Patents Examined by Gail O. Hayes
  • Patent number: 5978480
    Abstract: A system for scrambling and descrambling a composite video signal having content and an associated composite synchronization signal. The system comprises an apparatus for scrambling the composite video signal, an apparatus for recovering the composite video signal and a transmission apparatus for transmitting the scrambled composite video signal between the scrambling apparatus and the recovering apparatus. The apparatus for scrambling the composite video signal including a pseudo vertical synchronization signal generator, a pseudo horizontal synchronization signal generator, a combiner for combining the pseudo vertical and horizontal synchronization signals, and an adder for adding the combined pseudo vertical and horizontal synchronization signals into the composite video signal.
    Type: Grant
    Filed: August 30, 1996
    Date of Patent: November 2, 1999
    Assignee: VTECH Communications, Ltd.
    Inventors: Ming Fong, Kin Chi Lo
  • Patent number: 5974144
    Abstract: A method for encryption wide-bandwidth video, using a first processor for encrypting the video and a second processor for decrypting the video. Data is taken in blocks. A block of data is scrambled to generate scrambled data, then partitioned into a first portion and a second portion. A global key is generated at the first processor and the second processor, using public key technology. At the first processor, the global key is exclusively-ORed with the first portion, thereby generating a encrypted second portion. At the first processor, a random number is generated from the first portion and exclusively-ORed with the second portion to generate an encrypted second portion. At the second processor, the global key is exclusively-ORed with the encrypted first portion. At the second processor, the random number is recovered from the decrypted first portion and exclusively-ORed with the encrypted second portion to decrypt it. The scrambled data are descrambled, thereby recovering the data.
    Type: Grant
    Filed: February 25, 1998
    Date of Patent: October 26, 1999
    Assignee: CipherActive Ltd.
    Inventor: Nahum Brandman
  • Patent number: 5974147
    Abstract: The present invention provides a method for verifying an unreadable information-based indium that has been generated by a postal security device (PSD) for information-based indium comprising a 2-D bar code, certain human-readable information, a digital signature and a certificate. The method comprises the steps of attempting to read the 2-D bar code using sophisticated digital image processing when the 2-D bar code is not readable; and continuing normal processing when the 2-D bar code is readable with the sophisticated digital image processing. When the 2-D bar code is not readable two independent processes are used to determine the indicium certificate. A first process includes reading human readable information by optical character recognition using context, syntax, and redundancy in the human readable information to obtain a PSD-ID; and using the PSD-ID to look up in a certificate database a certificate corresponding to the information-based indicium.
    Type: Grant
    Filed: November 7, 1996
    Date of Patent: October 26, 1999
    Assignee: Pitney Bowes Inc.
    Inventors: Robert A. Cordery, Richard W. Heiden, Leon A. Pintsov, Brian M. Romansky, Monroe A. Weiant
  • Patent number: 5970141
    Abstract: A transcription network having linked computer terminals for a court reporter and for examining, defending, and associate attorneys is disclosed. Real-time transcription text is communicated from the reporter's terminal through the network. Secure message interchange between the examining attorneys and between defending attorneys is provided along independent communication links and using encryption. Off-site terminals for clients, experts, or other associate attorneys may be linked to the network. Communication on the network is hierarchically controlled so as not to bombard the examining attorney, and is managed by a protocol for updating disconnected and non-listening terminals. The terminals provide software routines for automatically delivering proposed objections to the form of a question or answer. Stenographic keystrokes that cannot be directly transcribed are converted to a phoneme form for down-line readability.
    Type: Grant
    Filed: April 9, 1998
    Date of Patent: October 19, 1999
    Assignee: Engate Incorporated
    Inventors: James D. Bennett, Lawrence M. Jarvis
  • Patent number: 5970150
    Abstract: A postage meter that is contained in a kiosk may be used to produce verifiable receipts for commercial transactions. The imbedded digital metering cryptographic technology that is contained in a postage meter may be used to produce a verifiable receipt. Several of the collected "commercial" transaction data elements are presented to the existing meter encryption module for processing as the meter was processing an envelope. The output encrypted data string is used as a new field in the receipt. Assuring that the receipt is authentic. Verification can be performed as follows: using the printed receipt as a source of data (at some later time) periodically on the archived records stored in the kiosk during the day on the uploaded "order" files before actual processing.
