Patents Examined by Ellen C Tran
-
Patent number: 7013387Abstract: A system for increasing realized secure sockets layer (“SSL”) encryption and decryption connections is disclosed. The system combines monitoring of server load with adjustment of static SSL parameters to optimize a system of devices. The system monitors parameters of the servers that affect the ability of the servers to process SSL connections. An “SSL capacity” value for each server is calculated which represents the capability of that server to process SSL connections. This value is used to calculate an SSL threshold for that server, which is then applied to the SSL device to determine how many SSL connections the SSL device should process for that server. Since the connection threshold for an SSL device is a function of the device's load and each server's SSL capacity, and these values are dynamic, the connection threshold values are recalculated periodically to ensure increased SSL performance without impact to client response.Type: GrantFiled: June 27, 2001Date of Patent: March 14, 2006Assignee: Intel CorporationInventor: Joseph F Cihula
-
Patent number: 6993162Abstract: A method for authenticating animation, the method comprises the steps of capturing an image; converting the captured image into a wire mesh data for permitting animation of the image; providing movement data, which directs movement of the wire mesh data, and texture data indicating the covering for the wire mesh; electronically transmitting the wire mesh data, texture data and movement data; encrypting the movement data; and electronically transmitting the encryption the movement data for verifying that the animation is unaltered during transmission from its source.Type: GrantFiled: June 15, 2001Date of Patent: January 31, 2006Assignee: Eastman Kodak CompanyInventors: Thomas M. Stephany, Majid Rabbani, John R. Squilla, Donald E. Olson
-
Patent number: 6985585Abstract: A method for the encryption and decryption of digital images based on cyclotomic polynomials and radiometric expressions comprising the steps of generating an encrypting transform, partitioning the digital images into data blocks, along with encrypting, transmitting, and decrypting the data blocks. Three common radiometric expressions are fundamental metamers, black metamers, and radiometric functions. In one embodiment, the mathematical equation that represents the encrypting transform is a cyclotomic polynomial. In another embodiment, a cyclotomic polynomial is used to calculate the coefficients of the mathematical equation that represents the encrypting transform. In other embodiments, the encrypting transform is generated with a radiometric expression, and the encrypted data blocks are calculated with a radiometric expression.Type: GrantFiled: March 30, 2001Date of Patent: January 10, 2006Assignee: Aevum CorporationInventors: Michael P. Keyes, Philip E. Cannata
-
Patent number: 6985591Abstract: The present invention provides secure communication from one encryption domain to another using a trusted module. In one embodiment, the invention includes receiving a first key for decryption of encrypted content over a secure authenticated channel, receiving a second key for re-encrypting the encrypted content over a secure authenticated channel. The invention further includes receiving the encrypted content, decrypting and re-encrypting the encrypted content using the first key and the second key, and conveying the re-encrypted content to a sink.Type: GrantFiled: June 29, 2001Date of Patent: January 10, 2006Assignee: Intel CorporationInventor: Gary L. Graunke
-
Patent number: 6983381Abstract: A method for communicating passwords includes receiving at a server a challenge from a authentication server via a first secure communications channel, the challenge comprising a random password that is inactive, communicating the challenge from the server to a client computer via a second secure communications channel, receiving at the server a challenge response from the client computer via the second secure communications channel, the challenge response comprising a digital certificate and a digital signature, the digital certificate including a public key in an encrypted form, the digital signature being determined in response to the random password and the private key, and communicating the challenge response from the server to the authentication server via the first secure communications channel, wherein the random password is activated when the authentication server verifies the challenge response.Type: GrantFiled: June 28, 2001Date of Patent: January 3, 2006Assignee: Arcot Systems, Inc.Inventor: Robert A. Jerdonek
-
Patent number: 6975729Abstract: One embodiment of the present invention provides a system that facilitates a key exchange that operates with a pre-shared secret key and that hides identities of parties involved in the key exchange. The method operates by establishing a negotiated secret key between a first party and a second party by performing communications between the first party and the second party across a network in a manner that does not allow an eavesdropper to determine the negotiated secret key. Next, the system encrypts an identifier for the first party using the negotiated secret key and a group secret key to form an encrypted identifier. This group secret key is known to members of a group, including the first party and the second party, but is kept secret from parties outside of the group. Next, the system sends the encrypted identifier from the first party across the network to the second party.Type: GrantFiled: August 15, 2000Date of Patent: December 13, 2005Assignee: Sun Microsystems, Inc.Inventor: Radia J. Perlman
-
Patent number: 6966001Abstract: A computing system and encryption/decryption method realizes assurance of security and improvement of throughput in a remote system. For this purpose, encrypted data is written to a storage system, it is determined whether data in the storage system is ciphertext or plaintext, and encrypted data is read, decrypted and re-written in storage asyncronously with writing encrypted data to storage.Type: GrantFiled: March 19, 2001Date of Patent: November 15, 2005Assignee: Hitachi, Ltd.Inventors: Kiyohiro Obara, Hisashi Takamatsu, Masafumi Nozawa, Takashi Oeda, Noboru Morishita
-
Patent number: 6963982Abstract: Clients that are connected on a private network and which are assigned a private IP address that is not routable on the Internet can connect to the Internet through a router/server that includes a network address translator (NAT). For outgoing packets, the NAT translates the client's private source IP address and generalized port number (GPN) to the NAT's global IP address and GPN. For incoming packets sent to the NAT's global IP address and GPN, the NAT translates the global destination IP address and GPN to the client's private IP address and GPN. For protocols which cannot be directly supported by the NAT, such as those in the IPSec security protocol suite, the NAT is extended by creating in the NAT's translation table an entry that associates, for a specific unsupported protocol, a client's private IP address and GPN, the NAT's global IP address and GPN, and a foreign address on the Internet, that is valid until a specified or default expiration time.Type: GrantFiled: October 27, 2000Date of Patent: November 8, 2005Assignee: Lucent Technologies Inc.Inventors: Jose′ C. Brustoloni, Juan Alberto Garay
-
Patent number: 6959089Abstract: An apparatus and method are utilized for transmitting data across an interface between a sender and a receiver. The sender and receiver can be provided with a shared key, a receiver—key and a sender—key. A payload message can be combined with the keys to generate a unique message for transmission across the interface. The payload message can be authenticated utilizing the same input and the same algorithm on the receiving end of the transmission. The resulting confirmatory payload message can be utilized with the authenticating payload message to authenticate the payload message.Type: GrantFiled: October 26, 2000Date of Patent: October 25, 2005Assignee: General Instrument CorporationInventor: Eric J. Sprunk
-
Patent number: 6952775Abstract: An electronic authentication method for identifying a user who is going to use a recording medium into which the information for making use of any kind of computerized service has been stored, comprising a step to carry out authentication by comparing the authentication information input by the user who is going to use the recording medium into which the information for making use of any kind of computerized service has been stored with the authentication information recorded on the recording medium and a step to carry out authentication by comparing the authentication information input by the user or the authentication information recorded on the recording medium with the registered authentication information existing in the hub of the networking to provide the service.Type: GrantFiled: August 23, 2000Date of Patent: October 4, 2005Assignee: Hitachi, Ltd.Inventor: Junichi Miura
-
Patent number: 6950948Abstract: A cryptographic process permits one to verifiably shuffle a series of input data elements. One or more authorities or individuals “shuffle,” or “anonymize” the input data (e.g. public keys in discrete log form or ElGamal encrypted ballot data). The process includes a validity construction that prevents any one or more of the authorities or individuals from making any changes to the original data without being discovered by anyone auditing a resulting proof transcript. The shuffling may be performed at various times. In the election example, the shuffling may be performed, e.g., after ballots are collected or during the registration, or ballot request phase of the election, thereby anonymizing the identities of the voters.Type: GrantFiled: March 24, 2001Date of Patent: September 27, 2005Assignee: VoteHere, Inc.Inventor: C. Andrew Neff
-
Patent number: 6947556Abstract: Methods, systems and computer program products are provided which provide for controlling access to digital data in a file by encrypting the data with a first key, encrypting the first key with a second personal key generated from a password/passphrase associated with the file and further encrypting the encrypted first key with a control key which is managed by the system. In certain embodiments, user authentication may also be provided by issuing a ticket which is utilized to create, access and administer the files in the system.Type: GrantFiled: August 21, 2000Date of Patent: September 20, 2005Assignee: International Business Machines CorporationInventors: Stephen Michael Matyas, Jr., Mohammad Peyravian, Allen Leonid Roginsky, Nevenko Zunic
-
Patent number: 6940978Abstract: A communications system and method for transmitting authorization messages to mobile platforms is provided. The communications system authorizes the mobile platform to continue transmitting data with a single signal rather than multiple signals. Specifically, the authorization signal comprises a unique address for a path of forward link equipment that transmits data to the mobile platform. The unique address informs the mobile platform which equipment is currently being used for data transmission, and the mobile platform then relays this information back to a ground station. The authorization signal further comprises a return link assignment that informs the mobile platform which transponder is to be used for data transmission back to the ground station. Accordingly, a single signal is used to transmit the required data to the mobile platforms.Type: GrantFiled: May 2, 2001Date of Patent: September 6, 2005Assignee: The Boeing CompanyInventor: David S. Parkman
-
Patent number: 6941476Abstract: A distributed storage system for storing at least one credential (46), provided by an issuing authority and relating to an identity (42, 44), is described. The system comprises: a plurality of unique identities (42, 44) each having a local store (40). Each local store (40) securely stores credentials (46) relating to the owner of the identity (42, 44). The system also comprises one or more security certificates (66) provided at each identity (42, 44) for ensuring the authenticity of the credentials (46). The security certificates (66) provide secure references to the issuers of the credentials (46) and this can be used in verifying the origin of each credential (46). The identity can be provided a website or a mobile phone for example.Type: GrantFiled: May 10, 2001Date of Patent: September 6, 2005Assignee: Hewlett-Packard Development Company, L.P.Inventors: Keith Alexander Harrison, Brian Quentin Monahan, Marco Casassa Mont
-
Patent number: 6937730Abstract: Content level filtering or masking of digital content that is broadcast, multicast, or otherwise distributed to receivers in a communications system. Instead of controlling the content only at the location of the broadcaster or at the receiver, the present invention provides the capability to control access to the content, and manipulate the content itself via a masking operation, at any point in the content distribution hierarchy or transmission chain. The present invention provides enhanced customer choice to different versions of the content and content creator control over content deemed to be too objectionable or too sensitive to be transmitted without partial concealment or obfuscation. A mask may be specified to change the content distributed further down the distribution hierarchy.Type: GrantFiled: February 16, 2000Date of Patent: August 30, 2005Assignee: Intel CorporationInventor: Mark J. Buxton
-
Patent number: 6928558Abstract: The invention relates to an arrangement and a method for reliably identifying a user in a computer system. The method utilizes a mobile station for communicating with the system. The method comprises generating a first one-time password in the mobile station by utilizing a known algorithm on the basis of the identification number of the user, subscriber-specific identifier, device-specific identifier of the mobile station, and time.Type: GrantFiled: October 27, 2000Date of Patent: August 9, 2005Assignee: Nokia Mobile Phones Ltd.Inventors: Nouri Allahwerdi, Lassi Hippeläinen
-
Patent number: 6922778Abstract: Methods and apparatus are provided for transcoding a data message, comprising a plurality of data fields (f1-f10) and an authentication code (Sgn(h1-10)), to produce a transcoded message for transmission to a destination device (4). The transcoding methods can be applied to such a data message which is received from a source device (1) wherein said data fields (f1-f10) have been coded in accordance with a first coding system, whereby respective data field codes (h1-h10) are generated for said data fields (f1-f10) and a message code (h1-10) is derived from said data field codes (h1-h10), and wherein said message code (h1-10) has been coded in accordance with a second coding system to generate said authentication code (Sgn(h1-10)). For each data field (f1-f10) of the received data message it is decided whether to maintain, modify or omit that field. For a field to be maintained, that field is maintained in the transcoded message.Type: GrantFiled: December 11, 2000Date of Patent: July 26, 2005Assignee: International Business Machines CorporationInventors: Stefan G. Hild, Luke J. O'Connor
-
Patent number: 6901508Abstract: In the method for expanding an address for an Internet protocol in an Internet edge router and the record medium capable of being read through a computer having a record of a program to realize the inventive method, an address expanding system of IPv4 used by incorporating public network connection information in an IPv4 address is utilized, thereby, all services of the existing IPv4 can be accepted and an enlargement to a new service can be valid.Type: GrantFiled: December 1, 2000Date of Patent: May 31, 2005Assignee: Electronics and Telecommunication Research InstituteInventors: Chang-Min Park, Mi-Ryong Park, Jong-Hyup Lee, Hyeong-Ho Lee, Sang-Ha Kim
-
System and method for intrusion detection data collection using a network protocol stack multiplexor
Patent number: 6851061Abstract: A system and method for detecting network intrusions using a protocol stack multiplexor is described. A network protocol stack includes a plurality of hierarchically structured protocol layers. Each such protocol layer includes a read queue and a write queue for staging transitory data packets and a set of procedures for processing the transitory data packets in accordance with the associated protocol. A protocol stack multiplexor is interfaced directly to at least one such protocol layer through a set of redirected pointers to the processing procedures of the interfaced protocol layer. A data packet collector references at least one of the read queue and the write queue for the associated protocol layer. A data packet exchanger communicates a memory reference to each transitory data packet from the referenced at least one of the read queue and the write queue for the associated protocol layer. An analysis module receives the communicated memory reference and performs intrusion detection based thereon.Type: GrantFiled: August 24, 2000Date of Patent: February 1, 2005Assignee: Networks Associates, Inc.Inventors: Daniel T. Holland, III, Roark B. Hilomen, Steven P. Lang