Patents Examined by Ly V. Hua
-
Patent number: 6715074Abstract: A system and method for making sure that before the ROM BIOS of a personal computer is reprogrammed, the BIOS image is compatible with the computer whose BIOS are being reprogrammed. This is done by requiring the utility that performs the reprogramming of the ROM BIOS to have a secure portion of code that is stored in a portion of the computer's memory that is inaccessible to a user. The secure portion of code is used to make sure that the BIOS image to be programmed into the computer is compatible with the computer.Type: GrantFiled: July 27, 1999Date of Patent: March 30, 2004Assignee: Hewlett-Packard Development Company, L.P.Inventor: Craig L. Chaiken
-
Patent number: 6711261Abstract: An improved method and apparatus for maintaining concealment for a scrambled signal when frequency pre-emphasis is used to defeat the scrambling. The pre-emphasis may be synthesized with high pass or peaking circuitry. More commonly however the pre-emphasis is available in television sets with a fine tuning control. By adjusting the fine tuning control to cause purposely mistuning off center, a peaking effect is generated which is used to counter the scrambled signal. The application discloses one embodiment which uses de-emphasis to counter the peaking effect. In another embodiment, signals added in the vicinity of the horizontal blanking interval causes the peaking effect to enhance these added signals over stable edges of the video signal. Since these added signals are position modulated for example, the television's sync circuits and horizontal oscillator circuits will cause scan circuits to generate position modulation.Type: GrantFiled: July 20, 1999Date of Patent: March 23, 2004Assignee: Macrovision CorpInventor: Ronald Quan
-
Patent number: 6711680Abstract: A method and system for generating messages from which it can be verified that a variable does not exceed a predetermined limit. The message can be a postal indicium. A message originator, which can be a postage metering system, receives a message in the form R−k(T), where R is a trapdoor function, K is an integer equal to the limit, and T is a plain text, from a data processing center which maintains the inverse function R−1 in secrecy. The message originator computes Sm=Rm(R−k(T), where m is a current value of the variable, and incorporates Sm into the message. A verifier verifies that m<K by confirming that Rk−m(Sm)=T. The verifier cannot compute Rk−m(Sm) for m<K since it does not have R−1. For the same reason the originator cannot compute R−k′(T), k′>K, from R−k(T).Type: GrantFiled: December 9, 1999Date of Patent: March 23, 2004Assignee: Pitney Bowes Inc.Inventor: Robert A Cordery
-
Patent number: 6694436Abstract: The terminal includes a terminal module (1) and a personal security device (31). The terminal module (1) is adapted to receive high-level requests from an application (Fap) installed on an electronic unit. The high-level requests are independent of the personal security device (31). The terminal module (1) and/or the personal security device (31) includes a reprogrammable memory for storing and a unit for executing a filter program (F) translating the high-level requests into at least one of either (i) at least one sequence of exchanges of data between the terminal module (1) and the user or (ii) a sequence of at least one elementary command that can be executed by the personal security device, together with a unit for protecting the filter program (F, 62) to prevent any modification of the filter program by an unauthorized entity. The filter program includes a unit for identifying and/or authenticating the source of requests sent by the application (Fap) installed in the electronic unit.Type: GrantFiled: May 19, 1999Date of Patent: February 17, 2004Assignee: ActivcardInventor: Yves Audebert
-
Patent number: 6690797Abstract: The descrambling device comprises hardware resources (1) and first memory zones (CA1, CA2, . . . , CAn) to store at least two different access control codes for controlling the hardware resources. The device also contains an arbitration code for selecting one access control code to control the hardware resources in order to share access to the hardware resources from the access control codes. Access control codes can be downloaded in the first memory zones by means of a loader contained in the device.Type: GrantFiled: July 28, 1999Date of Patent: February 10, 2004Assignee: Thomson Licensing S.A.Inventors: Mario de Vito, Laurent Gauche
-
Patent number: 6687824Abstract: Digital image encoding/decoding apparatus and methods for recording a signature image using watermarking, and for restoring the recorded signature image are provided.Type: GrantFiled: July 1, 1999Date of Patent: February 3, 2004Assignee: Samsung Electronics Co., Ltd.Inventor: Hyun-doo Shin
-
Patent number: 6684345Abstract: A system of Flash EEprom memory chips with controlling circuits serves as non-volatile memory such as that provided by magnetic disk drives. Improvements include selective multiple sector erase, in which any combinations of Flash sectors may be erased together. Selective sectors among the selected combination may also be de-selected during the erase operation. Another improvement is the ability to remap and replace defective cells with substitute cells. The remapping is performed automatically as soon as a defective cell is detected. When the number of defects in a Flash sector becomes large, the whole sector is remapped. Yet another improvement is the use of a write cache to reduce the number of writes to the Flash EEprom memory, thereby minimizing the stress to the device from undergoing too many write/erase cycling.Type: GrantFiled: December 26, 2002Date of Patent: January 27, 2004Assignee: SanDisk CorporationInventors: Eliyahou Harari, Robert D. Norman, Sanjay Mehrotra
