Patents Examined by David C. Cain
-
Patent number: 5802174Abstract: An optical disk D is composed of a first recording layer L.sub.1 and a second recording layer L.sub.2 each for two recording formats. Encrypted data is recorded on the first recording layer L.sub.1. Encrypting key data is recorded on the second recording layer L.sub.2. The encrypting key data is used for decoding the encrypted data. This recording makes easy reproduction of the recorded data quite difficult. If data recorded on a bit-formed portion may be reproduced by any means, the data signal recorded on the optical disk cannot be easily reproduced.Type: GrantFiled: June 27, 1996Date of Patent: September 1, 1998Assignee: Sony CorporationInventors: Yoichiro Sako, Hideo Owa, Yoshitomo Osawa, Akira Kurihara, Isao Kawashima
-
Patent number: 5799091Abstract: According to the present invention, a single chip semiconductor devices is provided. In one version of the invention, a single chip CMOS technology architecture is used to implement all or various combinations of baseband radio transmission, baseband interfaces and filtering, source coding, source interfaces and filtering, control and supervision, power and clock management, keyboard and display drivers, memory management and code compaction, digital signal processing ("DSP") and DSP memory and radio interface functions.Type: GrantFiled: May 24, 1996Date of Patent: August 25, 1998Assignee: LSI Logic CorporationInventor: Johan Lodenius
-
Patent number: 5799092Abstract: A self-verifying identification card having an image area which may contain a portrait, a finger print, a retinal image, or all of these together with an image signature which is derived from scanned intensity measurements taken from the image area. In the verification process, the image is scanned and aligned with respect to reference points corresponding to the original printing process which created the card, and intensity values, their averages, or any other function are compared to information provided by the image signature. Mathematical transformations, such as a one-way hash, an encryption, a compression algorithm, or a truth table may be used to encode the image signature. Alignment markers aid in scanning the image and the image signature. The use of average values aids in reducing noise and the use of comparison functions makes the process less sensitive to variations among scanners.Type: GrantFiled: February 28, 1995Date of Patent: August 25, 1998Assignee: Lucent Technologies Inc.Inventors: David M. Kristol, Lawrence P. O'Gorman
-
Patent number: 5799088Abstract: A non-deterministic public key encryption system whereby a public key is generated from a private key using mathematical operations equivalent to exponentiation in finite fields. Thus an attacker is required to compute logarithms over finite fields. Encryption involves generating a random initialization key (R) which is used to (1) exponentiate the message receiver's public key (E) to produce initial values (K) for a pseudorandom binary mixture generator, and to (2) compute an open key (Q) by exponentiating an initial known generator state (a.sub.0). A ciphertext (C) is produced from plaintext (P) by clocking the mixture generator from the initial value (K) and combining the output keystream with the plaintext (P). The open key (Q) is attached to the ciphertext prior to transmission. Decryption involves extracting the open key (Q) and exponentiating this by the message receiver's private key (D) to compute (K) which is then used to set the initial value of a mixture generator.Type: GrantFiled: September 23, 1996Date of Patent: August 25, 1998Inventor: William Michael Raike
-
Patent number: 5799083Abstract: An event verification system comprises an input for the reception of information and an encryption algorithm to encrypt the information; an electronic recorder to record the encrypted information and a decryption algorithm to decrypt recorded information; at least one programmable memory to store at least one cryptographic key for use with the encryption and decryption algorithms; a tamperproof enclosure to protect the input and at least one programmable memory from access or alteration; and, a trusted agent to generate at least one cryptographic key to be used in conjunction with the encryption and decryption algorithms, the trusted agent programming any generated cryptographic key into at least one programmable memory for use with the encryption and decryption algorithms and, upon request, verifying the authenticity of the recorded information by decrypting the recorded information using at least one cryptographic key.Type: GrantFiled: August 26, 1996Date of Patent: August 25, 1998Inventors: Harlan Jay Brothers, Chris Hind Genly
-
