Matthew A. Blaze - New York NY John Ioannidis - New York NY Angelos Keromytis - Philadelphia PA
Assignee:
ATT Corp. - New York NY
International Classification:
G06F 1760
US Classification:
705 64, 705 75
Abstract:
The present invention provides a microbilling system that integrates with existing billing systems and existing devices. In a preferred embodiment of the invention, the devices store digital certificates with short-lived expiration dates and specifying transaction limits, preferably using a trust management system. A provisioning agent periodically (e. g. , once a day) issues the certificates over a secure channel to the devices. When conducting a purchase transaction, the devices exchange certificates via a communication channel (that need not be secure) and the purchasing device issues a digitally signed electronic check which is periodically deposited over an advantageously secure channel with a clearing service. The present invention enables microbilling transactions by embedding liability in the certificates.
Matthew A. Blaze - New York NY, US John Ioannidis - New York NY, US Angelos Keromytis - Philadelphia PA, US
Assignee:
AT&T Corp. - New York NY
International Classification:
H04K 1/00 G06F 17/60
US Classification:
705 64, 705 67
Abstract:
The present invention provides a microbilling system that integrates with existing billing systems and existing devices. In a preferred embodiment of the invention, the devices store digital certificates with short-lived expiration dates and specifying transaction limits, preferably using a trust management system. A provisioning agent periodically (e. g. , once a day) issues the certificates over a secure channel to the devices. When conducting a purchase transaction, the devices exchange certificates via a communication channel (that need not be secure) and the purchasing device issues a digitally signed electronic check which is periodically deposited over an advantageously secure channel with a clearing service. The present invention enables microbilling transactions by embedding liability in the certificates.
Matthew A. Blaze - New York NY, US John Ioannidis - New York NY, US Angelos Keromytis - Philadelphia PA, US
Assignee:
AT&T Intellectual Property II, LP - Atlanta GA
International Classification:
H04K 1/00 G06F 17/60
US Classification:
705 64, 705 67
Abstract:
The present invention provides a microbilling system that integrates with existing billing systems and existing devices. In a preferred embodiment of the invention, the devices store digital certificates with short-lived expiration dates and specifying transaction limits, preferably using a trust management system. A provisioning agent periodically (e. g. , once a day) issues the certificates over a secure channel to the devices. When conducting a purchase transaction, the devices exchange certificates via a communication channel (that need not be secure) and the purchasing device issues a digitally signed electronic check which is periodically deposited over an advantageously secure channel with a clearing service. The present invention enables microbilling transactions by embedding liability in the certificates.
Method And Apparatus For Compliance Checking In A Trust-Management System
Matthew Blaze - New York NY, US Joan Feigenbaum - New York NY, US Martin Strauss - Summit NJ, US
International Classification:
G06F017/60
US Classification:
705/035000, 705/036000
Abstract:
A method and apparatus are provided for compliance checking in a trust-management system. A request r, a policy assertion (ƒ, POLICY), and n-1 credential assertions (ƒ, s) . . . , (ƒ, s) are received, each credential assertion comprising a credential function ƒand a credential source s. Each assertion may be monotonic, authentic, and locally bounded. An acceptance record set S is initialized to {( , , R)}, where represents a distinguished null string, and R represents the request r. Each assertion (ƒ, s), where i represents the integers from n-1 to 0, is run and the result is added to the acceptance record set S. This is repeated mn times, where m represents a number greater than and an acceptance is output if any of the results in the acceptance record set S comprise an acceptance record (0, POLICY, R).
System And Method For Constructing A Cryptographic Pseudo Random Bit Generator
A pseudo-random bit generator using at least one N-round Feistel construction that uses random functions. A block of data is permuted and divided into a stream word and a modification word. The stream word is used to build the pseudo-random bitstream. The modification word is used to modify a selected element of a random function used in a Feistel construction. When a single Feistel construction is used, its random functions are dynamically changed by the modification words as they are generated. When a plurality of Feistel constructions are used, the random functions of a selected inactive construction are modified by modification words generated by an active construction. When all of the elements of all of the functions of the inactive construction have been modified, the active and inactive functions are exchanged.
High-Bandwidth Encryption System With Low-Bandwidth Cryptographic Modules
A cryptographic system enables a secure, but low-bandwidth, cryptographic module, such as a smartcard or PCMCIA device, to serve as a high-bandwidth secret-key encryption decryption engine which uses the processing power of an untrusted, but fast, host processor without revealing the secret key to that host processor.
An efficient block cipher that operates on blocks of arbitrarily large size. A block is permuted by recursively using relatively small random functions in an N-round Feistel construction, where N is an integer. The security of the invention is closely related to the difficulty of solving the Numerical Matching with Target Sums problem, an NP Complete problem which cannot presently be solved analytically using known mathematical techniques. The memory required for the cipher's random functions increases linearly with block size, rather than exponentially as with known Feistel constructions. The invention can be efficiently and practically implemented in software at speeds comparable to the speeds of known ciphers.
Translation Indicator For Database-Queried Communications Services
A communications system is arranged to route a database-queried call (900-number or 800-number call) to a subscriber (pay-per-call sponsor or 800-number customer), and to deliver to the subscriber information identifying the call as a database-queried call, as opposed to a switched-line or POTS call.
Matt Blaze is a researcher in the areas of secure systems, cryptography, and trust management. He is currently an Associate Professor of Computer and ...
Youtube
Its 2019 and Special Agent Johnny Still Cant ...
In 2011, we published Why (Special Agent) Johnny (still) Can't Encrypt...
Duration:
24m 23s
DEF CON 25 Wifi Village - Matt Blaze - Sigin...
Practical weaknesses on P25 radio encryption, and how we exploited them.
Duration:
1h 5m 54s
The Metadata is the Message Matt Blaze
Sharing Shmoocon 2017 videos on YouTube. Hopefully to help reduce some...
Duration:
52m 17s
DEF CON 20 - Sandy Clark and Matt Blaze - SIG...
SIGINT and Traffic Analysis for the Rest of Us Sandy Clark University ...
Duration:
47m 41s
US Congressional Meeting (Apr/29/2015): Matt ...
This is a recording of a small part of the US Congressional Meeting ba...
Duration:
5m 30s
Matthew Rocklin - Blaze Foundations Part 1
PyData NYC 2014 Blaze is a NumPy/Pandas interface to big data systems ...
"They're in an arms race," said Matthew Blaze, a cryptography researcher and professor at the University of Pennsylvania. "The FBI is trying to find new ways in and Apple is trying to find new ways to defend against that."
Date: Mar 29, 2016
Source: Google
NSA documents say cellphone encryption easily bypassed
"If the NSA knows how to do this, presumably other intelligence agencies, which may be more hostile to the United States, have discovered how to do this, too," said Matthew Blaze, a cryptology expert at the University of Pennsylvania.
Date: Dec 14, 2013
Category: Sci/Tech
Source: Google
By cracking cellphone code, NSA has capacity for decoding private conversations
Matthew Blaze, a University of Pennsylvania cryptology expert, said the weakness of A5/1 encryption is a pretty sweeping, large vulnerability that helps the NSA listen to cellphone calls overseas and likely also allows foreign governments to listen to the calls of Americans.
Date: Dec 13, 2013
Category: Sci/Tech
Source: Google
Trying to Keep Your E-Mails Secret When the CIA Chief Couldn't
Understanding the threat is always the most difficult part of security technology, said Matthew Blaze, an associate professor of computer and information science at the University of Pennsylvania and a security and cryptography specialist. If they believed the threat to be a government with the a