STUART W HABER, M.D.
Osteopathic Medicine at Sheridan Sq, New York, NY

License number
New York 178060
Category
Osteopathic Medicine
Type
Infectious Disease
Address
Address
12A Sheridan Sq, New York, NY 10014
Phone
(212) 929-2370
(201) 487-7227

Personal information

See more information about STUART W HABER at radaris.com
Name
Address
Phone
Stuart Haber, age 68
16 W 16Th St APT 3SN, New York, NY 10011
(212) 408-0898
Stuart Haber
337 W 30Th St APT 5B, New York, NY 10001
(917) 834-5298
Stuart Haber, age 66
345 W 58Th St APT 3T, New York, NY 10019
Stuart Haber
441 E 20Th St, New York, NY 10010
Stuart Haber
540 W 113Th St, New York, NY 10025

Professional information

See more information about STUART W HABER at trustoria.com
Stuart Haber Photo 1
Method Of Extending The Validity Of A Cryptographic Certificate

Method Of Extending The Validity Of A Cryptographic Certificate

US Patent:
5373561, Dec 13, 1994
Filed:
Dec 21, 1992
Appl. No.:
7/992883
Inventors:
Stuart A. Haber - New York NY
Wakefield S. Stornetta - Morristown NJ
Assignee:
Bell Communications Research, Inc. - Livingston NJ
International Classification:
H04L 900, H04L 930
US Classification:
380 49
Abstract:
A cryptographic certificate attesting to the authenticity of original document elements, such as time of creation, content, or source, will lose its value when the cryptographic function underlying the certifying scheme is compromised. The present invention provides a means for extending the reliability of such a certificate by subjecting, prior to any such compromise, a combination of the original certificate and the document digital representation from which that certificate was derived to a scheme based on a different and ostensibly less vulnerable function. The new certificate resulting from this procedure extends the validity of the original authenticity by implacably incorporating the original certificate at a time when that certificate could only have been derived by legitimate means.


Stuart Haber Photo 2
Method For Secure Time-Stamping Of Digital Documents

Method For Secure Time-Stamping Of Digital Documents

US Patent:
5136647, Aug 4, 1992
Filed:
Aug 2, 1990
Appl. No.:
7/561888
Inventors:
Stuart A. Haber - New York NY
Wakefield S. Stornetta - Morristown NJ
Assignee:
Bell Communications Research, Inc. - Livingston NJ
International Classification:
H04L 900, H04L 930
US Classification:
380 49
Abstract:
A system for time-stamping a digital document, including for example text, video, audio, or pictorial data, protects the secrecy of the document text and provides a tamper-proof time seal establishing an author's claim to the temporal existence of the document. Initially, the author reduces the document to a number by means of a one-way hash function, thereby fixing a unique representation of the document text. In one embodiment of the invention the number is then transmitted to an outside agency where the current time is added to form a receipt which is certified by the agency using a public key signature procedure before being returned to the author as evidence of the document's existence. In later proof of such existence, the certificate is authenticated by means of the agency's public key to reveal the receipt which comprises the hash of the alleged document along with the time seal that only the agency could have signed into the certificate. The alleged document is then hashed with the same one-way function and the original and newly-generated hash numbers are compared.


Stuart Haber Photo 3
Method For Secure Time-Stamping Of Digital Documents

Method For Secure Time-Stamping Of Digital Documents

US Patent:
RE34954, May 30, 1995
Filed:
Nov 22, 1993
Appl. No.:
8/156120
Inventors:
Stuart A. Haber - New York NY
Wakefield S. Stornetta - Morristown NJ
Assignee:
Bell Communications Research, Inc. - Livingston NJ
International Classification:
H04L 900, H04L 930
US Classification:
380 49
Abstract:
A system for time-stamping a digital document, including for example text, video, audio, or pictorial data, protects the secrecy of the document text and provides a tamper-proof time seal establishing an author's claim to the temporal existence of the document. Initially, the author reduces the document to a number by means of a one-way hash function, thereby fitting a unique representation of the document text. In one embodiment of the invention the number is then transmitted to an outside agency where the current time is added to form a receipt which is certified by the agency using a public key signature procedure before being returned to the author as evidence of the document's existence. In later proof of such existence, the certificate is authenticated by means of the agency's public key to reveal the receipt which comprises the hash of the alleged document along with the time seal that only the agency could have signed into the certificate. The alleged document is then hashed with the same one-way function and the original and newly-generated hash numbers are compared.


