Patents Examined by Gail O. Hayes
  • Patent number: 6026490
    Abstract: A configurable cryptographic processing engine (100) provides high performance cryptographic processing support for symmetric combiner type cryptographic algorithms. As many as two independent cryptographic algorithms may be performed at the same time through the processes of background staging and algorithm multi-tasking. A 3-stage instruction pipeline, dynamically configurable cryptographic co-processor (550), and 32-bit RISC based architecture support high performance cryptographic processing performance on the order of 60 Mbps aggregate throughput.
    Type: Grant
    Filed: August 1, 1997
    Date of Patent: February 15, 2000
    Assignee: Motorola, Inc.
    Inventors: Kerry Lucille Johns-Vano, David Michael Harrison, Phillip Anthony Carswell, William Louis Perea, Ty Bao Lien
  • Patent number: 6021201
    Abstract: A cryptography unit having a cipher unit and a hash unit coupled in parallel for simultaneous ciphering and hashing. The cipher unit implements a cipher algorithm that operates on a data block having a first predetermined size M. The hash unit implements a hash algorithm on a data block having a second predetermined size N. Buffers of a size Q, where Q is an integer multiple of M and N, are employed to receive the input data into the present invention. A security unit that ensures that the cipher unit and the hash unit operate on the same data block of size Q is also provided.
    Type: Grant
    Filed: January 7, 1997
    Date of Patent: February 1, 2000
    Assignee: Intel Corporation
    Inventors: Ashutosh Bakhle, Derek L. Davis
  • Patent number: 6018582
    Abstract: The invention relates to an optical transmission system that implements encrypting of an information carrying signal by deterministic chaos. The system includes a transmitter (1), a receiver (4), and one transmission channel coupled between the transmitter (1) and the receiver (4). The transmitter (1) includes a deterministic chaos generator (3) coupled to an encoding system (2). The deterministic chaos generator (3) includes a wavelength tunable laser-emitting diode (33) and a feedback loop (34). The active layer of laser diode (33) is offset controlled by a laser signal passed through a non-linear optical element (32) and a delay line (31). The receiver (4) has a deterministic chaos generator (7) coupled to a synchronizer (6) and a decoder coupled to the synchronizer (6). Preferably, chaos generator (3) is the same as chaos generator (7). Other features are disclosed.
    Type: Grant
    Filed: January 3, 1997
    Date of Patent: January 25, 2000
    Assignee: France Telecom
    Inventors: Pierre-Luc Francois, Jean-Pierre Goedgebuer, Laurent Larger, Henri Porte
  • Patent number: 6014444
    Abstract: An apparatus for encrypted communication in which transmission data is encrypted based upon a cipher key and is transmitted. The received encrypted data is decrypted based upon a cipher key. A cipher key checker checks for agreement of the cipher keys by decoding the decrypted received data. The cipher key checker decodes the decrypted data in a unit of a preselected number of lines and determines whether the data are properly decoded or not.
    Type: Grant
    Filed: April 3, 1997
    Date of Patent: January 11, 2000
    Assignee: Mita Industrial Co., Ltd.
    Inventors: Shigeaki Nakamura, Tetsuya Nishino, Yoshio Morita, Masahiro Inoue, Masaru Sato, Hiroshi Sakai, Yukihiro Oi, Yoshio Shirai
  • Patent number: 6011848
    Abstract: A scheme for message delivery which can guarantee an authenticity of a user, a reliability of message delivery, and an authenticity of the message deliver, while preventing an illegal act, and which can prove them at later time. In this scheme, when the user requests a delivery of a message to the information provider, the information provider carries out a user authentication of the user according to a zero knowledge interactive proof protocol using check bits E, transmits a ciphertext C in which a message M is enciphered according to a secret key cryptosystem by using a work key W, as a part of the check bits E, and delivers the message to the user in units of one bit or a plurality of bits. Then the information provider carries out a record management of a log data H for the zero knowledge interactive proof protocol.
