Patents Examined by David C. Cain
-
Patent number: 5940514Abstract: An encryption method and apparatus for holographic data storage are disclosed. In a system using orthogonal phase-code multiplexing, data is encrypted by modulating the reference beam using an encryption key K represented by a unitary operator. In practice, the encryption key K corresponds to a diffuser or other phase-modulating element placed in the reference beam path, or to shuffling the correspondence between the codes of an orthogonal phase function and the corresponding pixels of a phase spatial light modulator. Because of the lack of Bragg selectivity in the vertical direction, the phase functions used for phase-code multiplexing are preferably one dimensional. Such phase functions can be one-dimensional Walsh functions. The encryption method preserves the orthogonality of reference beams, and thus does not lead to a degradation in crosstalk performance.Type: GrantFiled: April 30, 1996Date of Patent: August 17, 1999Assignee: The Board of Trustees of the Leland Stanford Junior UniversityInventors: John F. Heanue, Matthew C. Bashaw, Lambertus Hesselink
-
Patent number: 5901228Abstract: A user can use his personal computer to call up an on-line service system over a telecommunications link such as a telephone line. The On-line system provides all sorts of useful services to the personal computer such as antiviral protection, auxiliary processing capabilities, and other features that are impractical or inconvenient to provide locally.Type: GrantFiled: March 10, 1997Date of Patent: May 4, 1999Inventor: Christopher M. Crawford
-
Patent number: 5870473Abstract: A system and method relating to secure communications in a communication network is disclosed. The invention uses sessions having limited duration to enable parties to communicate securely in the communication network. The session of one party is independent from the session of another party. The sessions are linked at a server which confirms that the sessions are valid.In a preferred embodiment, the secure communications occur in an electronic transfer system. In the electronic transfer system, a customer and a merchant can conduct a transaction wherein the customer can purchase a product from the merchant and pay for the product using electronic funds.Type: GrantFiled: December 14, 1995Date of Patent: February 9, 1999Assignee: CyberCash, Inc.Inventors: Brian Paul Boesch, Stephen David Crocker, Donald Eggleston Eastlake, III, Alden Sherburne Hart, Jr., Robert A. Lindenberg, Denise Marie Paredes
-
Patent number: 5862223Abstract: The present invention is an expert matching method and apparatus for managing communications between an expert having particular qualifications and an end user seeking a solution to an expert request. In a preferred embodiment, the apparatus of the present invention includes a controller having a database for storing expert qualifications. In one embodiment, the controller receives an expert request. A search program identifies experts qualified to respond to the expert request. The expert request is then transmitted to the expert, which results in an expert answer transmitted to and received by the central controller. After authentication of the expert answer, using a wide range of security levels from passwords to cryptography, the answer is forwarded to the end user. The method and apparatus of the present invention have applications on the Internet as well as conventional voice telephony systems.Type: GrantFiled: July 24, 1996Date of Patent: January 19, 1999Assignee: Walker Asset Management Limited PartnershipInventors: Jay S. Walker, Bruce Schneier, James A. Jorasch
-
Patent number: 5862221Abstract: As for wireless communication lines between a master station and a plurality of remote stations, each remote station has a function F having an unitary variable which is known over all the stations and has two unique IDs, respectively. The master station is provided with a remote station ID memory circuit which outputs one ID of a remote station when the other ID of the remote station is input thereto, and a scrambler. carries out scrambling by using a fixed scramble vector VO during a setup sequence period and using a scramble vector VF set from a master station control circuit at the time of data transmission. A descrambler descrambles an input signal from the remote station by using the scramble vector VO during the setup sequence period and using a scramble vector VR set from the master station control circuit at the time of data transmission.Type: GrantFiled: June 27, 1997Date of Patent: January 19, 1999Assignee: NEC CorporationInventor: Shinya Muraoka
-
Patent number: 5841872Abstract: A system for enhancing an existing data encryption system by preprocessing or postprocessing the data stream as it enters or leaves the encryption system. This external processing makes the encrypted data stream much more difficult to analyze by introducing data content dependencies into the modified, encrypted data stream.Type: GrantFiled: July 1, 1996Date of Patent: November 24, 1998Assignee: Allsoft Distributing IncorporatedInventor: Bryan Colvin, Sr.
