Mark I. Greene - Penn Valley PA Ramachandran Murali - Drexel Hill PA Kazuhiro Aoki - Narashino, JP William Carle Horne - Branford CT Roland Baron - Guilford CT
Assignee:
The Trustees of the University of Pennsylvania - Philadelphia PA
Methods of inhibiting osteoclastogenesis and the activity of osteoclasts are disclosed. Methods of treating patients who have diseases characterized bone loss are disclosed. The present invention also provides peptides and peptide analogues designed from a binding loop of a member of the tumor necrosis factor receptor (TNF-R) superfamily. According to the methods, an amount of an inhibitor effective to inhibit osteoclastogenesis is administered to the patient. Methods of modulating dendritic cell maturation, T cell proliferation, and/or CD40 receptor systems in an individual are disclosed. The methods comprise the step of administering to the individual an amount of an inhibitor effective to modulating dendritic cell maturation, T cell proliferation, and/or CD40 receptor systems.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/00
US Classification:
705 75, 713168, 380277
Abstract:
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 9/32 B42D 15/00 H04N 1/40
US Classification:
713176, 283113, 358 328
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 G06F 11/30 G06F 12/14
US Classification:
713176, 713189
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Systems And Methods For Conducting Transactions And Communications Using A Trusted Third Party
Binyamin Pinkas - Jersey City NJ, US Tomas Sander - New York NY, US William G. Horne - Lawrenceville NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
G06Q 40/00
US Classification:
705 75, 707747, 713168, 380277
Abstract:
Systems and methods are provided for managing the transfer of electronic files. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. The receiver computes a hash of the encrypted file, and sends it to a trusted third party. The trusted third party compares the hash that was computed by the receiver with another hash computed by the sender. If the two hashes match, the third party sends the file decryption key to the receiver. In some embodiments, the receiver may also send the third party payment information so that the sender, the content owner, and/or the third party can be paid for their role in the transaction. In a preferred embodiment, the payment information is only sent to, and/or used by, the third party once the third party has confirmed to the satisfaction of the receiver that the encrypted file in the receiver's possession will decrypt correctly. In some embodiments, the sender computes a hash of the encrypted version of the file and sends it directly to the third party.
Systems And Methods For Watermarking Software And Other Media
William G. Horne - Lawrenceville NJ, US Umesh Maheshwari - San Jose CA, US Robert E. Tarjan - Princeton NJ, US James J. Horning - Palo Alto CA, US W. Olin Sibert - Lexington MA, US Lesley R. Matheson - Campbell CA, US Andrew K. Wright - Monroe Township NJ, US Susan S. Owicki - Palo Alto CA, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32 G06F 9/44 H04N 1/40 B42D 15/00
US Classification:
713176, 717114, 358 328, 283113
Abstract:
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.
Stuart Haber - New York NY, US William G. Horne - Lawrenceville NJ, US Tomas Sander - New York NY, US Danfeng Yao - West Lafayette IN, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/32 H04L 29/06
US Classification:
713176, 713150, 713168, 713175, 713177
Abstract:
One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
William G. Horne - Lawrenceville NJ, US Lesley R. Matheson - Discovery Bay CA, US Casey Sheehan - Hollister CA, US Robert E. Tarjan - Princeton NJ, US
Assignee:
Intertrust Technologies Corporation - Sunnyvale CA
International Classification:
H04L 9/32
US Classification:
713187, 713176, 726 26
Abstract:
Software self-checking mechanisms are described for improving software tamper resistance and/or reliability. Redundant tests are performed to detect modifications to a program while it is running. Modifications are recorded or reported. Embodiments of the software self-checking mechanisms can be implemented such that they are relatively stealthy and robust, and so that they are compatible with copy-specific static watermarking and other tamper-resistance techniques.
1st Source Servall Birmingham, AL Apr 2011 to Jul 2011 Distribution Center ManagerUSA Security Birmingham, AL Feb 2011 to Apr 2011 Security SupervisorWalmart Calera, AL Apr 2010 to Feb 2011 Part Time Photo Center/Wireless Connect Center Sales AssociateEastman Kodak Company Rochester, NY 2002 to 2007 Logistics SupervisorTransportation Supervisor 1993 to 2002
Education:
Commerce High School Yonkers, NY Jan 1966 to Jan 1969 High School in BookkeepingMonroe Community College Rochester, NY N/A in Inc
Military:
Rank: Corporal (Non-Commissoned Officer) Jul 1970 to Jul 1972 Branch: United States Marine CorpsL.i.location.original
Jun 2013 to 2000 iD Tech Camps instructorMobius Productions
May 2011 to 2000 Digital Entrepreneurial ProjectHome Depot Everett, WA Jul 2012 to Nov 2012 Seasonal position as a Sales AssociateUniversity of Idaho Philadelphia, PA Aug 2011 to May 2012 Senior Capstone ProjectSafeway
Sep 2007 to Jul 2009 Courtesy Clerk
Education:
University of Idaho 2009 to 2012 Bachelor of Science in Technology and DesignEdmonds Community College 2007 to 2009 Associate of Arts
Skills:
Game Design, unique interpretation, digital modeling, concept, storyboard, programing, visual communications.