Michael Kendrick Reiter - Raritan NJ Stuart Gerald Stubblebine - Lebanon NJ
Assignee:
ATT Corp. - New York NY
International Classification:
H04L 1222
US Classification:
713156, 713201, 713157, 709238
Abstract:
A name-to-target binding system generates certificates for use in authenticating a target key. In the system the certificate includes a first key. At least one attribute is assigned to the first key. A liability value is assigned to the combination of the first key and the at least one attribute. The system includes a second key used to sign a combination of the first key, the at least one attribute and the liability value wherein the second key is associated with the insurer agreeing to be liable for the liability value.
Generation Of Repeatable Cryptographic Key Based On Varying Parameters
Philip L. Bohannon - Piscataway NJ, US Bjorn Markus Jakobsson - Hoboken NJ, US Fabian Monrose - New York NY, US Michael Kendrick Reiter - Raritan NJ, US Susanne Gudrun Wetzel - New Providence NJ, US
A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e. g. keystroke dynamics) the keystroke is entered.
Software Aging Method And Apparatus For Discouraging Software Piracy
Bjorn Markus Jakobsson - Hoboken NJ, US Michael Kendrick Reiter - Raritan NJ, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/00 H04L 9/32 G06F 11/30 G06F 12/14
US Classification:
380 45, 726 26
Abstract:
A software program is configured in accordance with a software aging process such that one or more files generated by the program are at least partially encrypted using a cryptographic key associated with a current time interval for which the files are generated. The cryptographic key may be a symmetric key used for both encryption and decryption operations, such that cryptographic key used for encryption in a given interval is also required to decrypt files encrypted during that interval. Periodic updates of the software program are provided to a legitimate user of the software program, with a given one of the updates including a different cryptographic key associated with a subsequent time interval. The cryptographic key associated with a particular one of the time intervals may be common to each of a set of legitimate copies of the software program that have received the corresponding version of the periodic update. The variation of the cryptographic keys from one interval to another discourages unauthorized use of the software program by deliberately requiring both legitimate and illegitimate users to request unusually frequent updates, thereby substantially increasing the tracing and prosecution risks borne by software pirates.
Methods And Apparatus For Providing Privacy-Preserving Global Customization
Robert M. Arlein - Maplewood NJ, US Ben Jai - Scotch Plains NJ, US Bjorn Markus Jakobsson - Hoboken NJ, US Fabian Monrose - New York NY, US Michael Kendrick Reiter - Raritan NJ, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
G06F 17/30
US Classification:
707 9, 707 10, 709203, 709219, 705 26
Abstract:
Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.
Methods And Apparatus For Providing Networked Cryptographic Devices Resilient To Capture
Techniques are provided by which a device that performs private key operations (e. g. , signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i. e. , its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.
Backoff Protocols And Methods For Distributed Mutual Exclusion And Ordering
Michael Kendrick Reiter - Raritan NJ, US Gregory Chockler - Zur Hadassa, IL Dahlia Malkhi - Jerusalem, IL
Assignee:
Lucent Technologies Inc. - Murray Hill NJ Hebrew University - Jerusalem
International Classification:
G06F 15/16 G06F 15/173 G06F 15/167
US Classification:
709229, 709226
Abstract:
A system for and method of implementing a backoff protocol and a computer network incorporating the system or the method. In one embodiment, the system includes: (1) a client subsystem that generates a request for access to a shared resource and (2) a server subsystem that receives the request, returns a LOCKED indicator upon an expectation that the shared resource is unavailable and otherwise returns a FREE indicator, the client subsystem responding to the LOCKED indicator by waiting before regenerating the request for the access.
Methods And Apparatus For Delegation Of Cryptographic Servers For Capture-Resilient Devices
Philip D. MacKenzie - Maplewood NJ, US Michael Kendrick Reiter - Pittsburgh PA, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/00
US Classification:
713150
Abstract:
Improved cryptographic techniques are provided by which a device that performs private key operations (e. g. , signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i. e. , confirmation of the password guess) from the originally designated entity or party to another designated entity or party.
Method For Providing Authentication Assurance In A Key-Binding System
Michael Reiter - Raritan NJ, US Stuart Stubblebine - Lebanon NJ, US
International Classification:
G06F017/60
US Classification:
705/076000
Abstract:
A name-to-target binding system generates certificates for use in authenticating a target key. In the system the certificate includes a first key. At least one attribute is assigned to the first key. A liability value is assigned to the combination of the first key and the at least one attribute. The system includes a second key used to sign a combination of the first key, the at least one attribute and the liability value wherein the second key is associated with the insurer agreeing to be liable for the liability value.
Isbn (Books And Publications)
Potsdam Kunst Und Kultur: Eine Bestandsaufnahme Im Rahmen Der Kulturentwicklungsplanung
Internal Medicine Cardiovascular Disease Clinical Cardiac Electrophysiology
Education:
Stony Brook University (1975)
Name / Title
Company / Classification
Phones & Addresses
Michael Reiter Chairman of the Board, Chb
BULLDOG CONSULTING, INC Business Consulting Services
340 Webster Ave 5K, Brooklyn, NY 11230 340 Webster Ave, Brooklyn, NY 11230
Michael Reiter President, V, Pres-mbr, Vice-President
AMERICAN REALTY CAPITAL PROPERTIES, INC Real Estate Agent/Manager · Real Estate Investment Trust · Trusts Nec · Investment Advisory Service · Real Estate Investment Trusts · Real Estate Investment Trusts, Nsk · Trust Management · Hotel/Motel Operation
405 Park Ave, New York, NY 10022 106 York Rd, Meadowbrook, PA 19046 1065 Ave Of The Amer F, New York, NY 10018
Raritan Valley Community College 2011 - 2012
New Jersey Cosmetology/Barbering License, Cosmetology, Barber/Styling, and Nail Instructor
Rowan University 1998 - 2002
Bachelors in Business Administration, Marketing & Advertising
Skills:
Recruiting Program Management Account Management Sourcing Marketing New Business Development Management Advertising Sales Budgets Interviews Product Development
Michael Reiter, Attorney at Law at Michael Reiter, Attorney at Law
Location:
Redlands, California
Industry:
Law Practice
Work:
Michael Reiter, Attorney at Law - Redlands, California since Jul 2010
Michael Reiter, Attorney at Law
City of Redlands - City Attorney's Office, Redlands, California Jan 2006 - Jun 2010
Assistant City Attorney
City of San Bernardino - City Attorney's Office, City of San Bernardino Feb 2001 - Jan 2006
Deputy City Attorney
Legal Aid Society of San Bernardino, Inc. - San Bernardino Apr 1999 - Feb 2001
Attorney
Education:
Santa Clara University School of Law 1995 - 1998
J.D., Law
University of California, Berkeley 1992 - 1995
A.B., History
Interests:
Municipal Law, Code Enforcement Law, Personal Injury Law, Small Business Law
Languages:
English
Certifications:
Attorney, Licensed in the State of California, State Bar of California Admitted to the United States District Court, Central District of California, United States District Court, Central District of California Admitted to the Ninth Circuit Court of Appeals, Ninth Circuit Court of Appeals
Raritan Valley Community College 2011 - 2012
New Jersey Cosmetology/Barbering License, Cosmetology, Barber/Styling, and Nail Instructor
Rowan University 1998 - 2002
Bachelors in Business Administration, Marketing & Advertising
Skills:
Recruiting Program Management Account Management Sourcing Marketing New Business Development Management Advertising Sales Budgets Interviews Product Development
Former Palm Beach police chief Michael Reiter, whose department conducted the initial investigation into Epsteins behavior, said in a deposition that Acostas decision not to prosecute wasnt an appropriate resolution of this matter.
Date: Dec 04, 2018
Category: Headlines
Source: Google
Billionaire perv amassed network of underage girls
This was not a he said, she said situation. This was 50-something shes and one he and all the shes basically told the same story, former Palm Beach police chief Michael Reiter told the Herald.