Abstract: Methods and apparatus are provided for electronically configuring hardware features and options. A computer chip encoding method is provided in which a predetermined code or encryption sequence is uniquely associated with a computer chip. This code is used to modify a hardware configuration by enabling new features or options. The systems and methods reduce manufacturing and inventory costs by allowing a generic product to be produced which is then customized to meet the needs of the user. In addition, features and options of a data processing system can be dynamically upgraded without interruption of service or hardware replacement.
Type:
Grant
Filed:
June 2, 1995
Date of Patent:
June 25, 1996
Assignee:
International Business Machines Corporation
Inventors:
Randall J. Easter, Vincent A. Spano, Myron W. Zajac, John E. Campbell
Abstract: An apparatus, method, and system in which a compressed digital signal is derived from a digital input signal by compressing the digital input signal in a selected one of plural compression modes. The digital output signal has a different bit rate in each compression mode, but the digital input signal is received at the same bit rate in all the compression modes. In the method, spectral coefficients are derived from the digital input signal, and are grouped by frequency and by time into bands. Each band has a frequency width, and the frequency width of at least one of the bands is set according to the selected compression mode. The spectral coefficients in each band are quantized to provide quantized spectral coefficients. Finally, the quantized spectral coefficients in each band are included in the compressed digital signal, together with sub information for each band.
Abstract: Disclosed are systems and methods for protecting a software program from unauthorized use and copying through the removal at least one of a plurality of instructions comprising a software program, and encrypting the removed instruction utilizing an encryption algorithm to produce an encrypted instruction, the encryption algorithm responsive to a randomly generated key.
Abstract: A system for placing a visible "watermark" on a digital image is disclosed, wherein an image of the watermark is combined with the digital image. The pixels of the watermark image are examined, and for each pixel whose value is not a specified "transparent" value, the corresponding pixel of the original image is modified by changing its brightness but its chromaticities. This results in a visible mark which allows the contents of the image to be viewed clearly, but which discourages unauthorized use of the image.
Type:
Grant
Filed:
February 1, 1995
Date of Patent:
June 25, 1996
Assignee:
International Business Machines Corporation
Inventors:
Gordon W. Braudaway, Karen A. Magerlein, Frederick C. Mintzer
Abstract: The invention relates to a secured apparatus for the transmission of documents by facsimile or fax, which comprises on the emitter side a securing module placing in the binary file transmitted and representing the document a graphic signature of the "morse" type placed on a page of the document and including on the recipient side a module for decoding and checking the graphic signature. The invention also relates to a process for securing the transmission of documents by fax and an image authentication graphic code.
Abstract: A method and apparatus for determining when a original document has been altered. With this invention the original information in the document is hashed using a one-way hash function. The hashed information is then encoded into a number of fingerprint pieces which are then transmitted to a number of locations. To verify the originality of the document a minimum number of fingerprint pieces are decoded and the purported genuine document is hashed using the one-way hash function. If the results of the latter hash equal the results of decoding the minimum number of fingerprint pieces, then the purported document is accepted as the genuine document.
Type:
Grant
Filed:
June 28, 1994
Date of Patent:
June 25, 1996
Assignee:
International Business Machines Corporation
Abstract: In a television transmission system comprising an analog video channel scrambled with a control word which is changed occasionally and a NICAM sound channel scrambled with a control word which is also changed occasionally, and different scrambling and modulation circuits having independent clocks for the sound and video signals, a single control word generator is used for the sound and video signals and when this control word is changed for the video signal (17), a bit or a specific group of bits is incorporated in the subsequent sound data packet (18) indicating that a new control word is available, but the new control word will only be used for a subsequent data packet (19).
Abstract: A packet data transmission system is used to link a number of remote hand-held data-gathering units such as bar code readers to a central computer which maintains a database management system. Data packets are sent from the remote units by an RF link to intermediate base stations, then sent by the base stations to the central computer by a serial link. A frequency-hopping transmission method is used for the RF link. The remote units and base stations are all synchronized to a repeating pseudo-random sequence of frequencies in a band (902-928 MHz) which allows this type of transmission. The remote hand-held units initiate an exchange using RF transmission to and from the base stations, receiving only during a rigid time window following a transmission from the remote unit. The base stations cannot initiate communication to the remote units, but instead send data to the remote units only as part of the exchange.
Abstract: A frequency inversion scrambler in a cordless telephone utilizes an integrated high-pass filter (14) between a first stage low-pass filter (12) and modulator (16) to reduce the filter order while maintaining low group delay in the audio signal. The first stage low-pass filter and high-pass filter remove high frequency components and any DC offset from the filtered audio signal. The modulator translates the spectrum of the filtered signal to sum and difference frequencies. A second stage low-pass filter (18) removes the upper portion of the spectrum such that the resulting frequency spectrum is inverted with respect to the original audio signal to prevent eavesdropping of transmissions between the handset and base unit of the cordless telephone. Another frequency inversion circuit (30, 32, 34, 36) in the base unit inverts the frequency spectrum again back to its original state for transmission along telephone lines.
Abstract: The so-called flight path of an aircraft is defined in the form of a set of successive target points (B.sub.i -1, B.sub.i, B.sub.i +1) with a target circle (CB.sub.i) associated with each target point. A navigation envelope (DN) is determined in she direction to this target, and a guidance envelope (DH) is determined in the direction of the next target, for each target point. Normally, the aircraft is in the navigation envelope, and reenters the guidance envelope, then the target circle (B.sub.i) after which it heads in the direction of the navigation envelope associated with the next target. In the contrary case, a mandatory switching envelope (DCF) determines the instant when the aircraft is to orient itself on the next target (B.sub.i +1).
