Patents by Inventor Dale W. Hopkins
Dale W. Hopkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8135132Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: GrantFiled: December 23, 2009Date of Patent: March 13, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Publication number: 20100158247Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: ApplicationFiled: December 23, 2009Publication date: June 24, 2010Inventors: DALE W. HOPKINS, SUSAN LANGFORD, LARRY HINES, CHING-HSUAN CHEN
-
Patent number: 7660421Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: GrantFiled: June 28, 2002Date of Patent: February 9, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Patent number: 7392384Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: GrantFiled: June 28, 2002Date of Patent: June 24, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Patent number: 7318160Abstract: A method is disclosed for performing cryptographic tasks, that include key setup tasks and work data processing tasks. This method comprises the steps of processing the key data in a first cryptographic engine and processing the work data in a second cryptographic engine. The processing of the key data comprises the steps of receiving key data, processing the key data, and generating processed key data. The processing of the work data comprises the steps of receiving the processed key data, receiving work data, processing the work data, and outputting the processed work data. In this method of the invention, the first cryptographic engine performs its tasks independently of the second cryptographic engine. A method for allocating cryptographic engines in a cryptographic system is also disclosed comprising monitoring a queue of cryptographic tasks, monitoring activity levels of a first allocation of a plurality of cryptographic engines, and dynamically adjusting the first allocation.Type: GrantFiled: February 1, 2002Date of Patent: January 8, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga
-
Patent number: 7093133Abstract: A method is provided for generating a group digital signature wherein each of a group of individuals may sign a message M to create a group digital signature S, wherein M corresponds to a number representative of a message, 0?M?n?1, n is a composite number formed from the product of a number k of distinct random prime factors p1·p2· . . . ·pk, k is an integer greater than 2, and S?Md(mod n). The method may include: performing a first partial digital signature subtask on a message M using a first individual private key to produce a first partial digital signature S1; performing at least a second partial digital signature subtask on the message M using a second individual private key to produce a second partial digital signature S2; and combining the partial digital signature results to produce a group digital signature S.Type: GrantFiled: December 20, 2001Date of Patent: August 15, 2006Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga
-
Publication number: 20040003246Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Applicant: Compaq Information Technologies Group, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Publication number: 20040001595Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Applicant: Compaq Information technologies Group, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Publication number: 20030149883Abstract: A method is disclosed for performing cryptographic tasks, that include key setup tasks and work data processing tasks. This method comprises the steps of processing the key data in a first cryptographic engine and processing the work data in a second cryptographic engine. The processing of the key data comprises the steps of receiving key data, processing the key data, and generating processed key data. The processing of the work data comprises the steps of receiving the processed key data, receiving work data, processing the work data, and outputting the processed work data. In this method of the invention, the first cryptographic engine performs its tasks independently of the second cryptographic engine. A method for allocating cryptographic engines in a cryptographic system is also disclosed comprising monitoring a queue of cryptographic tasks, monitoring activity levels of a first allocation of a plurality of cryptographic engines, and dynamically adjusting the first allocation.Type: ApplicationFiled: February 1, 2002Publication date: August 7, 2003Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga
-
Publication number: 20030120931Abstract: A method is provided for generating a group digital signature wherein each of a group of individuals may sign a message M to create a group digital signature S, wherein M corresponds to a number representative of a message, 0≦M≦n−1, n is a composite number formed from the product of a number k of distinct random prime factors p1·p2· . . . ·pk, k is an integer greater than 2, and S≡Md(mod n). The method may include: performing a first partial digital signature subtask on a message M using a first individual private key to produce a first partial digital signature S1; performing at least a second partial digital signature subtask on the message M using a second individual private key to produce a second partial digital signature S2; and combining the partial digital signature results to produce a group digital signature S.Type: ApplicationFiled: December 20, 2001Publication date: June 26, 2003Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga
-
Publication number: 20020041683Abstract: A method provided for determining an optimal number k of prime factors p1, p2, . . . pk for developing a modulus N for use in a cryptographic system providing computational performance that increases as the number of constituent prime factors of the modulus increases, wherein use of the optimal number k of prime factors enables the system to provide optimal computational performance while maintaining a determined level of security.Type: ApplicationFiled: September 27, 2001Publication date: April 11, 2002Inventors: Dale W. Hopkins, Tom W. Collins
-
Patent number: 5519410Abstract: A virtual image display management system using a head-up display that improves the ability of an operator of an automobile, or other equipment, to focus on primary functions, such as vehicle operation, while providing secondary information within the operator's primary visual field without requiring the operator to refocus. The present virtual image display management system integrates one or more secondary function displays into one reconfigurable virtual image head-up display. Several secondary functions are displayed sequentially using analog/digital symbology, icon representation, alphanumeric text or static/motion picture format. The operator may select secondary functions to be monitored, the display format, and the data acquisition intervals. A reconfigurable virtual image display processor accommodates more sophisticated sensor and communication functionality without penalizing efficiency and safety of the operator's primary functions.Type: GrantFiled: September 19, 1994Date of Patent: May 21, 1996Assignee: Hughes Aircraft CompanyInventors: Joseph P. Smalanskas, Dale W. Hopkins, Scott T. Wood, Ernest S. Blazic
-
Patent number: 4216185Abstract: High purity water distribution systems are purged and disinfected by incorporating an outlet purge line into the conventional recirculating loop of the prior art. The purge line communicates with each outlet opening of the high purity water system and means are provided for intermittently and sequentially purging the outlets.Type: GrantFiled: October 16, 1978Date of Patent: August 5, 1980Inventor: Dale W. Hopkins