    Type: Grant
    Filed: December 19, 1996
    Date of Patent: October 19, 1999
    Assignee: Pitney Bowes Inc.
    Inventor: Ronald P. Sansone
  • Patent number: 5970142
    Abstract: A method of communicating encrypted configuration data between a programmable logic device (PLD) and a storage device is included in one part of the invention. The method includes the following steps. Transmit encrypted configuration data stored in a storage device to the PLD. Decrypt the encrypted configuration data to generate a copy of the configuration data in the PLD. Configure the PLD using the copy of the configuration data. In one embodiment, the PLD transmits a key to the storage device. In another embodiment the key is separately entered into the storage device and the PLD and never transmitted between the PLD and the storage device. In another embodiment, the key is entered only into the PLD. The key is used to encrypt the configuration data.
    Type: Grant
    Filed: August 26, 1996
    Date of Patent: October 19, 1999
    Assignee: Xilinx, Inc.
    Inventor: Charles R. Erickson
  • Patent number: 5970479
    Abstract: Methods and apparatus which deal with the management of risk relating to specified, yet unknown, future events are disclosed.`Sponsor` stakeholders specify a particular product relating to an event or phenomenon for which there is a range of possible future outcomes.`Ordering` stakeholders then offer contracts relating to the predetermined phenomenon and corresponding range of outcomes. The offered contracts specify an entitlement or (pay-off) at the future time of maturity for each outcome, and a consideration (or premium) payable, in exchange, to a `counter-party` stakeholder.Independently of the offered contracts, the `counter-party` stakeholders input data as to their view of the likelihood of occurrence of each outcome in the predetermined range into the future, or specifically at the predetermined date of maturity.Each offered contract is priced by calculating counter-party premiums from the registered data, and a match attempted by a comparison of the offered premium with the calculated premiums.
    Type: Grant
    Filed: May 28, 1993
    Date of Patent: October 19, 1999
    Assignees: Swychco Infrastructure Services Pty. Ltd., Swychco Support Services Pty. Ltd.
    Inventor: Ian K. Shepherd
  • Patent number: 5966447
    Abstract: A method and apparatus for descrambling data that is characterized by shift registers that realize an operation of generating polynomial and that have a ring-shaped structure that realizes plural and continuous operation. The method and apparatus further includes an initial value setting means for setting initial values in m shift registers; after setting the initial values, shifting the initial values while synchronizing the initial values with input clocks, and outputting the exclusive OR of data which is input while being synchronized with clocks and the lowermost latch outputs. Scrambled data with a byte is treated as a unit by using an exclusive OR circuit block.
    Type: Grant
    Filed: June 30, 1998
    Date of Patent: October 12, 1999
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Ikuoh Nishida, Masatoshi Shimbo
  • Patent number: 5966443
    Abstract: A key variable correction scheme allows errored encryption key material in mobile and portables radios to be quickly identified and corrected. The errored encryption material can be corrected automatically by a key management controller, once detected. Consequently, a mismatch problem can be diagnosed and resolved in a manner which is automatic, therefore quick and efficient, and in a way which overcomes the difficulty which users have in identifying by themselves a mismatch condition since the result is often only silence out of their respective radio speaker. Once the mismatch is corrected by the reassignment of correct keys, the user is free to join the radio call already in progress.
    Type: Grant
    Filed: April 30, 1996
    Date of Patent: October 12, 1999
    Assignee: Motorola, Inc.
    Inventors: Eduardo Gonzalez, John M. Gilbert
  • Patent number: 5966448
    Abstract: According to a cryptographic communication system which can safely perform cipher conversion processing when cryptographic communication is performed between terminals using different cipher types, when a terminal 10A-1 connected to a LAN-A using a cryptographic algorithm C1 transmits data to a terminal 10B-1 connected to a LAN-B using a cryptographic algorithm C2, the terminal 10A-1 generates two meaningless data items from the data to be transmitted, decrypts the two generated data items according to the cryptographic algorithm C1, and then transmits the decrypted data to two cryptographic protocol conversion servers and for dividing the data into two data items. Each of the cryptographic protocol conversion servers decrypts each transmitted data item, the re-encrypts the decrypted data according to the cryptographic algorithm C2, and then transmits the data to the terminal 10B-1.
    Type: Grant
    Filed: August 26, 1996
    Date of Patent: October 12, 1999
    Assignee: Hitachi, Ltd.