-
Patent number: 5838790Abstract: A system and method for authenticating that advertisements are properly displayed at a remote computer. The advertisements are received electronically and are stored in a memory device at the remote computer. The advertisements are output to users when the remote computer is off-line. Each advertisement is authenticated by the remote computer prior to output to ensure, for example, that the advertisement has not been tampered with, modified or replaced. Information as to when advertisements are output is recorded and used for billing the advertisers. This information can be stored in a statistics file on the remote computer. When the statistics file is transferred to a central computer, the statistics file is authenticated to ensure that it has not been tampered with, modified or replaced. The authentication scheme can be used as part of an electronic mail system.Type: GrantFiled: April 19, 1996Date of Patent: November 17, 1998Assignee: Juno Online Services, L.P.Inventors: Jon D. McAuliffe, Brian D. Marsh, Mark A. Moraes
-
Patent number: 5832090Abstract: An encryption method and stored value system comprising a host computer, a reader/writer that communicates with the host computer, and an RF transponder that communicates with the reader/writer. The transponder comprises a transponder chip having a memory with a plurality of memory sections, which encryption method protects data stored in the memory. The method provides a secure way to increase and decrease the value stored the transponder and to selectively write and data to and from the transponder.Type: GrantFiled: August 10, 1995Date of Patent: November 3, 1998Assignee: HID CorporationInventor: William B. Raspotnik
-
Patent number: 5832091Abstract: A public key cryptographic system is implemented as follows. In an enrolment apparatus, the unique number for use in generating the public key and private key of the system is generated by manipulation of fingerprint information of a subscriber. A filter is then generated which is a function both of the Fourier transform of the subscriber's fingerprint(s) and of the unique number. This filter is stored on a subscriber card. When the subscriber wishes to generate his public or private key, he inputs his card to a card reader of an apparatus and places his finger(s) on a fingerprint input. The apparatus generates an optical Fourier transform from the fingerprint input. The Fourier transform signal is incident on to a spatial light modulator programmed with the filter information from the card. An inverse transform is generated from the filtered signal and this is used to regenerate the unique number. The apparatus also has a subsystem for utilizing the private key to decrypt an input encrypted message.Type: GrantFiled: March 14, 1996Date of Patent: November 3, 1998Assignee: Mytec Technologies Inc.Inventors: George J. Tomko, Colin Soutar, Gregory J. Schmidt
-
Patent number: 5825888Abstract: In a packet analyzing circuit, first and second key data are detected and stored in respective first and second key data registers. First and second key generation circuits generate first and second keys from the first and second key data. An exclusive OR operation is carried out to both keys so as to generate a scrambling key. Using the scrambling key as an initial value, a random number generator generates a PN code used for scrambling, so that scrambled data is descrambled by adding the PN code to the data. The first key generation circuit, which receives a control signal CON from a timing generation circuit, is controlled by the control signal CON such that a scrambling key is generated only when the random number generator needs an initial value.Type: GrantFiled: September 11, 1996Date of Patent: October 20, 1998Assignee: Sanyo Electric Co., Ltd.Inventors: Kazuhiro Kimura, Shigeaki Hayashibe, Toshiyuki Ozawa, Tatsuo Hiramatsu, Yoshikazu Tomida
-
Patent number: 5825889Abstract: An apparatus and method for ciphering traffic exachanged in both directions between a satellite/cellular telephone and a ground station networkusing an orbitial satellite. A buffer memory is provided at either the mobile telephone station or the ground network station or both. The buffer memory is used to store the deciphering bits output from a duplex ciphering algorithm at the time the ciphering bits are generated. The stored ciphering bits are used to decipher a later-to-be-received traffic information block. The delay in using stored deciphering bits is determined for each call at call set-up to the nearest integer number of block periods by measuring the loop propagation delay from the ground station to the mobile telephone station during an exchange of signals at call set-up.Type: GrantFiled: October 15, 1996Date of Patent: October 20, 1998Assignee: Ericsson Inc.Inventor: Paul W. Dent
-
Patent number: 5815573Abstract: A cryptographic key recovery system for generating a cryptographic key for use by a pair of communicating parties while simultaneously providing for its recovery using one or more key recover agents. A plurality of m-bit shared key parts (P, Q) are generated which are shared with respective key recovery agents, while an n-bit nonshared key part (R) is generated that is not shared with any key recovery agent. The shared key parts (P, Q) are combined to generate an m-bit value which is concatenated with the nonshared key part (R) to generate an (m+n)-bit value from which an encryption key is generated. The cryptographic system has the effective work factor of an n-bit key to all of the key recovery agents acting in concert, but has the effective work factor of an (m+n)-bit to any other combination of third parties.Type: GrantFiled: April 10, 1996Date of Patent: September 29, 1998Assignee: International Business Machines CorporationInventors: Donald Byron Johnson, Paul Ashley Karger, Charles William Kaufman, Jr., Stephen Michael Matyas, Jr., Marcel Mordechay Yung, Nevenko Zunic
-
Patent number: 5812663Abstract: In a system for reproducing multimedia data such as enciphered characters, enciphered images, enciphered animation or enciphered sound, an ID is given every time the data are integrated to some extent and the ID and a sector of CD-ROM are made correspond one another so that an access in which a sector has been designated directly for the encoded data can be executed by directing the ID from the outside.Type: GrantFiled: December 14, 1995Date of Patent: September 22, 1998Assignee: Fujitsu LimitedInventors: Ryota Akiyama, Makoto Yoshioka
