Having Receiver Selection (e.g., Pager) Patents (Class 380/271)
-
Publication number: 20100081459Abstract: The present invention relates to a method and apparatus for distributing paging messages in a wireless communication system. The wireless communication system may include a paging controller configured to distribute the paging messages in a paging area, a paging group including a plurality of base stations within the paging area configured to receive the paging message, and a paging interface between the paging controller and the paging group configured to support transmission of only the paging messages to all the plurality of base stations through a single transmission of the paging message from the paging controller. The method may include distributing a paging message to all of a plurality of base stations through a single transmission of a paging message from a paging controller over a secured IP-multicast group.Type: ApplicationFiled: September 30, 2008Publication date: April 1, 2010Inventors: Peter Bosch, Geoffrey A. Collyer, Jean-Marc Fenart, Sudhir Umarale, Humberto LaRoche, Denis Fauconnier, Ajay Rajkumar, Indra Widjaja
-
Publication number: 20100001848Abstract: The present invention improves systems and devices for commissioning wireless tags, RFID tags, and wireless sensors. The present invention benefits wireless sensors that are not directly part of a demand printed label. In one embodiment RFID tags are pre-loaded into cartridges prior to consumption. This improvement adds significant convenience of loading RFID tags and enhances overall reliability of handling and applying the RFID tags. Accordingly, the present invention includes methods and devices that enable application and distribution of RFID tags in pre-loaded cartridges that are ready-to-use.Type: ApplicationFiled: June 22, 2007Publication date: January 7, 2010Inventors: Clarke McAllister, Timothy Mintzer
-
Publication number: 20090316903Abstract: The present invention relates to a time sync-type One-Time Password (OTP) generation device and method for a mobile phone. The present invention is configured such that an IC chip, in which a serial number and a secret key for OTP generation are encoded and stored, is mounted in an IC interface provided in the battery mounting part of a mobile phone, and is configured such that a decoding unit for encoding the serial number and secret key of the IC chip, a time counter for counting time information provided from a base station, and an OTP generation module for generating OTP numbers using the time information, the serial number and the secret key as a key value for an OTP program are included in the mobile phone. Accordingly, in accordance with the present invention, it is not necessary for a user to carry a separate OTP generation terminal, and concerns with respect to the hacking of OTP numbers can be alleviated because a serial number and a secret key are stored in an IC chip that cannot be hacked.Type: ApplicationFiled: April 18, 2007Publication date: December 24, 2009Inventor: Gyun Tae Jeung
-
Patent number: 7568111Abstract: A system and method is disclosed for providing DRM in a broadcast environment. In accordance with the embodiment, a DRM system distributes encrypted service keys over the mobile telephone network to a mobile terminal. The mobile terminal receives the encrypted service key and uses it to decrypt encrypted content keys received from a DVB set top box. The decrypted content keys are sent to the set box over local link where they are used to decrypt encrypted broadcast content.Type: GrantFiled: November 11, 2003Date of Patent: July 28, 2009Assignee: Nokia CorporationInventors: Jukka Alve, Ari Ikonen, Mauri Kangas, Tapani Heikkilä
-
Publication number: 20090161872Abstract: A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.Type: ApplicationFiled: December 11, 2008Publication date: June 25, 2009Inventors: William G. O'Brien, Tet Hin Yeap, Sanro Zlobec
-
Patent number: 7522727Abstract: A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).Type: GrantFiled: August 31, 2006Date of Patent: April 21, 2009Assignee: Motorola, Inc.Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J. Chater-Lea, Scott J. Pappas, Jason Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson
-
Publication number: 20090016530Abstract: A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier.Type: ApplicationFiled: July 22, 2008Publication date: January 15, 2009Applicant: The Chamberlain Group, Inc.Inventors: Bradford L. Farris, James J. Fitzgibbon
-