    Type: Grant
    Filed: November 6, 1995
    Date of Patent: January 4, 2000
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Masayuki Kanda, Kiyoshi Yamanaka, Youichi Takashima
  • Patent number: 6011850
    Abstract: The present invention relates to a securized, multifunction, acquisition and processing terminal more particularly usable in the banking sector, in connection with games and/or in the electronic management of documents, characterized in that it comprises:a mother board (13), having an interfacing bus with one or more standardized connectors to which can be connectedstandard input/output modules,at least one specific input/output module permitting the performance of specific functions incorporating at least one dedicated circuit, said module as its main function the supplying of the mother board with preorganized informations, in real time, concerning the specific functions and able to leave to said mother board any developed software processing of said informations.
    Type: Grant
    Filed: November 17, 1995
    Date of Patent: January 4, 2000
    Assignees: Jean-Marie Gatto, Dominique Bertrand
    Inventors: Dominique Bertrand, Jean-Marie Gatto
  • Patent number: 6011847
    Abstract: An integrated, modular computer program system provides for the encryption and decryption of files utilizing conventional encryption algorithms and a relational key generated by the system. The computer program system also generates a series of labels that are encrypted and appended as a trailer to the encrypted message. The encrypted labels provide a history behind the particular encryption and they can be individually selected, separated, and decrypted from the total file. A rule based expert system is utilized as an intelligent label selection system to minimize message sensitivity. An access control module permits a user with a preassigned passphrase to have access to the encryption or decryption portion of the program by comparing a generated vector or key with a partially decrypted version of a second vector or key stored on a portable storage medium such as a floppy disk.
    Type: Grant
    Filed: June 1, 1995
    Date of Patent: January 4, 2000
    Inventor: Roy D. Follendore, III
  • Patent number: 6005944
    Abstract: An efficient block cipher that operates on blocks of arbitrarily large size. A block is permuted by recursively using relatively small random functions in an N-round Feistel construction, where N is an integer. The security of the invention is closely related to the difficulty of solving the Numerical Matching with Target Sums problem, an NP Complete problem which cannot presently be solved analytically using known mathematical techniques. The memory required for the cipher's random functions increases linearly with block size, rather than exponentially as with known Feistel constructions. The invention can be efficiently and practically implemented in software at speeds comparable to the speeds of known ciphers.
    Type: Grant
    Filed: February 14, 1997
    Date of Patent: December 21, 1999
    Assignee: AT&T Corp
    Inventor: Matthew A. Blaze
  • Patent number: 6002772
    Abstract: To prevent piracy or leakage of data content, a cryptography technique and electronic watermark technique are combined together and used. In a data content supplied to a user, a user data is entered as electronic watermark by a data management center, and the data content with an electronic watermark entered in it is encrypted using a crypt key and is supplied. The encrypted data content is decrypted using a crypt key distributed from the data management center and is used. In case it is to be stored, it is encrypted using another crypt key. In case the data content is copied and transferred to other user, a user data of the other user is entered as electronic watermark, and a scenario to enter the user data of the other user as electronic watermark is registered at the data management center, and the data content with electronic watermark entered in it is encrypted using another crypt key and is supplied.
    Type: Grant
    Filed: April 2, 1997
    Date of Patent: December 14, 1999
    Assignee: Mitsubishi Corporation
    Inventor: Makoto Saito
  • Patent number: 6002769
    Abstract: A secure electronic messaging system (SEMS) provides absolute system security and user-defined message security for electronic messaging between two public entities. These messages can be of any kind provided the contents are created using a defined master alphabet of 81 characters or less. The SEMS encrypts and decrypts source message data using a series of message keys that are derived from a private, numeric original key known only by both parties sending and receiving messages. The message key suite absolutely secures the original key from discovery. The secure distribution of these original keys will be under the same methods that the public entities would use to discover each other such as opening an account, making a public inquiry for membership, etc. The system is based on the simple mathematics for secure electronic monetary transactions that translates source numbers into encrypted cipher numbers.
    Type: Grant
    Filed: September 4, 1997
    Date of Patent: December 14, 1999
    Assignee: Secure Choice LLC
    Inventor: Paul McGough
  • Patent number: 5999627
    Abstract: The present invention relates to an improved method for performing modular exponentiation to a fixed base element. The method includes exponentiating a first digital input signal g by a second digital input signal R, where g is a fixed signal unique to a cryptographic system and R is a randomly generated digital signal, to compute a third digital signal g.sup.R. The exponentiating includes pre-computing and storing a plurality of values depending only upon the fixed signal g in a plurality of memory locations within a computing device and then speeding up the computation of g.sup.R using the stored values. The invented exponentiation method can substantially reduce the amount of computation required to compute the value for g.sup.R. Exponentiation methods according to embodiments of the present invention may be used in a variety of cryptographic systems, e.g., Schnorr identification scheme, Digital Signature Standard (DSS), and Diffie-Hellman key agreement scheme, etc.