Stuart Haber Photo 4
Digital Document Time-Stamping With Catenate Certificate

Digital Document Time-Stamping With Catenate Certificate

US Patent:
5136646, Aug 4, 1992
Filed:
Mar 8, 1991
Appl. No.:
7/666896
Inventors:
Stuart A. Haber - New York NY
Wakefield S. Stornetta - Morristown NJ
Assignee:
Bell Communications Research, Inc. - Livingston NJ
International Classification:
H04L 900, H04L 930
US Classification:
380 49
Abstract:
A system for time-stamping a digital document, for example any alphanumeric, video, audio, or pictorial data, protects the secrecy of the document text and provides a tamper-proof time seal establishing an author's claim to the temporal existence of the document. Initially, the document may be condensed to a single number by means of a one-way hash function, thereby fixing a unique representation of the document text. The document representation is transmitted to an outside agency where the current time is added to form a receipt. The agency then certifies the receipt by adding and hashing the receipt data with the current record catenate certificate which itself is a number obtained as a result of the sequential hashing of each prior receipt with the extant catenate certificate. The certified receipt bearing the time data and the catenate certificate number is then returned to the author as evidence of the document's existence. In later proof of such existence, the certificate is authenticated by repeating the certification steps with the representation of the alleged document, the alleged time data, and the catenate certificate number appearing in the agency's records immediately prior to the certificate number in question.


Stuart Haber Photo 5
Digital Document Authentication System

Digital Document Authentication System

US Patent:
5781629, Jul 14, 1998
Filed:
Feb 21, 1997
Appl. No.:
8/803326
Inventors:
Stuart A. Haber - New York NY
W. Scott Stornetta - Morriston, Jr. NJ
Assignee:
Surety Technologies, Inc. - Florham Park NJ
International Classification:
H04L 932
US Classification:
380 23
Abstract:
A process for time-stamping a digital document is provided. The process provides a certificate which not only allows for the authentication of a document at a later time but which includes a name or nickname which allows for the unique identification of the document at a later time. The name or nickname provided in accordance with the present invention is not only simple and concise but allows for the self-authentication of the document which it refers to. The name can be used when two independent parties desire to refer to the same unique document in a quick and simple way.


Stuart Haber Photo 6
Audit-Log Integrity Using Redactable Signatures

Audit-Log Integrity Using Redactable Signatures

US Patent:
2008010, May 1, 2008
Filed:
Oct 31, 2006
Appl. No.:
11/555278
Inventors:
William Horne - Lawrenceville NJ, US
Stuart Haber - New York NY, US
Tomas Sander - New York NY, US
Assignee:
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. - Houston TX
International Classification:
H04L 9/00
US Classification:
713178
Abstract:
A method of establishing the integrity of an audit record set is described. The method comprises receiving a set of audit records and generating a first set of random values wherein each audit record in the set corresponds to at least one value of the first set. The method further comprises generating a second set of values based on an audit record and a corresponding value of the first set for each audit record in the set and generating a summary value based on the second set of values. The method further comprises certifying the summary value to generate an integrity certificate enabling verification of the integrity of the audit record set and storing the audit record set and at least one of the first set of values and the generated digital signature.


Stuart Haber Photo 7
Establishing A Secure Channel With A Human User

Establishing A Secure Channel With A Human User

US Patent:
8220036, Jul 10, 2012
Filed:
Dec 12, 2006
Appl. No.:
11/609822
Inventors:
Binyamin Pinkas - Jersey City NJ, US
Stuart A. Haber - New York NY, US
Robert E. Tarjan - Princeton NJ, US
Tomas Sander - New York NY, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
H04L 29/06
US Classification:
726 7, 726 5
Abstract:
A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.


Stuart Haber Photo 8
Integrity Verification Of Pseudonymized Documents

Integrity Verification Of Pseudonymized Documents

US Patent:
8266439, Sep 11, 2012
Filed:
Sep 12, 2007
Appl. No.:
11/854413
Inventors:
Stuart Haber - New York NY, US
William G. Horne - Lawrenceville NJ, US
Tomas Sander - New York NY, US
Danfeng Yao - West Lafayette IN, US
Assignee:
Hewlett-Packard Development Company, L.P. - Houston TX
International Classification:
H04L 9/32, H04L 29/06
US Classification:
713176, 713150, 713168, 713175, 713177
Abstract:
One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.


Stuart Haber Photo 9
Establishing A Secure Channel With A Human User

Establishing A Secure Channel With A Human User

US Patent:
7149899, Dec 12, 2006
Filed:
Apr 25, 2003
Appl. No.:
10/423546
Inventors:
Binyamin Pinkas - Jersey City NJ, US
Stuart A. Haber - New York NY, US
Robert E. Tarjan - Princeton NJ, US
Tomas Sander - New York NY, US
Assignee:
Intertrust Technologies Corp. - Sunnyvale CA
International Classification:
G06F 9/00
US Classification:
713182, 713181, 713193
Abstract:
A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“PIN”) is shared between a user and an application. When the user makes a request that involves utilizing the PIN for authentication purposes, the application renders a randomly selected identifier. The randomly selected identifier is in a format that is recognizable to a human but is not readily recognizable by an automated agent. The randomly selected identifier is then presented to the human user. The user identifies the relationship between the randomly selected identifier and the PIN. If the user's input reflects the fact that the user knows the PIN, then the user is authenticated.


Stuart Haber Photo 10
Stuart Haber

Stuart Haber

Location:
Greater New York City Area
Industry:
Research