Patent number: 7466826Abstract: To transmit digital data representing a content from a source to a receiver through a digital communication channel, the data being scrambled by at least one control word, the method includes the following steps. The source generates an encryption key which it stores temporarily. It encrypts the control word with the encryption key and transmits to the receiver the scrambled digital data and the encrypted control word, the latter being transmitted through an encrypted communication channel. The receiver then performs an operation of authentication of the source. When the source is authenticated by the receiver, it transmits the encryption key to it. The receiver then decrypts the control word and descrambles the data so as to present them to a user. The encryption key is then erased from the memories of the source and the receiver when the content has been entirely transmitted.Type: GrantFiled: December 4, 2001Date of Patent: December 16, 2008Assignee: Thomson LicensingInventors: Jean Pierre Andreaux, Sylvain Chevreau, Eric Diehl
-
Patent number: 7437752Abstract: In a particular embodiment, a client module is deployed on a wireless device. The client module comprises a policy database including a list of authorized devices to which the wireless device may communicate. In another embodiment, the client module comprises a policy database including at least two user profiles on a wireless device, such as a personal profile and a business profile.Type: GrantFiled: September 23, 2002Date of Patent: October 14, 2008Assignee: Credant Technologies, Inc.Inventors: Robert W. Heard, Dwayne R. Mann, Christopher D. Burchett, Ian R. Gordon
-
Patent number: 7426746Abstract: A mechanism for providing a mobile node with reliable information for location privacy decisions in connection with an address update process that gives the correspondent node a chance to deduce the location of the mobile node is provided. According to one embodiment of the invention, an indication is given when an address update process needs to be performed for optimizing routing between a mobile node and a correspondent node. In response to the indicating step, the correspondent node may be authenticated, the authentication yielding identity information about the correspondent node. Based on the identity information, a route optimization decision may be made based on whether or not the address update process is to be performed, and the address update process may be carried out depending on the decision.Type: GrantFiled: October 22, 2003Date of Patent: September 16, 2008Assignee: Nokia CorporationInventors: Risto Mononen, Sandro Grech
-
Patent number: 7412058Abstract: A method and radio receiver are provided for receiving and deciphering RF signals having encrypted data information relevant to the receiver environment. According to one aspect of the present invention, the receiver includes an input for receiving an RF signal having a data stream including a key selector and encrypted data including a message, and a demodulator for demodulating the data stream and outputting encrypted data including the message. The receiver further includes a data decryption circuit including memory for storing one or more groups of decryption keys based on a characteristic of the receiver environment. The data decryption circuit selects a decryption key based on the key selector and decrypts the message based on the selected decryption key.Type: GrantFiled: March 18, 2003Date of Patent: August 12, 2008Assignee: Delphi Technologies, Inc.Inventors: Glenn A. Walker, J. Robert Dockemeyer, Jr.
-
Patent number: 7403622Abstract: A symmetric key management process in a communication network comprising a source device furnished with a source of data to be broadcast over the network and at least one receiver device intended to receive the broadcast data. The process comprises: determining and securely transmitting a first symmetric key to a receiver device; the receiver device encrypting the first symmetric key using a second symmetric key and transmitting it to the source device; and the source device recovering and storing it. Before transmitting the data to at least one reception device, the source device encrypts these data with the aid of the first symmetric key, then it transmits these encrypted data, accompanied by the first encrypted symmetric key, to at least one receiver device. The receiver device decrypts the first symmetric key with the aid of the second key which it possesses, then it decrypts the encrypted data with the aid of the first symmetric key thus recovered.Type: GrantFiled: April 18, 2002Date of Patent: July 22, 2008Assignee: Thomson LicensingInventors: Eric Diehl, Jean-Pierre Andreaux
-
Patent number: 7380124Abstract: The present invention supports a secure transmissions protocol for information packet transmission between a Mobile Node and a Foreign Agent. The information packets are encrypted and decrypted using an integrated software client that combines mobile IP communication support and encrypting and decrypting protocols.Type: GrantFiled: March 28, 2002Date of Patent: May 27, 2008Assignee: Nortel Networks LimitedInventors: Jerry Mizell, David Lauson, Peter Wenzel, Steven Currin
-
