Search

Joshua B Jaffe

from Greenbrae, CA
Age ~51

Joshua Jaffe Phones & Addresses

  • 51 La Cuesta Dr, Greenbrae, CA 94904 (415) 497-9473
  • San Rafael, CA
  • Mill Valley, CA
  • San Francisco, CA
  • 137 Yolo St, Corte Madera, CA 94925
  • Washington, DC
  • Belvedere Tiburon, CA
  • Marina, CA

Work

Company: Dickstein Shapiro LLP Address:

Specialities

Intellectual Property • Litigation

Professional Records

Medicine Doctors

Joshua Jaffe Photo 1

Joshua S. Jaffe

View page
Specialties:
Obstetrics & Gynecology
Work:
Sharon Obstetrics & Gynecology/TSWS
50 Amenia Rd, Sharon, CT 06069
(860) 379-6267 (phone), (860) 364-1299 (fax)
Education:
Medical School
Harvard Medical School
Graduated: 1981
Procedures:
Tubal Surgery
Vaginal Repair
Amniocentesis
Cesarean Section (C-Section)
Colposcopy
Cystoscopy
D & C Dilation and Curettage
Delivery After Previous Caesarean Section
Destruction of Benign/Premalignant Skin Lesions
Destruction of Lesions on the Anus
Hysterectomy
Myomectomy
Ovarian Surgery
Skin Tags Removal
Vaccine Administration
Vaginal Delivery
Conditions:
Candidiasis of Vulva and Vagina
Abnormal Vaginal Bleeding
Breast Disorders
Complicating Pregnancy or Childbirth
Conditions of Pregnancy and Delivery
Languages:
English
Description:
Dr. Jaffe graduated from the Harvard Medical School in 1981. He works in Sharon, CT and specializes in Obstetrics & Gynecology. Dr. Jaffe is affiliated with Sharon Hospital.

Lawyers & Attorneys

Joshua Jaffe Photo 2

Joshua Jaffe - Lawyer

View page
Office:
Dickstein Shapiro LLP
Specialties:
Intellectual Property
Litigation
ISLN:
921205348
Admitted:
2008
University:
New York University, B.A., 2003
Law School:
Brooklyn Law School, J.D., 2007

Public records

Vehicle Records

Joshua Jaffe

View page
Address:
43 Topaz Way, San Francisco, CA 94131
Phone:
(415) 994-3228
VIN:
WP0AB2A9XCS720258
Make:
PORSCHE
Model:
911
Year:
2012

Resumes

Resumes

Joshua Jaffe Photo 3

Research Scientist At Cryptography Research, Inc.

View page
Location:
San Francisco Bay Area
Industry:
Research
Joshua Jaffe Photo 4

Joshua Jaffe

View page
Joshua Jaffe Photo 5

Joshua Jaffe

View page
Joshua Jaffe Photo 6

Joshua Jaffe

View page
Joshua Jaffe Photo 7

Joshua Jaffe

View page
Location:
London, Greater London, United Kingdom
Industry:
Internet
Joshua Jaffe Photo 8

Director Of Publisher Services At Videoegg

View page
Location:
San Francisco Bay Area
Industry:
Online Media

Business Records

Name / Title
Company / Classification
Phones & Addresses
Joshua Jaffe
Principal
International Home Exchange
Travel Agencies
30 Corte San Fernando, Belvedere Tiburon, CA 94920
(415) 435-3497
Joshua Jaffe
Senior Writer
Maroevich, O'Shea & Coghlan Ins, Inc
Insurance Agent/Broker
44 Montgomery St, San Francisco, CA 94104
(415) 957-0600
Joshua Jaffe
President
Securatrip Inc
Business Services at Non-Commercial Site
137 Yolo St, Corte Madera, CA 94925
Joshua Jaffe
Principal
Intervac
Travel Agency
30 Corte San Fernando, Tiburon, CA 94920
(415) 435-3497

Publications

Us Patents

Leak-Resistant Cryptographic Method And Apparatus

View page
US Patent:
6381699, Apr 30, 2002
Filed:
Dec 13, 2000
Appl. No.:
09/737182
Inventors:
Paul C. Kocher - San Francisco CA
Joshua M. Jaffe - San Francisco CA
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
H04L 910
US Classification:
713172, 713174, 713340, 705 65
Abstract:
The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A âself-healingâ property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations of the invention are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption, ElGamal digital signing, and the Digital Signature Algorithm.

Balanced Cryptographic Computational Method And Apparatus For Leak Minimizational In Smartcards And Other Cryptosystems

View page
US Patent:
6510518, Jan 21, 2003
Filed:
Jun 3, 1999
Appl. No.:
09/325611
Inventors:
Joshua M. Jaffe - San Francisco CA
Paul C. Kocher - San Francisco CA
Benjamin C. Jun - Palo Alto CA
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
G06F 124
US Classification:
713168, 713171, 713200, 713201
Abstract:
Cryptographic devices that leak information about their secrets through externally monitorable characteristics (such as electromagnetic radiation and power consumption) may be vulnerable to attack, and previously-known methods that could address such leaking are inappropriate for smartcards and many other cryptographic applications. Methods and apparatuses are disclosed for performing computations in which the representation of data, the number of system state transitions at each computational step, and the Hamming weights of all operands are independent of computation inputs, intermediate values, or results. Exemplary embodiments implemented using conventional (leaky) hardware elements (such as electronic components, logic gates, etc. ) as well as software executing on conventional (leaky) microprocessors are described. Smartcards and other tamper-resistant devices of the invention provide greatly improved resistance to cryptographic attacks involving external monitoring.