-
Patent number: 6678828Abstract: A secure network file access appliance supports the secure access and transfer of data between the file system of a client computer system and a network data store. An agent provided on the client computer system and monitored by the secure network file access appliance ensures authentication of the client computer system with respect to file system requests issued to the network data store. The secure network file access appliance is provided in the network infrastructure between the client computer system and network data store to apply qualifying access policies and selectively pass through to file system requests. The secure network file access appliance maintains an encryption key store and associates encryption keys with corresponding filesystem files to encrypt and decrypt file data as transferred to and read from the network data store through the secure network file access appliance.Type: GrantFiled: July 22, 2002Date of Patent: January 13, 2004Assignee: Vormetric, Inc.Inventors: Duc Pham, Tien Le Nguyen, Pu Paul Zhang, Mingchen Lo
-
Patent number: 6678827Abstract: The present invention is directed to a facility for using a security policy manager device to remotely manage multiple network security devices (NSDs). The manager device can also use one or more intermediate supervisor devices to assist in the management. Security for the communication of information between various devices can be provided in a variety of ways. The system allows the manager device to create a consistent security policy for the multiple NSDs by distributing a copy of a security policy template to each of the NSDs and by then configuring each copy of the template with NSD-specific information. For example, the manager device can distribute the template to multiple NSDs by sending a single copy of the template to a supervisor device associated with the NSDs and by then having the supervisor device update each of the NSDs with a copy of the template. Other information useful for implementing security policies can also be distributed to the NSDs in a similar manner.Type: GrantFiled: May 6, 1999Date of Patent: January 13, 2004Assignee: WatchGuard Technologies, Inc.Inventors: Peter M. Rothermel, David Wayne Bonn, Nick T. Marvais
-
Patent number: 6675299Abstract: The content of a document is stored in a file system, while the profile of the document is stored in a messaging system. The profile of the document is accessed upon request, and the document content is accessed based upon the content of the profile.Type: GrantFiled: November 30, 1998Date of Patent: January 6, 2004Assignee: iManage, Inc.Inventors: Jack Edward Porter, Geoffrey Leroy Brimhall, William Montgomery Crane, Liam Patrick O'Gorman
-
Patent number: 6671809Abstract: Software execution control in which a series of two-way rule checks is performed between software-defined communications system component records to ensure and maintain system security and integrity. A system platform (20) performs a series of two-way rule checks between records of a system platform (20) and an application (22) called by the platform (20), between records of the called application (22) and a module (24) that defines the called application (22), and between the records of the module (24) that defines the called application (22) and the platform (20). Both the called application (22) and the module (24) that defines the called application (22) are then instantiated if the two-way rule checks are successful. Because the rule checks are performed in a two-way manner, restrictions such as licensing and source restrictions may be placed not only on system modules (24-30), but also on the applications (22) using the modules (24-30), thereby enabling higher levels of system security to be achieved.Type: GrantFiled: May 10, 2000Date of Patent: December 30, 2003Assignee: General Dynamics Decision Systems, Inc.Inventors: Richard Allen Perona, Clifford Andrew Williams
-
Patent number: 6668326Abstract: A method for performing a computation task in a secure processor removably operatively associated with a host including a memory external to the secure processor. The method includes computing a portion of the task in the secure processor, obtaining a setting representation of settings of processing components of the secure processor at the end of the computing step, transmitting the setting representation to the external memory, retrieving the setting representation from the external memory, providing the setting representation to the secure processor, and resuming computation of the task in the secure processor by employing the setting representation.Type: GrantFiled: May 21, 1999Date of Patent: December 23, 2003Assignee: NDS LimitedInventors: Yaron Sella, Moshe Shlissel
-
Patent number: 6658572Abstract: The present invention is directed to preventing a hijacker from gaining sufficient flight control of an airliner to use it to do harm. One embodiment of the invention detects when the pilot is not seated and verifies the authorization for the seat to be empty. If the required authorization is not timely provided, a processor executes a hijacking response that includes locking out the flight controls, uninterruptibly and autonomously communicating events on-board the aircraft to ground controllers and others, and uninterruptibly and autonomously navigating the aircraft to a safe landing without control inputs from the cockpit. The present invention, a vehicle security system, is also useful on other vehicles. An embodiment for an automobile is described.Type: GrantFiled: October 31, 2001Date of Patent: December 2, 2003Assignee: Secure Sky Ventures International LLCInventor: Stanley M. Craig
