1
Ramarathnam Venkatesan, Yacov Yacobi: Passive and active software objects containing bore resistant watermarking. Microsoft Corporation, Lee & Hayes PLLC, October 5, 2004: US06801999 (168 worldwide citation)

A technique for imparting substantial break-once-run-everywhere (BORE) resistance to passive and active software objects, and for controlling access and use of resulting protected objects by a client computer (


2
Yacov Yacobi: Efficient electronic money. Bell Communications Research, Leonard Charles Suchyta, James W Falk, April 23, 1996: US05511121 (161 worldwide citation)

A unique electronic cash system protects the privacy of users in legitimate transactions while at the same time enabling the detection of a double spender of the same electronic coin. The electronic cash system takes advantage of a unique property of El Gamal signatures to achieve these results.


3
Michael J Beller, Yacov Yacobi: Two-way public key authentication and key agreement for low-cost terminals. Bell Communications Research, Leonard Charles Suchyta, Loria B Yeadon, March 29, 1994: US05299263 (159 worldwide citation)

A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution a ...


4
Yacov Yacobi: System and method for detecting fraudulent expenditure of electronic assets. Microsoft Corporation, Lee & Hayes PLLC, March 2, 1999: US05878138 (111 worldwide citation)

An electronic asset system includes tamper-resistant electronic wallets that store non-transferable electronic assets. To break such tamper-resistant wallets, the criminal is expected to spend an initial investment to defeat the tamper-resistant protection. The electronic assets are uniquely issued ...


5
Michael J Beller, Yacov Yacobi: Public key authentication and key agreement for low-cost terminals. Bell Communications Research, Leonard Charles Suchyta, James W Falk, April 11, 1995: US05406628 (111 worldwide citation)

A method for achieving mutual authentication and session key agreement between a first party 12 which has minimal computational resources and a second party 18 which has substantial computational resources utilizes a modular square root operation for certificate authentication and key distribution a ...


6
Shoshana K Loeb, Yacov Yacobi: Security method for private information delivery and filtering in public networks. Bell Communications Research, Leonard Charles Suchyta, September 14, 1993: US05245656 (110 worldwide citation)

A method for operating customized information services via a network comprising transmitting the identity U of an end-user station via the network to a name translator station. At the name translator station, the identity U of the end-user station is translated into a pseudonym U'. The pseudonym U' ...


7
Michael J Beller, Li Fung Chang, Yacov Yacobi: Cryptographic method for key agreement and user authentication. Bell Communications Research, Leonard Charles Suchyta, June 22, 1993: US05222140 (66 worldwide citation)

Protocols for session key agreement and authentication in a communication system such as a portable communication system make use of public key cryptographic techniques. The protocols of the present invention are especially suited for use in a portable communication system because portable telephone ...


8
Yacov Yacobi: System and method for detecting fraudulent expenditure of transferable electronic assets. Microsoft Corporation, Lee & Hayes PLLC, February 16, 1999: US05872844 (62 worldwide citation)

An electronic asset system includes tamper-resistant electronic wallets that store transferable electronic assets. To break such tamper-resistant wallets, the criminal is expected to spend an initial investment to defeat the tamper-resistant protection. The electronic assets are issued by an institu ...


9
Darko Kirovski, Yacov Yacobi: Asymmetric spread-spectrum watermarking systems and methods of use. Microsoft Corporation, Lee & Hayes PLLC, May 10, 2005: US06891958 (55 worldwide citation)

Described herein is an audio watermarking technology for detecting watermarks in audio signals, such as a music clip. The watermark identifies the content producer, providing a signature that is embedded in the audio signal and cannot be removed. The watermark is designed to survive all typical kind ...


10
Ravi Ganesan, Yacov Yacobi: System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem. Bell Atlantic Network Services, Bell Communications Research, Lowe Price LeBlanc & Becker, December 24, 1996: US05588061 (50 worldwide citation)

A method for improving an RSA cryptosystem by generating a user private exponent key, having an associated modulus N, and a user public exponent key for each user of the system. Each user's public exponent key is provided to all users of the system. Each user's private exponent key is divided into a ...



Click the thumbnails below to visualize the patent trend.