Patent number: 7372963Abstract: To reduce processing load or processing time required for compression and encryption of data. Data to be compressed, such as image data, is divided into specified block sizes by am image divider (10). A quantizer (12) references a quantization table (14) to quantize each of these blocks of data. The result of this quantization is entropy encoded by an entropy encoder (16) referencing a coding table (18) to acquire compressed data. An encryptor (20) encrypts the quantization table (14) and coding table (18) used in the quantization and encoding using a specified encryption method. A multiplexor (24) gathers together the encrypted data acquired as a result together with the compressed data in a specified format.Type: GrantFiled: July 23, 2003Date of Patent: May 13, 2008Assignee: Fuji Xerox Co., Ltd.Inventors: Kohshiro Inomata, Katsuya Mitsutake
-
Patent number: 7353392Abstract: A method and a configuration are described for mutual authentication of two data processing units. The mutual authentication of two data processing units is normally carried out in two separate authentication processes, which are carried out successively. A challenge and response method is normally used. For this purpose, a first challenge is sent from a first data processing unit to a second data processing unit, which transmits a first response back. A second response is produced by the first data processing unit, and is transmitted to the second data processing unit.Type: GrantFiled: August 8, 2002Date of Patent: April 1, 2008Assignee: Infineon Technologies AGInventors: Erwin Hess, Wolfgang Pockrandt
-
Patent number: 7343487Abstract: According to the present invention there is provided a datacast distribution system which allows for the distribution of movies, music, games, application software, and the like using a new or existing terrestrial digital video broadcast (DVB-T) network.Type: GrantFiled: October 10, 2001Date of Patent: March 11, 2008Assignee: Nokia CorporationInventors: Markus Lindqvist, Kai-Uwe Prokki, Markku Soinio, Dominique Müller
-
Patent number: 7289630Abstract: A method for protecting traffic in a radio access network connected to at least two core networks. The method includes maintaining a core-network-specific authentication protocol and a radio-bearer-specific ciphering process, and generating, for each ciphering process, a count parameter including a cyclical sequence number and a hyperframe number (HFN) which is incremented each time the cyclical sequence number completes one cycle. For each core network or authentication protocol, a first radio bearer of a session is initialized with a HFN exceeding the highest HFN used during the previous session. When a new radio bearer is established, the mobile station selects the highest HFN used during the session for the core network in question, increments it and uses it for initializing the count parameter for the new radio bearer. At the end of a session, the mobile station stores at least part of the highest HFN used during the session.Type: GrantFiled: August 30, 2002Date of Patent: October 30, 2007Assignee: Nokia CorporationInventors: Jukka Vialén, Valtteri Niemi
-
Patent number: 7215777Abstract: Methods and systems for efficiently sending notification of the occurrence of events through a firewall. A client system operating inside a firewall, attempts to receive notification of the occurrence of events from a server system operating outside the firewall. The client system attempts to receive communication from the server system using a connectionless protocol, such as UDP. If the client system receives communication using the connectionless protocol, the client system requests notification be sent using the connectionless protocol. The server system notifies the client system by sending a packet to the server system, using the connectionless protocol, when events occur. However, if the client does not receive communication using the connectionless protocol, the client requests notifications be sent using a connection-oriented protocol, such as TCP.Type: GrantFiled: January 16, 2001Date of Patent: May 8, 2007Assignee: Microsoft CorporationInventors: Brian J. Deen, Alex I. Hopmann, Joel M. Soderberg, Sean O. Lyndersay
-
Patent number: 7206933Abstract: A computer system includes a peripheral device and a processing unit. The processing unit is adapted to execute a driver for interfacing with the peripheral device in a standard mode of operation and an authentication agent in a privileged mode of operation, wherein the authentication agent includes program instructions adapted to authenticate the driver. The peripheral device may comprise a communications device, such as a software modem. A method for identifying security violations in a computer system includes executing a driver in a standard processing mode of a processing unit; transitioning the processing unit into a privileged processing mode; and authenticating the driver in the privileged processing mode. The driver may be adapted for interfacing with a communications peripheral device, such as a software modem.Type: GrantFiled: July 9, 2001Date of Patent: April 17, 2007Assignee: Advanced Micro Devices, Inc.Inventors: Geoffrey S. Strongin, David W. Smith, Brian C. Barnes, Terry L. Cole, Rodney Schmidt, Michael Barclay
