Patents Examined by Cas Stulberger
-
Patent number: 7036014Abstract: An RSA-based signing scheme that combines essentially optimal efficiency with attractive security properties. One preferred signing routine requires one RSA decryption plus some hashing, verifications requires one RSA encryption plus some hashing, and the size of the signature preferably is the size of the modulus. Given an ideal underlying hash function, the scheme is not only provably secure, but has security tightly related to the security of RSA. An alternative embodiment maintains all of the above features and, in addition, provides message recovery. The techniques can be extended to provide schemes for Rabin-based signatures or signatures using other trapdoor functions.Type: GrantFiled: June 11, 2001Date of Patent: April 25, 2006Assignee: The Regents of the University of CaliforniaInventors: Mihir Bellare, Phillip Rogaway
-
Patent number: 7028184Abstract: A method, system, computer program product, and method of doing business by digitally notarizing a collection of data streams, thereby improving security of the contents of the data streams. Preferably, public key cryptography is used, wherein the collection of data streams is digitally signed (i.e. notarized) using a private cryptographic key of a digital notary, such that an associated public cryptographic key can be used to verify the authenticity and integrity of the collection of data streams. One or more components which are involved in creating the data streams are preferably authenticated, and a unique identifier of each such component is included within cryptographically-protected information that is provided for the digital notarization. The authenticated identities of the components can therefore be determined from the digital notarization.Type: GrantFiled: January 17, 2001Date of Patent: April 11, 2006Assignee: International Business Machines CorporationInventors: John R. Hind, Marcia L. Peters
-
Patent number: 7024565Abstract: A circuit includes a capacitor formed with a dielectric including the dielectric encasing elements of the circuit. A detector detects changes in the capacitance of the capacitor.Type: GrantFiled: December 17, 1999Date of Patent: April 4, 2006Assignee: Intel CorporationInventors: Mark A. Beiley, James E. Breisch
-
Patent number: 7003667Abstract: Secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient. The data is encrypted using a first key. The first key is then encrypted using a second key and a third key. The second key is a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device. The third key is a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image. The encrypted data and the twice-encrypted first key are transmitted to the intended image output device.Type: GrantFiled: October 4, 1999Date of Patent: February 21, 2006Assignee: Canon Kabushiki KaishaInventors: Royce E. Slick, Craig Mazzagatte, Neil Y. Iwamoto
-
Patent number: 6996710Abstract: In one embodiment, a method for certifying an attestation key comprises generating a remote attestation key pair within a platform and producing a certificate. The certificate includes a public attestation key to attest that a private attestation key, corresponding to the public attestation key, is stored in hardware-protected memory.Type: GrantFiled: March 31, 2000Date of Patent: February 7, 2006Assignee: Intel CorporationInventors: Carl M. Ellison, Roger A. Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger, Ken Reneris, James A. Sutton, Shreekant S. Thakkar, Millind Mittal
-
Patent number: 6986056Abstract: A method and arrangement for generating binary sequences of random numbers uses the principle of random selection of the path of photons on a beam splitter and generating a random number by using two detectors (D10, D21) downstream from a beam splitter (ST2). To generate photons, a light source (L) of a low power is used, and an additional beam splitter (ST1) is connected upstream from the beam splitter (ST2). The photons emitted by the light source (L) during a predefined measurement time are split by the beam splitters (ST1, ST2) arranged one after the other in the beam path of the light source (L). The random sequence is generated when the splitting of the photons matches a predefined photon scheme.Type: GrantFiled: December 10, 1998Date of Patent: January 10, 2006Assignee: Deutsche Telekom AGInventors: Wolfgang Dultz, Gisela Dultz, Eric Hildebrandt, Heidrun Schmitzer
-
Patent number: 6980658Abstract: Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.Type: GrantFiled: September 28, 2000Date of Patent: December 27, 2005Assignee: Qualcomm IncorporatedInventors: Ramin Rezaiifar, Roy F. Quick, Jr., Paul Williamson, Jun Wang, Edward G. Tiedemann, Jr.
