Patents by Inventor William G. Horne
William G. Horne has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20170163670Abstract: Systems and methods associated with packet logging are described. One example method includes testing a packet obtained from a packet stream against a whitelist and a blacklist. The method also includes dropping the packet when the packet tests positive against the whitelist. The method also includes providing the packet to a security manager when the packet tests positive against the blacklist. The method also includes logging the packet when the packet tests negative against the whitelist.Type: ApplicationFiled: April 30, 2014Publication date: June 8, 2017Inventors: Pratyusa K Manadhata, William G. Horne
-
Patent number: 9672514Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: GrantFiled: August 28, 2015Date of Patent: June 6, 2017Assignee: Intertrust Technologies Corp.Inventors: Binyamin Pinkas, Tomas Sander, William G. Horne
-
Patent number: 9659157Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: GrantFiled: May 2, 2016Date of Patent: May 23, 2017Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Publication number: 20170076090Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: ApplicationFiled: September 2, 2015Publication date: March 16, 2017Inventors: William G. HORNE, Lesley R. MATHESON, Casey SHEEHAN, Robert E. TARJAN
-
Publication number: 20170070518Abstract: Various apparatuses and methods are usable to identify an Advanced Persistent Threat (APT). Various network packets may be subjected to a suitable behavioral analysis to identify such APTs. Upon identifying an APT, a response is initiated which may include sending attack messages to various devices in the network.Type: ApplicationFiled: November 18, 2016Publication date: March 9, 2017Applicant: Trend Micro IncorporatedInventors: Pratyusa K. MANADHATA, William G. HORNE
-
Publication number: 20170033933Abstract: In one implementation, a redactable document signature system includes an encoding engine, a reordering engine, and a signature engine. The encoding engine is to access a plurality of subdocuments of a document, to generate a plurality of commitment values from the plurality of subdocuments, and to generate a plurality of dummy values. Each dummy value is indistinguishable from a commitment value. The reordering engine is to define an order of the plurality of commitment values and the plurality of dummy values independent of an order of the subdocuments. The signature engine is to calculate a signature value for the document using the plurality of commitment values and the plurality of dummy values according to the order.Type: ApplicationFiled: April 8, 2014Publication date: February 2, 2017Inventors: Stuart Haber, William G. HORNE, Miaomiao ZHANG
-
Patent number: 9558299Abstract: A method for submatch extraction may include receiving an input string, receiving a regular expression. The method may further include converting the regular expression with capturing groups into ordered binary decision diagrams (OBDDs) to extract submatches.Type: GrantFiled: April 30, 2012Date of Patent: January 31, 2017Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Liu Yang, Prasad V. Rao, Pratyusa Kumar Manadhata, William G. Horne, Stuart Haber
-
Publication number: 20160342778Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: ApplicationFiled: May 2, 2016Publication date: November 24, 2016Inventors: William G. HORNE, Umesh MAHESHWARI, Robert J. TARJAN, James J. HORNING, W. Olin SIBERT, Lesley R. MATHESON, Andrew K. WRIGHT, Susan S. OWICKI
-
Patent number: 9405922Abstract: A method includes selecting a first biclique role in a plurality of roles and finding all roles in the plurality that have a set of vertices of a second type that is a subset of a set of vertices of the second type in the first role; removing each of the subsets from the set of vertices of the second type corresponding to the first role; and reassigning the vertices of the first type to the roles such that original associations between the vertices of the first type and the vertices of the second type are maintained.Type: GrantFiled: January 5, 2009Date of Patent: August 2, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Robert S. Schreiber, William G. Horne
-
Patent number: 9405921Abstract: One embodiment relates to a computer-implemented method for role discovery in access control systems. User accounts are selected according to a predetermined algorithm. For each selected user account, a new role is created covering a set of permissions including all permissions which the user account needs but is not yet covered by another role that the user account has. The new role is given to the user account so that all permissions needed by the user account are covered. Any additional user accounts which still need the set of permissions covered by the new role are also found, and the new role is given to these additional user accounts, if any. Other features, aspects and embodiments are also disclosed.Type: GrantFiled: July 31, 2007Date of Patent: August 2, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Robert Samuel Schreiber, Robert E. Tarjan, Mehul A. Shah, William G. Horne
-
Publication number: 20160155119Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: ApplicationFiled: August 28, 2015Publication date: June 2, 2016Inventors: Binyamin PINKAS, Tomas SANDER, William G. HORNE
-
