Electric Signal Modification Patents (Class 380/287)
-
Publication number: 20090316490Abstract: A method of writing data into a semiconductor memory (11) in which nonvolatile memory cells (MC) each having a gate connected to a word line (WL) are connected in series, the method comprising selecting (S13) a scrambling method for the data according to a word line address for memory cells (MC) into which data is to be written, scrambling (S14) the data, and writing (S15) the scrambled data into the memory cells (MC) according to the word line address. The data is scrambled using the selected scrambling method.Type: ApplicationFiled: February 13, 2008Publication date: December 24, 2009Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Tomoji Takada
-
Publication number: 20090285402Abstract: A mechanism is disclosed for protecting the privacy of communication content by means of a synchronized noise insertion process operated by counterpart sending and receiving devices. In send mode, a synchronized noise pattern is introduced by a sending device onto a source content, rendering the source content unreadable (or at least partially obfuscating the source content so as to inhibit interception of the content); and in receive mode, a corresponding pattern is introduced 180-degrees out of phase so as to effectively subtract the synchronized noise pattern and yield the original source content. In such manner, communication privacy is achievable without encrypting, encoding or transforming the source content at the sending or receiving device.Type: ApplicationFiled: May 16, 2008Publication date: November 19, 2009Inventors: Stuart Owen Goldman, Karl F. Rauscher
-
Publication number: 20090262944Abstract: The invention relates to a method for scrambling a sequence of symbols comprising at least two reference symbols (R1, R2) and at least one first data symbol (D), said method comprising obtaining a first reference symbol (R1) and a second reference symbol (R2), determining a first scrambling symbol (S1) corresponding to the first reference symbol (R1) and a second scrambling symbol (S7) corresponding to the second reference symbol (P2), and obtaining at least one first data symbol (D) comprised in a range from the first reference symbol (R1) to the second reference symbol (R2) in the sequence of symbols. In order to improve the accuracy of the channel estimation at a receiver and achieve high radio resource usage efficiency, a third scrambling symbol (Sx) corresponding to the at least one first data symbol (D) is determined as an interpolated value of the first scrambling symbol (S1) and the second scrambling symbol (S7).Type: ApplicationFiled: February 27, 2007Publication date: October 22, 2009Inventor: Alexander Golitschek Edler Von Elbwart
-
Publication number: 20090252333Abstract: The present invention relates to a method for generating a downlink frame includes: generating a first short sequence and a second short sequence indicating cell group information; generating a first scrambling sequence determined by a first synchronization signal; generating a second scrambling sequence determined by a group to which the first short sequence belongs, the wireless communication system using a plurality of short sequences and the plurality of short sequence being divided into a plurality of groups; scrambling the first short sequence with the first scrambling sequence; scrambling the second short sequence with at least the second scrambling sequence; and mapping a second synchronization signal including the scrambled first short sequence and the scrambled second short sequence in the frequency domain.Type: ApplicationFiled: June 19, 2009Publication date: October 8, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Kap Seok CHANG, Il Gyu KIM, Hyeong Geun PARK, Young Jo KO, Hyo Seok YI, Moon Sik LEE, Young Hoon KIM, Seung Chan BANG
-
Publication number: 20090252335Abstract: The present invention relates to a method of generating a downlink frame.Type: ApplicationFiled: June 19, 2009Publication date: October 8, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Kap Seok CHANG, Il Gyu KIM, Hyeong Geun PARK, Young Jo KO, Hyo Seok YI, Chan Bok JEONG, Young Hoon KIM, Seung Chan BANG
-
Publication number: 20090252336Abstract: The present invention relates to a method of generating a downlink frame. The method of generating the downlink frame includes: generating a first short sequence and a second short sequence indicating cell group information; generating a first scrambling sequence and a second scrambling sequence determined by the primary synchronization signal; generating a third scrambling sequence determined by a short sequence group-a wireless communication system uses a plurality of short sequences and the plurality of short sequences are grouped into a plurality of short sequence group-to which the first short sequence is assigned; scrambling the first short sequence with the first scrambling sequence and scrambling the second short sequence with the second scrambling sequence and the third scrambling sequence; and mapping the secondary synchronization signal that includes the scrambled first short sequence and the scrambled second short sequence to a frequency domain.Type: ApplicationFiled: June 19, 2009Publication date: October 8, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Kap Seok CHANG, Il Gyu KIM, Hyeong Geun PARK, Young Jo KO, Hyo Seok YI, Chan Bok JEONG, Young Hoon KIM, Seung Chan BANG
-
Publication number: 20090252332Abstract: The present invention relates to a method for generating a downlink frame includes: generating a first short sequence and a second short sequence indicating cell group information; generating a first scrambling sequence determined by a first synchronization signal; generating a second scrambling sequence determined by a first short sequence and a third scrambling sequence determined by a second short sequence; scrambling the first short sequence with the first scrambling sequence; scrambling the second short sequence with at least the second scrambling sequence; scrambling the second short sequence with the first scrambling sequence; scrambling the first short sequence with at least the third scrambling sequence; and mapping one second synchronization signal including the first short sequence scrambled with the first scrambling sequence and the second short sequence scrambled with at least the second scrambling sequence and another second synchronization signal including the second short sequence scrambled wiType: ApplicationFiled: June 19, 2009Publication date: October 8, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Kap Seok Chang, Il Gyu Kim, Hyeong Geun Park, Young Jo Ko, Hyo Seok Yi, Moon Sik Lee, Young Hoon Kim, Seung Chan Bang
-
Publication number: 20090252334Abstract: The present invention relates to a method of generating a downlink frame. The method of generating the downlink frame includes: generating a first short sequence and a second short sequence indicating cell group information; generating a first scrambling sequence and a second scrambling sequence determined by the primary synchronization signal; generating a third scrambling sequence determined by the first short sequence; scrambling the first short sequence with the first scrambling sequence and scrambling the second short sequence with the second scrambling sequence and the third scrambling sequence; and mapping the secondary synchronization signal that includes the scrambled first short sequence and the scrambled second short sequence to a frequency domain.Type: ApplicationFiled: June 19, 2009Publication date: October 8, 2009Applicant: Electronics and Telecommunications Research InstituteInventors: Kap Seok CHANG, Il Gyu KIM, Hyeong Geun PARK, Young Jo KO, Hyo Seok YI, Chan Bok JEONG, Young Hoon KIM, Seung Chan BANG
-
Publication number: 20090232309Abstract: A method for wireless communications is provided. The method includes receiving a control payload and a check protocol on a wireless link and decoding the control payload and the check protocol. The method also includes analyzing the control payload and the check protocol in view of a scrambling protocol and determining at least one control command based on the control payload, the check protocol, and the scrambling protocol.Type: ApplicationFiled: March 12, 2009Publication date: September 17, 2009Applicant: QUALCOMM IncorporatedInventors: Juan Montojo, Arnaud Meylan
-
Patent number: 7587589Abstract: In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using a symmetric cipher, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with other aspects, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The integrity of the data is also verified, and the data is decrypted using a symmetric key. The data is returned to the calling program only if the calling program is allowed to access the data and if the integrity of the data is successfully verified.Type: GrantFiled: November 8, 2006Date of Patent: September 8, 2009Assignee: Microsoft CorporationInventors: Paul England, Marcus Peinado
-
Patent number: 7578001Abstract: Even if copy control information in contents is Never Copy (CCI=11) and the like, a recording apparatus which is not in conformity with a copy protection system (CPS) changes the copy control information to Copy Free (CCI=00) and records the contents. A recording and reproducing apparatus which is in conformity with the CPS embeds, in a transmission signal thereof, path information indicating a path through which the contents pass, except for the contents which are originally set to Copy Free (CCI=00). Thereby, when the path information is detected though the copy control information is Copy Free (CCI=00), it is determined that the path information passed through an illegal apparatus, and hence recording can be inhibited.Type: GrantFiled: August 11, 2004Date of Patent: August 18, 2009Assignee: Pioneer CorporationInventor: Kazuo Kuroda
-
Publication number: 20090202066Abstract: A multiplication value decision unit (12) decides a multiplication value which is a positive value or a negative value corresponding to a bit value of each bit contained in a binary bit string constituting a scramble pattern generated in a pattern generation unit (11). A multiplication processing unit (13) multiplies symbol data representing each symbol value in the symbol data string formed by the multinary symbol containing a predetermined pair of a positive value and a negative value having an identical absolute value, in the value area, by the multiplication value decided by the multiplication value decision unit (12). Here, the multiplication processing unit (13) successively executes the multiplication between the symbol data for one symbol and the multiplication value decided corresponding to the bit value of the one bit contained in the scramble pattern until the number of symbols expressed by the symbol data string is reached.Type: ApplicationFiled: April 8, 2009Publication date: August 13, 2009Applicant: KABUSHIKI KAISHA KENWOODInventor: Taichi MAJIMA
-
Publication number: 20090202065Abstract: A multiplication value decision unit (12) decides a multiplication value which is a positive value or a negative value corresponding to a bit value of each bit contained in a binary bit string constituting a scramble pattern generated in a pattern generation unit (11). A multiplication processing unit (13) multiplies symbol data representing each symbol value in the symbol data string formed by the multinary symbol containing a predetermined pair of a positive value and a negative value having an identical absolute value, in the value area, by the multiplication value decided by the multiplication value decision unit (12). Here, the multiplication processing unit (13) successively executes the multiplication between the symbol data for one symbol and the multiplication value decided corresponding to the bit value of the one bit contained in the scramble pattern until the number of symbols expressed by the symbol data string is reached.Type: ApplicationFiled: September 29, 2005Publication date: August 13, 2009Applicant: Kabushiki Kaisha KenwoodInventor: Taichi Majima
-
Publication number: 20090196427Abstract: Techniques for protecting information in an audio file are provided. The techniques include obtaining an audio file, detecting information beating one or more segments in a speech signal, wherein the information comprises information sought for protection, encrypting the information sought for protection by scrambling the one or more segments using a scrambling filter, and selectively decrypting an amount of the encrypted information, wherein the amount of the encrypted information to be decrypted depends on user access privilege, and wherein selectively decrypting the amount of the encrypted information protects said amount of the encrypted information. Techniques are also provided for protecting information in an audio file.Type: ApplicationFiled: January 31, 2008Publication date: August 6, 2009Applicant: International Business Machines CorporationInventors: Raghuram Krishnapuram, Nandita J. Mahajan, L. Venkat Subramaniam, Vivek Tyagi, Tanveer A. Faruquie
-
Publication number: 20090199015Abstract: Techniques for protecting information in an audio file are provided. The techniques include obtaining an audio file, detecting information bearing one or more segments in a speech signal, wherein the information comprises information sought for protection, encrypting the information sought for protection by scrambling the one or more segments using a scrambling filter, and selectively decrypting an amount of the encrypted information, wherein the amount of the encrypted information to be decrypted depends on user access privilege, and wherein selectively decrypting the amount of the encrypted information protects said amount of the encrypted information. Techniques are also provided for protecting information in an audio file.Type: ApplicationFiled: January 31, 2008Publication date: August 6, 2009Applicant: International Business Machines CorporationInventors: Raghuram Krishnapuram, Nandita J. Mahajan, L. Venkat Subramaniam, Vivek Tyagi, Tanveer A. Faruquie
-
Publication number: 20090190754Abstract: A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. The method includes the steps of (1) providing a data object comprising digital data and file format information; (2) embedding independent data into a data object; and (3) scrambling the data object to degrade the data object to a predetermined signal quality level. The steps of embedding and scrambling may be performed until a predetermined condition is met. The method may also include the steps of descrambling the data object to upgrade the data object to a predetermined signal quality level, and decoding the embedded independent data. The additional steps of descrambling and decoding may be performed until a predetermined condition is met.Type: ApplicationFiled: March 30, 2009Publication date: July 30, 2009Inventors: Scott A. Moskowitz, Mike W. Berry
-
Publication number: 20090190755Abstract: The invention comprises an encoder for encoding a stegotext and a decoder for decoding the encoded stegotext, the stegotext being generated by modulating the log power spectrogram of a covertext signal with at least one key, the or each key having been added or subtracted in the log domain to the covertext power spectrogram in accordance with the data of the watermark code with which the stegotext was generated, and the modulated power spectrogram having been returned into the original domain of the covertext. The decoder carries out Fast Fourier Transformation and rectangular polar conversion of the stegotext signal so as to transform the stegotext signal into the log power spectrogram domain; subtracts in the log power domain positive and negative multiples of the key or keys from blocks of the log power spectrogram and evaluates the probability of the results of such subtractions representing an unmodified block of covertext in accordance with a predetermined statistical model.Type: ApplicationFiled: October 9, 2007Publication date: July 30, 2009Applicant: Activated Content CorporationInventors: Roger Fane Sewell, Mark St. John Owen, Stephen John Barlow, Simon Paul Long
-