Digital Content Protection Method And Apparatus

View page
US Patent:
6640305, Oct 28, 2003
Filed:
Sep 6, 2001
Appl. No.:
09/948473
Inventors:
Paul C. Kocher - San Francisco CA
Joshua M. Jaffe - San Francisco CA
Benjamin C. Jun - Palo Alto CA
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
H04L 910
US Classification:
713194, 713162, 713172, 380228, 380286
Abstract:
Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resistant device communicates with another of the computational units acting as an interface control processor, and serves to protect the contents of a nonvolatile memory from unauthorized access or modification by other portions of the tamper-resistant device, while performing cryptographic computations using the memory contents. Content providers enforce viewing privileges by transmitting encrypted rights keys to a large number of recipient devices. These recipient devices process received messages using the protected processing environment and memory space of the secure unit. The processing result depends on whether the recipient device was specified by the content provider as authorized to view some encrypted digital content.

Hardware-Level Mitigation And Dpa Countermeasures For Cryptographic Devices

View page
US Patent:
6654884, Nov 25, 2003
Filed:
Jan 17, 2003
Appl. No.:
10/346848
Inventors:
Joshua M. Jaffe - San Francisco CA
Paul C. Kocher - San Francisco CA
Benjamin C. Jun - Palo Alto CA
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
G06F 124
US Classification:
713168, 713171, 713200, 713201
Abstract:
Differential power analysis is a powerful cryptanalytic method that can be used to extract secret keys from cryptographic hardware during operation. To reduce the risk of compromise, cryptographic hardware can employ countermeasures to reduce the amount of secret information that can be deduced by power consumption measurements during processing. Such countermeasures can include balancing circuitry inside a cryptographic hardware device to reduce the amount of variation in power consumption that is correlated to data parameters being manipulated. This can be facilitated by using a constant-Hamming-weight representation when representing and manipulating secret parameters. Low-level operation modules, such as Boolean logic gates, can be built to process input parameters in a manner that balances the number of ON transistors while simultaneously maintaining a data-independent number of transistor transitions during computation. Leakage reduction may be used with other countermeasures, including introducing noise, unrelated to data being processed, into the power measurements.

Using Smartcards Or Other Cryptographic Modules For Enabling Connected Devices To Access Encrypted Audio And Visual Content

View page
US Patent:
7039816, May 2, 2006
Filed:
Oct 27, 2003
Appl. No.:
10/695256
Inventors:
Paul C. Kocher - San Francisco CA, US
Joshua M. Jaffe - San Francisco CA, US
Benjamin C. Jun - Palo Alto CA, US
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
H04N 7/167
H04L 9/30
US Classification:
713194, 713193, 380240, 380284
Abstract:
To prevent piracy, audiovisual content is encrypted prior to transmission to consumers. A low-cost, high-security cryptographic rights module (such as a smartcard) enables devices such as players/displays to decode such content. Security-critical functions may be performed by the cryptographic module in a manner that allows security compromises to be addressed by upgrading or replacing cryptographic modules, thereby avoiding the need to replace or modify other (typically much higher-cost) components. The security module contains cryptographic keys, which it uses to process rights enablement messages (REMs) and key derivation messages (KDMs). From a REM and KDM, the security module derives key data corresponding to content, uses public key and/or symmetric cryptography to re-encrypt the derived key data for another device, and provides the re-encrypted key data to the decoding device. The decoding device then uses cryptographic values derived from the re-encrypted key data to decrypt the content.

Leak-Resistant Cryptographic Payment Smartcard

View page
US Patent:
7506165, Mar 17, 2009
Filed:
Apr 29, 2002
Appl. No.:
10/136012
Inventors:
Paul C. Kocher - San Francisco CA, US
Joshua M. Jaffe - San Francisco CA, US
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
G06F 21/00
US Classification:
713172, 705 65
Abstract:
We disclose methods and apparatuses for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing useful cryptographic results, a typical leak-resistant cryptographic operation modifies or updates secret key material in a manner designed to render useless any information about the secrets that may have previously leaked from the system. Exemplary leak-proof and leak-resistant implementations are shown for symmetric authentication, certified Diffie-Hellman (when either one or both users have certificates), RSA, ElGamal public key decryption.

Differential Power Analysis Method And Apparatus

View page
US Patent:
7587044, Sep 8, 2009
Filed:
Dec 3, 2001
Appl. No.:
10/005105
Inventors:
Paul C. Kocher - San Francisco CA, US
Joshua M. Jaffe - San Francisco CA, US
Benjamin C. Jun - Foster City CA, US
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
H04L 9/00
G06F 21/00
US Classification:
380 1, 380 37, 713194
Abstract:
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.

Differential Power Analysis

View page
US Patent:
7599488, Oct 6, 2009
Filed:
Oct 29, 2007
Appl. No.:
11/978364
Inventors:
Paul C. Kocher - San Francisco CA, US
Joshua M. Jaffe - San Francisco CA, US
Benjamin C. Jun - Oakland CA, US
Assignee:
Cryptography Research, Inc. - San Francisco CA
International Classification:
H04K 3/00
H04L 9/00
G06F 11/30
US Classification:
380 1, 380 37, 713194, 713340
Abstract:
Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing. As the target device performs cryptographic operations, data from the A/D converter are recorded for each cryptographic operation. The stored data are then processed using statistical analysis, yielding the entire key, or partial information about the key that can be used to accelerate a brute force search or other attack.
Joshua B Jaffe from Greenbrae, CA, age ~51 Get Report