Patent number: 9350547Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: GrantFiled: August 18, 2014Date of Patent: May 24, 2016Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Patent number: 9336194Abstract: A method for submatch extraction may include receiving an input string, receiving a regular expression, and converting the regular expression with capturing groups into a plurality of finite automata to extract submatches. The method further includes using a first automaton to determine whether the input string is in a language described by the regular expression, and to process the input string, and using states of the first automaton in a second automaton to extract the submatches.Type: GrantFiled: March 13, 2012Date of Patent: May 10, 2016Assignee: Hewlett Packard Enterprises Development LPInventors: Pratyusa Kumar Manadhata, Stuart Haber, Miranda Jane Felicity Mowbray, Prasad V Rao, William G Horne
-
Patent number: 9275348Abstract: Identifying participants for collaboration in a threat exchange community can include receiving security data from a plurality of participants at a threat exchange server within the threat exchange community; and in response to receiving from a first participant from the plurality of participants security data associated with a security occurrence, identifying at the threat exchange server the first participant and a second participant from the plurality of participants for collaboration based on characteristics of the first participant and the second participant.Type: GrantFiled: January 31, 2013Date of Patent: March 1, 2016Assignee: Hewlett Packard Enterprise Development LPInventors: Sandeep N. Bhatt, William G. Horne, Daniel L. Moor, Suranjan Pramanik, Tomas Sander
-
Publication number: 20150373040Abstract: Sharing information can include identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community. Sharing information can also include determining what participant-related information to share with the threat exchange server in response to the identified security occurrence, and receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community.Type: ApplicationFiled: January 31, 2013Publication date: December 24, 2015Inventors: Tomas Sander, William G. Horne, Prasad V. Rao, Suranjan Pramanik, Siva Raj Rajagopalan, Daniel L. Moor, Krishnamurthy Viswanathan
-
Publication number: 20150278491Abstract: Systems and methods are disclosed for protecting a computer program from unauthorized analysis and modification. Obfuscation transformations can be applied to the computer program's local structure, control graph, and/or data structure to render the program more difficult to understand and/or modify. Tamper-resistance mechanisms can be incorporated into the computer program to detect attempts to tamper with the program's operation. Once an attempt to tamper with the computer program is detected, the computer program reports it to an external agent, ceases normal operation, and/or reverses any modifications made by the attempted tampering. The computer program can also be watermarked to facilitate identification of its owner. The obfuscation, tamper-resistance, and watermarking transformations can be applied to the computer program's source code, object code, or executable image.Type: ApplicationFiled: June 5, 2015Publication date: October 1, 2015Inventors: James J. HORNING, W. Olin SIBERT, Robert E. Tarjan, Umesh MAHESHWARI, William G. HORNE, Andrew K. WRIGHT, Lesley R. MATHESON, Susan S. OWICKI
-
Patent number: 9143517Abstract: Threat exchange information protection can include receiving security information from a number of participants of a threat exchange community, wherein a portion of the received security information is encoded with pseudonyms by each of the number of participants, analyzing the security information collectively from the number of participants, wherein the portion of the received security information remains encoded, and sending analysis results to each of the number of participants, wherein the analysis results include information relating to the portion.Type: GrantFiled: January 31, 2013Date of Patent: September 22, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: William G. Horne, Daniel L. Moor, Richard D. Austin, Tomas Sander, Prasad V. Rao, Sandeep N. Bhatt
-
Patent number: 9141788Abstract: Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that it they are compatible with copy-specific static watermarking and other tamper-resistance techniques.Type: GrantFiled: April 28, 2014Date of Patent: September 22, 2015Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Lesley R. Matheson, Casey Sheehan, Robert E. Tarjan
-
Patent number: 9123043Abstract: Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a first hash of at least a portion of the encrypted data content, and sends the first hash to a third party configured to compare at least a portion of the first hash to at least a portion of a second hash. The receiver receives a file decryption key from the third party, and decrypts at least the portion of the received encrypted data content with the decryption key. In some cases, multiple hashes of the encrypted data content may be computed, each using a different portion of the encrypted data content.Type: GrantFiled: November 4, 2013Date of Patent: September 1, 2015Assignee: Intertrust Technologies CorporationInventors: Binyamin Pinkas, Tomas Sander, William G. Horne
-
Publication number: 20150200782Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: ApplicationFiled: August 18, 2014Publication date: July 16, 2015Applicant: INTERTRUST TECHNOLOGIES CORP.Inventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki