Patents Examined by Ly V. Hua
  • Patent number: 6715074
    Abstract: A system and method for making sure that before the ROM BIOS of a personal computer is reprogrammed, the BIOS image is compatible with the computer whose BIOS are being reprogrammed. This is done by requiring the utility that performs the reprogramming of the ROM BIOS to have a secure portion of code that is stored in a portion of the computer's memory that is inaccessible to a user. The secure portion of code is used to make sure that the BIOS image to be programmed into the computer is compatible with the computer.
    Type: Grant
    Filed: July 27, 1999
    Date of Patent: March 30, 2004
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Craig L. Chaiken
  • Patent number: 6711261
    Abstract: An improved method and apparatus for maintaining concealment for a scrambled signal when frequency pre-emphasis is used to defeat the scrambling. The pre-emphasis may be synthesized with high pass or peaking circuitry. More commonly however the pre-emphasis is available in television sets with a fine tuning control. By adjusting the fine tuning control to cause purposely mistuning off center, a peaking effect is generated which is used to counter the scrambled signal. The application discloses one embodiment which uses de-emphasis to counter the peaking effect. In another embodiment, signals added in the vicinity of the horizontal blanking interval causes the peaking effect to enhance these added signals over stable edges of the video signal. Since these added signals are position modulated for example, the television's sync circuits and horizontal oscillator circuits will cause scan circuits to generate position modulation.
    Type: Grant
    Filed: July 20, 1999
    Date of Patent: March 23, 2004
    Assignee: Macrovision Corp
    Inventor: Ronald Quan
  • Patent number: 6711680
    Abstract: A method and system for generating messages from which it can be verified that a variable does not exceed a predetermined limit. The message can be a postal indicium. A message originator, which can be a postage metering system, receives a message in the form R−k(T), where R is a trapdoor function, K is an integer equal to the limit, and T is a plain text, from a data processing center which maintains the inverse function R−1 in secrecy. The message originator computes Sm=Rm(R−k(T), where m is a current value of the variable, and incorporates Sm into the message. A verifier verifies that m<K by confirming that Rk−m(Sm)=T. The verifier cannot compute Rk−m(Sm) for m<K since it does not have R−1. For the same reason the originator cannot compute R−k′(T), k′>K, from R−k(T).
    Type: Grant
    Filed: December 9, 1999
    Date of Patent: March 23, 2004
    Assignee: Pitney Bowes Inc.
    Inventor: Robert A Cordery
  • Patent number: 6694436
    Abstract: The terminal includes a terminal module (1) and a personal security device (31). The terminal module (1) is adapted to receive high-level requests from an application (Fap) installed on an electronic unit. The high-level requests are independent of the personal security device (31). The terminal module (1) and/or the personal security device (31) includes a reprogrammable memory for storing and a unit for executing a filter program (F) translating the high-level requests into at least one of either (i) at least one sequence of exchanges of data between the terminal module (1) and the user or (ii) a sequence of at least one elementary command that can be executed by the personal security device, together with a unit for protecting the filter program (F, 62) to prevent any modification of the filter program by an unauthorized entity. The filter program includes a unit for identifying and/or authenticating the source of requests sent by the application (Fap) installed in the electronic unit.
    Type: Grant
    Filed: May 19, 1999
    Date of Patent: February 17, 2004
    Assignee: Activcard
    Inventor: Yves Audebert
  • Patent number: 6690797
    Abstract: The descrambling device comprises hardware resources (1) and first memory zones (CA1, CA2, . . . , CAn) to store at least two different access control codes for controlling the hardware resources. The device also contains an arbitration code for selecting one access control code to control the hardware resources in order to share access to the hardware resources from the access control codes. Access control codes can be downloaded in the first memory zones by means of a loader contained in the device.
    Type: Grant
    Filed: July 28, 1999
    Date of Patent: February 10, 2004
    Assignee: Thomson Licensing S.A.
    Inventors: Mario de Vito, Laurent Gauche
  • Patent number: 6687824
    Abstract: Digital image encoding/decoding apparatus and methods for recording a signature image using watermarking, and for restoring the recorded signature image are provided.
    Type: Grant
    Filed: July 1, 1999
    Date of Patent: February 3, 2004
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Hyun-doo Shin
  • Patent number: 6684345
    Abstract: A system of Flash EEprom memory chips with controlling circuits serves as non-volatile memory such as that provided by magnetic disk drives. Improvements include selective multiple sector erase, in which any combinations of Flash sectors may be erased together. Selective sectors among the selected combination may also be de-selected during the erase operation. Another improvement is the ability to remap and replace defective cells with substitute cells. The remapping is performed automatically as soon as a defective cell is detected. When the number of defects in a Flash sector becomes large, the whole sector is remapped. Yet another improvement is the use of a write cache to reduce the number of writes to the Flash EEprom memory, thereby minimizing the stress to the device from undergoing too many write/erase cycling.
    Type: Grant
    Filed: December 26, 2002
    Date of Patent: January 27, 2004
    Assignee: SanDisk Corporation
    Inventors: Eliyahou Harari, Robert D. Norman, Sanjay Mehrotra
  • Patent number: 6678828
    Abstract: A secure network file access appliance supports the secure access and transfer of data between the file system of a client computer system and a network data store. An agent provided on the client computer system and monitored by the secure network file access appliance ensures authentication of the client computer system with respect to file system requests issued to the network data store. The secure network file access appliance is provided in the network infrastructure between the client computer system and network data store to apply qualifying access policies and selectively pass through to file system requests. The secure network file access appliance maintains an encryption key store and associates encryption keys with corresponding filesystem files to encrypt and decrypt file data as transferred to and read from the network data store through the secure network file access appliance.
    Type: Grant
    Filed: July 22, 2002
    Date of Patent: January 13, 2004
    Assignee: Vormetric, Inc.
    Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
  • Patent number: 6678827
    Abstract: The present invention is directed to a facility for using a security policy manager device to remotely manage multiple network security devices (NSDs). The manager device can also use one or more intermediate supervisor devices to assist in the management. Security for the communication of information between various devices can be provided in a variety of ways. The system allows the manager device to create a consistent security policy for the multiple NSDs by distributing a copy of a security policy template to each of the NSDs and by then configuring each copy of the template with NSD-specific information. For example, the manager device can distribute the template to multiple NSDs by sending a single copy of the template to a supervisor device associated with the NSDs and by then having the supervisor device update each of the NSDs with a copy of the template. Other information useful for implementing security policies can also be distributed to the NSDs in a similar manner.
    Type: Grant
    Filed: May 6, 1999
    Date of Patent: January 13, 2004
    Assignee: WatchGuard Technologies, Inc.
    Inventors: Peter M. Rothermel, David Wayne Bonn, Nick T. Marvais
  • Patent number: 6675299
    Abstract: The content of a document is stored in a file system, while the profile of the document is stored in a messaging system. The profile of the document is accessed upon request, and the document content is accessed based upon the content of the profile.
    Type: Grant
    Filed: November 30, 1998
    Date of Patent: January 6, 2004
    Assignee: iManage, Inc.
    Inventors: Jack Edward Porter, Geoffrey Leroy Brimhall, William Montgomery Crane, Liam Patrick O'Gorman
  • Patent number: 6671809
    Abstract: Software execution control in which a series of two-way rule checks is performed between software-defined communications system component records to ensure and maintain system security and integrity. A system platform (20) performs a series of two-way rule checks between records of a system platform (20) and an application (22) called by the platform (20), between records of the called application (22) and a module (24) that defines the called application (22), and between the records of the module (24) that defines the called application (22) and the platform (20). Both the called application (22) and the module (24) that defines the called application (22) are then instantiated if the two-way rule checks are successful. Because the rule checks are performed in a two-way manner, restrictions such as licensing and source restrictions may be placed not only on system modules (24-30), but also on the applications (22) using the modules (24-30), thereby enabling higher levels of system security to be achieved.
    Type: Grant
    Filed: May 10, 2000
    Date of Patent: December 30, 2003
    Assignee: General Dynamics Decision Systems, Inc.
    Inventors: Richard Allen Perona, Clifford Andrew Williams
  • Patent number: 6668326
    Abstract: A method for performing a computation task in a secure processor removably operatively associated with a host including a memory external to the secure processor. The method includes computing a portion of the task in the secure processor, obtaining a setting representation of settings of processing components of the secure processor at the end of the computing step, transmitting the setting representation to the external memory, retrieving the setting representation from the external memory, providing the setting representation to the secure processor, and resuming computation of the task in the secure processor by employing the setting representation.
    Type: Grant
    Filed: May 21, 1999
    Date of Patent: December 23, 2003
    Assignee: NDS Limited
    Inventors: Yaron Sella, Moshe Shlissel
  • Patent number: 6658572
    Abstract: The present invention is directed to preventing a hijacker from gaining sufficient flight control of an airliner to use it to do harm. One embodiment of the invention detects when the pilot is not seated and verifies the authorization for the seat to be empty. If the required authorization is not timely provided, a processor executes a hijacking response that includes locking out the flight controls, uninterruptibly and autonomously communicating events on-board the aircraft to ground controllers and others, and uninterruptibly and autonomously navigating the aircraft to a safe landing without control inputs from the cockpit. The present invention, a vehicle security system, is also useful on other vehicles. An embodiment for an automobile is described.
    Type: Grant
    Filed: October 31, 2001
    Date of Patent: December 2, 2003
    Assignee: Secure Sky Ventures International LLC
    Inventor: Stanley M. Craig
  • Patent number: 6658573
    Abstract: This invention concerns methods for the protection of resources in an open digital communication system, which resources are residing in or owned by physically and organizationally distributed, independent entities connected through that system, e.g. the Internet. Since, in such an open system, any entity can in principle access any resource of any other entity, precautions must be taken to avoid or minimize the danger of resource corruption and destruction, to maintain privacy and, where necessary, confidentiality. Thus, protection of resources is of ultimate importance to warrant integrity and function of an entity. For the intelligent protection of such resources, in particular against unauthorized access, a variable-grained control of the name space (consisting of all names an entity provides) and/or the provision of attachable and detachable guards accompanying each call for a file and/or service is provided.
    Type: Grant
    Filed: July 15, 1999
    Date of Patent: December 2, 2003
    Assignee: International Business Machines Corporation
    Inventors: Joerg Bischof, Thomas Eirich, Dirk Husemann
  • Patent number: 6654891
    Abstract: A method and apparatus for providing information between a central database and at least one server. A server manager is coupled between the central database and the at least one server. The server manager communicates configuration information between the central database and the at least one server in a single communication channel.
    Type: Grant
    Filed: October 29, 1998
    Date of Patent: November 25, 2003
    Assignee: Nortel Networks Limited
    Inventors: Larry W. Borsato, Mark Gaudet, Ian Hamilton, Rod Anderson, Glenn Waters
  • Patent number: 6647498
    Abstract: An apparatus and a method for preventing a personal computer from being illegally used are provided. A personal computer includes a RAM for storing a plurality of programs having application programs and an operation system, a flash memory of a BIOS ROM for storing a BIOS including a POST module for checking the state of a computer and booting the computer when power is applied and an interrupt processing module for managing peripheral equipments, a microprocessor for executing the plurality of programs and the BIOS, and a CMOS RAM for storing system information which must be maintained though power is intercepted. Both the CMOS RAM and the flash memory of the BIOS ROM respectively include areas for storing passwords. If A password input by a user is identical to a first password stored in CMOS RAM, booting the computer is processed when the first password is set in the CMOS RAM.
    Type: Grant
    Filed: May 18, 1999
    Date of Patent: November 11, 2003
    Assignee: Samsung Electronics Co., Ltd.
    Inventor: Jong-il Cho
  • Patent number: 6643777
    Abstract: A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.
    Type: Grant
    Filed: May 14, 1999
    Date of Patent: November 4, 2003
    Assignee: Acquis Technology, Inc.
    Inventor: William W. Y. Chu
  • Patent number: 6643780
    Abstract: A cable modem blocks data transfers addressed to host systems during a safe mode of operation and provides the data transfers to the addressed host systems during a normal mode of operation. The cable modem can be coupled to multiple host systems which can be addressed separately. Accordingly, the safe mode of operation can be selected for a subset of the host systems coupled to the cable modem. The safe mode or normal mode of operation can be invoked by pushing a button on the cable modem. The safe mode of operation may also be invoked after the expiration of a timer which times an interval of inactivity at the host. The normal mode of operations can be invoked after detecting activity at the host system.
    Type: Grant
    Filed: May 7, 1999
    Date of Patent: November 4, 2003
    Assignee: Ericsson Inc.
    Inventor: Gerald M. Cooper
  • Patent number: 6643781
    Abstract: The present invention requires a computing device to interact with an authorized host computer on a fairly regular basis in order to maintain operability. In one embodiment, there is stored within the computing device an authorization parameter. This parameter is checked upon the occurrence of certain events to determine whether it has expired. If the authorization parameter has expired, then the present invention renders the computing device inoperable. The only way to update this parameter, and hence to maintain operability, is for the computing device to interact with an authorized host computer. Unless a thief knows which host computer to contact, and how to properly interact with that host computer (both of which are unlikely), the authorization parameter of a stolen device will not be updated. As a result, the stolen device will become inoperable within a relatively short time after the theft.
    Type: Grant
    Filed: May 14, 1999
    Date of Patent: November 4, 2003
    Assignee: Sun Microsystems, Inc.
    Inventor: Charles Merriam
  • Patent number: 6640306
    Abstract: A transmitting unit has a first storing portion for storing a plurality of data programs, and a data generating portion for adding first identification data to a data program selected corresponding to selection data that is input by a user from the plurality of data programs stored in the first storing portion.
    Type: Grant
    Filed: April 13, 1999
    Date of Patent: October 28, 2003
    Assignee: Sony Corporation
    Inventors: Nobuhiro Tone, Toshiyuki Arai