    Type: Grant
    Filed: January 7, 1998
    Date of Patent: December 7, 1999
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Pil-joong Lee, Chae-hoon Lim
  • Patent number: 5999629
    Abstract: We have recognized that there is a strong need to control and maintain the secrecy of the intelligence that may be used by computers to communicate with another, for example, by encrypting the messages that they exchange with one another. Thus, the encryption keys used to encrypt such messages need to be managed in a highly secure manner. Accordingly, we provide an encryption module, which, in accord with an aspect of the invention, generates a unique device encryption key (S.sub.local), a cryptographic key formed from a unique identification key (S.sub.id) and an associated public key (KP.sub.id), and at least one program encryption key, in which the public key is generated as a function of the unique identification key. The module then encrypts the unique identification key and program encryption key using said device encryption key and stores the encrypted result in memory internal to security module, thereby securing the keys against misappropriation.
    Type: Grant
    Filed: October 31, 1995
    Date of Patent: December 7, 1999
    Assignee: Lucent Technologies Inc.
    Inventors: Daniel Nelson Heer, David P. Maher
  • Patent number: 5999622
    Abstract: To facilitate protected distribution of digital data files, the files are segmented, and each segment (e.g. disk sector) is encrypted separately. Some segments can be left unencrypted, speeding access since less decryption is required. Different segments can utilize different encryption techniques, increasing protection against unauthorized decryption. A table stored in association with the encrypted data provides authorized users with data identifying the encrypted segments, and the form of encryption used. Decryption is accomplished with a layered set of operating system software that operates in conjunction with said table. Specialized APIs aren't used; applications programs are provided with unencrypted data using conventional APIs. Internal interfaces, invisible to the APIS, intercept normal processing calls (e.g READs) and direct them to internal decryption software that returns decrypted data back to the APIs.
    Type: Grant
    Filed: November 22, 1995
    Date of Patent: December 7, 1999
    Assignee: Microsoft Corporation
    Inventors: Hiroshi Yasukawa, Takashi Kurosawa
  • Patent number: 5999625
    Abstract: A cryptographic method implemented on an electronic communication network interconnecting a plurality of terminals represents funds in a way that is secure at the issuer and secure when funds move from payer to payee and back to the issuer. The cryptographic method mints, issues, pays and redeems funds when transactions are done over the network with the flow and transaction of funds being controlled by an issuer. The method implements electronic money acquisition, transfer of money between users in an unrestricted way and in a way where fraud is impossible cryptographically, and redemption of electronic money to correct real money bank accounts. Funds are handled so that their representation enables the issuer to treat the representation as a physical monetary instrument equivalent to notes or coins.
    Type: Grant
    Filed: February 27, 1997
    Date of Patent: December 7, 1999
    Assignee: International Business Machines Corporation
    Inventors: Mihir Bellare, Juan Alberto Garay, Charanjit Singh Jutla, Marcel Mordechay Yung
  • Patent number: 5991416
    Abstract: A scrambling and a descrambling circuit for cordless telephone provides a higher security level than current phone scrambling circuitry. The higher security level is accomplished by separating an audio signal into low and high frequency bands. The frequency bands are selectively inverted or non-inverted during scrambling and descrambling according to common selection conditions. The processed signals are mixed into an overall mixed signal. The overall mixed signal is selectively inverted or non-inverted during scrambling and descrambling according to a common selection condition to increase the phone's transmission security level.
    Type: Grant
    Filed: October 21, 1996
    Date of Patent: November 23, 1999
    Assignee: Samsung Electronics, Co. Ltd.