Publication number: 20090185692Abstract: A system and method of retrieving a watermark in a watermarked signal are disclosed. The watermarked signal comprises odd and even overlapped blocks where the watermark is contained in the even blocks. The method comprises, for each k-th even block, subtracting the two adjacent odd numbered blocks from the k-th even block of the watermarked signal to retrieve s*k(n), transforming s*k(n) into the frequency domain to generate Sk(ƒ), calculating a phase of Sk(ƒ) as ?(ƒ) and a phase of Sk(ƒ) as ?(ƒ), calculating the difference ?(ƒ) between ?(ƒ) and ?(ƒ), unwrapping ?(ƒ) to obtain the phase modulation {tilde over (?)}k(ƒ), and using a Viterbi search to retrieve the watermark embedded in {tilde over (?)}k(ƒ).Type: ApplicationFiled: March 30, 2009Publication date: July 23, 2009Applicant: AT&T Corp.Inventors: James David Johnston, Shyh-Shiaw Kuo, Schuyler Reynier Quackenbush, William Turin
-
Patent number: 7564973Abstract: A digital watermark embedding device and method uses block correlation to perform motion detection on temporally sequential digital video signals after performing preprocessing such as division into blocks. The device and method evaluate a plurality of motion information which are calculated for blocks by using a technique such as determination by majority or weighting. Based on the detected motion information, by moving a digital watermark pattern to follow a picture, the digital watermark information can be superimposed on an input digital video signal so as to match human visual characteristics by using a technique such as emphasizing a portion on which the human eye is easily turned.Type: GrantFiled: June 3, 2002Date of Patent: July 21, 2009Assignee: Sony CorporationInventors: Yuuki Matsumura, Osamu Nakamura, Shunichi Soma, Takashi Kohashi
-
Publication number: 20090172791Abstract: A user access method and system are provided. The method includes the following steps. After the connection between a terminal and an access network AN is disconnected, a media access control identifier MAC ID is preserved in a predetermined time period. If the terminal initiates an access to the AN within the predetermined time period, the MAC ID is used by the terminal for accessing the AN. The system of the present embodiment includes a terminal and an AN. According to the method and system, the access time initiated by the terminal is reduced, the access collision is avoided, and the system performance is greatly enhanced.Type: ApplicationFiled: March 6, 2009Publication date: July 2, 2009Applicant: Huawei Technologies Co., Ltd.Inventors: Yinggang Du, Wei Ruan
-
Patent number: 7555787Abstract: The invention relates to an electronic device for cryptographic processing, having at least two electronic circuits (IC, CC, CP) coupled via a connection means, wherein the connection means is arranged for transferring data signals between the two electronic circuits. The electronic device further has a monitoring circuit (401) arranged to monitor a deviation in the capacitance of the connection means. In case the deviation exceeds a predetermined value an alert signal (411) is generated.Type: GrantFiled: February 9, 2005Date of Patent: June 30, 2009Assignee: NXP B.V.Inventor: Mark Nadim Olivier Clercq
-
Publication number: 20090122992Abstract: Advanced solutions for encrypting multi-layer audio data are required, ie. audio data that comprise a base layer and one or more enhancement layers. A method for encrypting such an encoded audio signal comprises separating the base layer into two sections, encrypting the side information within frames of the second section of the base layer, and encrypting at least a part of the data of the enhancement layer, wherein the encrypted section of the base layer and the encrypted enhancement layer require different decryption keys for decryption. Thus, free preview zones are possible to implement.Type: ApplicationFiled: May 3, 2007Publication date: May 14, 2009Inventors: Sven Kordon, Johannes Boehm
-
Patent number: 7525202Abstract: Apparatus and methods for performing quantum computations are disclosed. Such quantum computational systems may include quantum computers, quantum cryptography systems, quantum information processing systems, quantum storage media, and special purpose quantum simulators.Type: GrantFiled: August 31, 2004Date of Patent: April 28, 2009Assignee: Microsoft CorporationInventors: Michael Freedman, Chetan Nayak, Kirill Shtengel
-
Publication number: 20090080665Abstract: In many instances it is necessary to store and transfer information and data on a temporary basis. Typically this information and data is transient but is vulnerable to capture and piracy as it is not in an encrypted state. Therefore a unique method is disclosed that performs randomized scrambling of unprotected digital information that make it unreadable, or otherwise unusable, without the appropriate descrambling. In order to be effective and secure the method requires a large population of scrambling patterns, or codes, and assigns them index numbers. Scrambling patterns are randomly chosen for use in the scrambling of the information and data. Unique schemes for developing this large population of patterns and choosing at random the usable set at each interval or usage. In particular the method is useful in the protection of digital content.Type: ApplicationFiled: September 25, 2007Publication date: March 26, 2009Applicant: ACEURITY, INC.Inventor: Pankaj Patel
-