-
Patent number: 7203480Abstract: A system for broadcasting wireless data service in a mobile communication system includes sending a request call for a wireless data service from a mobile terminal to a mobile switching center, identifying whether the terminal is registered in the mobile switching center, transmitting authentication code information indicating that the terminal is registered in the base transceiver station, and releasing the corresponding call in the terminal receiving the authentication code information and receiving the wireless service data. The authentication code information may include a Walsh code and a long code necessary for allowing the terminal to reconstitute the data. Through this case information, the system can broadcast wireless service data throughout an entire region and be assured that only mobile terminals storing compatible code information will be able to access the data.Type: GrantFiled: December 4, 2002Date of Patent: April 10, 2007Assignee: LG Electronics Inc.Inventor: Hyo Sig Jeon
-
Patent number: 7181013Abstract: Apparatuses and methods are disclosed for accessing and distributing data that includes a portable first device and a second device wherein both devices have unconscious capture capability. The first device has a first memory wherein at least one document is stored in the first memory of the first device. The first device has a transceiver, an identifier, and a public key to access a second device.Type: GrantFiled: June 27, 2006Date of Patent: February 20, 2007Assignee: Ricoh Co., Ltd.Inventor: Jonathan J. Hull
-
Patent number: 7181624Abstract: A block key to encrypt block data is generated using an ATS (arrival time stamp) appended to each of TS (transport stream) packets included in a transport stream correspondingly to the arrival time of the TS packet. The ATS is a random data depending upon an arrival time, and so a block-unique key can be generated, which enhances the protection against data cryptanalysis. A block key is generated from a combination of an ATS with a key unique to a device, recording medium or the like such as a master key, disc-unique key, title-unique key or the like. Since an ATS is used to generate a block key, any area for storage of an encryption key for each block may not be provided in a recording medium.Type: GrantFiled: April 4, 2001Date of Patent: February 20, 2007Assignee: Sony CorporationInventors: Tomoyuki Asano, Yoshitomo Osawa, Motoki Kato
-
Patent number: 7139550Abstract: In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first fault information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.Type: GrantFiled: June 30, 2003Date of Patent: November 21, 2006Assignee: Siemens AktiengesellschaftInventors: Jorge Cuellar, Guenther Horn
-
Patent number: 7123719Abstract: A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).Type: GrantFiled: February 16, 2001Date of Patent: October 17, 2006Assignee: Motorola, Inc.Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J Chater-Lea, Scott J. Pappas, Jason Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson
-
Patent number: 7093286Abstract: Improved techniques that enable the exchange of sensitive information between client devices and server devices are disclosed. The exchange, as well as the use and nature, of sensitive information released can be governed by one or more privacy agreements established between the principle parties, namely, a client device and a content server. A proxy server can be used to establish privacy agreements with content servers (service providers).Type: GrantFiled: April 26, 2000Date of Patent: August 15, 2006Assignee: Openwave Systems Inc.Inventor: Peter F. King
-
Patent number: 7085384Abstract: Apparatuses and methods are disclosed for accessing and distributing data that includes a portable first device and a second device wherein both devices have unconscious capture capability. The first device has a first memory wherein at least one document is stored in the first memory of the first device. The first device has a transceiver, an identifier, and a public key to access a second device.Type: GrantFiled: June 22, 2004Date of Patent: August 1, 2006Assignee: Ricoh Co., Ltd.Inventor: Jonathan J. Hull
-
Patent number: 7072473Abstract: A system and method for providing secure, on-demand delivery and retrieval of documents, messages and the like utilizing an adaptor coupled to a facsimile machine. An adaptor is coupled between a facsimile machine and a telephone line. A mobile device communicates with the adaptor to allow a user to log onto a document delivery system, via the telephone line, and select a document, message or the like to be printed. The telephone number of the facsimile machine is provided to the data center by the adaptor or mobile device, and the data center then sends the selected documents to the facsimile machine through the adaptor. Alternatively, the data center can encrypt the documents before sending, and a key is used by the adaptor to decrypt the documents prior to sending to the facsimile machine.Type: GrantFiled: July 12, 2001Date of Patent: July 4, 2006Assignee: Pitney Bowes Inc.Inventor: Thomas J. Foth
