Patents by Inventor Yacov Yacobi

Yacov Yacobi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090287648
    Abstract: The claimed subject matter provides systems and methods that controls fraud and/or generates revenue. The system can upload media content to a generator that produces a digital certificate that includes a short identifier associated with the content. The system further sends the media content together with the digital certificate associated with the media content to a server that forwards the short identifier to a database engine which in return supplies the server with details associated with the producer of the content. At the request of a playback device the server can download the content to the playback device, at which point the playback device notifies the server to effectuate payment for utilization of the downloaded content by the playback device.
    Type: Application
    Filed: May 14, 2008
    Publication date: November 19, 2009
    Applicant: Microsoft Corporation
    Inventor: Yacov Yacobi
  • Patent number: 7580526
    Abstract: Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized use are described. Encrypted video signals are transmitted from a source device, e.g., display adapter, to a display device, e.g., monitor, over analog signal lines after the identity of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices. The source and destination devices each include a pseudo-random number generator driven by the session key. As part of the encryption process a false video signal is generated. The false video signal and R, G, B video signals are transmitted to the display device over four lines. The lines used to transmit the R, G, B and false video signals are periodically swapped as a function of the output of the pseudo random number generator to encrypt, e.g., scramble, the video signals.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: August 25, 2009
    Assignee: Microsoft Corporation
    Inventors: Paul England, Andrew D. Rosen, Yacov Yacobi, Gideon A. Yuval
  • Patent number: 7558959
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Grant
    Filed: October 28, 2004
    Date of Patent: July 7, 2009
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Publication number: 20090119215
    Abstract: Systems and methods that supply a fair transaction when a user (e.g., buyer) obtains digital content that is ordered from a merchant. A trusted component associated with a device of a user can compute a cryptographic hash value for the digital content (e.g., during a download thereof), wherein such hash value cannot be altered (e.g., tampered) by the user. Accordingly, the subject innovation implements a trusted agent on a user's device, wherein such agent itself can further be downloaded to the user device as part of the transaction.
    Type: Application
    Filed: November 7, 2007
    Publication date: May 7, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Yuqun Chen, Yacov Yacobi
  • Publication number: 20090068982
    Abstract: The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a portion of data related to a payment for at least one of a good or a service. A mobile device can include at least one mobile payment card (m-card), wherein the m-card is created by establishing a link to an account associated with a form of currency. The mobile device can employ public-key cryptography (PKC) to securely and wirelessly transmit a payment to the terminal component utilizing the m-card and linked account.
    Type: Application
    Filed: September 10, 2007
    Publication date: March 12, 2009
    Inventors: Yuqun Chen, Mohammed Moinuddin, Yacov Yacobi
  • Patent number: 7497379
    Abstract: Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.
    Type: Grant
    Filed: February 27, 2004
    Date of Patent: March 3, 2009
    Assignee: Microsoft Corporation
    Inventors: Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon A. Yuval
  • Patent number: 7480802
    Abstract: A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (400). Specifically, a relatively large number, n, of identical watermarks (1720) are embedded throughout a software object (1700), through use of n different secret watermark keys to form a protected object, with each key defining a pointer to a location in the protected object at which a corresponding watermark appears.
    Type: Grant
    Filed: March 13, 2006
    Date of Patent: January 20, 2009
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Yacov Yacobi
  • Patent number: 7460683
    Abstract: Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kinds of processing and all types of malicious attacks that attempt to remove or modify the watermark from the signal. The implementations of the watermark detecting system, described herein, support quick, efficient, and accurate detection of watermarks by the specifically designed watermark detecting system. In one described implementation, a watermark detecting system employs an improved normalized covariance test to determine the presence of a watermark using less expensive materials (hardware), quicker calculations, and a more accurate test (than the original correlation test).
    Type: Grant
    Filed: November 16, 2004
    Date of Patent: December 2, 2008
    Assignee: Microsoft Corporation
    Inventors: Darko Kirovski, Yacov Yacobi
  • Patent number: 7457430
    Abstract: Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kinds of processing and all types of malicious attacks that attempt to remove or modify the watermark from the signal. The implementations of the watermark detecting system, described herein, support quick, efficient, and accurate detection of watermarks by the specifically designed watermark detecting system. In one described implementation, a watermark detecting system employs an improved normalized covariance test to determine the presence of a watermark using less expensive materials (hardware), quicker calculations, and a more accurate test (than the original correlation test).
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: November 25, 2008
    Assignee: Microsoft Corporation
    Inventors: Darko Kirovski, Yacov Yacobi
  • Patent number: 7362861
    Abstract: Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized copying. Analog red (R), green (G) and blue (B) video signals are transmitted from a source device, e.g., a display adapter, to a display device, e.g., a monitor, over corresponding analog signal lines after the identify of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices after the identification of the destination device is confirmed. The source and destination devices each includes a pseudo-random number generator driven by the session key. The lines that carry the R, G and B video signals are changed, e.g., swapped, on a periodic basis as a function of the output of the pseudo-random number generator in the source device.
    Type: Grant
    Filed: May 26, 2004
    Date of Patent: April 22, 2008
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Paul England, Gideon A. Yuval
  • Publication number: 20070297610
    Abstract: A network-based data protection scheme for a mobile device utilizes encryption techniques and a remote key server that stores encryption keys on behalf of the mobile device. The mobile device stores encrypted data, preferably having no unencrypted counterpart stored therewith. On an as-needed basis, the mobile device requests a decryption key (or an encrypted version of a decryption key) from the key server, where the decryption key can be used by the mobile device to decrypt the encrypted information. The key server transmits the decryption key to the mobile device after authenticating the user of the mobile device.
