Patents Examined by Carmen D. White
  • Patent number: 5799093
    Abstract: A remote inspection system including a value dispensing device including structure for printing an indication of value, structure for accounting for value dispensed, and structure for querying and receiving operational data from both the printing structure and the accounting structure and for creating a message based on the operational data which message has a first portion identifying the data and a second encrypted signature portion which is created based on at least some of the operational data; a data center remotely located from the value dispensing device; and structure for establishing communication between the data center and the value dispensing device permitting the value dispensing device to send the message to the data center; wherein the data center includes apparatus for extracting the operational data from the message, apparatus for extracting the at least some of the operational data from the message to create the second encrypted signature portion based on the at least some of the information
    Type: Grant
    Filed: August 23, 1996
    Date of Patent: August 25, 1998
    Assignee: Pitney Bowes Inc.
    Inventors: Dale A. French, Kathryn V. Lawton
  • Patent number: 5799082
    Abstract: Apparatus for capturing and authenticating a visual image of a selected view, using a digital image forming means, such as a digital camera, together with a position determining system that provides position information, including location, angular orientation and/or time of observation at the time a digital image is formed by the digital camera. Once captured, the visual or electronic image and accompanying position information cannot be deleted or altered within the digital camera and can be downloaded only by an authorized downloader. The digital image of the selected view is presented as an array of pixels with associated pixel values. The position information may be incorporated in the digital image by altering selected pixel bit values for a selected pattern of pixels in the pixel array, or as any other suitable overlay; and this selected pattern may be determined using the position information.
    Type: Grant
    Filed: November 7, 1995
    Date of Patent: August 25, 1998
    Assignee: Trimble Navigation Limited
    Inventors: Michael D. Murphy, James M. Janky, John F. Schipper
  • Patent number: 5793987
    Abstract: A pluggable port adapter is used for connecting PCI devices to a host system through a PCI local bus while also adding functionality to the host system. The port adapter communicates with the host system through a port adapter/host interface that includes the PCI local bus and an auxiliary bus. The auxiliary bus is used for controlling the additional circuitry on the port adapter. A PROM on the adapter card is used for identifying the port adapter type, serial number and hardware revision. The auxiliary bus is used for conducting JTAG testing and is used by the host system to program logic devices on the port adapter. The logic devices can be reprogrammed in the field by the host system to repair bugs and to enhance performance and/or functionality. A power control circuit on the port adapter is controlled by the auxiliary bus for conducting hot swap operations.
    Type: Grant
    Filed: July 22, 1996
    Date of Patent: August 11, 1998
    Assignee: Cisco Systems, Inc.
    Inventors: William L. Quackenbush, Charles J. Naegeli, David J. Tsiang, John T. Chapman, Glenn Lee
  • Patent number: 5787178
    Abstract: A computerized method for signing a message, where a secret key is used for signing and the signature can be tested with the help of a public key, provides for the public key to be a number n that is the product of two large prime numbers p and q; the secret key includes at least one of the two prime numbers; a polynomial is created in the form P(x)=x.sup.k +a.sub.k-1 x.sup.k-1 + . . . +a.sub.1 x+a.sub.0, whose coefficients a.sub.k-1 . . . a.sub.0 are formed from the message, taking into account a random number. This polynomial is used to derive additional polynomials P(x) mod p and P(x) mod q whose zeros in the respective finite fields GF(p) and GF(q) are defined. The zeros are combined into one or more solutions z of the equation P(x) mod n=0, and the random number and the solution z or selected solutions z are added as the signature to the message.
