Patents by Inventor Yacov Yacobi

Yacov Yacobi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7062653
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Grant
    Filed: October 28, 2004
    Date of Patent: June 13, 2006
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Patent number: 7058812
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Grant
    Filed: October 28, 2004
    Date of Patent: June 6, 2006
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Patent number: 7047413
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Grant
    Filed: April 23, 2001
    Date of Patent: May 16, 2006
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Patent number: 7020638
    Abstract: An electronic asset system mints a stick of electronic assets that can be spent by the user with multiple vendors. Assets sticks are issued anonymously or non-anonymously in a way without requiring dedication to a particular vendor, hence allowing the user to spend one or more assets from the stick with different vendors. The auditor randomly audit samples of the spent assets to detect whether the assets have been fraudulently used. The electronic asset system employs tamper-resistant electronic wallets constructed as dedicated hardware devices, or as devices with secure-processor architecture. The electronic asset system also facilitates handling of electronic coupons in a manner that enforces compliance between the user and the vendor. The user and vendor each maintain a stick of corresponding coupons with pointers to the most recent and oldest coupons available for expenditure.
    Type: Grant
    Filed: November 29, 1999
    Date of Patent: March 28, 2006
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Paul England
  • Patent number: 6996236
    Abstract: Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized use are described. Encrypted video signals are transmitted from a source device, e.g., display adapter, to a display device, e.g., monitor, over analog signal lines after the identity of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices. The source and destination devices each include a pseudo-random number generator driven by the session key. As part of the encryption process a false video signal is generated. The false video signal and R, G, B video signals are transmitted to the display device over four lines. The lines used to transmit the R, G, B and false video signals are periodically swapped as a function of the output of the pseudo random number generator to encrypt, e.g., scramble, the video signals.
    Type: Grant
    Filed: June 30, 2000
    Date of Patent: February 7, 2006
    Assignee: Microsoft Corporation
    Inventors: Paul England, Andrew D. Rosen, Yacov Yacobi, Gideon A. Yuval
  • Patent number: 6983050
    Abstract: Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized coping. Analog red (R), green (G) and blue (B) video signals are transmitted from a source device, e.g., a display adapter, to a display device, e.g., a monitor, over corresponding analog signal lines after the identify of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices after the identification of the destination device is confirmed. The source and destination devices each includes a pseudo-random number generator driven by the session key. The lines that carry the R, G and S video signals are changed, e.g., swapped, on a periodic basis as a function of the output of the pseudo-random number generator in the source device.
    Type: Grant
    Filed: June 30, 2000
    Date of Patent: January 3, 2006
    Assignee: Microsoft Corporation
    Inventors: Yacov Yacobi, Paul England, Gideon A. Yuval
  • Publication number: 20050207577
    Abstract: Methods and apparatus for protecting copyrighted information, e.g., video signals, from unauthorized use are described. Encrypted video signals are transmitted from a source device, e.g., display adapter, to a display device, e.g., monitor, over analog signal lines after the identity of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices. The source and destination devices each include a pseudo-random number generator driven by the session key. As part of the encryption process a false video signal is generated. The false video signal and R, G, B video signals are transmitted to the display device over four lines. The lines used to transmit the R, G, B and false video signals are periodically swapped as a function of the output of the pseudo random number generator to encrypt, e.g., scramble, the video signals.
    Type: Application
    Filed: May 20, 2005
    Publication date: September 22, 2005
    Applicant: Microsoft Corporation
    Inventors: Paul England, Andrew Rosen, Yacov Yacobi, Gideon Yuval
  • Publication number: 20050195976
    Abstract: System for protecting copyrighted information, e.g., video signals, from unauthorized copying. Analog red (R), green (G) and blue (B) video signals are transmitted from a source device, e.g., a display adapter, to a display device, e.g., a monitor, over corresponding analog signal lines after the identify of the destination device is confirmed by receipt of a certificate assigned to the destination device. A session key, used for encrypting the analog signals, is generated and exchanged between the source and destination devices after the identification of the destination device is confirmed. The source and destination devices each includes a pseudo-random number generator driven by the session key. The lines that carry the R, G and B video signals are changed, e.g., swapped, on a periodic basis as a function of the output of the pseudo-random number generator in the source device.
    Type: Application
    Filed: March 17, 2005
    Publication date: September 8, 2005
    Applicant: Microsoft Corporation
    Inventors: Yacov Yacobi, Paul England, Gideon Yuval
  • Publication number: 20050190914
    Abstract: Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.
    Type: Application
    Filed: February 27, 2004
    Publication date: September 1, 2005
    Inventors: Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon Yuval
  • Publication number: 20050171903
    Abstract: An electronic asset system mints a stick of electronic assets that can be spent by the user with multiple vendors. Assets sticks are issued anonymously or non-anonymously in a way without requiring dedication to a particular vendor, hence allowing the user to spend one or more assets from the stick with different vendors. The auditor randomly audit samples of the spent assets to detect whether the assets have been fraudulently used. The electronic asset system employs tamper-resistant electronic wallets constructed as dedicated hardware devices, or as devices with secure-processor architecture. The electronic asset system also facilitates handling of electronic coupons in a manner that enforces compliance between the user and the vendor. The user and vendor each maintain a stick of corresponding coupons with pointers to the most recent and oldest coupons available for expenditure.
    Type: Application
    Filed: March 23, 2005
    Publication date: August 4, 2005
    Applicant: Microsoft Corporation
    Inventors: Yacov Yacobi, Paul England
  • Publication number: 20050171904
    Abstract: An electronic asset system mints a stick of electronic assets that can be spent by the user with multiple vendors. Assets sticks are issued anonymously or non-anonymously in a way without requiring dedication to a particular vendor, hence allowing the user to spend one or more assets from the stick with different vendors. The auditor randomly audit samples of the spent assets to detect whether the assets have been fraudulently used. The electronic asset system employs tamper-resistant electronic wallets constructed as dedicated hardware devices, or as devices with secure-processor architecture. The electronic asset system also facilitates handling of electronic coupons in a manner that enforces compliance between the user and the vendor. The user and vendor each maintain a stick of corresponding coupons with pointers to the most recent and oldest coupons available for expenditure.
    Type: Application
    Filed: March 23, 2005
    Publication date: August 4, 2005
    Applicant: Microsoft Corporation
    Inventors: Yacov Yacobi, Paul England
  • Publication number: 20050117777
    Abstract: Systems for fingerprinting digital data are described. In one embodiment, a system is configured to form a ? code by defining a plurality of fingerprinting words. Each fingerprinting word is unique and contains at least one spread sequence. Each fingerprinting word contains a plurality of ?-symbols, each ?-symbol containing 2c-1 spread sequences, where c is the number of colluders that are desired to be defended against. The fingerprinting words are structured to permit a collusion analysis to ascertain identities of potential colluders who change an associated fingerprinting word. The individual fingerprinting words are assigned to individual respective entities who constitute potential colluders and serve to identify an entity to which it is assigned.
    Type: Application
    Filed: December 22, 2004
    Publication date: June 2, 2005
    Applicant: Microsoft Corporation
    Inventor: Yacov Yacobi
  • Publication number: 20050111695
    Abstract: Systems for fingerprinting digital data are described. In one embodiment, a system for detecting a fingerprinting word is configured to receive a protected object that has embedded therein a fingerprinting word that contains a plurality of spread spectrum chips that are arranged in individual blocks that define individual spread sequences. The system processes the protected object sufficient to identify an entity that is associated with the fingerprinting word and which comprises a potential colluder. The system is configured to process the protected object by calculating a weight for each block and restricting the weights of certain blocks to a predetermined value.
    Type: Application
    Filed: December 22, 2004
    Publication date: May 26, 2005
    Applicant: Microsoft Corporation
    Inventor: Yacov Yacobi
  • Patent number: 6898706
    Abstract: A technique for imparting substantial break-once-run-everywhere resistance to software objects, and for controlling access and use of resulting protected objects by a client computer. Specifically, a relatively large number of identical watermarks are embedded throughout a software object to form a protected object. Once a user has downloaded a protected object through a client computer, the user transacts with a publishers web server to obtain an electronic license, cryptographically signed by the publisher to an enforcer located in the client computer which specifies rights for accessing and using this object, to this computer and an expected value of a parameter contained in the watermarks. Whenever the client computer attempts to access a file containing the protected object, the enforcer examines the object using its watermark key.
    Type: Grant
    Filed: May 20, 1999
    Date of Patent: May 24, 2005
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Yacov Yacobi
  • Publication number: 20050108541
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Application
    Filed: October 28, 2004
    Publication date: May 19, 2005
    Applicant: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Patent number: 6891958
    Abstract: Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kinds of processing and all types of malicious attacks that attempt to remove or modify the watermark from the signal. The implementations of the watermark detecting system, described herein, support quick, efficient, and accurate detection of watermarks by the specifically designed watermark detecting system. In one described implementation, a watermark detecting system employs an improved normalized covariance test to determine the presence of a watermark using less expensive materials (hardware), quicker calculations, and a more accurate test (than the original correlation test).
    Type: Grant
    Filed: February 27, 2001
    Date of Patent: May 10, 2005
    Assignee: Microsoft Corporation
    Inventors: Darko Kirovski, Yacov Yacobi
  • Publication number: 20050097334
    Abstract: Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kinds of processing and all types of malicious attacks that attempt to remove or modify the watermark from the signal. The implementations of the watermark detecting system, described herein, support quick, efficient, and accurate detection of watermarks by the specifically designed watermark detecting system. In one described implementation, a watermark detecting system employs an improved normalized covariance test to determine the presence of a watermark using less expensive materials (hardware), quicker calculations, and a more accurate test (than the original correlation test).
    Type: Application
    Filed: November 16, 2004
    Publication date: May 5, 2005
    Applicant: Microsoft Corporation
    Inventors: Darko Kirovski, Yacov Yacobi
  • Publication number: 20050097333
    Abstract: Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kinds of processing and all types of malicious attacks that attempt to remove or modify the watermark from the signal. The implementations of the watermark detecting system, described herein, support quick, efficient, and accurate detection of watermarks by the specifically designed watermark detecting system. In one described implementation, a watermark detecting system employs an improved normalized covariance test to determine the presence of a watermark using less expensive materials (hardware), quicker calculations, and a more accurate test (than the original correlation test).
    Type: Application
    Filed: November 5, 2004
    Publication date: May 5, 2005
    Applicant: Microsoft Corporation
    Inventors: Darko Kirovski, Yacov Yacobi
  • Publication number: 20050086485
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Application
    Filed: October 28, 2004
    Publication date: April 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski
  • Publication number: 20050086487
    Abstract: An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish.
    Type: Application
    Filed: October 28, 2004
    Publication date: April 21, 2005
    Applicant: Microsoft Corporation
    Inventors: Yacov Yacobi, Henrique Malvar, Darko Kirovski