    Type: Application
    Filed: June 23, 2006
    Publication date: December 27, 2007
    Applicant: Microsoft Corporation
    Inventors: Yuqun Chen, Zicheng Liu, Mariusz H. Jakubowski, Yacov Yacobi
  • Publication number: 20070269040
    Abstract: This document describes tools that enable secure communication between devices that are within a user's common control. These commonly controlled devices may follow a protocol, for example, where each commits to its own public key and receives a commitment of the other's public key, publishes its own public key and receives the other's public key, and authenticates the other's public key based on the received commitment of the other's public key. If authentic, each device computes an identifier based on the other's public key and its own private key associated with its own public key. A user may interact with the devices to confirm that the identifiers are the same. If they are the same, the devices may communicate securely.
    Type: Application
    Filed: May 16, 2006
    Publication date: November 22, 2007
    Applicant: Microsoft Corporation
    Inventors: Gideon A. Yuval, Peter E.H. Hauser, Yacov Yacobi, Daniel R. Simon, Joby S. Lafky
  • Patent number: 7222232
    Abstract: A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (400). Specifically, a relatively large number, n, of identical watermarks (1720) are embedded throughout a software object (1700), through use of n different secret watermark keys to form a protected object, with each key defining a pointer to a location in the protected object at which a corresponding watermark appears.
    Type: Grant
    Filed: October 20, 2004
    Date of Patent: May 22, 2007
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Yacov Yacobi
  • Publication number: 20070086586
    Abstract: A computer-implemented system and method for configuring and operating a white-box cipher is disclosed. In one implementation, the system employs a method for configuring pseudorandom data derived from a key to perform key-scheduling functionality associated with rounds of the cipher. Additionally, the system employs a method for generating white-box executable code, wherein the code hides the pseudorandom data by incorporating it into mathematical operations performed during execution of the rounds. Accordingly, the cipher is suited for white-box applications managing digital rights, such as decoding audio, video and other content.
    Type: Application
    Filed: October 14, 2005
    Publication date: April 19, 2007
    Applicant: Microsoft Corporation
    Inventors: Mariusz Jakubowski, Ramarathnam Venkatesan, Gideon Yuval, Yacov Yacobi, Matthew Cary
  • Patent number: 7200244
    Abstract: Systems for fingerprinting digital data are described. In one embodiment, a system is configured to form a ? code by defining a plurality of fingerprinting words. Each fingerprinting word is unique and contains at least one spread sequence. Each fingerprinting word contains a plurality of ?-symbols, each ?-symbol containing 2c?1 spread sequences, where c is the number of colluders that are desired to be defended against. The fingerprinting words are structured to permit a collusion analysis to ascertain identities of potential colluders who change an associated fingerprinting word. The individual fingerprinting words are assigned to individual respective entities who constitute potential colluders and serve to identify an entity to which it is assigned.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: April 3, 2007
    Assignee: Microsoft Corporation
    Inventor: Yacov Yacobi
  • Publication number: 20070061580
    Abstract: A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (400). Specifically, a relatively large number, n, of identical watermarks (1720) are embedded throughout a software object (1700), through use of n different secret watermark keys to form a protected object, with each key defining a pointer to a location in the protected object at which a corresponding watermark appears.
    Type: Application
    Filed: March 13, 2006
    Publication date: March 15, 2007
    Applicant: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Yacov Yacobi
  • Patent number: 7177442
    Abstract: Methods and systems for fingerprinting digital data are described. In the described embodiment, Direct Sequence Spread Spectrum (DSSS) technology is utilized. Unique fingerprinting words are defined where each includes at least one spread sequence. In one embodiment, a fingerprinting word comprises a plurality symbols, called “? symbols.” Each ? symbol is composed of 2c-1 blocks, where c represents the number of colluders that are desired to be protected against. Each block contains d spread sequence chips. The fingerprinting words are assigned to a plurality of entities to which protected objects embedded with the fingerprinting words are to be distributed. To ascertain the identity of an entity that has altered its unique fingerprinting word, the relative weight of each block is computed in accordance with a defined function and blocks whose weights satisfy a predetermined relationship are “clipped” to a so-called working range.
    Type: Grant
    Filed: September 29, 2003
    Date of Patent: February 13, 2007
    Assignee: Microsoft Corporation
    Inventor: Yacov Yacobi
  • Patent number: 7158655
    Abstract: Systems for fingerprinting digital data are described. In one embodiment, a system for detecting a fingerprinting word is configured to receive a protected object that has embedded therein a fingerprinting word that contains a plurality of spread spectrum chips that are arranged in individual blocks that define individual spread sequences. The system processes the protected object sufficient to identify an entity that is associated with the fingerprinting word and which comprises a potential colluder. The system is configured to process the protected object by calculating a weight for each block and restricting the weights of certain blocks to a predetermined value.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: January 2, 2007
    Assignee: Microsoft Corporation
    Inventor: Yacov Yacobi
  • Patent number: 7096364
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Grant
    Filed: October 28, 2004
    Date of Patent: August 22, 2006
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Patent number: 7080249
    Abstract: Cyclic verification of code integrity is applied to an object by identifying multiple segments of the object. Each segment is separated into multiple blocks, and a message authentication code (MAC) value of each of these segments is computed. The computed module MAC values are then incorporated into selected ones of the multiple segments (referred to here as “checker segments”), which may also have their MAC values incorporated into other checker segments. A new MAC value for each of the checker segments is then calculated. A new block is added to each of the checker segments that results in restoring the MAC value of the checker segment back to its original value. Thus, the checker segments can be subsequently verified based on the MAC values stored in other segments.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: July 18, 2006
    Assignee: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi