Bjorn Markus Jakobsson - Hoboken NJ, US Michael Kendrick Reiter - Raritan NJ, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/00 H04L 9/32 G06F 11/30 G06F 12/14
US Classification:
380 45, 726 26
Abstract:
A software program is configured in accordance with a software aging process such that one or more files generated by the program are at least partially encrypted using a cryptographic key associated with a current time interval for which the files are generated. The cryptographic key may be a symmetric key used for both encryption and decryption operations, such that cryptographic key used for encryption in a given interval is also required to decrypt files encrypted during that interval. Periodic updates of the software program are provided to a legitimate user of the software program, with a given one of the updates including a different cryptographic key associated with a subsequent time interval. The cryptographic key associated with a particular one of the time intervals may be common to each of a set of legitimate copies of the software program that have received the corresponding version of the periodic update. The variation of the cryptographic keys from one interval to another discourages unauthorized use of the software program by deliberately requiring both legitimate and illegitimate users to request unusually frequent updates, thereby substantially increasing the tracing and prosecution risks borne by software pirates.
Methods And Apparatus For Providing Privacy-Preserving Global Customization
Robert M. Arlein - Maplewood NJ, US Ben Jai - Scotch Plains NJ, US Bjorn Markus Jakobsson - Hoboken NJ, US Fabian Monrose - New York NY, US Michael Kendrick Reiter - Raritan NJ, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
G06F 17/30
US Classification:
707 9, 707 10, 709203, 709219, 705 26
Abstract:
Techniques and infrastructure are provided for supporting global customization. The invention enables persona profiles of user information to be maintained, and such persona profiles to be accessed by merchants. Via the persona abstraction, users control what information is grouped into a persona profile, and can selectively enable a merchant to read one of these profiles. The infrastructure of the invention employs a persona server that assists users in managing their personae. The infrastructure of the invention separates this from the profile databases at which persona profile information is stored, to eliminate any single point at which different persona profiles can be tied to the same user. Since merchants also have privacy concerns, the infrastructure of the invention provides a data protection model based on tainting, by which merchants can limit how the information they contribute can be exposed.
Methods And Apparatus For Providing Networked Cryptographic Devices Resilient To Capture
Techniques are provided by which a device that performs private key operations (e. g. , signatures or decryptions) in networked applications, and whose local private key is activated with, for example, a password or PIN, can be immunized to offline dictionary attacks in case the device is captured. The techniques do not assume tamper resistance of the device, but rather exploit the networked nature of the device, in that the device's private key operations are performed using a simple interaction with a remote server. This server, however, is untrusted, i. e. , its compromise does not reduce the security of the device's private key unless the device is also captured, and need not have a prior relationship with the device. Techniques are also provided for supporting key disabling, by which the rightful owner of a stolen device can disable the device's private key even if the attacker already knows the user's password.
Methods And Apparatus For Delegation Of Cryptographic Servers For Capture-Resilient Devices
Philip D. MacKenzie - Maplewood NJ, US Michael Kendrick Reiter - Pittsburgh PA, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 9/00
US Classification:
713150
Abstract:
Improved cryptographic techniques are provided by which a device that performs private key operations (e. g. , signatures and/or decryptions), and whose private key operations are protected by a password, is immunized against offline dictionary attacks in case of capture by forcing the device to confirm a password guess with a designated entity or party in order to perform a private key operation, and by which the initiating device may dynamically delegate the password-checking function (i. e. , confirmation of the password guess) from the originally designated entity or party to another designated entity or party.
Methods And Apparatus For Two-Party Generation Of Dsa Signatures
Philip MacKenzie - Maplewood NJ, US Michael Reiter - Pittsburgh PA, US
International Classification:
H04L009/00
US Classification:
380/028000, 713/180000
Abstract:
Techniques are provided for sharing the DSA signature function, so that two parties can efficiently generate a DSA signature with respect to a given public key but neither can alone. In an illustrative embodiment, the invention provides a DSA signature protocol that allows a proof of security for concurrent execution in the random oracle model. The invention also allows a proof of security for sequential execution without random oracles.
Method And Apparatus For Simultaneous Electronic Exchange Using A Semi-Trusted Third Party
Matthew Keith Franklin - New York NY Michael Kendrick Reiter - Raritan NJ
Assignee:
AT&T Corp. - New York NY
International Classification:
H04L 900
US Classification:
713167
Abstract:
A method and apparatus for fairly exchanging documents. A first document is shared between principal Y and third party Z. A second document is shared between principal X and third party Z. Z verifies that the sharing of the first and second documents has been performed correctly without Z understanding either document. If verified, Z sends its shares of the first and second documents to Y and X, respectively. X and Y verify that Z's shares are authentic.
Matthew K. Franklin - New York NY Michael K. Reiter - Raritan NJ
Assignee:
AT&T Corporation - New York NY
International Classification:
G06F 1900 H04L 900
US Classification:
705 37
Abstract:
The apparatus and method of the present invention provide secure auction service for use in a network having servers and bidding terminals. The auction service makes transactions among servers and bidding terminals subject to a distributed protocol. The distributed protocol distributes submitted bids among the multiple servers, closes a bidding period, verifies validity of monetary value of each submitted bid by utilizing said distributed protocol and determines a winning bidder.
Isbn (Books And Publications)
Potsdam Kunst Und Kultur: Eine Bestandsaufnahme Im Rahmen Der Kulturentwicklungsplanung
Internal Medicine Cardiovascular Disease Clinical Cardiac Electrophysiology
Education:
Stony Brook University (1975)
Name / Title
Company / Classification
Phones & Addresses
Michael Reiter Chairman of the Board, Chb
BULLDOG CONSULTING, INC Business Consulting Services
340 Webster Ave 5K, Brooklyn, NY 11230 340 Webster Ave, Brooklyn, NY 11230
Michael Reiter Vice-President
East Central Iowa Corp Membership Organization
1750 Broadway St, Waterloo, IA 50703
Michael Reiter President, V, Pres-mbr, Vice-President
AMERICAN REALTY CAPITAL PROPERTIES, INC Real Estate Agent/Manager · Real Estate Investment Trust · Trusts Nec · Investment Advisory Service · Real Estate Investment Trusts · Real Estate Investment Trusts, Nsk · Trust Management · Hotel/Motel Operation
405 Park Ave, New York, NY 10022 106 York Rd, Meadowbrook, PA 19046 1065 Ave Of The Amer F, New York, NY 10018
Raritan Valley Community College 2011 - 2012
New Jersey Cosmetology/Barbering License, Cosmetology, Barber/Styling, and Nail Instructor
Rowan University 1998 - 2002
Bachelors in Business Administration, Marketing & Advertising
Skills:
Recruiting Program Management Account Management Sourcing Marketing New Business Development Management Advertising Sales Budgets Interviews Product Development
Michael Reiter, Attorney at Law at Michael Reiter, Attorney at Law
Location:
Redlands, California
Industry:
Law Practice
Work:
Michael Reiter, Attorney at Law - Redlands, California since Jul 2010
Michael Reiter, Attorney at Law
City of Redlands - City Attorney's Office, Redlands, California Jan 2006 - Jun 2010
Assistant City Attorney
City of San Bernardino - City Attorney's Office, City of San Bernardino Feb 2001 - Jan 2006
Deputy City Attorney
Legal Aid Society of San Bernardino, Inc. - San Bernardino Apr 1999 - Feb 2001
Attorney
Education:
Santa Clara University School of Law 1995 - 1998
J.D., Law
University of California, Berkeley 1992 - 1995
A.B., History
Interests:
Municipal Law, Code Enforcement Law, Personal Injury Law, Small Business Law
Languages:
English
Certifications:
Attorney, Licensed in the State of California, State Bar of California Admitted to the United States District Court, Central District of California, United States District Court, Central District of California Admitted to the Ninth Circuit Court of Appeals, Ninth Circuit Court of Appeals
Former Palm Beach police chief Michael Reiter, whose department conducted the initial investigation into Epsteins behavior, said in a deposition that Acostas decision not to prosecute wasnt an appropriate resolution of this matter.
Date: Dec 04, 2018
Category: Headlines
Source: Google
Billionaire perv amassed network of underage girls
This was not a he said, she said situation. This was 50-something shes and one he and all the shes basically told the same story, former Palm Beach police chief Michael Reiter told the Herald.