Patents Examined by David C. Cain
  • Patent number: 5940514
    Abstract: An encryption method and apparatus for holographic data storage are disclosed. In a system using orthogonal phase-code multiplexing, data is encrypted by modulating the reference beam using an encryption key K represented by a unitary operator. In practice, the encryption key K corresponds to a diffuser or other phase-modulating element placed in the reference beam path, or to shuffling the correspondence between the codes of an orthogonal phase function and the corresponding pixels of a phase spatial light modulator. Because of the lack of Bragg selectivity in the vertical direction, the phase functions used for phase-code multiplexing are preferably one dimensional. Such phase functions can be one-dimensional Walsh functions. The encryption method preserves the orthogonality of reference beams, and thus does not lead to a degradation in crosstalk performance.
    Type: Grant
    Filed: April 30, 1996
    Date of Patent: August 17, 1999
    Assignee: The Board of Trustees of the Leland Stanford Junior University
    Inventors: John F. Heanue, Matthew C. Bashaw, Lambertus Hesselink
  • Patent number: 5901228
    Abstract: A user can use his personal computer to call up an on-line service system over a telecommunications link such as a telephone line. The On-line system provides all sorts of useful services to the personal computer such as antiviral protection, auxiliary processing capabilities, and other features that are impractical or inconvenient to provide locally.
    Type: Grant
    Filed: March 10, 1997
    Date of Patent: May 4, 1999
    Inventor: Christopher M. Crawford
  • Patent number: 5870473
    Abstract: A system and method relating to secure communications in a communication network is disclosed. The invention uses sessions having limited duration to enable parties to communicate securely in the communication network. The session of one party is independent from the session of another party. The sessions are linked at a server which confirms that the sessions are valid.In a preferred embodiment, the secure communications occur in an electronic transfer system. In the electronic transfer system, a customer and a merchant can conduct a transaction wherein the customer can purchase a product from the merchant and pay for the product using electronic funds.
    Type: Grant
    Filed: December 14, 1995
    Date of Patent: February 9, 1999
    Assignee: CyberCash, Inc.
    Inventors: Brian Paul Boesch, Stephen David Crocker, Donald Eggleston Eastlake, III, Alden Sherburne Hart, Jr., Robert A. Lindenberg, Denise Marie Paredes
  • Patent number: 5862221
    Abstract: As for wireless communication lines between a master station and a plurality of remote stations, each remote station has a function F having an unitary variable which is known over all the stations and has two unique IDs, respectively. The master station is provided with a remote station ID memory circuit which outputs one ID of a remote station when the other ID of the remote station is input thereto, and a scrambler. carries out scrambling by using a fixed scramble vector VO during a setup sequence period and using a scramble vector VF set from a master station control circuit at the time of data transmission. A descrambler descrambles an input signal from the remote station by using the scramble vector VO during the setup sequence period and using a scramble vector VR set from the master station control circuit at the time of data transmission.
    Type: Grant
    Filed: June 27, 1997
    Date of Patent: January 19, 1999
    Assignee: NEC Corporation
    Inventor: Shinya Muraoka
  • Patent number: 5862223
    Abstract: The present invention is an expert matching method and apparatus for managing communications between an expert having particular qualifications and an end user seeking a solution to an expert request. In a preferred embodiment, the apparatus of the present invention includes a controller having a database for storing expert qualifications. In one embodiment, the controller receives an expert request. A search program identifies experts qualified to respond to the expert request. The expert request is then transmitted to the expert, which results in an expert answer transmitted to and received by the central controller. After authentication of the expert answer, using a wide range of security levels from passwords to cryptography, the answer is forwarded to the end user. The method and apparatus of the present invention have applications on the Internet as well as conventional voice telephony systems.
    Type: Grant
    Filed: July 24, 1996
    Date of Patent: January 19, 1999
    Assignee: Walker Asset Management Limited Partnership
    Inventors: Jay S. Walker, Bruce Schneier, James A. Jorasch
  • Patent number: 5841872
    Abstract: A system for enhancing an existing data encryption system by preprocessing or postprocessing the data stream as it enters or leaves the encryption system. This external processing makes the encrypted data stream much more difficult to analyze by introducing data content dependencies into the modified, encrypted data stream.
    Type: Grant
    Filed: July 1, 1996
    Date of Patent: November 24, 1998
    Assignee: Allsoft Distributing Incorporated
    Inventor: Bryan Colvin, Sr.
  • Patent number: 5838790
    Abstract: A system and method for authenticating that advertisements are properly displayed at a remote computer. The advertisements are received electronically and are stored in a memory device at the remote computer. The advertisements are output to users when the remote computer is off-line. Each advertisement is authenticated by the remote computer prior to output to ensure, for example, that the advertisement has not been tampered with, modified or replaced. Information as to when advertisements are output is recorded and used for billing the advertisers. This information can be stored in a statistics file on the remote computer. When the statistics file is transferred to a central computer, the statistics file is authenticated to ensure that it has not been tampered with, modified or replaced. The authentication scheme can be used as part of an electronic mail system.