-
Patent number: 7068701Abstract: A long code scrambler has been provided to scramble the data bits prior to QAM mapping. Different data rates are accommodated by using different long code m-tuples sampled at the modulation symbol rate, where m equals 2, 4 or 6 for 4, 16 or 64 QAM, respectively. In order to support 1XEV-DV users employing multiple Walsh code channels, a long code 6-tuple sample is permutated, to further randomize the QAM symbols. As appropriate for the modulation order, 2, 4 or 6 bits of the permutated 6-tuple are applied to the data sequence. That is, in addition to randomizing the modulation symbols for a given code channel, each code channel will likely have unique QAM symbols at any given symbol time.Type: GrantFiled: May 29, 2001Date of Patent: June 27, 2006Assignee: Motorola, Inc.Inventors: Gregory Agami, Robert J Corke, Daniel G Prysby, Stefan Paun
-
Patent number: 7065655Abstract: A method is disclosed comprising placing a first device in an enclosure, placing a second device in the enclosure, sealing the enclosure, and after sealing the enclosure, causing the first device to exchange a key with the second device. After the key exchange, the first and second devices can be taken out of the enclosure and can use the key to communicate with each other securely and in an authenticated manner. The devices may be electronic devices or optical devices. The enclosure prevents electromagnetic radiation of a certain bandwidth from escaping and thus prevents an adversarial device from eavesdropping on communication between the first and second devices. The enclosure may include a filtering material such as a metal net. The enclosure may be, for example, a plastic bag or a glass container.Type: GrantFiled: November 21, 2000Date of Patent: June 20, 2006Assignee: Lucent Technologies Inc.Inventor: Bjorn Markus Jakobsson
-
Patent number: 7023996Abstract: A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform.Type: GrantFiled: May 4, 2001Date of Patent: April 4, 2006Assignee: The Boeing CompanyInventors: Gary V. Stephenson, David S. Parkman, David W. Carman
-
Patent number: 6996235Abstract: A system and method for providing secure, on-demand delivery and retrieval of documents, messages and the like utilizing an adaptor and a printer coupled to the Internet. An adaptor is coupled between a network based printing protocol enabled device, such as, for example, an Internet Printing Protocol enabled printer, and the Internet. A mobile device communicates with the adaptor to allow a user to log onto a document delivery system, via the Internet, and select a document, message or the like to be printed. The adaptor or mobile device provides the Internet address of the printer to the data center, which then sends the selected documents to the printer through the adaptor using the network based printing protocol. Alternatively, the data center can encrypt the documents before sending. A corresponding decryption key is used by the adaptor to decrypt the documents prior to sending to the printer.Type: GrantFiled: October 8, 2001Date of Patent: February 7, 2006Assignee: Pitney Bowes Inc.Inventor: Thomas J. Foth
-
Patent number: 6980796Abstract: Method and arrangement for checking the authenticity of a first communication subscriber in a communications network In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first fault information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.Type: GrantFiled: May 31, 2000Date of Patent: December 27, 2005Assignee: Siemens AktiengesellschaftInventors: Jorge Cuellar, Guenther Horn
-
Patent number: 6973566Abstract: A communications system includes a physical layer hardware unit and a processing unit. The physical layer hardware unit is adapted to communicate data over a communications channel in accordance with assigned transmission parameters. The physical layer hardware unit is adapted to receive an incoming signal over the communications channel and sample the incoming signal to generate a digital received signal. The processing unit is adapted to execute a standard mode driver in a standard mode of operation and a privileged mode driver in a privileged mode of operation. The standard mode driver includes program instructions adapted to extract control codes from the digital received signal and configure the physical layer hardware assigned transmission parameters based on the control codes.Type: GrantFiled: July 9, 2001Date of Patent: December 6, 2005Assignee: Advanced Micro Devices, Inc.Inventors: David W. Smith, Brian C. Barnes, Terry L. Cole, Rodney Schmidt, Geoffrey S. Strongin, Michael Barclay
-
