Patents Examined by Gail O. Hayes
  • Patent number: 6055315
    Abstract: A scrambling system for a cable television system in which a group of channel frequencies are reused over a plurality of service areas includes an access controller, an encoder and a plurality of simplified scrambling units. Each service area receives different television signals on the group of channel frequencies. The access controller provides signal authorization information for a given channel frequency to a plurality of receiver/decoders located in the different services areas. The access controller also provides descrambling information corresponding to the signal authorization information to the encoder for the given channel frequency. The encoder produces a conditional access code by placing the descrambling information into a scrambled reference signal. An extracting unit removes the conditional access code from the scrambled reference signal and distributes the conditional access code to each of the simplified scrambling units operating at the given channel frequency.
    Type: Grant
    Filed: December 7, 1998
    Date of Patent: April 25, 2000
    Assignee: ICTV, Inc.
    Inventors: John F. Doyle, Stephen C. Snell, Timothy Dunn
  • Patent number: 6055316
    Abstract: A secure communications arrangement is disclosed including a source device and a destination device interconnected by a network. The source device generates message packets for transfer to the destination device, each message packet including information in ciphertext form. The source device generates the ciphertext from plaintext in accordance with the cipher block chaining mode, using an initialization vector that is generated using a hash function selected so that small changes in an input result in large changes in the initialization vector. As a result values such as sequence numbers or time stamps can be used in generating the initialization vector, while still providing for cryptographic security for the ciphertext as against cryptanalytic attack. The destination device receives the message packet and decrypts the ciphertext to generate plaintext in accordance with the cipher block chaining mode, using an initialization vector that is generated using the corresponding hash function.
    Type: Grant
    Filed: December 26, 1997
    Date of Patent: April 25, 2000
    Assignee: Sun Microsystems, Inc.
    Inventors: Radia J. Perlman, Stephen R. Hanna
  • Patent number: 6047072
    Abstract: In response to an inquiry by an unsophisticated Subscriber over a nonsecure network, a Provider returns a public key and retains the corresponding private key. The Subscriber encrypts a password using the public key, which is decrypted by the Provider. The password is then used to securely transfer to the Subscriber a key determined by the Provider, thereby enabling the Subscriber to decrypt messages encrypted by the Provider and transmitted over the nonsecure network. This password dependent secure transmission of a key to an unsophisticated Subscriber may be accomplished by several methods, including hashing, key lookup, and Wizard protocol. In each method the password is used by the Subscriber and the Provider in correlated operations ending in secure receipt by the Subscriber of a key determined by the Provider.
    Type: Grant
    Filed: October 23, 1997
    Date of Patent: April 4, 2000
    Assignee: Signals, Inc.
    Inventors: Robert G. Field, Michael W. Layne
  • Patent number: 6047069
    Abstract: A data encryption/decryption system encrypts data and its associated redundancy bytes while retaining the error correction capabilities of the original data. The error correction function can then be removed, for example, from a storage drive and performed by, e.g. a host processor or a other entity. The storage drive reads the raw data, including error correction codes, from the media and encrypts the data by exclusive OR-ing each error correction code (ECC) block with a new ECC block which was generated using random data and the same ECC scheme. Error correction of the new data block can be performed in the host processor or other entity without exposing the original data. The error correction is valid for any errors that occurred in the original raw data because the ECC redundancy bytes of the random data block were created using the same ECC generator as was used with the original data.
    Type: Grant
    Filed: July 17, 1997
    Date of Patent: April 4, 2000
    Assignee: Hewlett-Packard Company
    Inventor: Josh Hogan
  • Patent number: 6044158
    Abstract: A communication apparatus (100) provides an interface between a cellular encryption and decryption apparatus (150) and a telephone line (91) allowing for communication of secure data of the telephone line using a regular telephone (70). The communication apparatus (100) provides for the receipt of incoming secure data in an unattended data mode, and also allows the telephone to be used in either a secure mode or clear mode. The communication apparatus monitors the telephone line (91) for secure tones while operating in the clear mode. When a secure tone is detected, the communication apparatus (100) breaks the path between the PSTN (90) and the telephone (70) and routes the signals to the cellular encryption and decryption apparatus (150) to establish a secure call.