-
Patent number: 6658573Abstract: This invention concerns methods for the protection of resources in an open digital communication system, which resources are residing in or owned by physically and organizationally distributed, independent entities connected through that system, e.g. the Internet. Since, in such an open system, any entity can in principle access any resource of any other entity, precautions must be taken to avoid or minimize the danger of resource corruption and destruction, to maintain privacy and, where necessary, confidentiality. Thus, protection of resources is of ultimate importance to warrant integrity and function of an entity. For the intelligent protection of such resources, in particular against unauthorized access, a variable-grained control of the name space (consisting of all names an entity provides) and/or the provision of attachable and detachable guards accompanying each call for a file and/or service is provided.Type: GrantFiled: July 15, 1999Date of Patent: December 2, 2003Assignee: International Business Machines CorporationInventors: Joerg Bischof, Thomas Eirich, Dirk Husemann
-
Patent number: 6654891Abstract: A method and apparatus for providing information between a central database and at least one server. A server manager is coupled between the central database and the at least one server. The server manager communicates configuration information between the central database and the at least one server in a single communication channel.Type: GrantFiled: October 29, 1998Date of Patent: November 25, 2003Assignee: Nortel Networks LimitedInventors: Larry W. Borsato, Mark Gaudet, Ian Hamilton, Rod Anderson, Glenn Waters
-
Patent number: 6647498Abstract: An apparatus and a method for preventing a personal computer from being illegally used are provided. A personal computer includes a RAM for storing a plurality of programs having application programs and an operation system, a flash memory of a BIOS ROM for storing a BIOS including a POST module for checking the state of a computer and booting the computer when power is applied and an interrupt processing module for managing peripheral equipments, a microprocessor for executing the plurality of programs and the BIOS, and a CMOS RAM for storing system information which must be maintained though power is intercepted. Both the CMOS RAM and the flash memory of the BIOS ROM respectively include areas for storing passwords. If A password input by a user is identical to a first password stored in CMOS RAM, booting the computer is processed when the first password is set in the CMOS RAM.Type: GrantFiled: May 18, 1999Date of Patent: November 11, 2003Assignee: Samsung Electronics Co., Ltd.Inventor: Jong-il Cho
-
Patent number: 6643777Abstract: A security method for an attached computer module in a computer system. The security method reads a security identification number in an attached computer module and compares it to a security identification number in a console, which houses the attached computer module. Based upon a relationship between these numbers, a security status is selected. The security status determines the security level of operating the computer system.Type: GrantFiled: May 14, 1999Date of Patent: November 4, 2003Assignee: Acquis Technology, Inc.Inventor: William W. Y. Chu
-
Patent number: 6643780Abstract: A cable modem blocks data transfers addressed to host systems during a safe mode of operation and provides the data transfers to the addressed host systems during a normal mode of operation. The cable modem can be coupled to multiple host systems which can be addressed separately. Accordingly, the safe mode of operation can be selected for a subset of the host systems coupled to the cable modem. The safe mode or normal mode of operation can be invoked by pushing a button on the cable modem. The safe mode of operation may also be invoked after the expiration of a timer which times an interval of inactivity at the host. The normal mode of operations can be invoked after detecting activity at the host system.Type: GrantFiled: May 7, 1999Date of Patent: November 4, 2003Assignee: Ericsson Inc.Inventor: Gerald M. Cooper
-
Patent number: 6643781Abstract: The present invention requires a computing device to interact with an authorized host computer on a fairly regular basis in order to maintain operability. In one embodiment, there is stored within the computing device an authorization parameter. This parameter is checked upon the occurrence of certain events to determine whether it has expired. If the authorization parameter has expired, then the present invention renders the computing device inoperable. The only way to update this parameter, and hence to maintain operability, is for the computing device to interact with an authorized host computer. Unless a thief knows which host computer to contact, and how to properly interact with that host computer (both of which are unlikely), the authorization parameter of a stolen device will not be updated. As a result, the stolen device will become inoperable within a relatively short time after the theft.Type: GrantFiled: May 14, 1999Date of Patent: November 4, 2003Assignee: Sun Microsystems, Inc.Inventor: Charles Merriam
-
Patent number: 6640306Abstract: A transmitting unit has a first storing portion for storing a plurality of data programs, and a data generating portion for adding first identification data to a data program selected corresponding to selection data that is input by a user from the plurality of data programs stored in the first storing portion.Type: GrantFiled: April 13, 1999Date of Patent: October 28, 2003Assignee: Sony CorporationInventors: Nobuhiro Tone, Toshiyuki Arai