Patent number: 6907123Abstract: A secure real time voice communication system 70 is provided that allows for the secure transmission of voice communications between a sending device 72 and a receiving device 78 through the public switch telephone network 76. The device 72 uses an encryption decryption engine 30 which is capable of executing a number of encryption algorithms which are selected using an encryption selection table 80. An encryption key can be calculated from a periodic key value and a public variable key value. Further, the encryption algorithm used can be periodically changed during a voice communication session so that multiple encryption techniques can be used within the same communication session.Type: GrantFiled: December 21, 2000Date of Patent: June 14, 2005Assignee: Cisco Technology, Inc.Inventor: John E. Schier
-
Publication number: 20040252839Abstract: A method which includes transmitting data by electromagnetic waves to at least a reception device, in receiving the data at the reception device and in displaying part at least of the data at the reception device. The method is characterized in that it includes displaying the data, prior to recording part at least of the data received by the device at the removable storing mechanism which the device receives and/or only after controlling whether the display is authorized or appropriate on the basis of the data pre-recorded in the removable storage mechanism. The invention also concerns a device for implementing the method.Type: ApplicationFiled: June 6, 2003Publication date: December 16, 2004Inventors: Luc Deborgies, Georges Liberman
-
Patent number: 6785748Abstract: A wireless mode between a scanner and an image communication apparatus is changed, in response to completion of image transmission from the scanner to the image communication apparatus, completion of print of the image sent from the scanner to the image communication apparatus, completion of transmission via a communication line connected to the image communication apparatus of the image sent from the scanner to the image communication apparatus, instructions to stop print of the image sent from the scanner to the image communication apparatus, instructions to stop transmission via the communication line connected to the image communication apparatus of the image sent from the scanner to the image communication apparatus, and states of the scanner and the image communication apparatus at a predetermined time and so on. For example, a low power consumption mode and communication mode of Bluetooth communication are switched to each other.Type: GrantFiled: July 13, 2001Date of Patent: August 31, 2004Assignee: Canon Kabushiki KaishaInventors: Makoto Mikuni, Michihiro Izumi, Yoshiyuki Hirai
-
Patent number: 6782102Abstract: Multiple format secure voice apparatus for communication handsets includes a core unit with a speaker, a microphone, a keypad, and a display. The core unit also includes an audio circuit coupled to the speaker and the microphone, an encryption/decryption element coupled to the audio circuit, a coder/decoder element coupled to the audio circuit and the encryption/decryption element, and a control element coupled to the keypad, the display, the audio circuit, the encryption/decryption element, and the coder/decoder element. A standard interface coupling is connected to an audio I/O terminal, a data I/O terminal of the coder/decoder element, and a control I/O terminal of the control element. A mating standard interface coupling mates with the standard interface coupling of the core unit and is coupled to the mating standard interface coupling.Type: GrantFiled: December 21, 2000Date of Patent: August 24, 2004Assignee: Motorola, Inc.Inventors: Scott D. Blanchard, Dean P. Vanden Heuvel
-
Publication number: 20040001592Abstract: An electronic device comprising: a transport stream analyzer, the transport stream analyzer adapted to receive an encrypted MPEG transport stream and to output a program stream map stream, a conditional access table stream, a program stream directory stream, an encrypted video signal stream, one or more encrypted audio streams, an entitlement control message stream and a entitlement management message stream, all as MPEG packetized elementary stream data structure; and a packet multiplexer adapted to receive the output of the transport stream analyzer and to assemble the output of the transport stream analyzer into an encrypted MPEG compliant modified program stream comprised of packs of MPEG packetized elementary stream data structures and to output the encrypted MPEG compliant modified program stream.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Applicant: Koninklijke Philips Electronics N.V.Inventors: Samuel Olu Akiwumi-Assani, Richard Chi-Te Shen, Sheau-Bao Ng
-
