1
Ramarathnam Venkatesan, Yacov Yacobi: Passive and active software objects containing bore resistant watermarking. Microsoft Corporation, Lee & Hayes PLLC, October 5, 2004: US06801999 (167 worldwide citation)

A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (


2
Michael J Beller, Yacov Yacobi: Two-way public key authentication and key agreement for low-cost terminals. Bell Communications Research, Leonard Charles Suchyta, Loria B Yeadon, March 29, 1994: US05299263 (158 worldwide citation)

A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution a ...


3
Yacov Yacobi: Efficient electronic money. Bell Communications Research, Leonard Charles Suchyta, James W Falk, April 23, 1996: US05511121 (152 worldwide citation)

A unique electronic cash system protects the privacy of users in legitimate transactions while at the same time enabling the detection of a double spender of the same electronic coin. The electronic cash system takes advantage of a unique property of El Gamal signatures to achieve these results.


4
Yacov Yacobi: System and method for detecting fraudulent expenditure of electronic assets. Microsoft Corporation, Lee & Hayes PLLC, March 2, 1999: US05878138 (111 worldwide citation)

An electronic asset system includes tamper-resistant electronic wallets that store non-transferable electronic assets. To break such tamper-resistant wallets, the criminal is expected to spend an initial investment to defeat the tamper-resistant protection. The electronic assets are uniquely issued ...


5
Michael J Beller, Yacov Yacobi: Public key authentication and key agreement for low-cost terminals. Bell Communications Research, Leonard Charles Suchyta, James W Falk, April 11, 1995: US05406628 (110 worldwide citation)

A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution a ...


6
Shoshana K Loeb, Yacov Yacobi: Security method for private information delivery and filtering in public networks. Bell Communications Research, Leonard Charles Suchyta, September 14, 1993: US05245656 (109 worldwide citation)

A method for operating customized information services via a network comprising transmitting the identity U of an end-user station via the network to a name translator station. At the name translator station, the identity U of the end-user station is translated into a pseudonym U'. The pseudonym U' ...


7
Michael J Beller, Li Fung Chang, Yacov Yacobi: Cryptographic method for key agreement and user authentication. Bell Communications Research, Leonard Charles Suchyta, June 22, 1993: US05222140 (66 worldwide citation)

Protocols for session key agreement and authentication in a communication system such as a portable communication system make use of public key cryptographic techniques. The protocols of the present invention are especially suited for use in a portable communication system because portable telephone ...


8
Yacov Yacobi: System and method for detecting fraudulent expenditure of transferable electronic assets. Microsoft Corporation, Lee & Hayes PLLC, February 16, 1999: US05872844 (62 worldwide citation)

An electronic asset system includes tamper-resistant electronic wallets that store transferable electronic assets. To break such tamper-resistant wallets, the criminal is expected to spend an initial investment to defeat the tamper-resistant protection. The electronic assets are issued by an institu ...


9
Darko Kirovski, Yacov Yacobi: Asymmetric spread-spectrum watermarking systems and methods of use. Microsoft Corporation, Lee & Hayes PLLC, May 10, 2005: US06891958 (55 worldwide citation)

Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kind ...


10
Ramarathnam Venkatesan, Yacov Yacobi: License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer. Microsoft Corporation, Lee & Hayes PLLC, May 24, 2005: US06898706 (49 worldwide citation)

A technique for imparting substantial break-once-run-everywhere resistance to software objects, and for controlling access and use of resulting protected objects by a client computer. Specifically, a relatively large number of identical watermarks are embedded throughout a software object to form a ...



Click the thumbnails below to visualize the patent trend.