Abstract: A network management frame contains a clear text (unencrypted) management command field and a security field. The management frame is sent to a data communications network by an authorized managing entity (manager). The management frame is addressed to a managing agent (agent). The security field includes two sub fields. The first sub field is a clear text time stamp. The second sub field includes this same time stamp value concatenated with a checksum that is calculated by the manager for the specific clear text management command contained within the management frame. The concatenated value is then encrypted under a secret cryptographic key that is shared by the manager and the agent. The agent receives the management frame, calculates a checksum of the clear text management command, and appends this checksum to the clear text time stamp as contained in the received management frame. This value is then encrypted using the shared cryptographic code.
Type:
Grant
Filed:
October 13, 1994
Date of Patent:
June 4, 1996
Assignee:
International Business Machines Corp.
Inventors:
Kurt E. Augustine, James E. Neeley, Sr., Norman C. Strole
Abstract: A digital sliding correlator having means for producing a series of time-shifted stored copies of a digital character, means responsive to said shifted, stored copies of the character for multiplying said shifted, stored copies by the input signal or the sign-inverted counterpart of the input signal, a first set of integrators and a second set of integrators, means for supplying to the first set of integrators first portions of said multiplied signals and for supplying to said second set of integrators second portions of said multiplied signals, and means for combining the outputs of said integrators.
Abstract: Signaling is inserted (102) into a communication channel of a communication system by inserting the signaling into the communication channel if the communication channel has sufficient available bandwidth (104). If the communication channel does not have sufficient available bandwidth, reducing the bandwidth of information being communicated on the communication channel (106) and inserting the signaling into the communication channel (108) with reduced information bandwidth.
Abstract: Quantum key distribution (QKD) uses non-orthogonal quantum states to distribute random information, suitable for use as a key for encryption and authentication, between two users who share secret information initially, with the assurance, based on the uncertainty principle, that it is unknown to anyone else. The present invention, which can be used with a fiberoptic channel or an unguided light beam, differs from previous QKD schemes in using macroscopic signals instead of single photons. The invention solves the problem of stray light and cost by using signals which are more efficient, and less noisy than photon-counting detectors at the wavelengths where optical fibers are most transparent.
Type:
Grant
Filed:
November 24, 1993
Date of Patent:
May 7, 1996
Assignee:
International Business Machines Corporation
Abstract: A virtual amplifier comprises a typical switched source follower circuit plus an additional switch of minimum size to perform a virtual amplification function. A capacitor is connected between the gate, which comprises a detector node, and the source, which comprises a source node, of a source follower FET. The source node is connected to the output by a first FET switch. The source node is also connected to a voltage source by a second FET switch. The voltage on the detector node is manipulated by pumping a charge into or out of the capacitor. Charge pumping is accomplished by first accumulating charge on the detector node while the source node is connected to the voltage source, and then switching the first FET switch on and the second FET switch off so that the effective capacitance of the detector node is reduced.
Abstract: Interactive encoding and decoding of machine readable dataforms provides more efficient encoding avoiding trial and error dataform production and more accurate decoding avoiding inaccurate reading of dataforms. While data is entered (12) and encoded (14) an image of the resulting dataform, such as a data code matrix or two-dimensional bar code, is displayed (16) and continuously updated as the dataform (20) fills with entered data. Using the display (16) and an input unit (12) such as a keyboard, digitizer or scanner, data can be edited to add, modify or delete data while observing the resulting dataform (20). On completion, the final dataform code signals are provided for further use (24) or a copy of the dataform (20) is provided by printing, for example. During decoding, an image of the dataform (20) as captured by a reader (32), such as a laser scanner, CCD matrix or CMOS camera, is displayed (34).
Abstract: A neutron radiation insensitive crystal oscillator. The device includes two crystals with neutron sensitivity coefficients of opposite sign. The crystals may be connected either in parallel or series relationships. The addition of tuning reactances to the circuit permits control of the circuit's overall resonance.
Type:
Grant
Filed:
May 31, 1988
Date of Patent:
April 30, 1996
Assignee:
The United States of America as represented by the Secretary of the Army
Abstract: A cordless, battery-operated telephone of relatively low power consumption suitable to operate in license-exempt spectrum and which may employ an established communication protocol, such as the CT-2 communication protocol, is realized by providing a direct sequence spread spectrum (DSSS) modulator/spreader and demodulator/despreader in a battery-operated handset in connection with an intelligent CT-2 controller to which is added additional circuitry and functionality in the handset for acquiring, pulling-in and tracking, in both operational and low-power-consumption standby modes, a received DSSS signal from a base station unit.
Abstract: A unique electronic cash system protects the privacy of users in legitimate transactions while at the same time enabling the detection of a double spender of the same electronic coin. The electronic cash system takes advantage of a unique property of El Gamal signatures to achieve these results.
Abstract: An internetwork authentication method is provided for verifying a sending host by a receiving host or an intermediate router or gateway. The method comprises the steps of: obtaining a network address and a public key of a receiving host; utilizing the public key from the receiving host in combination with a private key of the originating host to generate a cryptographic signature; transmitting the signature along with data through a first subnetwork in at least one packet; receiving at least one packet at the receiving host; and the receiving host utilizing a private key of said receiving host site and a public key of said originating host to verify said cryptographic signature.
Type:
Grant
Filed:
June 3, 1994
Date of Patent:
April 23, 1996
Assignee:
The United States of America as represented by the Secretary of the Navy