-
Patent number: 5809141Abstract: A communication system is disclosed which reduces loop delay when a first wireless phone calls a second wireless phone wherein the first and second phones are served by the same relay station. The communication system includes a relay station for communicating with the first and second wireless phones. A transponder located in the relay station relays signals received from one mobile station on a first frequency band to another mobile station on a second frequency band. In addition, the transponder sends the received signals to a controller which controls the operation of the transponder using control information.Type: GrantFiled: July 30, 1996Date of Patent: September 15, 1998Assignee: Ericsson Inc.Inventors: Paul W. Dent, Sandeep Chennakeshu, Rajaram Ramesh, Stanley L. Reinhold
-
Patent number: 5809139Abstract: A digital watermarking method and apparatus allows for the watermarking of a digital video signal in a compressed form, thereby allowing watermarking of a pre-compressed video sequence without requiring the decoding and re-coding of the signal. The watermark signal is a sequence of information bits which has been modulated by a pseudo-random noise sequence to spread it in the frequency domain. The video signal is transform coded, preferably with a discrete cosine transform, and a watermark signal, which has been transform coded using the same type of transform, is added to the coded video signal. The system also includes bitstream control to prevent an increase in the bit rate of the video signal. This allows the system to be used with transmission channels having strict bit rate constraints. For each transform coefficient of the video signal, the number of bits necessary to encode the watermarked coefficient is compared to the number of bits necessary to encode the unwatermarked coefficient.Type: GrantFiled: September 13, 1996Date of Patent: September 15, 1998Assignee: Vivo Software, Inc.Inventors: Bernd Girod, Frank H. D. Hartung
-
Patent number: 5809143Abstract: Apparatus and methods are provided for transacting secure purchase and bill payment transactions.Type: GrantFiled: June 28, 1997Date of Patent: September 15, 1998Inventor: Thomas S. Hughes
-
Patent number: 5809145Abstract: A system for distributing digital data among a plurality of customers is provided which comprises a modular software architecture to accommodate different data preview, search, data compression and encryption functions, and different purchase transactions. A software kernel creates an operating environment in conjunction with the host operating system of a customer computer to accommodate these different services and functions and allow for the storage and retrieval of datasets from a variety of storage locations, such as portable storage devices at customer computers and shared memory devices accessible via communication networks. Computer-dependent product codes for requesting datasets and release codes for decrypting datasets are generated to protect against unauthorized use of selected datasets.Type: GrantFiled: June 28, 1996Date of Patent: September 15, 1998Assignee: Paradata Systems Inc.Inventors: David Slik, Shannon Byrne
-
Patent number: 5805707Abstract: In a radio pager, when encrypting information is attached to a received message, the message is written to an encrypted message memory in distinction from an ordinary message. The message stored in the encrypted message memory is read out and displayed only when decrypting information matching the encrypting information is entered by the user of the pager. The encrypting information may be added to the received message by the user before the message is written to the encrypted message memory. With this configuration, the pager allows only the user or an authorized person to see private messages stored in the encrypted message memory.Type: GrantFiled: July 25, 1996Date of Patent: September 8, 1998Assignee: NEC CorporationInventor: Yasushi Nakano
-
Patent number: 5802178Abstract: A multi-level security device is disclosed for providing security between a user and at least one computer network, wherein the user is selected from the group consisting of a host computer and at least a second network. A secure network interface Unit (SNIU) that operates at a user layer communications protocol, which communicates with other like SNIU devices by establishing an association at a session layer of a communication stack in order to create a global security perimeter for end-to-end communications. The SNIU includes a host/network interface for receiving messages sent between the user and the at least one network, which is operative to convert the received messages to and from a format utilized by the at least one network. A message parser for determining whether the association already exists with another SNIU device. A session manager coupled to the interface for identifying and verifying the user requesting access to the network.Type: GrantFiled: July 30, 1996Date of Patent: September 1, 1998Assignee: ITT Industries, Inc.Inventors: James M. Holden, Stephen E. Levin, James O. Nickel, Edwin H. Wrench, Jr.
-
Patent number: RE36918Abstract: A method, using a public-key cryptosystem, for enabling a predetermined entity to monitor communications of users .[.suspected of unlawful activities while protecting the privacy of law-abiding users.]., wherein each user is assigned a pair of matching secret and public keys. According to the method, each user's secret key is broken into shares. Then, each user provides a plurality of "trustees" pieces of information. The pieces of information provided to each trustee enable that trustee to verify that such information includes a "share" of a secret key of some given public key. Each trustee can verify that the pieces of information provided include a share of the secret key without interaction with any other trustee or by sending messages to the user. Upon a predetermined request or condition, e.g., a court order authorizing the entity to monitor the communications of a user .[.suspected of unlawful activity.]., the trustees reveal to the entity the shares of the secret key of such user.Type: GrantFiled: September 12, 1995Date of Patent: October 17, 2000Assignee: CertCo LLCInventor: Silvio Micali