Patent number: 6556681Abstract: A trainable transmitter comprises a transmitter, code-generation circuitry and a removable, plug-in data module. The data module includes information necessary for generating a code for a specific security system, such as a garage door opener. Preferably, the data includes a cryptographic algorithm and the frequency at which the wireless signal is to be generated. The code-generation circuitry accesses the data in the data module to generate a code, which is then transmitted by the transmitter. A variety of data modules are provided. A user installs a data module which corresponds to the security system to be accessed.Type: GrantFiled: August 26, 1998Date of Patent: April 29, 2003Assignee: Lear CorporationInventor: Joseph David King
-
Patent number: 6556835Abstract: In a method for multicasting in a radio network, having at least one base station and multiple mobile terminals, the broadcast message is broadcast from the base station, and the broadcast message is received at the mobile terminals. Furthermore, a broadcast message is formulated as a multicast message, and a token is delivered to a selected group of mobile terminals. The token is needed to recover the information of the multicast message. The selected group of mobile terminals includes at least two mobile terminals. The token is used by the selected group of mobile terminals to allow the reception and recovery of the multicast message.Type: GrantFiled: August 15, 2000Date of Patent: April 29, 2003Assignee: Nokia CorporationInventor: Tommi Raivisto
-
Patent number: 6487657Abstract: The invention relates to a data communication network suitable for the exchange of data between computers, which network comprises at least one substantially wireless LAN (Local Area Network) and access points distributed over an area of coverage for linking the computers comprised in the minimally one LAN, with the network. The minimally one wireless LAN is virtual and the data traffic with the computers belonging to that particular LAN is individualized by encoding the data exchanged between the computers and the access points by using for each LAN a unique key.Type: GrantFiled: February 18, 1999Date of Patent: November 26, 2002Assignee: No Wires Needed, B.V.Inventor: Ronald Alexander Brockmann
-
Patent number: 6333703Abstract: A system of mobile units are installed in multiple vehicles in traffic, the vehicles with mobile units being a sample of all vehicles in traffic. These mobile units include both wireless communications devices and apparatus that determines the location of each vehicle. Monitoring a vehicle's position as a function of time also reveals the velocity of the vehicle. Position and speed information is periodically broadcast by the vehicles to a central monitoring station and to neighboring vehicles. At the central monitoring station, the collective input from the sample set of vehicles is processed using statistical analysis methods to provide an instant chart of traffic conditions in the area, the accuracy of said chart being within a range determined by the size of the sample. Warnings of delays or updates on traffic conditions on the road ahead are then automatically returned to subscribers of the information or are used as part of an Intelligent Vehicle Highway System (IVHS).Type: GrantFiled: October 4, 2000Date of Patent: December 25, 2001Assignee: International Business Machines CorporationInventors: Neal J. Alewine, James C. Colson, Abraham P. Ittycheriah, Stephane H. Maes, Paul A. Moskowitz
-
Publication number: 20010016043Abstract: A ciphered message contained in a radio signal is displayed as it is if a code number contained in a received radio signal does not coincide with a preliminarily registered code number. On the other hand, if the code number contained in the radio signal coincide with the preliminarily registered code number, the message is deciphered and displayed on a display portion when a code number input from an input portion coincides with a received code number.Type: ApplicationFiled: May 29, 1998Publication date: August 23, 2001Inventor: SATOSHI BANN0
-
Patent number: 6259791Abstract: A first service provider having a highest security of access, initially programs (604) tables in a subscriber unit (122), including an address table (224) having entries including addresses to which the subscriber unit is responsive, a sub-address table (226) including a sub-address identifier and a corresponding first pointer to a first decryption key for an algorithm required to decrypt a sub-message associated with the sub-address identifier, and a key table (228) including the first decryption key. A second service provider having a security of access less than that of the first service provider reprograms (606) an attribute of at least one of the sub-address table and the key table. The second service provider obtains reprogramming access by encrypting a first reprogramming message such that it can be properly decrypted using the first decryption key.Type: GrantFiled: February 26, 1998Date of Patent: July 10, 2001Assignee: Motorola, Inc.Inventor: Morris Anthony Moore
-
