Patents Examined by Gregory A. Morse
  • Patent number: 7085937
    Abstract: A method is disclosed for amortizing the authentication overhead of data transmissions. The method comprises establishing a first secure transmission of data between a transmitter and a receiver by transmitting at least one token to the receiver during the first secure transmission. There may be any number of senders and receivers, and any receivers may be a sender and vice versa. The method also comprises establishing at least one additional transmission of data between the sender and the receiver and transmitting the data and at least one token during the at least one additional transmission. In addition, the method compares the at least one token transmitted during the at least one additional transmission to the token transmitted during the first secure transmission to guarantee the authenticity of that at least one additional transmission. The method may also include transmitting a preselected number of tokens during the first secure transmission.
    Type: Grant
    Filed: October 27, 2000
    Date of Patent: August 1, 2006
    Assignee: Xanboo, Inc.
    Inventors: Babak Rezvani, Jack L. Chen
  • Patent number: 7072967
    Abstract: In a distributed computing environment, a message gate may be the message endpoint for a client or service. A message gate may provide a secure message endpoint that sends and receives type-safe messages. Devices may have a gate factory (e.g. message endpoint constructor) that is trusted code on the device for generating gates based on XML message descriptions. In one embodiment, the gate factory may construct a gate from the XML schema of the service, a URI for the service, and an authentication credential. Access to some services may be unrestricted. For such services, a gate may be constructed without an authentication credential, saving the overhead of running an authentication service and incorporating an authentication credential. Gate construction may also be optimized for certain clients that do not desire to perform checking of messages against a service's XML schema. If verification is not desired, a client may avoid or may chose to avoid building (e.g.
    Type: Grant
    Filed: September 12, 2000
    Date of Patent: July 4, 2006
    Assignee: Sun Microsystems, Inc.
    Inventors: Thomas E. Saulpaugh, Gregory L. Slaughter, Eric Pouyoul
  • Patent number: 7069427
    Abstract: The present invention is a system and method for handling personally identifiable information, using a rules model. The invention involves defining a limited number of privacy-related actions regarding personally identifiable information; constructing a rule for each circumstance in which one of said privacy-related actions may be taken or must be taken; allowing for the input of dynamic contextual information to precisely specify the condition for evaluation of a rule; creating a programming object containing at least one of said rules; associating the programming object with personally identifiable information; processing a request; and providing an output. The invention does not merely give a “yes-or-no answer. The invention has the advantage of being able to specify additional actions that must be taken. The invention may use a computer system and network. One aspect of the present invention is a method for handling personally identifiable information.
    Type: Grant
    Filed: June 19, 2001
    Date of Patent: June 27, 2006
    Assignee: International Business Machines Corporation
    Inventors: Steven B. Adler, Endre Felix Bangerter, Nigel Howard Julian Brown, Jan Camenisch, Arthur M. Gilbert, Guenter Karjoth, Dogan Kesdogan, Michael Robert McCullough, Adam Charles Nelson, Charles Campbell Palmer, Martin Joseph Clayton Presler-Marshall, Michael Schnyder, Elsie Van Herreweghen, Michael Waidner
  • Patent number: 7069440
    Abstract: A method and computer program in which a user (132) may have a digital certificate created using a strong authentication technique. Once the user has the digital certificate he may then request the generation of a “single sign-on” certificate that will allow the user (132) access to a foreign computer networks. This is accomplished by the user (132) contacting a registration web server (124) and requesting the generation of “single sign-on” for the foreign computer network. Thereafter, the registration web server (124) may take a public key generated based on the digital certificate and request the creation of a “single sign-on” by simply creating a public key from the digital certificate.
    Type: Grant
    Filed: March 30, 2001
    Date of Patent: June 27, 2006
    Assignee: Northrop Grumman Corporation
    Inventor: Kenneth W. Aull
  • Patent number: 7065652
    Abstract: A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose.
    Type: Grant
    Filed: June 21, 2000
    Date of Patent: June 20, 2006
    Assignee: Aladdin Knowledge Systems, Ltd.
    Inventors: Bin Xu, Jim Sesma, Robert Freeman, Weijun Li
  • Patent number: 7062660
    Abstract: A method and apparatus for controlling the performance of a mount operation changing the logical association of a first file system with a second file system of an information handling system by a user who may not have general authority to perform such a mount operation. In response to a request by a user to perform a requested mount operation on the first file system, a determination is made of whether the user has general authority to perform the requested mount operation, either because the user has general superuser authority or because the user has superuser authority for mount operations. If the user has general authority to perform the requested mount operation, the requested mount operation is performed. If the user does not have general authority to perform the requested mount operation, the requested mount operation is performed only if the user has a predetermined access authority to the first file system.