    Type: Grant
    Filed: April 12, 1996
    Date of Patent: July 28, 1998
    Assignee: Deutsche Telekom AG
    Inventor: Joerg Schwenk
  • Patent number: 5784461
    Abstract: A secure method for granting customer access to images and image related services at an image fulfillment center, includes the steps of: scanning a customer film image to generating high and low resolution digital versions of the image; appending a unique ID and associated security key to the high resolution version of the image and storing the appended image at the fulfillment center; encrypting the ID with a shared encryption key and appending the encrypted ID and the security key to the low resolution version of the image and sending the appended low resolution image to the customer; using the security key to encrypt a request for services relating to the high resolution version of the image and sending the encrypted ID with the encrypted request to the fulfillment center; decrypting the ID using the shared encryption key at the fulfillment center and using the decrypted ID to retrieve the appended high resolution version of the image; and retrieving the key from the appended high resolution version of the
    Type: Grant
    Filed: May 23, 1996
    Date of Patent: July 21, 1998
    Assignee: Eastman Kodak Company
    Inventors: Stephen L. Shaffer, Kevin Arnold Townsend
  • Patent number: 5784460
    Abstract: A system is provided for retrieving a selected one of a plurality of encrypted software products stored in at least one storage device, such as a CD-ROM. Each software product is decryptable by a unique decryption key. The CD-ROM storage device is coupled to a end-user station having a unique serial number and a processor that is responsive to an application program stored therein. The user can select a software product to decrypt upon receipt of the corresponding decryption key. A remote vender station, having a unique password, is selectively coupled to the end-user station, via a network, to receive a request for the decryption key corresponding to the selected software product. Further, the vender station receives the serial number from the end-user station. A remote server is connected to the vender station, via a network, when the password transmitted from the vender station is validated.
    Type: Grant
    Filed: October 10, 1996
    Date of Patent: July 21, 1998
    Assignee: ProtoCall Technolgies, Inc.
    Inventors: Michael S. Blumenthal, Daniel J. Barthel, Bruce Newman, Brenda S. Newman
  • Patent number: 5778070
    Abstract: In a computer system having a processor, a system memory, a flash memory, and a memory controller, a method comprising the steps of loading a flash memory upgrade program containing a new flash memory image and a digital signature into a portion of the system memory; configuring the memory controller to limit the processor to accessing only the flash memory and the portion of the system memory; verifying the flash memory update program using the digital signature; and, updating the flash memory only if the flash memory upgrade program is authentic.
    Type: Grant
    Filed: June 28, 1996
    Date of Patent: July 7, 1998
    Assignee: Intel Corporation
    Inventor: Phillip E. Mattison
  • Patent number: 5768386
    Abstract: An improved touch screen encryption device and method is disclosed. The user selects information from prompts displayed on a touch screen. The improved device determines the input information based upon the location of the touch. The device encrypts the information--for example, the user's personal identification number--and sends the encrypted information to a remote processor. The device and method may be used by a financial institution (such as a bank), a postal services institution or wherever sensitive information is input through a touch screen.
    Type: Grant
    Filed: May 31, 1996
    Date of Patent: June 16, 1998
    Assignee: Transaction Technology, Inc.
    Inventors: Randal H. Yokomoto, Warren Yung-Hang Tan, Yosif Smushkovich, Xuan S. Bui, Michael Merman, Inas M. Dessouky, Cuong Do, Stephen M. Gryte, Phoebe Rin-Rin Hsu, Robert R. Propp, Michael L. Sears
  • Patent number: 5764774
    Abstract: A coded symbol encoding and decoding system and method provides improved efficiency and security by compressing and/or encrypting data prior to encoding the data into a coded symbol symbology. Prior to encoding the data into the coded symbol symbology, the encoding portion of the system compresses and/or encrypts the data. If compression decreases the size of the data by a given threshold, the system encodes the compressed data. Otherwise, the system encodes the uncompressed data. An unused character in the encoded data is used as a flag to indicate whether the data was compressed and/or encrypted. The encoded data is then printed as a coded symbol pattern. Conversely, the decoding portion reads the printed pattern, decodes the resulting data, and if necessary, decompresses and/or decrypts the data. Use of an unused character in the encoded data to indicate whether the data was compressed and/or encrypted allows the system and method to be used with existing symbologies.
    Type: Grant
    Filed: September 25, 1995
    Date of Patent: June 9, 1998
    Assignee: Intermec Corporation
    Inventor: Larry Lingnan Liu
  • Patent number: 5757911
    Abstract: An encryption communication terminal includes an encryption key table 9a for registering secret encryption keys and an encryption box 9b for storing received encrypted data. When encrypted data is received, the decryption of the received encrypted data is tried by using a secret encryption key Ki registered in the encryption key table 9a. If the encrypted data can successfully be decrypted by using the registered secret encryption key Ki, the decrypted data is printed out. On the other hand, if the encrypted data cannot be decrypted, the received encrypted data is stored in the encryption box 9b, and then a reception report is output to notify that encrypted data is stored in the encryption box 9b. This reception report lets a recipient user know that encrypted data has been received but cannot be decrypted. The recipient user may ask the transmitter about the secret encryption key Ki to decrypt the received encrypted data.
    Type: Grant
    Filed: March 7, 1995
    Date of Patent: May 26, 1998
    Assignee: Mita Industrial Co., Ltd.
    Inventor: Kohichi Shibata
  • Patent number: 5751811
    Abstract: A cryptographic method and system based on chaos theory is provided. Unique random 64-bit binary strings generated from an iterative chaotic equation are used as logic and arithmetic operands during encryption/decryption. The random 64-bit binary strings are generated based on 4 initializer values that produce thousands of iterated values from the chaotic equation z.sub.t+1 =Z.sub.t.sup.2 +c, where z and c are complex numbers. The 64-bit random numbers are translated into two 32-bit keys so that each 32 bits of message are encrypted/decrypted, using a bitwise logic operator such as an exclusive-or, with a unique 32-bit key for the length of the message file. For additional security, a combination of logic and arithmetic operators are used on the 32-bit keys and the 32-bit blocks of message text to produce 32N-bit blocks of ciphertext, where N=2.sub.r and r.ltoreq.2. For any set of 4 initializer values, the lifetime, n, is the number of iterations of the equation Z.sub.t+1 =z.sub.t.sup.
    Type: Grant
    Filed: November 26, 1996
    Date of Patent: May 12, 1998
    Inventors: Joseph C. Magnotti, Larry A. Nelson
  • Patent number: 5751810
    Abstract: A 6-digit decimal input value A and a previously prepared 6-digit decimal extension fixed value L are substituted in an extension function f, thereby extending the input value A to a 12-digit decimal value f(A,L). This extended value f(A,L) is bit-agitated with a bit agitation key R. Further, a value C obtained by the bit agitation processing is substituted in a reduction function g, thereby obtaining a 6-digit decimal output value B. Thus, the input value A is extended by the extension processing to be thereafter subjected to the bit agitation processing, whereby safety of secret information can be improved without increasing the number of digits of the input value A. Further, the value obtained by the bit agitation is thereafter reduced, whereby the output value B can be reduced to a number of digits which is applicable to the human memory. Thus, a bit agitator is obtained which is safer than at conventional one and has an excellent user interface.
    Type: Grant
    Filed: August 7, 1995
    Date of Patent: May 12, 1998
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Atsuko Miyaji, Motoji Omori, Makoto Tatebayashi
  • Patent number: 5751813
    Abstract: An encryption server receives a first encrypted message (105) and decrypts (403) the encrypted message using a first key, yielding a decrypted message comprising a second encrypted message (105A), an identification of a sender of the first encrypted message, and an identification of a first recipient. The second encrypted message, the identification of the sender, and the identification of the first recipient are determined (405) from the decrypted message. The second encrypted message and the identification of the sender are encrypted (409) with a second key, yielding a third encrypted message (109). The third encrypted message (109) is transmitted to the first recipient.
    Type: Grant
    Filed: April 29, 1996
    Date of Patent: May 12, 1998
    Assignee: Motorola, Inc.
    Inventor: David Dorenbos
  • Patent number: 5742686
    Abstract: An apparatus and method for dynamic encryption of information including data, voice, and graphics, consisting of a random access memory containing encryption and decryption programs and the information to be encrypted and decrypted, an encryption processor executing the encryption and decryption programs, the encryption and decryption programs being a code set whose members are distinct encryption/decryption codes executed serially by the encryption processor to encrypt and decrypt the information, and also being optionally repetitively executed, and a data set in the random access memory specifying the order and execution and number of repetitions of each member of the code set.
    Type: Grant
    Filed: June 14, 1996
    Date of Patent: April 21, 1998
    Inventor: Phillip Scott Finley
  • Patent number: 5737423
    Abstract: An apparatus and method for remote inspection of a smart card or similar apparatus. A smart card includes an antenna and receiver for receiving transmitted messages and a display. The smart card responds to a response request message to display a secure output message prompting a user of the smart card to respond to the party originating the message. When a valid response is received a response confirmation message is transmitted to the smart card. If a response is not received or is invalid a deactivate command message is transmitted to the smart card. If a response request message is not received within a first time period, or if a response confirmation is not received within a second time period after a response request is received, or if an attempt is made to use the card after a response request is received and before a response confirmation is received, the card will deactivate itself.
    Type: Grant
    Filed: August 23, 1995
    Date of Patent: April 7, 1998
    Assignee: Pitney Bowes Inc.
    Inventor: Flavio M. Manduley
  • Patent number: 5737424
    Abstract: A method and system for secure distribution of protected data using elliptic curve systems includes a program to unlock software. The user obtains an encrypted unlocking code from a processing center and enters it into the unlocking program, which decrypts the message, yielding the unlocking code, then uses the unlocking code to unlock the software. To encrypt the unlocking code, the processing center selects an appropriate unlocking code using information received from the user, selects an elliptic curve to use, selects a first point on the elliptic curve having an index corresponding to the information to be encrypted, generates a delta key and a center key and the finite field inverse of the center key, selects a second point on the elliptic curve which is the product of the inverse of the center key and the first point, and generates an index of the second point, which, with the delta key, is the encrypted information.
    Type: Grant
    Filed: June 4, 1996
    Date of Patent: April 7, 1998
    Assignee: Software Security, Inc.
    Inventors: Laszlo Elteto, Jose Pastor
  • Patent number: 5727062
    Abstract: Data blocks of various size can be processed in fast, effective block cipher mechanisms. Variable size confusion layers and variable size diffusion layers combine to form variable size block ciphers. Block size can set (typically byte-by-byte) at design time or dynamically during operation.The embodiment of FIG. 1 consists of horizontal layers alternating between confusion and diffusion. Here, each confusion layer, such as the layer including byte-wide substitution operation (16), uses keyed substitution tables which are initialized prior to operation. Simple and fast diffusion layers, such as the layer including byte-wide exclusive-OR (20), generally diffuse in just one direction. Consequently, multiple diffusion layers are usually required, such as those including byte-wide exclusive-OR operations (28) and (36). This kind of diffusion is unusual in a block cipher because it is extremely weak.
    Type: Grant
    Filed: July 6, 1995
    Date of Patent: March 10, 1998
    Inventor: Terry F. Ritter
  • Patent number: 5717761
    Abstract: A transmission section is responsive to first through K-th data signals to transmit a transmission signal through a transmission path to a reception section. The transmission signal has first through K-th frames which carry said first through said K-th data signals and first through K-th transmission unique words, respectively, where K represents a positive integer which is greater than one. The transmission section comprises a first producing section for producing the first through the K-th transmission unique words in accordance with a predetermined unique word and each of first through K-th specific patterns and a second producing section for producing the transmission signal in accordance with the first through the K-th transmission unique words and the first through the K-th data signals. The first through the K-th transmission unique words are different from one another.
    Type: Grant
    Filed: January 16, 1996
    Date of Patent: February 10, 1998
    Assignee: NEC Corporation
    Inventor: Chinami Yatagai
  • Patent number: 5717762
    Abstract: In a mobile communication system of the WACS type, frame formats are unified for DSL, HDSL, and DS1 channels. In addition, each novel base station (25) comprises a radio frame number processor for adding, to upward encrypted information data directed from mobile stations (27) towards a base control station (21), a radio frame number which is used in downward encrypted information data transmitted from the base control station to one or more of the mobile stations and may not necessarily be used in each mobile station on issuing the upward encrypted data.
    Type: Grant
    Filed: November 24, 1995
    Date of Patent: February 10, 1998
    Assignee: NEC Corporation
    Inventors: Makoto Aihara, Kazuaki Sakai
  • Patent number: 5712915
    Abstract: A digital circuit multiplier (DCM) system which permits encrypted signals to obtain a multiplication gain at the DCM equipment without decrypting the signals at the DCM equipment. Detection of speech/silence is made at the encryption stage and distinct and separable encryptions are applied to the speech and silence portions of the signal, as well as a control signal indicating which portions of the encrypted data stream correspond to speech and silence. At the DCME transmit unit, only the control signal portion of the data stream is decrypted and the encrypted silence frames are discarded to obtain multiplication gain. Thus, efficient use is made of the channel capacity without the need to decrypt the speech signal at the DCME. At the DCME receive unit the control signals are used to add encrypted silence frames back into the data stream.
    Type: Grant
    Filed: June 7, 1995
    Date of Patent: January 27, 1998
    Assignee: Comsat Corporation
    Inventor: Michael Onufry, Jr.