Patent number: 6188767Abstract: The present invention encompasses a base station and method of providing communication services to a plurality of communication units. The method includes the steps of sending communication information between the base station and at least two of the plurality of communication units. A first step of identifying communication units produces a group identifier. A scrambling code, based at least in part on the group identifier, is then used to encode the communication information for transmission.Type: GrantFiled: April 29, 1998Date of Patent: February 13, 2001Assignee: Motorola, Inc.Inventors: Michael L. Needham, Leigh M. Chinitz, Duane C. Rabe
-
Patent number: 6167137Abstract: Disclosed are three major aspects relating to wireless transmission of encrypted data messages in a security system wherein the receiver stores locally an encryption key utilized by the transmitting device to encrypt the data message and the receiver uses the encryption key to decrypt an encrypted data message, and wherein a sequence number generator is used to synchronously track the message sequence at both the transmitter and receiver. A first major aspect involves encrypted device registration (learning) methods that are user-friendly and immune from detection by technically skilled intruders with special RF equipment, and periodic user-friendly changing of the encryption key per encrypted transmitting device in the system. A second major aspect involves encrypted device de-registration (unlearning, or deletion) that is likewise user friendly.Type: GrantFiled: November 23, 1999Date of Patent: December 26, 2000Assignee: Pittway Corp.Inventors: Francis C. Marino, Thomas P. Schmit
-
Patent number: 6150961Abstract: A system of mobile units are installed in multiple vehicles in traffic. These mobile units include both wireless communications devices and apparatus that determines the location of each vehicle. Monitoring a vehicle's position as a function of time also reveals the velocity of the vehicle. Position and speed information is periodically broadcast by the vehicles to a central monitoring station and to neighboring vehicles. At the central monitoring station, the collective input of a set of vehicles is processed to provide an instant chart of traffic conditions in the area. Warnings of delays or updates on traffic conditions on the road ahead are then automatically returned to subscribers of the information or are used as part of an Intelligent Vehicle Highway System (IVHS).Type: GrantFiled: November 24, 1998Date of Patent: November 21, 2000Assignee: International Business Machines CorporationInventors: Neal J. Alewine, James C. Colson, Abraham P. Ittycheriah, Stephane H. Maes, Paul A. Moskowitz
-
Patent number: 6084969Abstract: A method and system allows encryption services can be added to an existing wireless two-way alphanumeric pager network by providing a pager proxy which is arranged to receive an encrypted message from a sending pager and re-packages it for re-transmission to the destination pager. The sending pager encrypts the message using a session key, and encrypts the session key so that it can only be recovered by a secret key of the pager proxy. The pager proxy, upon recovery of the session key, decrypts the message, generates a new session key, re-encrypts the message, and encrypts the new session key so that it can only be recovered by a secret key of the destination pager. Encryption of the session key can either be carried out by shared secret key encryption or encryption of the session key by a public key corresponding to a private key of the pager proxy or destination pager.Type: GrantFiled: December 31, 1997Date of Patent: July 4, 2000Assignee: V-One CorporationInventors: Steven R. Wright, Christopher T. Brook
-
Patent number: 6067529Abstract: A telecommunications system and method is disclosed for providing a substantially immediate electronic receipt after a consumer has made a purchase. When a consumer makes a purchase, the sales terminal, which is attached with a short message/e-mail sending capable terminal, can generate and route a short message along with the detailed purchase information to a transport address or alias address associated with the consumer via a Gatekeeper for the Internet for the area that the sales terminal is located in. Upon receipt of the short message, the Gatekeeper can then convert the alias address to the transport address, if the alias address is given and the consumer does not want the short message sent to the alias address, and forward the short message through the Internet to that transport address (or alias address) as an Internet Protocol datagram for storage and retrieval of the short message by the consumer either immediately or at a later time.Type: GrantFiled: August 12, 1998Date of Patent: May 23, 2000Assignee: Ericsson Inc.Inventors: Dipankar Ray, Vladimir Alperovich
-
Patent number: RE40791Abstract: In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first fault information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.Type: GrantFiled: May 31, 2000Date of Patent: June 23, 2009Assignee: Siemens AktiengesellschaftInventors: Jorge Cuellar, Guenther Horn