    Type: Grant
    Filed: August 6, 2001
    Date of Patent: June 13, 2006
    Assignee: International Business Machines Corporation
    Inventor: Joseph Quinlan
  • Patent number: 7062651
    Abstract: In a network connected to a printer and a registration server, a network registration protocol for registering the printer on the network includes the steps of installing a secret unique identifier and public unique identifier in non-volatile memory in the printer and in a database of the registration server, before the printer is connected to the network; then, when the printer is connected to the network, authenticating the printer to the server by comparison of the secret unique identifiers installed in printer and server, using a secure transmission between the two over the network. Also a network registration signal for transmission over a network from a printer to a registration server to register the printer with the server, where the signal is transmitted at the first occasion the printer is connected to the network.
    Type: Grant
    Filed: May 23, 2000
    Date of Patent: June 13, 2006
    Assignee: Silverbrook Research Pty Ltd
    Inventors: Paul Lapstun, Kia Silverbrook
  • Patent number: 7058969
    Abstract: A first unit collects and stores data (bar codes 12) and reports to a second unit. The first unit keeps and communicates a first unit current record, for storage, of its (random and unpredictable) activities since last connection and a first unit past record for comparison, of its (random and unpredictable) activities up to last connection. Matching between its previously stored first unit current record and the received first unit past record makes the second unit grant access to the first unit and store the received first unit current record. The same can be done for the second unit by the first unit. Non-coupling invokes provision of extra identification, renewed coupling involving a common default set of records. Records can generate encryption keys. Random data and encryption prevent illegal access.
    Type: Grant
    Filed: May 8, 2002
    Date of Patent: June 6, 2006
    Inventor: Michael Anthimos Sambati
  • Patent number: 7058814
    Abstract: A limited tracking system and associated method that enable the use of personal encoded identification media to limit access to tracking information. The tracking system provides concurrent time-limited access to a large number of people, objects, information, services, and other resources, and has particular applicability to credit cards, dining cards, telephone calling cards, health cards, driver's licenses, video store cards, car access cards, building access cards, computer access cards, and like identification badges or cards. The tracking system includes a transmitter module incorporated in a badge, and a receiver module incorporated in a secure server. The transmitter module contains an encryptor and a watch crystal that keeps track of time, such that the encryptor encrypts the current time with the user's private key, and periodically transmits the encrypted current time to the receiver module, as a code list.
    Type: Grant
    Filed: September 28, 2000
    Date of Patent: June 6, 2006
    Assignee: International Business Machines Corporation
    Inventor: Thomas Guthrie Zimmerman
  • Patent number: 7058808
    Abstract: The essence of the invention is in that when making a digital blind RSA-signature a new technique for blinding an initial data by a RSA-encryption and corresponding technique for unblinding the signed blinded data are employed, which gives the possibility to use an unlimited number of kinds of the signature in electronic systems of the mass scale service. The untraceability is ensured by a corresponding choice of the randomized exponent R, RSA-key used in RSA-encryption the initial data, and by the public module N properties verified in an arbitrary time moment. In so doing, N=P·Q, where P and Q are secret prime factors, and R is multiple to N?1. In other variants of the invention the diversity of kinds of the signature is set by limitings on multiplicities of public exponents, said limitings being chosen prior to blinding the initial data.
    Type: Grant
    Filed: June 16, 1999
    Date of Patent: June 6, 2006
    Assignee: Cyphermint, Inc.
    Inventors: Oleg Anatolievich Zolotorev, Ivan Vladimirovich Kuznetsov, Andrei Gennadievich Moshonkin, Alexandr Leonidovich Smirnov, Ildar Magafurovich Khamitov
  • Patent number: 7055038
    Abstract: A graphics processor receives a compressed encrypted video stream. The graphics processor decrypts the compressed encrypted video stream and stores a decrypted version (i.e., a decrypted compressed video stream) in a protected portion of an on-chip or off-chip video memory. The graphics processor then permits processors and other bus masters on the graphics processor to access the on-chip video memory, but conditionally limits access to other bus masters that are located off-chip, such as a central processing unit located off-chip and coupled to the graphics processor via a bus.
    Type: Grant
    Filed: May 7, 2001
    Date of Patent: May 30, 2006
    Assignee: ATI International SRL
    Inventors: Allen J. C. Porter, Chun Wang, Kevork Kechichian, Gabriel Varga, David Strasser
  • Patent number: 7051368
    Abstract: Methods and systems of screening input strings that are intended for use by a Web server are described. In the described embodiment, an attack pattern is determined that can be used to attack a Web server. A search pattern is defined that can be used to detect the attack pattern. The search pattern is defined in a flexible, extensible manner that permits variability among its constituent parts. An input string that is intended for use by a Web server is received and evaluated using the search pattern to ascertain whether the attack pattern is present. If an attack pattern is found that matches the search pattern, then a remedial action is implemented.
    Type: Grant
    Filed: November 9, 1999
    Date of Patent: May 23, 2006
    Assignee: Microsoft Corporation
    Inventors: Michael Howard, Vikas Malhotra
  • Patent number: 7050584
    Abstract: After a key pair with a public key and a corresponding private key has been determined on the basis of an initial value, the initial value is made available to a user. The private key can then be erased. When the user wishes to carry out a cryptographic operation based on the “Public-Key-Technology”, the user enters the initial value into a computer and, upon utilization of the initial value, a regenerated private key is formed, which corresponds to the private key that had been previously formed but was then erased.