    Inventor: Yl-Sung Bae
  • Patent number: 5991410
    Abstract: The present invention is a method of a wireless adaptor receiving financial information, indicative of financial transactions, in PSTN compatible format, encrypting and converting the information into PSTN non-compatible format, transmitting the encrypted and converted information to a host computer, decrypting the information by the host computer, transmitting the decrypted information to an authorization processor, which transmits back to the host computer signals indicating authorization or denial of the transaction, the host computer transforming the signal received from the authorization processor to PSTN non-compatible format, and transmitting to the to the financial device the authorization or denial signal.
    Type: Grant
    Filed: May 9, 1996
    Date of Patent: November 23, 1999
    Assignee: AT&T Wireless Services, Inc.
    Inventors: Herb Albert, Paul Renton, Lorin Rowe, Stephen R. Schramke, Glen Zorn
  • Patent number: 5982897
    Abstract: High precision transmitted navigational data as encrypted data transmitted by global positioning (GPS) satellites is made unavailable in regions designated as hostile and during desired intervals, while allowing the data to be available outside the hostile region. All satellites in the GPS constellation transmit the high precision navigational data in encrypted form. However, only the satellites that are not visible to the hostile region transmit the periodic key necessary to decrypt the data. The periodic key changes after a predetermined time interval. During a given time interval the same key value is used by all satellites for encryption of the high precision navigational data. A receiver can obtain the current periodic key from any visible satellite which is transmitting the periodic key. This key is then used to decrypt the high precision navigational data from that satellite and all other visible satellites.
    Type: Grant
    Filed: June 10, 1998
    Date of Patent: November 9, 1999
    Assignee: ITT Corporation
    Inventor: James Monroe Clark
  • Patent number: 5983203
    Abstract: A computer implemented method for processing streams of data signals representing different data items of a common business attribute transmitted by a plurality of different vendors. The streams of data signals are transmitted to the computer by the vendors. Each one of the vendors transmits the data items in a different vendor associated data item format. A rules table is provided in the computer relating each of the vendors with such vendors associated data item format. The streams of data signals transmitted by the plurality of different vendors are stored in a memory. The vendors transmitting the streams of data signals are identified by the computer. The formats of the streams of data signals transmitted by each of the vendors are mapped by the computer in accordance with the rules table into a common predetermined format for the data items. The common format of the data items is stored in a computer memory.
    Type: Grant
    Filed: January 3, 1997
    Date of Patent: November 9, 1999
    Assignee: FMR Corp.
    Inventors: Brian E. Church, Joseph G. Ferra, Paul F. Mulligan
  • Patent number: 5978482
    Abstract: An information processing system including an encryption processing logic module and a decryption processing logic module for enabling the encryption of digital information to be decrypted with a decryption key K. The encryption processing module includes logic for encrypting the digital information, distributing the digital information and authorizing a user to decrypt the information. The decryption processing module includes logic for the user to communicate a user number n.sub.i to receive an authorization number a.sub.i (a.sub.i being calculated as equal to ((K.sym.n.sub.i) raised to the power of (1/n.sub.i ' mod .phi. from the authorization logic in the encryption processing module and extrication logic for extricating the decryption key. The user number n.sub.i uniquely identifies, and is valuable to, the user, so valuable in fact that the user would be unwilling to publically disclose it. The extrication logic operates on a digital signet pair (a.sub.i, n.sub.
    Type: Grant
    Filed: August 21, 1995
    Date of Patent: November 2, 1999
    Assignee: International Business Machines Corporation
    Inventors: Cynthia Dwork, Joseph Y. Halpern, Jeffrey Bruce Lotspiech
  • Patent number: 5978479
    Abstract: A descramble section extracts required information for descrambling transmitted together with TV signals and converts scrambled signals to ordinary TV signals in response to input control signals. A microcomputer system has a function of processing view-contract management using a required information for descrambling and applies the control signals to the descramble section based on a result of the viewer-contract management processing, when an IC card is not connected. On the other hand, when IC card is connected, the microcomputer system gives the required information for descrambling to the IC card and gives control signals from the IC card to the descramble section without processing the viewer-control management. The IC card performs the viewer-contract management processing using the necessary information for descrambling, and gives control signals to the microcomputer system based on the result of the viewer-contract management processing.
    Type: Grant
    Filed: July 2, 1996
    Date of Patent: November 2, 1999
    Assignee: Kabushiki Kaisha Toshiba
    Inventor: Shinichi Ooi