    Type: Grant
    Filed: April 19, 1996
    Date of Patent: November 17, 1998
    Assignee: Juno Online Services, L.P.
    Inventors: Jon D. McAuliffe, Brian D. Marsh, Mark A. Moraes
  • Patent number: 5832091
    Abstract: A public key cryptographic system is implemented as follows. In an enrolment apparatus, the unique number for use in generating the public key and private key of the system is generated by manipulation of fingerprint information of a subscriber. A filter is then generated which is a function both of the Fourier transform of the subscriber's fingerprint(s) and of the unique number. This filter is stored on a subscriber card. When the subscriber wishes to generate his public or private key, he inputs his card to a card reader of an apparatus and places his finger(s) on a fingerprint input. The apparatus generates an optical Fourier transform from the fingerprint input. The Fourier transform signal is incident on to a spatial light modulator programmed with the filter information from the card. An inverse transform is generated from the filtered signal and this is used to regenerate the unique number. The apparatus also has a subsystem for utilizing the private key to decrypt an input encrypted message.
    Type: Grant
    Filed: March 14, 1996
    Date of Patent: November 3, 1998
    Assignee: Mytec Technologies Inc.
    Inventors: George J. Tomko, Colin Soutar, Gregory J. Schmidt
  • Patent number: 5832090
    Abstract: An encryption method and stored value system comprising a host computer, a reader/writer that communicates with the host computer, and an RF transponder that communicates with the reader/writer. The transponder comprises a transponder chip having a memory with a plurality of memory sections, which encryption method protects data stored in the memory. The method provides a secure way to increase and decrease the value stored the transponder and to selectively write and data to and from the transponder.
    Type: Grant
    Filed: August 10, 1995
    Date of Patent: November 3, 1998
    Assignee: HID Corporation
    Inventor: William B. Raspotnik
  • Patent number: 5825888
    Abstract: In a packet analyzing circuit, first and second key data are detected and stored in respective first and second key data registers. First and second key generation circuits generate first and second keys from the first and second key data. An exclusive OR operation is carried out to both keys so as to generate a scrambling key. Using the scrambling key as an initial value, a random number generator generates a PN code used for scrambling, so that scrambled data is descrambled by adding the PN code to the data. The first key generation circuit, which receives a control signal CON from a timing generation circuit, is controlled by the control signal CON such that a scrambling key is generated only when the random number generator needs an initial value.
    Type: Grant
    Filed: September 11, 1996
    Date of Patent: October 20, 1998
    Assignee: Sanyo Electric Co., Ltd.
    Inventors: Kazuhiro Kimura, Shigeaki Hayashibe, Toshiyuki Ozawa, Tatsuo Hiramatsu, Yoshikazu Tomida
  • Patent number: 5825889
    Abstract: An apparatus and method for ciphering traffic exachanged in both directions between a satellite/cellular telephone and a ground station networkusing an orbitial satellite. A buffer memory is provided at either the mobile telephone station or the ground network station or both. The buffer memory is used to store the deciphering bits output from a duplex ciphering algorithm at the time the ciphering bits are generated. The stored ciphering bits are used to decipher a later-to-be-received traffic information block. The delay in using stored deciphering bits is determined for each call at call set-up to the nearest integer number of block periods by measuring the loop propagation delay from the ground station to the mobile telephone station during an exchange of signals at call set-up.
    Type: Grant
    Filed: October 15, 1996
    Date of Patent: October 20, 1998
    Assignee: Ericsson Inc.
    Inventor: Paul W. Dent
  • Patent number: 5815573
    Abstract: A cryptographic key recovery system for generating a cryptographic key for use by a pair of communicating parties while simultaneously providing for its recovery using one or more key recover agents. A plurality of m-bit shared key parts (P, Q) are generated which are shared with respective key recovery agents, while an n-bit nonshared key part (R) is generated that is not shared with any key recovery agent. The shared key parts (P, Q) are combined to generate an m-bit value which is concatenated with the nonshared key part (R) to generate an (m+n)-bit value from which an encryption key is generated. The cryptographic system has the effective work factor of an n-bit key to all of the key recovery agents acting in concert, but has the effective work factor of an (m+n)-bit to any other combination of third parties.
    Type: Grant
    Filed: April 10, 1996
    Date of Patent: September 29, 1998
    Assignee: International Business Machines Corporation
    Inventors: Donald Byron Johnson, Paul Ashley Karger, Charles William Kaufman, Jr., Stephen Michael Matyas, Jr., Marcel Mordechay Yung, Nevenko Zunic
  • Patent number: 5812663
    Abstract: In a system for reproducing multimedia data such as enciphered characters, enciphered images, enciphered animation or enciphered sound, an ID is given every time the data are integrated to some extent and the ID and a sector of CD-ROM are made correspond one another so that an access in which a sector has been designated directly for the encoded data can be executed by directing the ID from the outside.
    Type: Grant
    Filed: December 14, 1995
    Date of Patent: September 22, 1998
    Assignee: Fujitsu Limited
    Inventors: Ryota Akiyama, Makoto Yoshioka
  • Patent number: 5809139
    Abstract: A digital watermarking method and apparatus allows for the watermarking of a digital video signal in a compressed form, thereby allowing watermarking of a pre-compressed video sequence without requiring the decoding and re-coding of the signal. The watermark signal is a sequence of information bits which has been modulated by a pseudo-random noise sequence to spread it in the frequency domain. The video signal is transform coded, preferably with a discrete cosine transform, and a watermark signal, which has been transform coded using the same type of transform, is added to the coded video signal. The system also includes bitstream control to prevent an increase in the bit rate of the video signal. This allows the system to be used with transmission channels having strict bit rate constraints. For each transform coefficient of the video signal, the number of bits necessary to encode the watermarked coefficient is compared to the number of bits necessary to encode the unwatermarked coefficient.
    Type: Grant
    Filed: September 13, 1996
    Date of Patent: September 15, 1998
    Assignee: Vivo Software, Inc.
    Inventors: Bernd Girod, Frank H. D. Hartung
  • Patent number: 5809141
    Abstract: A communication system is disclosed which reduces loop delay when a first wireless phone calls a second wireless phone wherein the first and second phones are served by the same relay station. The communication system includes a relay station for communicating with the first and second wireless phones. A transponder located in the relay station relays signals received from one mobile station on a first frequency band to another mobile station on a second frequency band. In addition, the transponder sends the received signals to a controller which controls the operation of the transponder using control information.
    Type: Grant
    Filed: July 30, 1996
    Date of Patent: September 15, 1998
    Assignee: Ericsson Inc.
    Inventors: Paul W. Dent, Sandeep Chennakeshu, Rajaram Ramesh, Stanley L. Reinhold
  • Patent number: 5809145
    Abstract: A system for distributing digital data among a plurality of customers is provided which comprises a modular software architecture to accommodate different data preview, search, data compression and encryption functions, and different purchase transactions. A software kernel creates an operating environment in conjunction with the host operating system of a customer computer to accommodate these different services and functions and allow for the storage and retrieval of datasets from a variety of storage locations, such as portable storage devices at customer computers and shared memory devices accessible via communication networks. Computer-dependent product codes for requesting datasets and release codes for decrypting datasets are generated to protect against unauthorized use of selected datasets.
    Type: Grant
    Filed: June 28, 1996
    Date of Patent: September 15, 1998
    Assignee: Paradata Systems Inc.
    Inventors: David Slik, Shannon Byrne
  • Patent number: 5809143
    Abstract: Apparatus and methods are provided for transacting secure purchase and bill payment transactions.
    Type: Grant
    Filed: June 28, 1997
    Date of Patent: September 15, 1998
    Inventor: Thomas S. Hughes
  • Patent number: 5805707
    Abstract: In a radio pager, when encrypting information is attached to a received message, the message is written to an encrypted message memory in distinction from an ordinary message. The message stored in the encrypted message memory is read out and displayed only when decrypting information matching the encrypting information is entered by the user of the pager. The encrypting information may be added to the received message by the user before the message is written to the encrypted message memory. With this configuration, the pager allows only the user or an authorized person to see private messages stored in the encrypted message memory.
    Type: Grant
    Filed: July 25, 1996
    Date of Patent: September 8, 1998
    Assignee: NEC Corporation
    Inventor: Yasushi Nakano
  • Patent number: 5802178
    Abstract: A multi-level security device is disclosed for providing security between a user and at least one computer network, wherein the user is selected from the group consisting of a host computer and at least a second network. A secure network interface Unit (SNIU) that operates at a user layer communications protocol, which communicates with other like SNIU devices by establishing an association at a session layer of a communication stack in order to create a global security perimeter for end-to-end communications. The SNIU includes a host/network interface for receiving messages sent between the user and the at least one network, which is operative to convert the received messages to and from a format utilized by the at least one network. A message parser for determining whether the association already exists with another SNIU device. A session manager coupled to the interface for identifying and verifying the user requesting access to the network.
    Type: Grant
    Filed: July 30, 1996
    Date of Patent: September 1, 1998
    Assignee: ITT Industries, Inc.
    Inventors: James M. Holden, Stephen E. Levin, James O. Nickel, Edwin H. Wrench, Jr.
  • Patent number: RE36918
    Abstract: A method, using a public-key cryptosystem, for enabling a predetermined entity to monitor communications of users .[.suspected of unlawful activities while protecting the privacy of law-abiding users.]., wherein each user is assigned a pair of matching secret and public keys. According to the method, each user's secret key is broken into shares. Then, each user provides a plurality of "trustees" pieces of information. The pieces of information provided to each trustee enable that trustee to verify that such information includes a "share" of a secret key of some given public key. Each trustee can verify that the pieces of information provided include a share of the secret key without interaction with any other trustee or by sending messages to the user. Upon a predetermined request or condition, e.g., a court order authorizing the entity to monitor the communications of a user .[.suspected of unlawful activity.]., the trustees reveal to the entity the shares of the secret key of such user.
    Type: Grant
    Filed: September 12, 1995
    Date of Patent: October 17, 2000
    Assignee: CertCo LLC
    Inventor: Silvio Micali