Having Receiver Selection (e.g., Pager) Patents (Class 380/271)
  • Publication number: 20100081459
    Abstract: The present invention relates to a method and apparatus for distributing paging messages in a wireless communication system. The wireless communication system may include a paging controller configured to distribute the paging messages in a paging area, a paging group including a plurality of base stations within the paging area configured to receive the paging message, and a paging interface between the paging controller and the paging group configured to support transmission of only the paging messages to all the plurality of base stations through a single transmission of the paging message from the paging controller. The method may include distributing a paging message to all of a plurality of base stations through a single transmission of a paging message from a paging controller over a secured IP-multicast group.
    Type: Application
    Filed: September 30, 2008
    Publication date: April 1, 2010
    Inventors: Peter Bosch, Geoffrey A. Collyer, Jean-Marc Fenart, Sudhir Umarale, Humberto LaRoche, Denis Fauconnier, Ajay Rajkumar, Indra Widjaja
  • Publication number: 20100001848
    Abstract: The present invention improves systems and devices for commissioning wireless tags, RFID tags, and wireless sensors. The present invention benefits wireless sensors that are not directly part of a demand printed label. In one embodiment RFID tags are pre-loaded into cartridges prior to consumption. This improvement adds significant convenience of loading RFID tags and enhances overall reliability of handling and applying the RFID tags. Accordingly, the present invention includes methods and devices that enable application and distribution of RFID tags in pre-loaded cartridges that are ready-to-use.
    Type: Application
    Filed: June 22, 2007
    Publication date: January 7, 2010
    Inventors: Clarke McAllister, Timothy Mintzer
  • Publication number: 20090316903
    Abstract: The present invention relates to a time sync-type One-Time Password (OTP) generation device and method for a mobile phone. The present invention is configured such that an IC chip, in which a serial number and a secret key for OTP generation are encoded and stored, is mounted in an IC interface provided in the battery mounting part of a mobile phone, and is configured such that a decoding unit for encoding the serial number and secret key of the IC chip, a time counter for counting time information provided from a base station, and an OTP generation module for generating OTP numbers using the time information, the serial number and the secret key as a key value for an OTP program are included in the mobile phone. Accordingly, in accordance with the present invention, it is not necessary for a user to carry a separate OTP generation terminal, and concerns with respect to the hacking of OTP numbers can be alleviated because a serial number and a secret key are stored in an IC chip that cannot be hacked.
    Type: Application
    Filed: April 18, 2007
    Publication date: December 24, 2009
    Inventor: Gyun Tae Jeung
  • Patent number: 7568111
    Abstract: A system and method is disclosed for providing DRM in a broadcast environment. In accordance with the embodiment, a DRM system distributes encrypted service keys over the mobile telephone network to a mobile terminal. The mobile terminal receives the encrypted service key and uses it to decrypt encrypted content keys received from a DVB set top box. The decrypted content keys are sent to the set box over local link where they are used to decrypt encrypted broadcast content.
    Type: Grant
    Filed: November 11, 2003
    Date of Patent: July 28, 2009
    Assignee: Nokia Corporation
    Inventors: Jukka Alve, Ari Ikonen, Mauri Kangas, Tapani Heikkilä
  • Publication number: 20090161872
    Abstract: A method, comprising: receiving an encrypted signature from a tag associated with an item; determining a dynamic parameter; obtaining a key based at least in part on the dynamic parameter; decrypting the signature with the key to obtain an identifier; and performing an action related to identification of the item, based on the identifier. Also, a system, comprising: a tag reader configured to receive an encrypted signature from a tag associated with an item; and a processing entity configured to (i) determine a dynamic parameter; (ii) obtain a key based at least in part on the dynamic parameter; (iii) decrypt the signature with the key to obtain an identifier; and (iv) perform an action related to identification of the item, based on the identifier.
    Type: Application
    Filed: December 11, 2008
    Publication date: June 25, 2009
    Inventors: William G. O'Brien, Tet Hin Yeap, Sanro Zlobec
  • Patent number: 7522727
    Abstract: A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).
    Type: Grant
    Filed: August 31, 2006
    Date of Patent: April 21, 2009
    Assignee: Motorola, Inc.
    Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J. Chater-Lea, Scott J. Pappas, Jason Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson
  • Publication number: 20090016530
    Abstract: A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier.
    Type: Application
    Filed: July 22, 2008
    Publication date: January 15, 2009
    Applicant: The Chamberlain Group, Inc.
    Inventors: Bradford L. Farris, James J. Fitzgibbon
  • Patent number: 7466826
    Abstract: To transmit digital data representing a content from a source to a receiver through a digital communication channel, the data being scrambled by at least one control word, the method includes the following steps. The source generates an encryption key which it stores temporarily. It encrypts the control word with the encryption key and transmits to the receiver the scrambled digital data and the encrypted control word, the latter being transmitted through an encrypted communication channel. The receiver then performs an operation of authentication of the source. When the source is authenticated by the receiver, it transmits the encryption key to it. The receiver then decrypts the control word and descrambles the data so as to present them to a user. The encryption key is then erased from the memories of the source and the receiver when the content has been entirely transmitted.
    Type: Grant
    Filed: December 4, 2001
    Date of Patent: December 16, 2008
    Assignee: Thomson Licensing
    Inventors: Jean Pierre Andreaux, Sylvain Chevreau, Eric Diehl
  • Patent number: 7437752
    Abstract: In a particular embodiment, a client module is deployed on a wireless device. The client module comprises a policy database including a list of authorized devices to which the wireless device may communicate. In another embodiment, the client module comprises a policy database including at least two user profiles on a wireless device, such as a personal profile and a business profile.
    Type: Grant
    Filed: September 23, 2002
    Date of Patent: October 14, 2008
    Assignee: Credant Technologies, Inc.
    Inventors: Robert W. Heard, Dwayne R. Mann, Christopher D. Burchett, Ian R. Gordon
  • Patent number: 7426746
    Abstract: A mechanism for providing a mobile node with reliable information for location privacy decisions in connection with an address update process that gives the correspondent node a chance to deduce the location of the mobile node is provided. According to one embodiment of the invention, an indication is given when an address update process needs to be performed for optimizing routing between a mobile node and a correspondent node. In response to the indicating step, the correspondent node may be authenticated, the authentication yielding identity information about the correspondent node. Based on the identity information, a route optimization decision may be made based on whether or not the address update process is to be performed, and the address update process may be carried out depending on the decision.
    Type: Grant
    Filed: October 22, 2003
    Date of Patent: September 16, 2008
    Assignee: Nokia Corporation
    Inventors: Risto Mononen, Sandro Grech
  • Patent number: 7412058
    Abstract: A method and radio receiver are provided for receiving and deciphering RF signals having encrypted data information relevant to the receiver environment. According to one aspect of the present invention, the receiver includes an input for receiving an RF signal having a data stream including a key selector and encrypted data including a message, and a demodulator for demodulating the data stream and outputting encrypted data including the message. The receiver further includes a data decryption circuit including memory for storing one or more groups of decryption keys based on a characteristic of the receiver environment. The data decryption circuit selects a decryption key based on the key selector and decrypts the message based on the selected decryption key.
    Type: Grant
    Filed: March 18, 2003
    Date of Patent: August 12, 2008
    Assignee: Delphi Technologies, Inc.
    Inventors: Glenn A. Walker, J. Robert Dockemeyer, Jr.
  • Patent number: 7403622
    Abstract: A symmetric key management process in a communication network comprising a source device furnished with a source of data to be broadcast over the network and at least one receiver device intended to receive the broadcast data. The process comprises: determining and securely transmitting a first symmetric key to a receiver device; the receiver device encrypting the first symmetric key using a second symmetric key and transmitting it to the source device; and the source device recovering and storing it. Before transmitting the data to at least one reception device, the source device encrypts these data with the aid of the first symmetric key, then it transmits these encrypted data, accompanied by the first encrypted symmetric key, to at least one receiver device. The receiver device decrypts the first symmetric key with the aid of the second key which it possesses, then it decrypts the encrypted data with the aid of the first symmetric key thus recovered.
    Type: Grant
    Filed: April 18, 2002
    Date of Patent: July 22, 2008
    Assignee: Thomson Licensing
    Inventors: Eric Diehl, Jean-Pierre Andreaux
  • Patent number: 7380124
    Abstract: The present invention supports a secure transmissions protocol for information packet transmission between a Mobile Node and a Foreign Agent. The information packets are encrypted and decrypted using an integrated software client that combines mobile IP communication support and encrypting and decrypting protocols.
    Type: Grant
    Filed: March 28, 2002
    Date of Patent: May 27, 2008
    Assignee: Nortel Networks Limited
    Inventors: Jerry Mizell, David Lauson, Peter Wenzel, Steven Currin
  • Patent number: 7372963
    Abstract: To reduce processing load or processing time required for compression and encryption of data. Data to be compressed, such as image data, is divided into specified block sizes by am image divider (10). A quantizer (12) references a quantization table (14) to quantize each of these blocks of data. The result of this quantization is entropy encoded by an entropy encoder (16) referencing a coding table (18) to acquire compressed data. An encryptor (20) encrypts the quantization table (14) and coding table (18) used in the quantization and encoding using a specified encryption method. A multiplexor (24) gathers together the encrypted data acquired as a result together with the compressed data in a specified format.
    Type: Grant
    Filed: July 23, 2003
    Date of Patent: May 13, 2008
    Assignee: Fuji Xerox Co., Ltd.
    Inventors: Kohshiro Inomata, Katsuya Mitsutake
  • Patent number: 7353392
    Abstract: A method and a configuration are described for mutual authentication of two data processing units. The mutual authentication of two data processing units is normally carried out in two separate authentication processes, which are carried out successively. A challenge and response method is normally used. For this purpose, a first challenge is sent from a first data processing unit to a second data processing unit, which transmits a first response back. A second response is produced by the first data processing unit, and is transmitted to the second data processing unit.
    Type: Grant
    Filed: August 8, 2002
    Date of Patent: April 1, 2008
    Assignee: Infineon Technologies AG
    Inventors: Erwin Hess, Wolfgang Pockrandt
  • Patent number: 7343487
    Abstract: According to the present invention there is provided a datacast distribution system which allows for the distribution of movies, music, games, application software, and the like using a new or existing terrestrial digital video broadcast (DVB-T) network.
    Type: Grant
    Filed: October 10, 2001
    Date of Patent: March 11, 2008
    Assignee: Nokia Corporation
    Inventors: Markus Lindqvist, Kai-Uwe Prokki, Markku Soinio, Dominique Müller
  • Patent number: 7289630
    Abstract: A method for protecting traffic in a radio access network connected to at least two core networks. The method includes maintaining a core-network-specific authentication protocol and a radio-bearer-specific ciphering process, and generating, for each ciphering process, a count parameter including a cyclical sequence number and a hyperframe number (HFN) which is incremented each time the cyclical sequence number completes one cycle. For each core network or authentication protocol, a first radio bearer of a session is initialized with a HFN exceeding the highest HFN used during the previous session. When a new radio bearer is established, the mobile station selects the highest HFN used during the session for the core network in question, increments it and uses it for initializing the count parameter for the new radio bearer. At the end of a session, the mobile station stores at least part of the highest HFN used during the session.
    Type: Grant
    Filed: August 30, 2002
    Date of Patent: October 30, 2007
    Assignee: Nokia Corporation
    Inventors: Jukka Vialén, Valtteri Niemi
  • Patent number: 7215777
    Abstract: Methods and systems for efficiently sending notification of the occurrence of events through a firewall. A client system operating inside a firewall, attempts to receive notification of the occurrence of events from a server system operating outside the firewall. The client system attempts to receive communication from the server system using a connectionless protocol, such as UDP. If the client system receives communication using the connectionless protocol, the client system requests notification be sent using the connectionless protocol. The server system notifies the client system by sending a packet to the server system, using the connectionless protocol, when events occur. However, if the client does not receive communication using the connectionless protocol, the client requests notifications be sent using a connection-oriented protocol, such as TCP.
    Type: Grant
    Filed: January 16, 2001
    Date of Patent: May 8, 2007
    Assignee: Microsoft Corporation
    Inventors: Brian J. Deen, Alex I. Hopmann, Joel M. Soderberg, Sean O. Lyndersay
  • Patent number: 7206933
    Abstract: A computer system includes a peripheral device and a processing unit. The processing unit is adapted to execute a driver for interfacing with the peripheral device in a standard mode of operation and an authentication agent in a privileged mode of operation, wherein the authentication agent includes program instructions adapted to authenticate the driver. The peripheral device may comprise a communications device, such as a software modem. A method for identifying security violations in a computer system includes executing a driver in a standard processing mode of a processing unit; transitioning the processing unit into a privileged processing mode; and authenticating the driver in the privileged processing mode. The driver may be adapted for interfacing with a communications peripheral device, such as a software modem.
    Type: Grant
    Filed: July 9, 2001
    Date of Patent: April 17, 2007
    Assignee: Advanced Micro Devices, Inc.
    Inventors: Geoffrey S. Strongin, David W. Smith, Brian C. Barnes, Terry L. Cole, Rodney Schmidt, Michael Barclay
  • Patent number: 7203480
    Abstract: A system for broadcasting wireless data service in a mobile communication system includes sending a request call for a wireless data service from a mobile terminal to a mobile switching center, identifying whether the terminal is registered in the mobile switching center, transmitting authentication code information indicating that the terminal is registered in the base transceiver station, and releasing the corresponding call in the terminal receiving the authentication code information and receiving the wireless service data. The authentication code information may include a Walsh code and a long code necessary for allowing the terminal to reconstitute the data. Through this case information, the system can broadcast wireless service data throughout an entire region and be assured that only mobile terminals storing compatible code information will be able to access the data.
    Type: Grant
    Filed: December 4, 2002
    Date of Patent: April 10, 2007
    Assignee: LG Electronics Inc.
    Inventor: Hyo Sig Jeon
  • Patent number: 7181013
    Abstract: Apparatuses and methods are disclosed for accessing and distributing data that includes a portable first device and a second device wherein both devices have unconscious capture capability. The first device has a first memory wherein at least one document is stored in the first memory of the first device. The first device has a transceiver, an identifier, and a public key to access a second device.
    Type: Grant
    Filed: June 27, 2006
    Date of Patent: February 20, 2007
    Assignee: Ricoh Co., Ltd.
    Inventor: Jonathan J. Hull
  • Patent number: 7181624
    Abstract: A block key to encrypt block data is generated using an ATS (arrival time stamp) appended to each of TS (transport stream) packets included in a transport stream correspondingly to the arrival time of the TS packet. The ATS is a random data depending upon an arrival time, and so a block-unique key can be generated, which enhances the protection against data cryptanalysis. A block key is generated from a combination of an ATS with a key unique to a device, recording medium or the like such as a master key, disc-unique key, title-unique key or the like. Since an ATS is used to generate a block key, any area for storage of an encryption key for each block may not be provided in a recording medium.
    Type: Grant
    Filed: April 4, 2001
    Date of Patent: February 20, 2007
    Assignee: Sony Corporation
    Inventors: Tomoyuki Asano, Yoshitomo Osawa, Motoki Kato
  • Patent number: 7139550
    Abstract: In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first fault information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.
    Type: Grant
    Filed: June 30, 2003
    Date of Patent: November 21, 2006
    Assignee: Siemens Aktiengesellschaft
    Inventors: Jorge Cuellar, Guenther Horn
  • Patent number: 7123719
    Abstract: A method includes receiving an authentication request from a mobile station (401) and determining whether to forward the request to an authentication agent. When it is determined to forward the request, the request is forwarded to the authentication agent (107). A random number and a random seed are received from the authentication agent (107). The random number and the random seed are forwarded to the mobile station (401). A response to the random number and the random seed from the mobile station (401) is received and forwarded to the authentication agent (107). The authentication agent (107) compares the response with an expected response. When the authentication agent (107) authenticates the mobile station (401), a derived cipher key is received from the authentication agent (107).
    Type: Grant
    Filed: February 16, 2001
    Date of Patent: October 17, 2006
    Assignee: Motorola, Inc.
    Inventors: Hans Christopher Sowa, Daniel J. McDonald, David J Chater-Lea, Scott J. Pappas, Jason Johur, Dennis Newkirk, Randy Kremske, Walter F. Anderson
  • Patent number: 7093286
    Abstract: Improved techniques that enable the exchange of sensitive information between client devices and server devices are disclosed. The exchange, as well as the use and nature, of sensitive information released can be governed by one or more privacy agreements established between the principle parties, namely, a client device and a content server. A proxy server can be used to establish privacy agreements with content servers (service providers).
    Type: Grant
    Filed: April 26, 2000
    Date of Patent: August 15, 2006
    Assignee: Openwave Systems Inc.
    Inventor: Peter F. King
  • Patent number: 7085384
    Abstract: Apparatuses and methods are disclosed for accessing and distributing data that includes a portable first device and a second device wherein both devices have unconscious capture capability. The first device has a first memory wherein at least one document is stored in the first memory of the first device. The first device has a transceiver, an identifier, and a public key to access a second device.
    Type: Grant
    Filed: June 22, 2004
    Date of Patent: August 1, 2006
    Assignee: Ricoh Co., Ltd.
    Inventor: Jonathan J. Hull
  • Patent number: 7072473
    Abstract: A system and method for providing secure, on-demand delivery and retrieval of documents, messages and the like utilizing an adaptor coupled to a facsimile machine. An adaptor is coupled between a facsimile machine and a telephone line. A mobile device communicates with the adaptor to allow a user to log onto a document delivery system, via the telephone line, and select a document, message or the like to be printed. The telephone number of the facsimile machine is provided to the data center by the adaptor or mobile device, and the data center then sends the selected documents to the facsimile machine through the adaptor. Alternatively, the data center can encrypt the documents before sending, and a key is used by the adaptor to decrypt the documents prior to sending to the facsimile machine.
    Type: Grant
    Filed: July 12, 2001
    Date of Patent: July 4, 2006
    Assignee: Pitney Bowes Inc.
    Inventor: Thomas J. Foth
  • Patent number: 7068701
    Abstract: A long code scrambler has been provided to scramble the data bits prior to QAM mapping. Different data rates are accommodated by using different long code m-tuples sampled at the modulation symbol rate, where m equals 2, 4 or 6 for 4, 16 or 64 QAM, respectively. In order to support 1XEV-DV users employing multiple Walsh code channels, a long code 6-tuple sample is permutated, to further randomize the QAM symbols. As appropriate for the modulation order, 2, 4 or 6 bits of the permutated 6-tuple are applied to the data sequence. That is, in addition to randomizing the modulation symbols for a given code channel, each code channel will likely have unique QAM symbols at any given symbol time.
    Type: Grant
    Filed: May 29, 2001
    Date of Patent: June 27, 2006
    Assignee: Motorola, Inc.
    Inventors: Gregory Agami, Robert J Corke, Daniel G Prysby, Stefan Paun
  • Patent number: 7065655
    Abstract: A method is disclosed comprising placing a first device in an enclosure, placing a second device in the enclosure, sealing the enclosure, and after sealing the enclosure, causing the first device to exchange a key with the second device. After the key exchange, the first and second devices can be taken out of the enclosure and can use the key to communicate with each other securely and in an authenticated manner. The devices may be electronic devices or optical devices. The enclosure prevents electromagnetic radiation of a certain bandwidth from escaping and thus prevents an adversarial device from eavesdropping on communication between the first and second devices. The enclosure may include a filtering material such as a metal net. The enclosure may be, for example, a plastic bag or a glass container.
    Type: Grant
    Filed: November 21, 2000
    Date of Patent: June 20, 2006
    Assignee: Lucent Technologies Inc.
    Inventor: Bjorn Markus Jakobsson
  • Patent number: 7023996
    Abstract: A method is provided for asymmetrically encrypting data communicated between a ground platform and multiple airborne platforms. The method includes packet encrypting ground-based data so as to preserve routing information while encrypting the remaining data. The packet-encrypted data is then transmitted to the airborne platforms. The method also includes bulk encrypting airborne-based data so as to maximize security. The bulk-encrypted data is then transmitted to the ground platform.
    Type: Grant
    Filed: May 4, 2001
    Date of Patent: April 4, 2006
    Assignee: The Boeing Company
    Inventors: Gary V. Stephenson, David S. Parkman, David W. Carman
  • Patent number: 6996235
    Abstract: A system and method for providing secure, on-demand delivery and retrieval of documents, messages and the like utilizing an adaptor and a printer coupled to the Internet. An adaptor is coupled between a network based printing protocol enabled device, such as, for example, an Internet Printing Protocol enabled printer, and the Internet. A mobile device communicates with the adaptor to allow a user to log onto a document delivery system, via the Internet, and select a document, message or the like to be printed. The adaptor or mobile device provides the Internet address of the printer to the data center, which then sends the selected documents to the printer through the adaptor using the network based printing protocol. Alternatively, the data center can encrypt the documents before sending. A corresponding decryption key is used by the adaptor to decrypt the documents prior to sending to the printer.
    Type: Grant
    Filed: October 8, 2001
    Date of Patent: February 7, 2006
    Assignee: Pitney Bowes Inc.
    Inventor: Thomas J. Foth
  • Patent number: 6980796
    Abstract: Method and arrangement for checking the authenticity of a first communication subscriber in a communications network In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first fault information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.
    Type: Grant
    Filed: May 31, 2000
    Date of Patent: December 27, 2005
    Assignee: Siemens Aktiengesellschaft
    Inventors: Jorge Cuellar, Guenther Horn
  • Patent number: 6973566
    Abstract: A communications system includes a physical layer hardware unit and a processing unit. The physical layer hardware unit is adapted to communicate data over a communications channel in accordance with assigned transmission parameters. The physical layer hardware unit is adapted to receive an incoming signal over the communications channel and sample the incoming signal to generate a digital received signal. The processing unit is adapted to execute a standard mode driver in a standard mode of operation and a privileged mode driver in a privileged mode of operation. The standard mode driver includes program instructions adapted to extract control codes from the digital received signal and configure the physical layer hardware assigned transmission parameters based on the control codes.
    Type: Grant
    Filed: July 9, 2001
    Date of Patent: December 6, 2005
    Assignee: Advanced Micro Devices, Inc.
    Inventors: David W. Smith, Brian C. Barnes, Terry L. Cole, Rodney Schmidt, Geoffrey S. Strongin, Michael Barclay
  • Patent number: 6907123
    Abstract: A secure real time voice communication system 70 is provided that allows for the secure transmission of voice communications between a sending device 72 and a receiving device 78 through the public switch telephone network 76. The device 72 uses an encryption decryption engine 30 which is capable of executing a number of encryption algorithms which are selected using an encryption selection table 80. An encryption key can be calculated from a periodic key value and a public variable key value. Further, the encryption algorithm used can be periodically changed during a voice communication session so that multiple encryption techniques can be used within the same communication session.
    Type: Grant
    Filed: December 21, 2000
    Date of Patent: June 14, 2005
    Assignee: Cisco Technology, Inc.
    Inventor: John E. Schier
  • Publication number: 20040252839
    Abstract: A method which includes transmitting data by electromagnetic waves to at least a reception device, in receiving the data at the reception device and in displaying part at least of the data at the reception device. The method is characterized in that it includes displaying the data, prior to recording part at least of the data received by the device at the removable storing mechanism which the device receives and/or only after controlling whether the display is authorized or appropriate on the basis of the data pre-recorded in the removable storage mechanism. The invention also concerns a device for implementing the method.
    Type: Application
    Filed: June 6, 2003
    Publication date: December 16, 2004
    Inventors: Luc Deborgies, Georges Liberman
  • Patent number: 6785748
    Abstract: A wireless mode between a scanner and an image communication apparatus is changed, in response to completion of image transmission from the scanner to the image communication apparatus, completion of print of the image sent from the scanner to the image communication apparatus, completion of transmission via a communication line connected to the image communication apparatus of the image sent from the scanner to the image communication apparatus, instructions to stop print of the image sent from the scanner to the image communication apparatus, instructions to stop transmission via the communication line connected to the image communication apparatus of the image sent from the scanner to the image communication apparatus, and states of the scanner and the image communication apparatus at a predetermined time and so on. For example, a low power consumption mode and communication mode of Bluetooth communication are switched to each other.
    Type: Grant
    Filed: July 13, 2001
    Date of Patent: August 31, 2004
    Assignee: Canon Kabushiki Kaisha
    Inventors: Makoto Mikuni, Michihiro Izumi, Yoshiyuki Hirai
  • Patent number: 6782102
    Abstract: Multiple format secure voice apparatus for communication handsets includes a core unit with a speaker, a microphone, a keypad, and a display. The core unit also includes an audio circuit coupled to the speaker and the microphone, an encryption/decryption element coupled to the audio circuit, a coder/decoder element coupled to the audio circuit and the encryption/decryption element, and a control element coupled to the keypad, the display, the audio circuit, the encryption/decryption element, and the coder/decoder element. A standard interface coupling is connected to an audio I/O terminal, a data I/O terminal of the coder/decoder element, and a control I/O terminal of the control element. A mating standard interface coupling mates with the standard interface coupling of the core unit and is coupled to the mating standard interface coupling.
    Type: Grant
    Filed: December 21, 2000
    Date of Patent: August 24, 2004
    Assignee: Motorola, Inc.
    Inventors: Scott D. Blanchard, Dean P. Vanden Heuvel
  • Publication number: 20040001592
    Abstract: An electronic device comprising: a transport stream analyzer, the transport stream analyzer adapted to receive an encrypted MPEG transport stream and to output a program stream map stream, a conditional access table stream, a program stream directory stream, an encrypted video signal stream, one or more encrypted audio streams, an entitlement control message stream and a entitlement management message stream, all as MPEG packetized elementary stream data structure; and a packet multiplexer adapted to receive the output of the transport stream analyzer and to assemble the output of the transport stream analyzer into an encrypted MPEG compliant modified program stream comprised of packs of MPEG packetized elementary stream data structures and to output the encrypted MPEG compliant modified program stream.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Applicant: Koninklijke Philips Electronics N.V.
    Inventors: Samuel Olu Akiwumi-Assani, Richard Chi-Te Shen, Sheau-Bao Ng
  • Patent number: 6556681
    Abstract: A trainable transmitter comprises a transmitter, code-generation circuitry and a removable, plug-in data module. The data module includes information necessary for generating a code for a specific security system, such as a garage door opener. Preferably, the data includes a cryptographic algorithm and the frequency at which the wireless signal is to be generated. The code-generation circuitry accesses the data in the data module to generate a code, which is then transmitted by the transmitter. A variety of data modules are provided. A user installs a data module which corresponds to the security system to be accessed.
    Type: Grant
    Filed: August 26, 1998
    Date of Patent: April 29, 2003
    Assignee: Lear Corporation
    Inventor: Joseph David King
  • Patent number: 6556835
    Abstract: In a method for multicasting in a radio network, having at least one base station and multiple mobile terminals, the broadcast message is broadcast from the base station, and the broadcast message is received at the mobile terminals. Furthermore, a broadcast message is formulated as a multicast message, and a token is delivered to a selected group of mobile terminals. The token is needed to recover the information of the multicast message. The selected group of mobile terminals includes at least two mobile terminals. The token is used by the selected group of mobile terminals to allow the reception and recovery of the multicast message.
    Type: Grant
    Filed: August 15, 2000
    Date of Patent: April 29, 2003
    Assignee: Nokia Corporation
    Inventor: Tommi Raivisto
  • Patent number: 6487657
    Abstract: The invention relates to a data communication network suitable for the exchange of data between computers, which network comprises at least one substantially wireless LAN (Local Area Network) and access points distributed over an area of coverage for linking the computers comprised in the minimally one LAN, with the network. The minimally one wireless LAN is virtual and the data traffic with the computers belonging to that particular LAN is individualized by encoding the data exchanged between the computers and the access points by using for each LAN a unique key.
    Type: Grant
    Filed: February 18, 1999
    Date of Patent: November 26, 2002
    Assignee: No Wires Needed, B.V.
    Inventor: Ronald Alexander Brockmann
  • Patent number: 6333703
    Abstract: A system of mobile units are installed in multiple vehicles in traffic, the vehicles with mobile units being a sample of all vehicles in traffic. These mobile units include both wireless communications devices and apparatus that determines the location of each vehicle. Monitoring a vehicle's position as a function of time also reveals the velocity of the vehicle. Position and speed information is periodically broadcast by the vehicles to a central monitoring station and to neighboring vehicles. At the central monitoring station, the collective input from the sample set of vehicles is processed using statistical analysis methods to provide an instant chart of traffic conditions in the area, the accuracy of said chart being within a range determined by the size of the sample. Warnings of delays or updates on traffic conditions on the road ahead are then automatically returned to subscribers of the information or are used as part of an Intelligent Vehicle Highway System (IVHS).
    Type: Grant
    Filed: October 4, 2000
    Date of Patent: December 25, 2001
    Assignee: International Business Machines Corporation
    Inventors: Neal J. Alewine, James C. Colson, Abraham P. Ittycheriah, Stephane H. Maes, Paul A. Moskowitz
  • Publication number: 20010016043
    Abstract: A ciphered message contained in a radio signal is displayed as it is if a code number contained in a received radio signal does not coincide with a preliminarily registered code number. On the other hand, if the code number contained in the radio signal coincide with the preliminarily registered code number, the message is deciphered and displayed on a display portion when a code number input from an input portion coincides with a received code number.
    Type: Application
    Filed: May 29, 1998
    Publication date: August 23, 2001
    Inventor: SATOSHI BANN0
  • Patent number: 6259791
    Abstract: A first service provider having a highest security of access, initially programs (604) tables in a subscriber unit (122), including an address table (224) having entries including addresses to which the subscriber unit is responsive, a sub-address table (226) including a sub-address identifier and a corresponding first pointer to a first decryption key for an algorithm required to decrypt a sub-message associated with the sub-address identifier, and a key table (228) including the first decryption key. A second service provider having a security of access less than that of the first service provider reprograms (606) an attribute of at least one of the sub-address table and the key table. The second service provider obtains reprogramming access by encrypting a first reprogramming message such that it can be properly decrypted using the first decryption key.
    Type: Grant
    Filed: February 26, 1998
    Date of Patent: July 10, 2001
    Assignee: Motorola, Inc.
    Inventor: Morris Anthony Moore
  • Patent number: 6188767
    Abstract: The present invention encompasses a base station and method of providing communication services to a plurality of communication units. The method includes the steps of sending communication information between the base station and at least two of the plurality of communication units. A first step of identifying communication units produces a group identifier. A scrambling code, based at least in part on the group identifier, is then used to encode the communication information for transmission.
    Type: Grant
    Filed: April 29, 1998
    Date of Patent: February 13, 2001
    Assignee: Motorola, Inc.
    Inventors: Michael L. Needham, Leigh M. Chinitz, Duane C. Rabe
  • Patent number: 6167137
    Abstract: Disclosed are three major aspects relating to wireless transmission of encrypted data messages in a security system wherein the receiver stores locally an encryption key utilized by the transmitting device to encrypt the data message and the receiver uses the encryption key to decrypt an encrypted data message, and wherein a sequence number generator is used to synchronously track the message sequence at both the transmitter and receiver. A first major aspect involves encrypted device registration (learning) methods that are user-friendly and immune from detection by technically skilled intruders with special RF equipment, and periodic user-friendly changing of the encryption key per encrypted transmitting device in the system. A second major aspect involves encrypted device de-registration (unlearning, or deletion) that is likewise user friendly.
    Type: Grant
    Filed: November 23, 1999
    Date of Patent: December 26, 2000
    Assignee: Pittway Corp.
    Inventors: Francis C. Marino, Thomas P. Schmit
  • Patent number: 6150961
    Abstract: A system of mobile units are installed in multiple vehicles in traffic. These mobile units include both wireless communications devices and apparatus that determines the location of each vehicle. Monitoring a vehicle's position as a function of time also reveals the velocity of the vehicle. Position and speed information is periodically broadcast by the vehicles to a central monitoring station and to neighboring vehicles. At the central monitoring station, the collective input of a set of vehicles is processed to provide an instant chart of traffic conditions in the area. Warnings of delays or updates on traffic conditions on the road ahead are then automatically returned to subscribers of the information or are used as part of an Intelligent Vehicle Highway System (IVHS).
    Type: Grant
    Filed: November 24, 1998
    Date of Patent: November 21, 2000
    Assignee: International Business Machines Corporation
    Inventors: Neal J. Alewine, James C. Colson, Abraham P. Ittycheriah, Stephane H. Maes, Paul A. Moskowitz
  • Patent number: 6084969
    Abstract: A method and system allows encryption services can be added to an existing wireless two-way alphanumeric pager network by providing a pager proxy which is arranged to receive an encrypted message from a sending pager and re-packages it for re-transmission to the destination pager. The sending pager encrypts the message using a session key, and encrypts the session key so that it can only be recovered by a secret key of the pager proxy. The pager proxy, upon recovery of the session key, decrypts the message, generates a new session key, re-encrypts the message, and encrypts the new session key so that it can only be recovered by a secret key of the destination pager. Encryption of the session key can either be carried out by shared secret key encryption or encryption of the session key by a public key corresponding to a private key of the pager proxy or destination pager.
    Type: Grant
    Filed: December 31, 1997
    Date of Patent: July 4, 2000
    Assignee: V-One Corporation
    Inventors: Steven R. Wright, Christopher T. Brook
  • Patent number: 6067529
    Abstract: A telecommunications system and method is disclosed for providing a substantially immediate electronic receipt after a consumer has made a purchase. When a consumer makes a purchase, the sales terminal, which is attached with a short message/e-mail sending capable terminal, can generate and route a short message along with the detailed purchase information to a transport address or alias address associated with the consumer via a Gatekeeper for the Internet for the area that the sales terminal is located in. Upon receipt of the short message, the Gatekeeper can then convert the alias address to the transport address, if the alias address is given and the consumer does not want the short message sent to the alias address, and forward the short message through the Internet to that transport address (or alias address) as an Internet Protocol datagram for storage and retrieval of the short message by the consumer either immediately or at a later time.
    Type: Grant
    Filed: August 12, 1998
    Date of Patent: May 23, 2000
    Assignee: Ericsson Inc.
    Inventors: Dipankar Ray, Vladimir Alperovich
  • Patent number: RE40791
    Abstract: In the method and the arrangement for checking the authenticity of a first communication subscriber in a communications network, a first fault information item is formed in the first communication subscriber using a fault detection data item of the first communication subscriber and an information item relating to a random data item. In a second communication subscriber in the communications network, a second fault information item is formed using a fault detection data item of the second communication subscriber and the information relating to the random data item. The authenticity of the first communication subscriber is checked using the first fault information and the second fault information.
    Type: Grant
    Filed: May 31, 2000
    Date of Patent: June 23, 2009
    Assignee: Siemens Aktiengesellschaft
    Inventors: Jorge Cuellar, Guenther Horn