1
Cynthia Dwork, Moni Naor, Florian Pestoni: System and method for verifying signatures on documents. International Business Machines Corporation, Romualdas Strimaitis, James C Pintner, June 27, 2000: US06081610 (110 worldwide citation)

A system and method are provided for producing verified signatures on documents such as checks and affidavits. Initially, a customer who is to obtain a verified signature, at some point in time, registers with a signatory authority, and a secret key, having public and private components, is establis ...


2
Cynthia Dwork, Joseph Y Halpern, Hovey R Strong Jr: Fault tolerant load management system and method. International Business Machines Corporation, James C Pintner, April 30, 1996: US05513354 (63 worldwide citation)

A method and apparatus are disclosed for managing tasks in a network of processors. After a period of time has elapsed, during which the processors of the network have been executing tasks allocated to them, the processors exchange views as to which pending tasks have or have not been completed. The ...


3
Cynthia Dwork, Simeon Naor, Shanmugasundaram Ravikumar, Dandapani Sivakumar: System and method for aggregating ranking results from various sources to improve the results of web searching. International Business Machines Corporation, Marc D McSwain, March 6, 2007: US07188106 (45 worldwide citation)

A system and method for aggregating rankings from a plurality of ranking sources to generate a maximally consistent ranking by minimizing a distance measure. The ranking sources may be search engines executing queries on web pages that have been deliberately modified to cause an incorrect estimate o ...


4
Cynthia Dwork, Joseph Y Halpern, Jeffrey Bruce Lotspiech: Method and system for protection of digital information. International Business Machines Corporation, Gray Cary Ware Freidenrich, March 14, 2000: US06038316 (25 worldwide citation)

An information processing system including an encryption processing logic module and a decryption processing logic module for enabling the encryption of digital information to be decrypted with a decryption key K. The encryption processing module includes logic for encrypting the digital information ...


5
Cynthia Dwork, Moni Naor, Florian Pestoni: System and method for certifying content of hard-copy documents. International Business Machines Corporation, James C Gunster Yoakley Valdes Fauli & Stewart Pintner, July 20, 1999: US05926551 (23 worldwide citation)

A system and method are provided for facilitating proof that a specific item, such as a document, has been sent via a communication medium, such as the mail service of the United States Postal Service, at a specific time. A bit map image is produced, such as by scanning a hard copy document. Prefera ...


6
Cynthia Dwork, Joseph Y Halpern, Jeffrey Bruce Lotspiech: Method and system for protection of digital information. International Business Machines Corporation, Gray Cary Ware Freidenrich, November 2, 1999: US05978482 (20 worldwide citation)

An information processing system including an encryption processing logic module and a decryption processing logic module for enabling the encryption of digital information to be decrypted with a decryption key K. The encryption processing module includes logic for encrypting the digital information ...


7
Cynthia Dwork, Simeon Naor: Method for message authentication from non-malleable crypto systems. International Business Machines Corporation, James C Pintner, July 23, 1996: US05539826 (16 worldwide citation)

A method is provided for authentication of encrypted messages. A non-malleable public-key encryption technique is employed, so that an eavesdropper cannot employ an encrypted message, previously overheard, to generate a message which, when sent to a recipient, which would pass as a message originati ...


8
Cynthia Dwork, Moni Naor, Florian Pestoni: Machine-readable checks. International Business Machines Corporation, Morgan & Finnegan, October 3, 2000: US06126203 (14 worldwide citation)

A machine-readable check comprising a check and a machine-readable image block printed on the check. Preferably, the image block is a two-dimensional print code.


9
Cynthia Dwork, Frank D McSherry: Differential data privacy. Microsoft Corporation, Woodcock Washburn, April 13, 2010: US07698250 (14 worldwide citation)

Systems and methods are provided for controlling privacy loss associated with database participation. In general, privacy loss can be evaluated based on information available to a hypothetical adversary with access to a database under two scenarios: a first scenario in which the database does not co ...


10
Cynthia Dwork, Ching Tien Ho, Hovey Raymond Strong Jr: Method and system for achieving collective consistency in detecting failures in a distributed computing system. International Business Machines Corporation, Khanh Q Tran, James C Pintner, October 28, 1997: US05682470 (9 worldwide citation)

A method and apparatus are disclosed for achieving collective consistency in the detection and reporting of failures in a distributed computing system having multiple processors. Each processor is capable of being called by a parallel application for system status. Initially, each processor sends th ...