Patent number: 5796830Abstract: A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public information, so that the session key may be regenerated from the key recovery values P, Q and (if generated) R. Key recovery values P and Q are encrypted using the respective public recovery keys of a pair of key recovery agents. The encrypted P and Q values are included along with other recovery information in a session header accompanying an encrypted message sent from the sender to the receiver. The key recovery agents may recover the P and Q values for a law enforcement agent by decrypting the encrypted P and Q values in the session header, using their respective private recovery keys corresponding to the public keys.Type: GrantFiled: July 29, 1996Date of Patent: August 18, 1998Assignee: International Business Machines CorporationInventors: Donald Byron Johnson, Paul Ashley Karger, Charles William Kaufman, Jr., Stephen Michael Matyas, Jr., David Robert Safford, Marcel Mordechay Yung, Nevenko Zunic
-
Patent number: 5796827Abstract: An apparatus and method are disclosed for encoding and transferring data from a transmitter to a receiver, using the human body as a transmission medium. The transmitter includes an electric field generator, a data encoder which operates by modulating the electric field, and electrodes to couple the electric field through the human body. The receiver includes electrodes, in physical contact with, or close proximity to, a part of the human body, for detecting an electric field carried through the body, and a demodulator for extracting the data from the modulated electric field. An authenticator, connected to the receiver, processes the encoded data and validates the authenticity of the transmission. The apparatus and method are used to identify and authorize a possessor of the transmitter. The possessor then has secure access to, and can obtain delivery of, goods and services such as the distribution of money, phone privileges, building access, and commodities.Type: GrantFiled: November 14, 1996Date of Patent: August 18, 1998Assignee: International Business Machines CorporationInventors: Don Coppersmith, Prabhakar Raghavan, Thomas G. Zimmerman
-
Patent number: 5790676Abstract: A preferred embodiment provides a radio port controller in a wireless personal communications system including a first interface module in communication with a radio port, a second interface in communication with a digital switch, and at least one switching transcoder module in communication with the first and second interface modules. A further preferred embodiment provides that the switching transcoder module includes a digital signal processor. The radio port controller preferably has a communication backplane including a plurality of slots, and each slot is preferably adapted to selectively receive either a T1 card interfacing to a T1 line or an E1 card interfacing to an E1 line.Type: GrantFiled: September 23, 1997Date of Patent: August 4, 1998Assignee: Hughes Electronics CorporationInventors: Kalyan Ganesan, Ranjan Pant, Kim Goh, Barrie Saunders
-
Patent number: 5790675Abstract: A novel asymmetrical cryptographic schema which can be used for enciphering, signature and authentication. The schema is based on low degree public polynomial equations with value in a finite ring K.The mechanism is not necessarily bijective. The secret key makes it possible to hide polynomial equations with value in extensions of the ring K. The solving of these equations makes it possible, if one has the secret key, to execute operations which are not executable with the public key alone.Type: GrantFiled: July 24, 1996Date of Patent: August 4, 1998Assignee: CP8 TransacInventor: Jacques Patarin
-
Patent number: 5786975Abstract: A switching circuit especially suitable for protecting electronic components such as integrated circuits (2) from the harmful effects of ionizing radiation. The circuit comprises two switches for isolating the component (2) from its power supply, the switches conveniently being NPN transistors (TR1, TR2) and being connected either side of a decoupling capacitor (3) associated with a component (2). Because the capacitor (3) is allowed to retain its charge during power-off, no time is lost in recharging it once the power supply has been resumed.Type: GrantFiled: March 19, 1993Date of Patent: July 28, 1998Assignee: British Aerospace PLCInventors: Peter H. Duncan, Glenn R. Randall
-
Patent number: 5787179Abstract: A scrambling method of a stream formed of a series of unit streams in succession, the unit stream including a first stream part and a second stream part located behind the first stream part. The scrambling method scrambles the second stream part by using a random number generator and includes a step of supplying predetermined data included in the first stream part and having a non-fixed value, for each of the second stream part to be scrambled, to the random number generator as an initial value. Further, a scrambling apparatus, a descrambling method and a descrambling apparatus are disclosed.Type: GrantFiled: July 19, 1996Date of Patent: July 28, 1998Assignee: Fujitsu Ltd.Inventors: Kiyotaka Ogawa, Kiyoshi Kohiyama, Ryota Akiyama, Kiyokatsu Iijima
-
Patent number: 5778072Abstract: A system and method provide transparent integration of a smart card private key operations with an existing set of encryption services and system applications. A key store manager manages user key data, and handles requests for key operations from the system applications. A user information file stores user data, including user private keys for users that do not have smart cards, and an indication of those users that have smart cards. A set of system applications interfaces with the key store manager through encryption protocol specific application programming interfaces. Users connect to the system through terminals or remote computers that may be equipped with smart card readers. For users having smart cards, the key store manager forwards to the smart cards requests for private key operations, such as encryption or decryption with the user's private key, from the system applications. In this manner the user's private key cannot be compromised by exposure to the computer system.Type: GrantFiled: July 7, 1995Date of Patent: July 7, 1998Assignee: Sun Microsystems, Inc.Inventor: Vipin Samar
-
Patent number: 5768389Abstract: A method and a system for generating and managing a secret key of a public key cryptosystem, in which the secret key is generated inside a tamper resistant device, and stored into a storage region in a personal portable device from which the secret key cannot be read out of the personal portable device, while the personal portable device is inside the tamper resistant device. Here, the secret key can be reproduced by collecting the partial secret keys from those arbitrators who judge that the secret key reproduction is appropriate. Also, the secret key is generated inside a tamper resistant personal portable device, and stored into a storage region in the tamper resistant personal portable device from which the secret key cannot be read out of the tamper resistant personal portable device. Here, the secret key can be reproduced by using the partial secret keys for constituting the secret key from all entities sharing interests with a user of the tamper resistant personal portable device.Type: GrantFiled: June 20, 1996Date of Patent: June 16, 1998Assignee: Nippon Telegraph and Telephone CorporationInventor: Shinji Ishii
-
Patent number: 5764769Abstract: An apparatus and method produce a videotape or other recording that cannot be pre- or post-dated, nor altered, nor easily fabricated by electronically combining pre-recorded material. In order to prevent such falsification, the camera or other recording apparatus periodically receives certifiably unpredictable signals ("challenges") from a trusted source, causes these signals to influence the scene being recorded, then periodically forwards a digest of the ongoing digital recording to a trusted repository. The unpredictable challenges prevent pre-dating of the recording before the time of the challenge, while the storage of a digest prevents post-dating of the recording after the time the digest was received by the repository.Type: GrantFiled: July 31, 1996Date of Patent: June 9, 1998Assignee: International Business Machines CorporationInventors: Charles Henry Bennett, David Peter DiVincenzo, Ralph Linsker
-
Patent number: 5764764Abstract: A video signal format converting circuit is disclosed, comprising a signal converting matrix circuit and a filter circuit that is constructed of a time delaying device for a video signal corresponding to a standard television format. When a digital video signal corresponding to a first video signal format is converted into a second video signal format that is different from the first video signal format and then output, the time delaying device of the filter circuit is used as a delaying circuit. The output signal of the delaying circuit or the video signal corresponding to the standard television signal format is selectively output. While or after the video signal corresponding to the first video signal format is converted into the video signal corresponding to the second signal format, the video signal is modified so as to protect it from being copied.Type: GrantFiled: April 8, 1997Date of Patent: June 9, 1998Assignee: Sony CorporationInventors: Yasuhide Mogi, Etsuro Yamauchi, Atsushi Narita
-
Patent number: 5764766Abstract: A system and method and computer program product for encrypting data communications comprising the generation of a salt at a data transmitting system and combination of the salt with a primary encryption key known at the data transmitting system and a data receiving system. The salt and the primary encryption key are hashed to produce a transmitting encryption key and a data message is encrypted with an encryption function utilizing the transmitting encryption key to produce a ciphertext message. The salt and the ciphertext message are transmitted to the data receiving system where the salt and the primary encryption key are hashed to produce a receiving decryption key and the data message is retrieved by performing a symmetrical decryption function on the ciphertext message and the receiving decryption key.Type: GrantFiled: June 11, 1996Date of Patent: June 9, 1998Assignee: Digital Equipment CorporationInventor: Michael Spratte
-
Patent number: 5764761Abstract: In an electronic assembly, a first integrated circuit device (chip) is provided with a lock circuitry that controls operational enablement of a functional block of the chip. To unlock the lock circuitry, a "chip-key" must be supplied to the chip. The chip is also provided with chip-key output circuit for outputting a chip key associated with one or more other chips of the electronic assembly; the chip-key output circuit may be part of the functional block controlled by the lock circuitry of the same chip.Type: GrantFiled: May 7, 1996Date of Patent: June 9, 1998Assignee: Hewlett-Packard CompanyInventor: Dominique Vicard
-
Patent number: 5764771Abstract: The present invention relates to a method of processing a digital signal of dimension k, in a so-called secure communication system, such that the digital signal (y) at output cannot be deduced from the digital signal (x) at input, consisting in dispatching the digital signal (x) to a device effecting a one-way function.The method includes the following steps:the digital signal (x) at the input is dispatched to a circuit C (1, 2) which gives as output a digital signal (x") of dimension n acceptable to the one-way function;the signal (x") from the circuit C (1, 2) is dispatched to the circuit effecting the one-way function giving as output the digital signal (y).The invention applies in particular to so-called secure communication systems.Type: GrantFiled: June 13, 1996Date of Patent: June 9, 1998Assignee: Thomson multimedia S.A.Inventors: Mario De Vito, Jacques Stern, Louis Gregoire, Jean-Bernard Fischer
-
Patent number: 5764767Abstract: A method for reconstructing a secret, over a public communication channel, using a perfect t-out-of-n secret sharing scheme. The scheme having a dealer which utilizes a delivering procedure for privately delivering n secret shares of the secret along with n keys to n participants that are interlinked by the channel. The scheme further having a secret reconstructing procedure for being executed by selected recipient participants, for reconstructing the secret by utilizing self secret share of the recipient participant and l-1 secret shares of the other participants. The secret reconstructing procedure includes the following steps:(i) receiving over said public communication channel l-1 encoded secret shares from the l-1 participants, respectively;(ii) decoding each one of the l-1 encoded secret shares, thereby obtaining l-1 decoded secret shares; and(iii) reconstructing the secret from the l-1 decoded secret shares and from the self secret share of the recipient participant.Type: GrantFiled: August 21, 1996Date of Patent: June 9, 1998Assignee: Technion Research and Development Foundation Ltd.Inventors: Amos Beimel, Ben-Zion Chor
-
Patent number: RE35829Abstract: A low cost spread spectrum modulator for BPSK, or Binary Phase Shift Keying capable of outputting the high modulation rate and suppressed carrier output needed in spread spectrum systems. The present invention provides high quality BPSK modulation without the double balance mixers as required in the prior art, thereby dispensing with the necessity of complex transistor/potonciometer or diode/transformer arrangements. The present invention provides BPSK modulation utilizing only one transformer, which can be adjusted for carrier suppression and two transistors. FET's, or digital logic gates or the like, allowing the present system to be driven from low power CMOS logic levels, yet producing eight db of gain. The present invention may also be utilized as a frequency multiplier, with the utilization of the appropriately high frequency transistor, FET, digital logic gate, or the like.Type: GrantFiled: November 17, 1995Date of Patent: June 23, 1998Assignee: Axonn CorporationInventor: Hugh Britton Sanderford, Jr.