August 20, 2019Assignee: ENTIT SOFTWARE LLCInventors: Liqun Chen, Stuart Haber
-
Publication number: 20190158296Abstract: In one implementation, a redactable document signature system includes an encoding engine, a reordering engine, and a signature engine. The encoding engine is to access a plurality of subdocuments of a document, to generate a plurality of commitment values from the plurality of subdocuments, and to generate a plurality of dummy values. Each dummy value is indistinguishable from a commitment value. The reordering engine is to define an order of the plurality of commitment values and the plurality of dummy values independent of an order of the subdocuments. The signature engine is to calculate a signature value for the document using the plurality of commitment values and the plurality of dummy values according to the order.Type: ApplicationFiled: January 29, 2019Publication date: May 23, 2019Applicant: HealthTrackRxInventors: Stuart Haber, William G. Horne, Miaomiao Zhang
-
Patent number: 10237074Abstract: In one implementation, a redactable document signature system includes an encoding engine, a reordering engine, and a signature engine. The encoding engine is to access a plurality of subdocuments of a document, to generate a plurality of commitment values from the plurality of subdocuments, and to generate a plurality of dummy values. Each dummy value is indistinguishable from a commitment value. The reordering engine is to define an order of the plurality of commitment values and the plurality of dummy values independent of an order of the subdocuments. The signature engine is to calculate a signature value for the document using the plurality of commitment values and the plurality of dummy values according to the order.Type: GrantFiled: April 8, 2014Date of Patent: March 19, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Stuart Haber, William G. Horne, Miaomiao Zhang
-
Publication number: 20190075088Abstract: Examples disclosed herein relate to data objects associated with private set intersection (PSI). Some examples disclosed herein may enable identifying a set of server elements and a set of data objects. Each data object of the set of data objects may be associated with at least one server element of the set of server elements. Some examples further enable sending the set of server elements and the set of data objects to a client computing device that has a set of client elements. A private set intersection (PSI) between the set of server elements and the set of client elements may be inaccessible by the client computing device, and a subset of the set of data objects that are associated with the PSI may be accessible by the client computing device.Type: ApplicationFiled: March 18, 2016Publication date: March 7, 2019Inventors: Liqun Chen, Stuart Haber, Tomas Sander
-
Publication number: 20180365451Abstract: Examples relate to Input/Output (I/O) data encryption and decryption. In an example, an encryption/decryption engine on an Integrated Circuit (IC) of a computing device obtains at least one plaintext data. Some examples determine, by the encryption/decryption engine, whether the at least one plaintext data is to be sent to a memory in the computing device or to an I/O device. Some examples apply, when the at least one plaintext data is to be sent to the I/O device and by the encryption/decryption engine, an encryption primitive of a block cipher encryption algorithm to the at least one plaintext data to create output encrypted data, wherein an initialization vector that comprises a random number is applied to the encryption primitive.Type: ApplicationFiled: January 31, 2017Publication date: December 20, 2018Inventors: Geoffrey Ndu, Pratyusa K. Manadhata, Christopher I. Dalton, Adrian Shaw, Stuart Haber
-
Publication number: 20180219669Abstract: A blockchain includes blocks that each store a hash value computed using a hash function from data of the block. Another hash value is computed for each block using a different hash function, and added to the block within the blockchain. New blocks subsequently added to the blockchain have hash values computed using just the different hash function.Type: ApplicationFiled: January 27, 2017Publication date: August 2, 2018Inventors: Liqun Chen, Stuart Haber
-
Publication number: 20180212949Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: November 30, 2017Publication date: July 26, 2018Applicant: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Stuart A. Haber, Robert E. Tarjan, Tomas Sander
-
Publication number: 20180137062Abstract: A technique includes receiving a request to initialize a region of a memory. Content that is stored in the region is encrypted based at least in part on a stored nonce value and a key. The technique includes, in response to the request, performing cryptographic-based initialization of the memory, including altering the stored nonce value to initialize the region of the memory.Type: ApplicationFiled: September 30, 2015Publication date: May 17, 2018Inventors: Amro J. Awad, Pratyusa K. Manadhata, Stuart Haber, William G. Home
-
Patent number: 9854125Abstract: In one implementation, a physical version of a document is converted to a digital representation of the physical version and a new certificate is computed for the digital representation of the physical version. The new certificate is computed based on the digital representation of the physical version, at least one processing step performed on the digital representation, and a prior certificate computed for a prior digital representation indicative of the physical version. In another implementation, a document is validated.Type: GrantFiled: January 30, 2012Date of Patent: December 26, 2017Assignee: Ent. Services Development Corporation LPInventors: Stuart Haber, Prasad V. Rao
-
Publication number: 20170262546Abstract: Implementations are directed, for example, to a method that includes receiving, at a data storage system from a client, a key search token that has not been used to encrypt data records or keywords associated with the data records. The key search token is independent of an encryption key used to encrypt the data records associated with the key search token. The method further includes determining an encrypted data record associated with the key search token, and transmitting the determined encrypted data record to the client. Implementations of the client are also provided.Type: ApplicationFiled: July 30, 2014Publication date: September 14, 2017Inventors: Liqun Chen, Stuart Haber Haber, Kate Mallichan, Simon Kai-Ying Shiu
-
Publication number: 20170222800Abstract: According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.Type: ApplicationFiled: October 27, 2014Publication date: August 3, 2017Inventors: Stuart Haber, Liqun CHEN
-
Publication number: 20170033933Abstract: In one implementation, a redactable document signature system includes an encoding engine, a reordering engine, and a signature engine. The encoding engine is to access a plurality of subdocuments of a document, to generate a plurality of commitment values from the plurality of subdocuments, and to generate a plurality of dummy values. Each dummy value is indistinguishable from a commitment value. The reordering engine is to define an order of the plurality of commitment values and the plurality of dummy values independent of an order of the subdocuments. The signature engine is to calculate a signature value for the document using the plurality of commitment values and the plurality of dummy values according to the order.Type: ApplicationFiled: April 8, 2014Publication date: February 2, 2017Inventors: Stuart Haber, William G. HORNE, Miaomiao ZHANG
-
Patent number: 9558299Abstract: A method for submatch extraction may include receiving an input string, receiving a regular expression. The method may further include converting the regular expression with capturing groups into ordered binary decision diagrams (OBDDs) to extract submatches.Type: GrantFiled: April 30, 2012Date of Patent: January 31, 2017Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Liu Yang, Prasad V. Rao, Pratyusa Kumar Manadhata, William G. Horne, Stuart Haber
-
Publication number: 20160277385Abstract: A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.Type: ApplicationFiled: May 27, 2016Publication date: September 22, 2016Inventors: Binyamin PINKAS, Stuart A. HABER, Robert E. TARJAN, Tomas SANDER