Patent number: 7502471Abstract: A scrambling architecture protects data streams in the operating system and hardware components of a computer by scrambling the otherwise raw data prior to the data being handled by the operating system. Scrambled content is passed to a filter graph (or other processing system) where the content is processed while scrambled. A scrambler also generates a random signal based on a first key and a second key. After processing, the scrambled data is passed to a driver for output. A driver may implement a descrambler to detect tone patterns in the content and recovers the first key from varying amplitudes of the tone patterns. The descrambler may also receive the second key via a separate channel and generates the same random signal using the recovered first key and the second key. The descrambler subtracts the tone patterns and the random signal from the scrambled content to restore the content.Type: GrantFiled: March 20, 2006Date of Patent: March 10, 2009Assignee: Microsoft CorporationInventors: Henrique Malvar, Paul England
-
Publication number: 20090060202Abstract: Ternary (3-value) and higher, multi-value digital scramblers/descramblers in digital communications. The method and apparatus of the present invention includes the creation of ternary (3-value) and higher value truth tables that establish ternary and higher value scrambling functions which are its own descrambling functions. The invention directly codes by scrambling ternary and higher-value digital signals and directly decodes by descrambling with the same function. A disclosed application of the invention is the creation of composite ternary and higher-value scrambling devices and methods consisting of single scrambling devices or functions combined with ternary or higher value shift registers. Another disclosed application is the creation of ternary and higher-value spread spectrum digital signals. Another disclosed application is a composite ternary or higher value scrambling system, comprising an odd number of scrambling functions and the ability to be its own descrambler.Type: ApplicationFiled: November 4, 2008Publication date: March 5, 2009Inventor: Peter Lablans
-
Patent number: 7471806Abstract: At every reproduction of a moving image, a tamper resistant module (TRM) randomly selects any one of plural electronic watermark inserting modules, and incorporates the module selected into an area randomly selected from among plural non-operation (NOP) areas in an MPEG expansion module. The module can be switched for each image in a series of the moving images. Since an algorithm for inserting the electronic watermark differs for each moving image or each image, elimination of the electronic watermark by means of analysis, particularly, complete elimination from all the images, is extremely difficult.Type: GrantFiled: January 29, 2004Date of Patent: December 30, 2008Assignee: Fujitsu LimitedInventors: Kiyoshi Kohiyama, Hiroshi Komazaki
-
Patent number: 7463736Abstract: In an image process apparatus, a key different for each level of hierarchy is generated on the basis of a specific key with respect to image data having a hierarchical structure, the image data in each level of the hierarchy is encrypted using the generated key for each level, and the specific key is managed, so that key management can be easily performed while the image data having a hierarchical structure is enciphered using different keys for each level of the hierarchy.Type: GrantFiled: May 9, 2003Date of Patent: December 9, 2008Assignee: Canon Kabushiki KaishaInventors: Nobuhiro Tagashira, Keiichi Iwamura, Junichi Hayashi, Yuji Suga
-
Publication number: 20080301431Abstract: Disclosed herein is a text security method. The text security method encrypts both a font and a text constituting a text document in the same manner so that the encrypted text can be correctly viewed only when the encrypted font is provided. The text is encrypted by changing, in a regular manner, positions of intrinsic character images or intrinsic codes of the text within different code areas, and the font is encrypted by changing, in the same regular manner, positions of intrinsic character images or intrinsic codes of glyphs of the font corresponding to the text within different font areas.Type: ApplicationFiled: May 30, 2008Publication date: December 4, 2008Inventor: Young Sun HEA
-
Publication number: 20080267412Abstract: The invention relates to a system for embedding auxiliary information in a media signal such as an audio visual signal. An apparatus comprises a quantization index modulator (103) which generates a modified signal by quantization index modulation of the media signal. The modified signal has distortions relative to the media signal which are dependent on the auxiliary information. The apparatus further comprises a perception processor (107) which generates a perceptual characteristic indicative of a perceptual sensitivity of the media signal to the distortions. The quantization index modulator (103) and perception processor (107) are coupled to a compensation processor (105) which generates an output signal by modifying a strength of the distortions of the modified signal in response to the perceptual characteristic. The invention combines quantization index modulation watermarking with perceptual models to provide an improved trade off between watermark imperceptibility and detection reliability.Type: ApplicationFiled: May 30, 2005Publication date: October 30, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventor: Job Cornelis Oostveen
-