    Inventors: Hikari Namba, Kazuo Takaragi, Satoshi Miyazaki
  • Patent number: 5966445
    Abstract: An identification scheme which allows a prover to identify his own identity to a verifier more certainly and prevents already used authentication information from being re-used, a key exchange which uses a common secret key between two users in order not to allow an unauthorized to find it out, a digital signature scheme giving message recovery and digital signature scheme with appendix for producing a digital signature of a message recovery type or appendix type according to the size of a message to be signed, a multi-digital signature scheme for allowing multiple signers to generate digital signatures with respect to the same message and producing them in a message recovery type or appendix type according to the length of the message to be signed, and a blind digital signature scheme for producing a digital signature when a message to be signed should not be opened to the public as well as the signer and therefore a signer does not know the contents thereof.
    Type: Grant
    Filed: May 28, 1996
    Date of Patent: October 12, 1999
    Assignee: Korea Telecommunication Authority
    Inventors: Ill Hwan Park, Chung Ryong Jang
  • Patent number: 5966449
    Abstract: In a network having a plurality of entities and a center, the center creates random numbers for all the combinations of two of the entities within the network, and delivers to each entity random numbers created for those combinations involving that entity. A sender entity selects a random number corresponding to the combination of that entity and the destination entity from a group of random numbers delivered to the sender entity, encrypts a communication text using an encryption key determined by the selected random number and sends the encrypted text to the destination entity. The destination entity selects a random number corresponding to the combination of itself and the sender entity from the random numbers delivered to the destination entity, and decodes a cipher text received using an encryption key determined by the selected random number.
    Type: Grant
    Filed: December 20, 1994
    Date of Patent: October 12, 1999
    Assignee: Canon Kabushiki Kaisha
    Inventors: Keiichi Iwamura, Takahisa Yamamoto
  • Patent number: 5963643
    Abstract: A method enabling two populations of persons, one being sedentary (for example a provider of long-distance services) and the other being nomadic (for example the customers of this provider of services) to exchange data in a sure and speedy manner, comprises the following steps:portable objects are placed at the disposal of the persons belonging to the nomadic population, these objects having the credit card format and being customized by specific identifiers for each person and for each card, the card is used to transmit at least partially encrypted DTMF type brief acoustic identification signals which are received by means of the microphone of a standard telephone set and processed by means of the standard telephone set so that the resulting signal can be transmitted, through a telephone or computer network, to the data-processing service of at least one of the persons of the sedentary population,the signals coming from the card are processed by means of a specific software program whose parameters are a fun
    Type: Grant
    Filed: September 25, 1996
    Date of Patent: October 5, 1999
    Assignee: Fintel S.A.
    Inventors: Lucas Goreta, Christian Duroux
  • Patent number: 5956408
    Abstract: Data, including a program and software updates, is encrypted by a public key encryption system using the private key of the data sender. The data is also digitally signed by the sender. The receiver decrypts the encrypted data, using the public key of the sender, and verifies the digital signature on the transmitted data. The program interacts with basic information stored within the confines of the receiver. As result of the interaction, the software updates are installed within the confines of the user, and the basic information stored within the confines of the user are changed.
    Type: Grant
    Filed: February 12, 1998
    Date of Patent: September 21, 1999
    Assignee: International Business Machines Corporation
    Inventor: Todd Weston Arnold
  • Patent number: 5953422
    Abstract: A computer system incorporating a two-piece authentication procedure for securely providing user authentication over a network. In the disclosed embodiment of the invention, a user password is entered during a secure power-up procedure. The user password is encrypted by an external token or smart card that stores an encryption algorithm furnished with an encryption key that is unique or of limited production. A network password is thereby created. The network password is maintained in a secure memory space such as System Management Mode (SMM) memory. The network password is then encrypted and communicated over the network. The network password may be encrypted using the server's public key or another key that is known to the server. Optional node identification information is appended to the network password prior to communication over the network. Once received by the server, the encrypted network password is decrypted using the server's private key.
    Type: Grant
    Filed: December 31, 1996
    Date of Patent: September 14, 1999
    Assignee: Compaq Computer Corporation
    Inventors: Michael F. Angelo, Sompong P. Olarig
  • Patent number: 5953419
    Abstract: A system is disclosed for automatically distributing secured versions (*Sys.sub.-- D.sub.-- key*) of a file decryption key (Sys.sub.-- D.sub.-- key) to a plurality of file users by way of the file's security label. The label is defined to contain a plurality of Access-Control-Entries Records (ACER's) where each ACER includes a respective secured version (*Sys.sub.-- D.sub.-- key*) of the file decryption key. Each such secured version (*Sys.sub.-- D.sub.-- key*) is decipherable by a respective ACER private key. Each ACER may include respective other data such as:(a) ACER-unique identifying data for uniquely identifying the ACER or an associated user;(b) decryption algorithm identifying data for identifying the decryption process to be used to decrypt the encrypted *DATA* portion of the file; and(c) special handling code for specifying special handling for the code-containing ACER.
    Type: Grant
    Filed: May 6, 1996
    Date of Patent: September 14, 1999
    Assignee: Symantec Corporation
    Inventors: Shawn R. Lohstroh, William D. McDonnal, David Grawrock
  • Patent number: 5943426
    Abstract: A communication network (10) includes any number of interconnected nodes (20), including a sending node (22), a sending gateway (24), a receiving gateway (26), and a destination node (28). A low capacity or expensive communication channel (30) resides between the sending and receiving gateways (24, 26). An original digitally signed message is sent from the sending node (22) toward the destination node (28). When the original message arrives at the sending gateway (24), the original signature is verified. If verified, the sending gateway (24) shrinks the original message into a reduced message and re-signs the message with a gateway digital signature before sending the message onward through the communication channel (30) toward the destination node (28). The destination node (28) verifies the gateway digital signature against the reduced message and is not required to de-compress the reduced message into a precise duplicate of the original message.
    Type: Grant
    Filed: September 22, 1997
    Date of Patent: August 24, 1999
    Assignee: Motorola, Inc.
    Inventors: Robert David Frith, Larry Charles Puhl, Ezzat A. Dabbish
  • Patent number: 5940811
    Abstract: A method and apparatus for closed loop, automatic processing of typical financial transactions, including loans, setting up checking, savings and individual retirement accounts, obtaining cashier's checks, ordering additional checks, issuing credit and debit cards, wire transferring money, and so on. The transactions are provided from a kiosk and controlled by a computer controller interacting with the consumer. In the case of loans, a computer controller helps the consumer in the completion of the application, performs the underwriting, and transfers funds. The computer controller obtains the information needed to process the application, determines whether to approve the loan, effects electronic fund transfers to the applicant's deposit account and arranges for automatic withdrawals to repay the loan.
    Type: Grant
    Filed: October 15, 1996
    Date of Patent: August 17, 1999
    Assignee: Affinity Technology Group, Inc.
    Inventor: Jeffrey A. Norris
  • Patent number: 5940505
    Abstract: A record signal corresponding to record information to be recorded to a record medium is scrambled, and the scrambled record signal is recorded to the record medium. The information recording method is provided with: generating a scramble function to scramble the record signal in correspondence with a record medium identification code, which is set in advance to identify the record medium; scrambling the record signal by use of the generated scramble function and outputting the scrambled record signal; recording the scrambled record signal and the record medium identification code corresponding to the scrambled record signal to the record medium; generating an inverse-scramble function to decipher the scrambled record signal on the basis of the generated scramble function; and outputting the generated inverse-scramble function and the record medium identification code corresponding to the generated inverse-scramble function as one set to the external.
    Type: Grant
    Filed: July 30, 1996
    Date of Patent: August 17, 1999
    Assignee: Pioneer Electronic Corporation
    Inventor: Hitoshi Kanamaru
  • Patent number: 5940511
    Abstract: A method and apparatus for secure entry and authentication of a multi-digit personal identification number (PIN) is described. An authenticator generates a random number, and provides that number, or a function thereof, to a user. The user is prompted to encode each digit of the PIN number, one digit at a time, by performing a mathematical operation on the digit using the number provided by the authenticator. The encoded PIN digit is provided to the authenticator which reverses the steps performed by the user to regenerate and verify the user's PIN. The user is prompted to encode subsequent digits of the PIN only after (1) a previous digit is encoded, (2) the encoded digit is provided to an input device for the authenticator, (3) and a new random number is generated and that random number, or a function thereeof, is provided to the user for encoding a subsequent PIN digit.
    Type: Grant
    Filed: May 30, 1997
    Date of Patent: August 17, 1999
    Assignee: Lucent Technologies, Inc.
    Inventor: Gordon Thomas Wilfong