    Type: Grant
    Filed: August 1, 1997
    Date of Patent: March 28, 2000
    Assignee: Motorola, Inc.
    Inventors: Lynn Eric Terpening, Kenneth Nicholas Kuczyk, Daniel Neil Kuczyk
  • Patent number: 6044463
    Abstract: A message delivery system which can guarantee the authenticity of a user, the reliability of a message delivery, and the authenticity of the message delivery, while preventing an illegal act, and which can prove them at a later time. The system has an information provider terminal including a user authentication unit for carrying out a user authentication of the user according to a zero knowledge interactive proof protocol using check bits E generated according to a work key W, and a transmission unit for transmitting to the user a ciphertext C in which a message M to be delivered to the user is enciphered according to a secret key cryptosystem by using the work key W, and the check bits E. The system also has a user terminal including a message reception unit for taking out the work key W by using at least the check bits E, and obtaining the message M by deciphering the ciphertext C according to the secret key cryptosystem by using the work key W.
    Type: Grant
    Filed: August 25, 1997
    Date of Patent: March 28, 2000
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Masayuki Kanda, Kiyoshi Yamanaka, Youichi Takashima
  • Patent number: 6043752
    Abstract: A remote-control unit for vehicles in which an immobilizer facility and keyless entry facility are united to enable bidirectional transmission. Further, a cost reduction is achieved by decreasing the number of parts, and labor required for maintenance is diminished. A remote-control unit for vehicles includes a circuit 16 for receiving a cryptographic code CR from a vehicle when a key 10 is fitted into a key cylinder 21, a circuit 17 for storing a cryptographic code, a control circuit for producing a first cipher system code CS1 in response to a cryptographic code, and producing a second cipher system code CS2 in response to actuation of a manual switch 12, and a transmission circuit 15 for transmitting the cipher system codes in the form of radio waves to the vehicle.
    Type: Grant
    Filed: June 30, 1997
    Date of Patent: March 28, 2000
    Assignee: Mitsubishi Denki Kabushiki Kaisha
    Inventors: Takayuki Hisada, Takao Miyazaki, Kazuyori Katayama
  • Patent number: 6041122
    Abstract: A method and apparatus for hiding cryptographic keys based on autocorrelation timing attacks is provided. The method and apparatus of the present invention utilize a autocorrelation timing attack to allow independent software entities to authenticate themselves without storing a private cryptographic key. This is accomplished by storing timing statistics related to the evaluation of an equation in the software entity rather than the cryptographic key itself. When the software entity authenticates itself, the cryptographic key is derived based on information provided by the timing statistics contained in the software entity.
    Type: Grant
    Filed: February 27, 1998
    Date of Patent: March 21, 2000
    Assignee: Intel Corporation
    Inventors: Gary L. Graunke, David W. Aucsmith
  • Patent number: 6038318
    Abstract: An optimized approach for machine computation of exponential values or functions is disclosed. The determination of the exponential values is performed using a "Big Multiply" approach and a "Big Mod" approach which involve dynamically determining the maximum size of an intermediate value required to determine an encryption key and allocating memory sufficiently large to store the maximum size intermediate value so that no additional memory allocation operations are required during the determination of the encryption keys. In addition, iterative multiplication and shift operations are performed on portions of the intermediate value in a cascade fashion to prevent spilling of the intermediate value. In one context, the computation of the exponential values is used in generating a key for exchange in a public key cryptosystem, such as the Diffie-Hellman public key cryptosystem.
    Type: Grant
    Filed: June 3, 1998
    Date of Patent: March 14, 2000
    Assignee: Cisco Technology, Inc.
    Inventor: Tom Roden
  • Patent number: 6038316
    Abstract: An information processing system including an encryption processing logic module and a decryption processing logic module for enabling the encryption of digital information to be decrypted with a decryption key K. The encryption processing module includes logic for encrypting the digital information, distributing the digital information and authorizing a user to decrypt the information. The decryption processing module includes logic for the user to communicate a user number n.sub.i to receive an authorization number a.sub.i from the authorization logic in the encryption processing module and extrication logic for extricating the decryption key. The user number n.sub.i uniquely identifies, and is valuable to, the user, so valuable in fact that the user would be unwilling to publically dislcose it. The extrication logic operates on a digital signet pair (a.sub.i, n.sub.i) consisting of the authorization number and user number, to extract K.
    Type: Grant
    Filed: September 24, 1997
    Date of Patent: March 14, 2000
    Assignee: International Business Machines Corporation
    Inventors: Cynthia Dwork, Joseph Y. Halpern, Jeffrey Bruce Lotspiech
  • Patent number: 6038315
    Abstract: A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment.
    Type: Grant
    Filed: March 17, 1997
    Date of Patent: March 14, 2000
    Assignee: The Regents of the University of California
    Inventors: Robert S. Strait, Peter K. Pearson, Sailes K. Sengupta
  • Patent number: 6035037
    Abstract: A system processes a video signal that includes a plurality of signal components representing respective ones of a plurality of video programs such as various pay-TV programs. Each of the signal components is processed, e.g., descrambling a pay-TV program, by one of a plurality of series connected high speed signal processing integrated circuit (IC) cards, or "smart" cards. An output signal from the last smart card in the series connection includes a plurality of processed signal components. The plurality of processed signal components are processed further to produce a signal suitable for producing a displayed image that includes multiple image portions, such as a picture-in-picture (PIP) or picture-outside-picture (POP) image in a television system. Each portion of the image is produced in response to one of the processed signal components.
    Type: Grant
    Filed: January 30, 1997
    Date of Patent: March 7, 2000
    Assignee: Thomson Electronic Consumers, Inc.
    Inventor: John William Chaney
  • Patent number: 6035039
    Abstract: In a mobile satellite system, a mobile communication system includes a fraud detection and user validation system and method for commissioning the mobile communication system in the mobile satellite system. The method includes the steps of generating a first input signal by the mobile communication system upon initialization, and transmitting the first input signal from the mobile communication system to the central controller. The method also includes the steps of generating a first security key in the central controller using the first input signal, and generating a second security key in the mobile communication system using the first input signal and transmitting the second security key to the central controller. The central controller verifies the mobile communication system that transmitted the first input signal to commission it in the mobile satellite system. The verification process is responsive to a comparison of the first security key with the second security key.
    Type: Grant
    Filed: February 17, 1998
    Date of Patent: March 7, 2000
    Inventors: William R. Tisdale, Charles E. Sigler
  • Patent number: 6031913
    Abstract: Characteristics of a communication channel are used to establish key sequences for use in encrypting communicated information. In one embodiment, these characteristics are the impedances of the channel viewed from one transceiver to the other and vice versa. The keys can be established with computations equivalent to a bounded distance decoding procedure, and the decoder used to establish a key may be used for processing the subsequent data transmission. Compared to classical and public-key cryptographic systems, an alternative mechanism for establishing and sharing key sequences that depends on a physical process is provided in which each party need not generate a pseudo-random quantity because the necessary randomness is provided by the properties of the communication channel itself. By using a channel decoder, the probability of two users establishing the same secret key is substantially unity, and the probability of an eavesdropper establishing the same key is substantially zero.
    Type: Grant
    Filed: January 29, 1998
    Date of Patent: February 29, 2000
    Assignee: Ericsson Inc.
    Inventors: Amer Aref Hassan, John Erik Hershey, Sandeep Chennakeshu
  • Patent number: 6032260
    Abstract: A computer program memory stores computer instructions for securing data transmitted over a system, such as the Internet, enabling a user to be authenticated and authorized for a requested operation. An "eticket" architecture (including identification information) is generated by an authentication server. The information in the eticket is hashed using, for example, a Message Digest Protocol, and a hash number is generated. The hash number is then encrypted using a private key, and the identification information in the eticket and the encrypted hash number are concatenated to generate a completed "eticket" architecture. The "eticket" may then be transmitted over the Internet (i.e., a non-secure environment) from server to server without having the information in the "eticket" altered, and without having to "reauthenticate" the user at each server.
    Type: Grant
    Filed: November 13, 1997
    Date of Patent: February 29, 2000
    Assignee: NCR Corporation
    Inventors: Levent MD Sasmazel, David H. Schneider
  • Patent number: 6028936
    Abstract: An authentic media protection system is described. Every recorded media includes a digital signature, a list of known counterfeit media identifiers, and counterfeit media response information. The digital signature is a unique encrypted combination of a recorded media serial number and samples of substantive information recorded on the media. The playback unit performs a series of authenticating steps before playing or reading recorded media. The playback unit independently verifies the encrypted digital signature to detect forgeries. The playback unit stores a recorded media identifier for each recorded media that is played in a cumulative list. This cumulative list is compared with the lists of known counterfeit media stored on each recorded media to determine whether the playback unit has played a counterfeit media. If the playback unit determines it has played a counterfeit media then it executes a counterfeit media response routine.
    Type: Grant
    Filed: January 16, 1996
    Date of Patent: February 22, 2000
    Assignee: Disney Enterprises, Inc.
    Inventor: W. Daniel Hillis
  • Patent number: 6028931
    Abstract: An encryption code decoding prevention circuit for a semiconductor memory device, such as an EPROM, includes a plurality of encryption code cells, an encryption word line operator, a word line operator, a plurality of read data encrypting processors for encrypting data output from memory cells, and an output data detector for enabling an output detecting signal when all bit lines are judged not to have data thereon, by checking an n-bit output applied from the read data encrypting processors to an output buffer. The output buffer amplifies the n-bit data output from the read data encrypting processors and outputs an output data of "1" each time a carry value is applied thereto from the encryption word line operator. The circuit prevents encrypted data from being exposed by making it appear as if unused memory cells are in use by simulating data values of "1" for each of the unused cells.
    Type: Grant
    Filed: July 18, 1997
    Date of Patent: February 22, 2000
    Assignee: LG Semicon Co., Ltd.
    Inventor: Sung Sik Kim
  • Patent number: 6028935
    Abstract: A cryptographic receiver (10) includes photon detectors (52, 54, 56, 58) arranged to detect photons arriving from filters (22) and (24). A fiber coupler (14) randomly distributes each received photon (16) from an optical fiber toone of two photon channels (18, 20). The filters (22, 24) are each unbalanced Mach-Zehner interferometers with a phase modulator (34, 44) in one arm (28, 38). The filters (22, 24) impose non-orthogonal measurement bases on photons within the respective channels (18, 20). A signal processor (60) derives a cryptographic key-code by analysis of signals received from the photon detectors (52, 54, 46, 58).
    Type: Grant
    Filed: April 10, 1996
    Date of Patent: February 22, 2000
    Assignee: The Secretary of State for Defence in Her Britannic Majesty's Government of the United Kingdom of Great Britain and Northern Ireland
    Inventors: John G Rarity, Paul R Tapster
  • Patent number: 6028938
    Abstract: Techniques for ensuring the security of forms data are disclosed. The layout for a particular form is signed separately from the data used to fill out the form using encryption techniques. The signed data is related to the signed layout in a way which permits the layout to be changed without requiring the data to be changed while still guaranteeing that a changed layout does not change the original meaning of the signed data.
    Type: Grant
    Filed: December 3, 1996
    Date of Patent: February 22, 2000
    Assignee: Shana Corporation
    Inventors: Wayne Allan Malkin, Charles David Perman
  • Patent number: 6026243
    Abstract: A DB interface is provided between each subscriber database, which stores information associated with each goods including an aesthetic/sensuous attribute unique to each subscriber, and a basic DB, which stores support information for supporting goods planning of each subscriber by electronic processing. The DB interface converts the aesthetic/sensuous attribute to data corresponding to a unified classification and a unified evaluation axis of the basic DB so as to cause the basic DB to fetch the information of each subscriber database as part of the support information.
    Type: Grant
    Filed: September 26, 1995
    Date of Patent: February 15, 2000
    Assignee: Olympus Optical Co., Ltd.
    Inventors: Toshihito Kouchi, Takemasa Shimosato, Yasuyuki Ogura, Shinichi Yoshii