-
Patent number: 6978373Abstract: Methods, systems and computer program products are provided which provide profile information associated with a client to a server by generating, at the client, a profile document containing profile information associated with the client and incorporating in the profile document a designator which indicates that profile information identified by the designator is not provided by the client and is provided by a network intermediary in a path between the client and the server. The designator in the profile document is encrypted utilizing a key associated with the client and the profile document with the encrypted designator transmitted from the client to the server utilizing the path. Method, systems and computer program products corresponding to the network intermediaries are also provided.Type: GrantFiled: March 22, 2000Date of Patent: December 20, 2005Assignee: International Business Machines CorporationInventors: Stefan Georg Hild, Sandeep Kishan Singhal
-
Patent number: 6971010Abstract: An image authentication system utilizes a coded version of a digital image signature and embeds that information into a transform representation of the image. A digital image signature preferably is extracted from the image data. That signature is coded so that the signature is not immediately recognizable. The coded information is embedded into high frequency coefficients in a transform representation of the image. The contents of the high frequency coefficients of a received or later accessed signal can then be deciphered and compared to the signature determined directly from the image to authenticate the integrity of the signal.Type: GrantFiled: October 15, 1999Date of Patent: November 29, 2005Assignee: Koninklijke Philips Electronics N.V.Inventor: Mohamed Abdel-Mottaleb
-
Patent number: 6925572Abstract: Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a supported protocol, that a command of the request is allowed, that the length of the request does not exceed the allowed maximum for the command, and that characters of the request are of an allowable type. Upon first-phase verification, a second phase is invoked that is particular to the protocol of the request. In the second, specialized phase, the request is filtered to verify one or more of the source, the destination, and the content of the request. Upon second-phase verification, the request is allowed to pass. If either first-or second-phase verification fails, then the request is denied.Type: GrantFiled: February 28, 2000Date of Patent: August 2, 2005Assignee: Microsoft CorporationInventors: Neta Amit, Eran Harel, Abraham Nathan, Nevet Basker
-
Patent number: 6920561Abstract: A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.Type: GrantFiled: March 31, 2000Date of Patent: July 19, 2005Assignee: International Business Machines CorporationInventors: Christopher Britton Gould, Howard Jeffery Locker, Andy Lloyd Trotter, Michael T. Vanover, James Peter Ward
-
Patent number: 6892307Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are associated with trust levels and a log-on service obtains credentials for an entity commensurate with the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.Type: GrantFiled: August 5, 1999Date of Patent: May 10, 2005Assignee: Sun Microsystems, Inc.Inventors: David L. Wood, Derk Norton, Paul Weschler, Chris Ferris, Yvonne Wilson
-
Patent number: 6839435Abstract: Ranking display method for a game machine wherein, when a score along with an E mail address is inputted from a personal computer, a server stores the inputted score and E mail address, and when there is a change in ranking of score, the server transmits a message by E mail to the corresponding personal computer.Type: GrantFiled: June 9, 1999Date of Patent: January 4, 2005Assignee: Namco LimitedInventors: Tsuyoshi Iijima, Shinichi Odake, Eiichi Saita
-
Patent number: 6826689Abstract: A method and system for emulating a secret code between a first hardware module to a second hardware module. First, the secret code that is initially stored in the first hardware module is transformed into a transformed secret code according to a transformation pattern randomly selected from a set of possible transformation patterns. Then the transformed secret code is transferred to the second hardware module. Next, the second hardware module can repeatedly guess a hypothetical secret code from the transformed secret code by using a transformation pattern selected from the possible transformation patterns and reversing the effect of the selected transformation pattern on the transformed secret code. In addition, the hypothetical secret code is used to encode a test sample, and the encoded test sample is sent back to the first hardware module. Accordingly, the first hardware module can verify the validity of the current hypothetical secret code by checking the encoded test sample.Type: GrantFiled: October 1, 1999Date of Patent: November 30, 2004Assignee: Geneticware Co., Ltd.Inventor: Chien-Tzu Hou
-
Patent number: 6819766Abstract: A computer system and method manages encryption keys for data. The system and method generates a session key and encrypts given data with the session key. The system and method generates a key encryption key based on a secret initial vector, or password. The session key is encrypted using the key encryption key. The encrypted data and the encrypted session key are then interleaved according to a set of indices created by a one-way transform. The one-way transform takes as its input the initial vector, the length of the encrypted session key and the length of the encrypted data. The data is recovered by a party knowing the initial vector using the one-way transform to determine the location of the encrypted session key in the interleaved data. The session key is decrypted which allows the data to be decrypted.Type: GrantFiled: March 22, 2000Date of Patent: November 16, 2004Assignee: International Business Machines CorporationInventor: Kou Weidong
-
Patent number: 6816595Abstract: To provide a method and a system for creating a mini time key from a time key, a plurality of mini time keys are created within a unit time period. First, a unit time decryption key is prepared immediately after the unit time is created. Then, the last mini time key is created by applying a one-way function to the unit time decryption key. A desired mini time key is created by applying the one-way function to a mini time key following the desired mini time key. In other words, the mini time keys are created as a timed series arranged in a descending order beginning with the last mini time key. In this manner, even when a specific mini time key is externally leaked for a specific reason, a following mini time key in a timed series can not be created by using this mini time key. In addition, even when the mini time keys are sequentially published, the security of the unit time decryption key is maintained.Type: GrantFiled: March 19, 1999Date of Patent: November 9, 2004Assignee: International Business Machines CorporationInventor: Michiharu Kudo
-
Patent number: 6804354Abstract: A stream cipher cryptosystem includes a pseudo-random bit generator receiving a key and providing a vulnerable keystream vulnerable to crytanalysis, and a non-linear filter cryptographic isolator to convert the vulnerable keystream into a protected keystream. The non-linear filter cryptographic isolator includes a multiplier for performing a multiplication function on the vulnerable keystream to provide a lower partial product array and an upper partial product array, and a simple unbiased operation (SUO) for combining the lower partial product array and the upper partial product array to provide the protected keystream. In example encryption operations, a plaintext binary data sequence is combined with the protected keystream to provide a ciphertext binary data sequence. In example decryption operations, a ciphertext binary data sequence is combined with the protected keystream to provide a plaintext binary data sequence.Type: GrantFiled: December 2, 1999Date of Patent: October 12, 2004Assignee: Honeywell International Inc.Inventor: Kevin R. Driscoll
-
Patent number: 6785813Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the pubilc and private information of respective ones of the correspondents.Type: GrantFiled: April 25, 2000Date of Patent: August 31, 2004Assignee: Certicom Corp.Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
-
Patent number: 6763462Abstract: A method to detect a computer virus may be utilized by a virus detection routine which monitors electronic messages transmitted by an electronic mail (e-mail) application. Random numbers may be generated and associated with specific e-mail addresses in a distribution list or electronic address book. Each time the e-mail application transmits an electronic message, the virus routine may be invoked to inspect recipient addresses of the outgoing message. If the e-mail addresses corresponding to the random numbers match one or more of the recipient addresses, the virus routine may alert a user of potential virus activity.Type: GrantFiled: October 5, 1999Date of Patent: July 13, 2004Assignee: Micron Technology, Inc.Inventor: David Marsh
-
Patent number: 6751728Abstract: A method and system for network communication efficiently transmits encrypted packets from a sending host on an external network to a receiving host on an intranet through a network access point (NAP) of the intranet. A packet to be sent by the sending host on the external network is constructed with the external network address of the NAP as the destination address of the packet. The intranet address of the receiving host is also included in the packet in the non-encrypted form and is used in the calculation of the cryptographic hash or the like that is included in the packet for authentication purposes. The encrypted packet is then routed to the NAP through the external network. When the NAP receives the packet, it strips the intranet address of the receiving host from the packet and uses that address to replace the original destination address in the packet. The NAP then forwards the modified packet to the receiving host.Type: GrantFiled: June 16, 1999Date of Patent: June 15, 2004Assignee: Microsoft CorporationInventors: David V. Gunter, Leeon Moshe Shachaf