Patents Examined by Cas Stulberger
  • Patent number: 7036014
    Abstract: An RSA-based signing scheme that combines essentially optimal efficiency with attractive security properties. One preferred signing routine requires one RSA decryption plus some hashing, verifications requires one RSA encryption plus some hashing, and the size of the signature preferably is the size of the modulus. Given an ideal underlying hash function, the scheme is not only provably secure, but has security tightly related to the security of RSA. An alternative embodiment maintains all of the above features and, in addition, provides message recovery. The techniques can be extended to provide schemes for Rabin-based signatures or signatures using other trapdoor functions.
    Type: Grant
    Filed: June 11, 2001
    Date of Patent: April 25, 2006
    Assignee: The Regents of the University of California
    Inventors: Mihir Bellare, Phillip Rogaway
  • Patent number: 7028184
    Abstract: A method, system, computer program product, and method of doing business by digitally notarizing a collection of data streams, thereby improving security of the contents of the data streams. Preferably, public key cryptography is used, wherein the collection of data streams is digitally signed (i.e. notarized) using a private cryptographic key of a digital notary, such that an associated public cryptographic key can be used to verify the authenticity and integrity of the collection of data streams. One or more components which are involved in creating the data streams are preferably authenticated, and a unique identifier of each such component is included within cryptographically-protected information that is provided for the digital notarization. The authenticated identities of the components can therefore be determined from the digital notarization.
    Type: Grant
    Filed: January 17, 2001
    Date of Patent: April 11, 2006
    Assignee: International Business Machines Corporation
    Inventors: John R. Hind, Marcia L. Peters
  • Patent number: 7024565
    Abstract: A circuit includes a capacitor formed with a dielectric including the dielectric encasing elements of the circuit. A detector detects changes in the capacitance of the capacitor.
    Type: Grant
    Filed: December 17, 1999
    Date of Patent: April 4, 2006
    Assignee: Intel Corporation
    Inventors: Mark A. Beiley, James E. Breisch
  • Patent number: 7003667
    Abstract: Secure transmission of data to an intended image output device, wherein the data can be used to generate an image at the intended image output device in the presence of an intended recipient. The data is encrypted using a first key. The first key is then encrypted using a second key and a third key. The second key is a public key of a first private key/public key pair, a private key of the first private key/public key pair being primarily in the sole possession of the intended image output device. The third key is a public key of a second private key/public key pair, a private key of the second private key/public key pair being primarily in the sole possession of the intended recipient of the image. The encrypted data and the twice-encrypted first key are transmitted to the intended image output device.
    Type: Grant
    Filed: October 4, 1999
    Date of Patent: February 21, 2006
    Assignee: Canon Kabushiki Kaisha
    Inventors: Royce E. Slick, Craig Mazzagatte, Neil Y. Iwamoto
  • Patent number: 6996710
    Abstract: In one embodiment, a method for certifying an attestation key comprises generating a remote attestation key pair within a platform and producing a certificate. The certificate includes a public attestation key to attest that a private attestation key, corresponding to the public attestation key, is stored in hardware-protected memory.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: February 7, 2006
    Assignee: Intel Corporation
    Inventors: Carl M. Ellison, Roger A. Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger, Ken Reneris, James A. Sutton, Shreekant S. Thakkar, Millind Mittal
  • Patent number: 6986056
    Abstract: A method and arrangement for generating binary sequences of random numbers uses the principle of random selection of the path of photons on a beam splitter and generating a random number by using two detectors (D10, D21) downstream from a beam splitter (ST2). To generate photons, a light source (L) of a low power is used, and an additional beam splitter (ST1) is connected upstream from the beam splitter (ST2). The photons emitted by the light source (L) during a predefined measurement time are split by the beam splitters (ST1, ST2) arranged one after the other in the beam path of the light source (L). The random sequence is generated when the splitting of the photons matches a predefined photon scheme.
    Type: Grant
    Filed: December 10, 1998
    Date of Patent: January 10, 2006
    Assignee: Deutsche Telekom AG
    Inventors: Wolfgang Dultz, Gisela Dultz, Eric Hildebrandt, Heidrun Schmitzer
  • Patent number: 6980658
    Abstract: Method and apparatus for encrypting transmission traffic at separate protocol layers L1, L2, and L3so that separate encryption elements can be assigned to separate types of transmission traffic, which allows the implementation of different levels of encryption according to service requirements. Encryption elements use variable value inputs, called crypto-syncs, along with semi-permanent encryption keys to protect from replay attacks from rogue mobile stations. Since crypto-sync values vary, a method for synchronizing crypto-syncs at the mobile station and base station is also presented.
    Type: Grant
    Filed: September 28, 2000
    Date of Patent: December 27, 2005
    Assignee: Qualcomm Incorporated
    Inventors: Ramin Rezaiifar, Roy F. Quick, Jr., Paul Williamson, Jun Wang, Edward G. Tiedemann, Jr.
  • Patent number: 6978373
    Abstract: Methods, systems and computer program products are provided which provide profile information associated with a client to a server by generating, at the client, a profile document containing profile information associated with the client and incorporating in the profile document a designator which indicates that profile information identified by the designator is not provided by the client and is provided by a network intermediary in a path between the client and the server. The designator in the profile document is encrypted utilizing a key associated with the client and the profile document with the encrypted designator transmitted from the client to the server utilizing the path. Method, systems and computer program products corresponding to the network intermediaries are also provided.
    Type: Grant
    Filed: March 22, 2000
    Date of Patent: December 20, 2005
    Assignee: International Business Machines Corporation
    Inventors: Stefan Georg Hild, Sandeep Kishan Singhal
  • Patent number: 6971010
    Abstract: An image authentication system utilizes a coded version of a digital image signature and embeds that information into a transform representation of the image. A digital image signature preferably is extracted from the image data. That signature is coded so that the signature is not immediately recognizable. The coded information is embedded into high frequency coefficients in a transform representation of the image. The contents of the high frequency coefficients of a received or later accessed signal can then be deciphered and compared to the signature determined directly from the image to authenticate the integrity of the signal.
    Type: Grant
    Filed: October 15, 1999
    Date of Patent: November 29, 2005
    Assignee: Koninklijke Philips Electronics N.V.
    Inventor: Mohamed Abdel-Mottaleb
  • Patent number: 6925572
    Abstract: Two-phase filtering for a firewall is disclosed. In the first, general phase, a request is filtered to verify one or more of: that the request is pursuant to a supported protocol, that a command of the request is allowed, that the length of the request does not exceed the allowed maximum for the command, and that characters of the request are of an allowable type. Upon first-phase verification, a second phase is invoked that is particular to the protocol of the request. In the second, specialized phase, the request is filtered to verify one or more of the source, the destination, and the content of the request. Upon second-phase verification, the request is allowed to pass. If either first-or second-phase verification fails, then the request is denied.
    Type: Grant
    Filed: February 28, 2000
    Date of Patent: August 2, 2005
    Assignee: Microsoft Corporation
    Inventors: Neta Amit, Eran Harel, Abraham Nathan, Nevet Basker
  • Patent number: 6920561
    Abstract: A method for providing an authentication of a user of a computer system in a network is disclosed. The method comprises capturing biometric data of a user; encrypting and signing the biometric data with a private key and sending the encrypted and signed data to a central server in the network. The method further comprises accepting and verifying credentials associated with the signed and encrypted data from the server utilizing the public key from the server. The method further comprises installing the credentials into the computer if the credentials are verified. In a method and system in accordance with the present invention, a user can walk up to any client within an enterprise and have their locally captured biometric input authenticated at a central server. The user can then have their individual credentials securely imported to the local client for subsequent use during that time period, without needing any additional identification or memory token such as a smartcard.
    Type: Grant
    Filed: March 31, 2000
    Date of Patent: July 19, 2005
    Assignee: International Business Machines Corporation
    Inventors: Christopher Britton Gould, Howard Jeffery Locker, Andy Lloyd Trotter, Michael T. Vanover, James Peter Ward
  • Patent number: 6892307
    Abstract: A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are associated with trust levels and a log-on service obtains credentials for an entity commensurate with the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient.
    Type: Grant
    Filed: August 5, 1999
    Date of Patent: May 10, 2005
    Assignee: Sun Microsystems, Inc.
    Inventors: David L. Wood, Derk Norton, Paul Weschler, Chris Ferris, Yvonne Wilson
  • Patent number: 6839435
    Abstract: Ranking display method for a game machine wherein, when a score along with an E mail address is inputted from a personal computer, a server stores the inputted score and E mail address, and when there is a change in ranking of score, the server transmits a message by E mail to the corresponding personal computer.
    Type: Grant
    Filed: June 9, 1999
    Date of Patent: January 4, 2005
    Assignee: Namco Limited
    Inventors: Tsuyoshi Iijima, Shinichi Odake, Eiichi Saita
  • Patent number: 6826689
    Abstract: A method and system for emulating a secret code between a first hardware module to a second hardware module. First, the secret code that is initially stored in the first hardware module is transformed into a transformed secret code according to a transformation pattern randomly selected from a set of possible transformation patterns. Then the transformed secret code is transferred to the second hardware module. Next, the second hardware module can repeatedly guess a hypothetical secret code from the transformed secret code by using a transformation pattern selected from the possible transformation patterns and reversing the effect of the selected transformation pattern on the transformed secret code. In addition, the hypothetical secret code is used to encode a test sample, and the encoded test sample is sent back to the first hardware module. Accordingly, the first hardware module can verify the validity of the current hypothetical secret code by checking the encoded test sample.
    Type: Grant
    Filed: October 1, 1999
    Date of Patent: November 30, 2004
    Assignee: Geneticware Co., Ltd.
    Inventor: Chien-Tzu Hou
  • Patent number: 6819766
    Abstract: A computer system and method manages encryption keys for data. The system and method generates a session key and encrypts given data with the session key. The system and method generates a key encryption key based on a secret initial vector, or password. The session key is encrypted using the key encryption key. The encrypted data and the encrypted session key are then interleaved according to a set of indices created by a one-way transform. The one-way transform takes as its input the initial vector, the length of the encrypted session key and the length of the encrypted data. The data is recovered by a party knowing the initial vector using the one-way transform to determine the location of the encrypted session key in the interleaved data. The session key is decrypted which allows the data to be decrypted.
    Type: Grant
    Filed: March 22, 2000
    Date of Patent: November 16, 2004
    Assignee: International Business Machines Corporation
    Inventor: Kou Weidong
  • Patent number: 6816595
    Abstract: To provide a method and a system for creating a mini time key from a time key, a plurality of mini time keys are created within a unit time period. First, a unit time decryption key is prepared immediately after the unit time is created. Then, the last mini time key is created by applying a one-way function to the unit time decryption key. A desired mini time key is created by applying the one-way function to a mini time key following the desired mini time key. In other words, the mini time keys are created as a timed series arranged in a descending order beginning with the last mini time key. In this manner, even when a specific mini time key is externally leaked for a specific reason, a following mini time key in a timed series can not be created by using this mini time key. In addition, even when the mini time keys are sequentially published, the security of the unit time decryption key is maintained.
    Type: Grant
    Filed: March 19, 1999
    Date of Patent: November 9, 2004
    Assignee: International Business Machines Corporation
    Inventor: Michiharu Kudo
  • Patent number: 6804354
    Abstract: A stream cipher cryptosystem includes a pseudo-random bit generator receiving a key and providing a vulnerable keystream vulnerable to crytanalysis, and a non-linear filter cryptographic isolator to convert the vulnerable keystream into a protected keystream. The non-linear filter cryptographic isolator includes a multiplier for performing a multiplication function on the vulnerable keystream to provide a lower partial product array and an upper partial product array, and a simple unbiased operation (SUO) for combining the lower partial product array and the upper partial product array to provide the protected keystream. In example encryption operations, a plaintext binary data sequence is combined with the protected keystream to provide a ciphertext binary data sequence. In example decryption operations, a ciphertext binary data sequence is combined with the protected keystream to provide a plaintext binary data sequence.
    Type: Grant
    Filed: December 2, 1999
    Date of Patent: October 12, 2004
    Assignee: Honeywell International Inc.
    Inventor: Kevin R. Driscoll
  • Patent number: 6785813
    Abstract: A key establishment protocol between a pair of correspondents includes the generation by each correspondent of respective signatures. The signatures are derived from information that is private to the correspondent and information that is public. After exchange of signatures, the integrity of exchange messages can be verified by extracting the public information contained in the signature and comparing it with information used to generate the signature. A common session key may then be generated from the pubilc and private information of respective ones of the correspondents.
    Type: Grant
    Filed: April 25, 2000
    Date of Patent: August 31, 2004
    Assignee: Certicom Corp.
    Inventors: Scott Vanstone, Alfred John Menezes, Minghua Qu
  • Patent number: 6763462
    Abstract: A method to detect a computer virus may be utilized by a virus detection routine which monitors electronic messages transmitted by an electronic mail (e-mail) application. Random numbers may be generated and associated with specific e-mail addresses in a distribution list or electronic address book. Each time the e-mail application transmits an electronic message, the virus routine may be invoked to inspect recipient addresses of the outgoing message. If the e-mail addresses corresponding to the random numbers match one or more of the recipient addresses, the virus routine may alert a user of potential virus activity.
    Type: Grant
    Filed: October 5, 1999
    Date of Patent: July 13, 2004
    Assignee: Micron Technology, Inc.
    Inventor: David Marsh
  • Patent number: 6751728
    Abstract: A method and system for network communication efficiently transmits encrypted packets from a sending host on an external network to a receiving host on an intranet through a network access point (NAP) of the intranet. A packet to be sent by the sending host on the external network is constructed with the external network address of the NAP as the destination address of the packet. The intranet address of the receiving host is also included in the packet in the non-encrypted form and is used in the calculation of the cryptographic hash or the like that is included in the packet for authentication purposes. The encrypted packet is then routed to the NAP through the external network. When the NAP receives the packet, it strips the intranet address of the receiving host from the packet and uses that address to replace the original destination address in the packet. The NAP then forwards the modified packet to the receiving host.
    Type: Grant
    Filed: June 16, 1999
    Date of Patent: June 15, 2004
    Assignee: Microsoft Corporation
    Inventors: David V. Gunter, Leeon Moshe Shachaf