    Type: Grant
    Filed: August 4, 1999
    Date of Patent: May 23, 2006
    Assignee: Infineon Technologies AG
    Inventors: Gerhard Hoffmann, Klaus Lukas
  • Patent number: 7047409
    Abstract: A method of automatically tracking a certificate pedigree is provided, in which a new user is provided with a piece of hardware containing a predetermined pedigree certificate stored therein, the predetermined pedigree certificate having a level of trust bearing a relationship to a category of hardware of which the provided piece of hardware is a member. An automated registration arrangement is provided which can be accessed only by users having a piece of hardware containing a predetermined pedigree certificate having a specified level of trust stored therein. When the new user accesses the automated registration arrangement using the provided piece of hardware, the automated registration arrangement provides the new user with an individual signature certificate having a level of trust commensurate with that of the pedigree certificate.
    Type: Grant
    Filed: October 16, 2000
    Date of Patent: May 16, 2006
    Assignee: Northrop Grumman Corporation
    Inventors: Kenneth W. Aull, Vincent J. McCullough
  • Patent number: 7046801
    Abstract: A cryptographic processing method in which dependence of cryptographic processing process and secret information on each other is cut off; and in which, when a scalar multiplied point is calculated from a scalar value and a point on an elliptic curve in an elliptic curve cryptosystem, a value of a bit of the scalar value is judged; and in which operations on the elliptic curve are executed a predetermined times and in a predetermined order without depending on the judged value of the bit.
    Type: Grant
    Filed: March 20, 2001
    Date of Patent: May 16, 2006
    Assignee: Hitachi, Ltd.
    Inventor: Katsuyuki Okeya
  • Patent number: 7046804
    Abstract: An image encoding/decoding system and method for producing a computer-generated security device which can be printed onto a document, such as a passport, to secure the document against data alteration. Deflection encoding means comprises means for applying a selected software lens to a source image and producing a deflected image. Encryption encoding means comprises means for applying an encryption function to the deflected image or a source image and producing an encrypted image. Overlaying means is provided for overlaying the deflected and encrypted images and producing therefrom the security device image. The deflected image may be detected from the security device image both by means of a manual lenticular lens corresponding to the software lens applied to a printing of the security image and by means of computer decoding processing applying the software lens.
    Type: Grant
    Filed: April 19, 2000
    Date of Patent: May 16, 2006
    Assignee: Canadian Bank Note Company, Ltd
    Inventors: Trevor Merry, Ileana Buzuloiu
  • Patent number: 7047561
    Abstract: The present invention relates to a firewall for use in association with real-time Internet applications such as Voice over Internet Protocol (VoIP). The firewall applies an application proxy to the signaling and control channels and a packet filter to the bearer channels. One of the features of hybrid firewall is that the application proxy can instruct the packet filter as to which bearer channels to enable and disable for the duration of a real-time Internet application session. The hybrid firewall can also intelligently perform network address translation (NAT) on Internet protocol packets incoming and outgoing to the firewall.
    Type: Grant
    Filed: September 28, 2000
    Date of Patent: May 16, 2006
    Assignee: Nortel Networks Limited
    Inventor: Michael C. G. Lee
  • Patent number: 7043638
    Abstract: The invention relates to a data storage medium storing data material having a data replay order, the stored data material being associated with dummy data material stored on the medium at a different position in the data replay order, in which metadata identifying the data material is encoded as a watermark in the dummy data material.
    Type: Grant
    Filed: March 20, 2003
    Date of Patent: May 9, 2006
    Assignee: Sony United Kingdom Limited
    Inventors: Mark John McGrath, Michael Williams
  • Patent number: 7043017
    Abstract: A symmetric key stream processor 60 that encrypts and decrypts text in accordance with the RC4 algorithm has a main processing block 62 and a host interface 64. The main processing block 62 includes an Sbox memory 78 implemented with a synchronous dual-port RAM and an encryption logic block 80 with a finite state machine. The dual port memory architecture is used for efficiency during permutation and message processing.
    Type: Grant
    Filed: September 13, 2001
    Date of Patent: May 9, 2006
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Richard J. Swindlehurst, Joel D. Feldman
  • Patent number: 7043636
    Abstract: The integrity of a dynamic data object that comprises one or more dynamic data items is ensured by storing the dynamic data object and dynamic authorization data in a memory. The dynamic authorization data may, for example, be a count of how many failed attempts to gain authorization have previously been made, and this is modified at least whenever another failed attempt is made. Whenever the dynamic data object or the dynamic authorization data is changed, its corresponding hash value is recomputed and stored into the memory. The dynamic data object is considered authentic only if newly-generated values of the two hash signatures match those that were previously stored into the memory. Changes to the dynamic data object are permitted only after the user has executed passed an authorization procedure.
    Type: Grant
    Filed: September 14, 2001
    Date of Patent: May 9, 2006
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventor: Ben Smeets