Publication number: 20080232600Abstract: A transaction device adds or injects a random noise component into signals representing (x,y) coordinate signals associated with user interface with an input screen associated with the device. The noise component can be generated by converting to analog the output of a random number generator, and then adding the noise component to the x-axis and/or y-axis component of the (x,y) coordinate signal. Alternatively the noise component can be injected into the x-axis and/or y-axis operating potential for the input screen. The result is a masking of the original (x,y) positional information. The randomly generated number is only available internal to the device. The device can use this number to de-crypt the true (x,y) signals, which signals can then be re-encrypted before transmitting from the device.Type: ApplicationFiled: June 9, 2008Publication date: September 25, 2008Inventors: Llavanya Fernando, Nathan C. Wang, G.F.R. Sulak Soysa
-
Patent number: 7401228Abstract: A data transmitting method, a data recording apparatus, a data record medium and a data reproducing apparatus are provided to disallow the encryption to be easily decoded and keep the secrecy of key information higher. The data transmitting apparatus includes an error correction coding process block. In the block, an input converting circuit operates to perform a logic operation with respect to the information data from an interface circuit 12 according to the key data. The converted information data is sent to an encoder 15 for generating parity data. This parity data is mixed with information data before conversion in a mixing circuit. The error correction coding block operates to send the resulting data to a modulating circuit 17 for modulating the data. The modulated data is recorded on a disk record medium.Type: GrantFiled: August 2, 2002Date of Patent: July 15, 2008Assignee: Sony CorporationInventors: Yoichiro Sako, Yoshitomo Osawa, Akira Kurihara, Isao Kawashima, Hideo Owa
-
Patent number: 7391866Abstract: A reception apparatus includes: a reception unit for receiving the scrambled content, the scrambled content being scrambled so that a predetermined unit of scrambled content is descrambled using a descrambling key corresponding to the predetermined unit of scrambled content, and at least one piece of storage information in which a list including all descrambling keys used for descrambling the scrambled content is embedded; storage unit for storing the received scrambled content and the storage information; list extraction unit for extracting the list from the stored storage information; descramble processing unit for extracting the predetermined unit of scrambled content from the stored scrambled content, extracting a descrambling key corresponding to the predetermined unit of scrambled content from the extracted list, and descrambling the extracted predetermined unit of scrambled content using the extracted descrambling key; and reproduction unit for reproducing the predetermined unit of descrambled contentType: GrantFiled: December 13, 2001Date of Patent: June 24, 2008Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Yukiyasu Fukami, Toru Nakahara, Takashi Matsuo, Akio Higashi, Hiroki Murakami
-
Patent number: 7380124Abstract: The present invention supports a secure transmissions protocol for information packet transmission between a Mobile Node and a Foreign Agent. The information packets are encrypted and decrypted using an integrated software client that combines mobile IP communication support and encrypting and decrypting protocols.Type: GrantFiled: March 28, 2002Date of Patent: May 27, 2008Assignee: Nortel Networks LimitedInventors: Jerry Mizell, David Lauson, Peter Wenzel, Steven Currin
-
Patent number: 7362860Abstract: This invention allows the encryption side to set whether an image playback apparatus should play back image data in a scrambled state or a non-scrambled state. When a code-block of input image data is an object to be encrypted, it is encrypted. In playing back the data, it is determined whether playback is to be executed by using the encrypted code-block (the scrambling playback mode is to be set). To inhibit use of the encrypted code-block, a terminating marker is placed at the start of the code-block. To use the encrypted code-block, the terminating marker is placed at the end of the code-block.Type: GrantFiled: March 2, 2004Date of Patent: April 22, 2008Assignee: Canon Kabushiki KaishaInventor: Junichi Hayashi
-
Patent number: 7356142Abstract: A method for recording data on an optical medium is disclosed. In one embodiment, the method includes receiving a first plurality of frames of data at a Cross Interleave Reed-Solomon Code (CIRC) encoder, encoding the first plurality of frames of data by the CIRC encoder to generate a second plurality of frames of data, generating a set of data to form a Q sub-channel, altering selected data bits in the Q sub-channel to form an encoded Q sub-channel, forming a plurality of control bytes including the encoded Q sub-channel, adding one of the control bytes to each one of the second plurality of frames of data to generate a third plurality of frames of data, encoding selected portions of the third plurality of frames of data by an EFM encoder to generate a plurality of channel frames, and recording the channel frames on the optical medium. This method allows CDs to be recorded that cannot be played by conventional CD players.Type: GrantFiled: May 10, 2000Date of Patent: April 8, 2008Assignee: Macrovision CorporationInventor: Daniel D. Downing
-
Patent number: 7352861Abstract: This invention relates to a digital electronic component which is protected against electrical- and/or electromagnetic-type analyse). The inventive component comprises: a synchronous element (10) which is controlled by a clock (H); means (11, 12) of generating said clock (H), the frequency of which varies randomly between a minimum value and a maximum value for at least a given period of time; and means (13) of controlling the random nature of the frequency change of said clock (H).Type: GrantFiled: December 11, 2002Date of Patent: April 1, 2008Assignee: Nagra Thomson LicensingInventors: Jean-Luc Dauvois, Jérôme Perrine
-
Patent number: 7305089Abstract: The camera includes a sensor for sensing the photographer's iris image and registering the image in advance. The iris image is recorded in the image of a subject by a digital MCU at a timing different from that at which the image of the subject is captured. The recording timing is that at which the camera power supply is turned off, that at which a recording medium is ejected from the camera or that at which the iris image to be recorded is changed to the registered iris image of another photographer. The recording of the iris image is achieved by embedding it as a watermark or by appending it to metadata.Type: GrantFiled: June 13, 2003Date of Patent: December 4, 2007Assignee: Canon Kabushiki KaishaInventors: Goichi Morikawa, Go Tokura
-
Patent number: 7302060Abstract: Systems and methods of securing wireless communications between a network and a subscriber station are disclosed. One embodiment creates authentication triplets due to expire after a certain amount of time such that they may not be used indefinitely by an attacker who intercepts them.Type: GrantFiled: September 16, 2004Date of Patent: November 27, 2007Assignee: QUALCOMM IncorporatedInventors: Michael Paddon, Gregory G. Rose, Philip M. Hawkes, James F. Semple
-
Patent number: 7274790Abstract: Method and apparatus for scrambling a high definition television signal to discourage unauthorized recording of same. While recording per se is not prevented, the resulting recorded signal is rendered unusable due to an induced “wobble” between the active video and the associated sync pulses. The scrambled television signal is readily viewable on a compliant high definition television set which descrambles the HDTV signal using an encoded indication of the amount of wobble accompanying the HDTV signal. Also provided is a special interface to prevent unauthorized persons from using the indication of the amount of wobble so as to defeat the scrambling. Also provided are method and apparatus for defeating the scrambling method and hence allowing recording of the scrambled video signal.Type: GrantFiled: January 31, 2003Date of Patent: September 25, 2007Assignee: Macrovision CorporationInventors: John O. Ryan, James R. Holzgrafe, Mark A. Hollar
-
Patent number: 7242217Abstract: Techniques for reducing the frequency of an output signal from a hard intellectual property (HIP) block on an integrated circuit are provided. By reducing the frequency of the output signal, circuit blocks in the integrated circuit that operate at a lower frequency than the HIP block are able to capture the output signal. A plurality of serially coupled flip-flops store values of an HIP output signal during each period of the output signal. Logic circuitry then generates a lower frequency HIP output signal in response to the values stored in the flip-flops. Also, a flip-flop can generate a heartbeat signal that is used to determine whether a signal within an HIP block is operating properly.Type: GrantFiled: December 1, 2004Date of Patent: July 10, 2007Assignee: Altera CorporationInventors: Darren van Wageningen, Curt Wortman
-
Patent number: 7127620Abstract: A coding device for implementing a cryptographic encryption and/or access authorization includes a data processing unit, a decoupling unit, a power supply interface, a main clock supply unit, and a power profile generator generating a power profile and superimposing it on a power profile of the data processing unit to prevent an attack by correlation analysis of the power profile.Type: GrantFiled: May 3, 2002Date of Patent: October 24, 2006Assignee: Infineon Technologies AGInventor: Gregor Boeckeler
-
Patent number: 7099492Abstract: Digital watermarking technology is used in conjunction with map data, such as is acquired by satellite and other aerial sensors, and as may be generated from databases based on such aerial data. For example, an image including steganographically hidden location data is analyzed and a refinement to the location data is made. The refined location data is then steganographically hidden in the image. In one implementation a method of steganographically embedding auxiliary data in imagery is provided. The method includes receiving imagery including a first geolocation estimate steganographically embedded therein. The first geolocation estimate corresponds to at least one area depicted in the imagery.Type: GrantFiled: February 13, 2004Date of Patent: August 29, 2006Assignee: Digimarc CorporationInventor: Geoffrey B. Rhoads
-
Patent number: 7069590Abstract: A scrambling architecture protects data streams in the operating system and hardware components of a computer by scrambling the otherwise raw data prior to the data being handled by the operating system. The architecture has a scrambler implemented at either the client or the server that adds noise to the content. More specifically, the scrambler produces periodic sets of tone patterns having varying amplitudes based on a first key. The scrambler also generates a random signal based on the first key and a second key. The tone patterns and random signal are added to the content to scramble the content. The scrambled content is then passed to the filter graph (or other processing system) where the content is processed while scrambled. Any attacker attempting to siphon off the bits during processing will steal only noisy data, which is worthless for redistribution or copying purposes. After processing, the scrambled data is passed to a driver for output.Type: GrantFiled: February 17, 2000Date of Patent: June 27, 2006Assignee: Microsoft CorporationInventors: Henrique Malvar, Paul England
-
Patent number: 7039614Abstract: In accordance with one embodiment, a method for storing a normal scrambled digital program is provided. The method includes receiving a scrambled program, and receiving a plurality of access requirements. Each access requirement can descramble the scrambled program. The method also includes selecting at least one of the access requirements, and storing the scrambled program and the selected requirement.Type: GrantFiled: November 9, 1999Date of Patent: May 2, 2006Assignees: Sony Corporation, Sony Electronics, Inc.Inventor: Brant L. Candelore
-
Patent number: 7003118Abstract: An architecture for a high performance IPSEC accelerator. The architecture includes components for scanning fields of packets, programming an IPSEC services device according to the scanned fields, and modifying the scanned packet with an output from the IPSEC security services device. Preferably, the architecture is implemented in hardware, and attached to a host machine. Hardware devices, fast in comparison to software processing and network speeds, allows the computationally intensive IPSEC processes to be completed in real-time and reduce or eliminate bottlenecks in the path of a packet being sent or received to/from a network.Type: GrantFiled: November 27, 2000Date of Patent: February 21, 2006Assignee: 3Com CorporationInventors: Li-Jau (Steven) Yang, Chi-Lie Wang, Kap Soh, Chin-Li (Karen) Mou
-
Patent number: 7000106Abstract: Disclosed is a computer-readable medium containing program instructions for configuring a first computer so that a first telephony client on the first computer may securely communicate with a second telephony client on a second computer via a communication path. The computer-readable medium includes computer code for inserting a security algorithm within the communication path. The security algorithm facilitates secure communication between the first and second telephony clients such that more than a single type of telephony client may be implemented. In a specific embodiment, the security algorithm is inserted within the first computer's operating system kernel.Type: GrantFiled: March 26, 1999Date of Patent: February 14, 2006Assignee: Siemens Communications, Inc.Inventor: George E. Carter
-
Patent number: 6965682Abstract: A media object sensed at one location is delivered at a second remote location, or an application associated with the object is made available at the second location. In some embodiments, the delivered object is of a higher quality than the sensed object. In other embodiments, larger objects requiring higher bandwidth for effective transmission are delivered notwithstanding low bandwidth bottlenecks between the first and second locations. Such advantages are achieved by employing watermark data as proxies for media objects and associated applications.Type: GrantFiled: February 15, 2000Date of Patent: November 15, 2005Inventors: Bruce L. Davis, William Y. Conwell, Geoffrey B. Rhoads, Douglas B. Evans
-
Patent number: 6954542Abstract: Upon embedding additional information in image information, since an image region in which the additional information can be embedded is limited, the information size that can be embedded is often limited, and all pieces of additional information cannot be embedded. Before the additional information is embedded in the image information, distribution information of pixel values is obtained by scanning the image information, and the information size that can be embedded is detected and displayed on the basis of the obtained distribution information of pixel values.Type: GrantFiled: January 12, 2004Date of Patent: October 11, 2005Assignee: Canon Kabushiki KaishaInventors: Nobutaka Miyake, Minoru Kusakabe
-
Patent number: 6950520Abstract: A method and apparatus for modifying a video signal to allow it to carry encoded data which is detectable at a suitably compliant receiver but is not recorded by a conventional video recorder. One application is to carry a descrambling key to prevent useful recording (but not viewing) of a scrambled television signal since the key will not be recorded. This encoded “hidden” data is not recorded by the conventional video recorders because, for instance, it is located in the vertical or horizontal blanking intervals of the video signal, or is carried by a high frequency carrier signal, or is expressed by phase modulation of the video signal's synchronization pulses.Type: GrantFiled: January 25, 2000Date of Patent: September 27, 2005Assignee: Macrovision CorporationInventors: John O. Ryan, James R. Holzgrafe, Mark A. Hollar