Patents Examined by Tod R. Swann
  • Patent number: 6151559
    Abstract: A test (600) system for characterizing the nature and the severity of the impairments affecting a radio frequency signal path (148) which may be an upstream or a downstream channel in a cable system. Testing is done by monitoring the output of an unused signal path (614) with a filter (608) and a totaling counter (612). The filter passes impairment energy from the signal path to the counter in a frequency band of interest, thereby increasing the count value on the counter. The bandpass filter limits the ability of impairments or signals from other frequency bands to increase the counter's count value. The counter's input threshold voltage level (404) is set to trigger on impairments that are sufficiently strong to cause data errors. The count value may be used to determine the time duration of an impairment by dividing the count accumulated in one second by the center frequency of the filter.
    Type: Grant
    Filed: June 21, 1997
    Date of Patent: November 21, 2000
    Inventor: Thomas H. Williams
  • Patent number: 6151587
    Abstract: A computer implemented coupon dispensing system is provided. The computer implemented coupon dispensing system includes a display area, a memory arrangement, a processor, and a printer. The display area includes a display screen having a plurality of product identification cells for selecting a product type. The memory arrangement is configured to store information comprising product identification information, product discount information, and product location information for locating a product in a store. The processor is coupled to the memory arrangement and the display screen and is configured to process the information stored in the memory arrangement in order to generate selected product data packets including selected product identification information, selected product discount information, and selected product location information.
    Type: Grant
    Filed: July 23, 1998
    Date of Patent: November 21, 2000
    Inventor: John T. Matthias
  • Patent number: 6151582
    Abstract: A decision support system for managing an agile supply chain including a server side and a client side. The server side includes a decision support system database that interfaces with a model engine that performs analysis of the data to support planning decisions. The server side also includes a server manager that coordinates requests for service and information. The client side includes decision frames that present the various view points available in the system to the users. A frame manager coordinates the requests from the decision support frames to access the needed data and models.
    Type: Grant
    Filed: February 24, 1997
    Date of Patent: November 21, 2000
    Assignee: Philips Electronics North America Corp.
    Inventors: Ying Huang, Ramakrishna Desiraju, Christophe Begue, Omer Bakkalbasi, Lap Mui Ann Chan, Krishnakumar Bhaskaran, Awi Federgruen, Yossi Aviv, Raymond J. Krasinski, Peter Boey
  • Patent number: 6151585
    Abstract: Resource usage data is used to infer degrees of influence between users. Once such inferences are made, a directed graph representation of the users and the inferred "influence" between the users can be generated. "Influential rumormongers" can then be determined from the directed graph, for example, by using a greedy graph covering algorithm. In this way, marketing information can be targeted to "influential rumormongers" to optimize its dissemination and impact. If actual (explicit) data regarding the influence between users is known, such data may be used to refine or replace at least some edge values.
    Type: Grant
    Filed: April 24, 1998
    Date of Patent: November 21, 2000
    Assignee: Microsoft Corporation
    Inventors: Steven J. Altschuler, Lani F. Wu, David Ingerman
  • Patent number: 6151675
    Abstract: A method and apparatus is provided for effecting secure document delivery in any of various document formats. A document is encrypted with the public key of a server associated with the recipient of the document, instead of with the public key of the intended recipient. The receiving server is located within a firewall. The encrypted document is forwarded to the server within the firewall. The server decrypts the document using its corresponding private key, converts the document to a new data representation, and then either forwards the document to the recipient inside the firewall, or re-encrypts the document with the public key of an intended recipient outside of the firewall or with the public key of another server that is associated with the intended recipient of the document.
    Type: Grant
    Filed: July 23, 1998
    Date of Patent: November 21, 2000
    Assignee: Tumbleweed Software Corporation
    Inventor: Jeffrey C. Smith
  • Patent number: 6148377
    Abstract: Distributed shared memory systems and processes that can connect into each node of a computer network to encapsulate the memory management operations of the connected nodes and to provide thereby an abstraction of a shared virtual memory that can span across each node of the network and that optionally spans across each memory device connected to the computer network. Accordingly, each node on the network having the distributed shared memory system of the invention can access the shared memory.
    Type: Grant
    Filed: November 22, 1996
    Date of Patent: November 14, 2000
    Assignee: Mangosoft Corporation
    Inventors: John B. Carter, Scott H. Davis, William Abraham, Steven J. Frank, Thomas G. Hansen, Robert S. Phillips, Daniel J. Dietterich, David Porter
  • Patent number: 6148401
    Abstract: A system and method for providing assurance to a host executing a piece of software that the software possesses a particular property. A certifier determines if a piece of software possesses a particular property, and if it does, it cryptographically signs the software, producing a signature. The software and a certificate that includes the signature is then distributed to a host. The host checks the signature. If the signature is valid, then the host is provided with assurance that the software possesses the particular property. If the signature is not valid, then the host is provided with no such assurance.
    Type: Grant
    Filed: November 19, 1997
    Date of Patent: November 14, 2000
    Assignee: AT&T Corp.
    Inventors: Premkumar Thomas Devanbu, Stuart Gerald Stubblebine
  • Patent number: 6148407
    Abstract: A method and apparatus for computer platform identification. According to the method, a first fingerprint is generated using a plurality of computer system traits. A second fingerprint is generated on an unidentified computer and then compared to the first fingerprint. This comparison results in a value representing a probability that the unidentified computer system is the same computer system which generated the first fingerprint. A system disclosed includes a processor which is coupled to memory by a bus. The memory contains a first routine which retrieves a plurality of system traits to form a first fingerprint. The memory also contains a second routine which retrieves the first fingerprint and compares the first fingerprint to a second fingerprint.
    Type: Grant
    Filed: September 30, 1997
    Date of Patent: November 14, 2000
    Assignee: Intel Corporation
    Inventor: David Aucsmith
  • Patent number: 6148081
    Abstract: A system and method implemented in an interactive television system for restricting or controlling the access rights of interactive television applications and carousels. The system broadcasts modules from a broadcast station to a plurality of receiving stations, which execute applications containing the modules. In one embodiment, the applications utilize a credential consisting of a producer identification number (ID) and an application ID for each of the grantor and grantee applications, an expiration date, a set of permission data, a producer certificate and a signature. An application requesting access and a carousel granting access may be identified by respective producer and application IDs. The credential utilizes public key encryption to ensure the integrity of the credential. The producer and application IDs may be replaced with wildcards so that rights may be granted to a group of producers or applications.
    Type: Grant
    Filed: November 20, 1998
    Date of Patent: November 14, 2000
    Assignee: OpenTV, Inc.
    Inventors: Steven Szymanski, Jean Rene Menand, Vincent Dureau, Suresh N. Chari
  • Patent number: 6148291
    Abstract: Container and inventory monitoring methods and systems provide detailed logistical control of containers, shipping racks and resident and in-transit inventory. The methods and systems create and maintain accurate real-time records of the location, movement and load status of containers, racks and inventory within the facility boundaries and between facilities such as factories, assembly plants, warehouses, shipping yards and freight switching facilities. Detailed data on container switching, unloading and loading activity is recorded and archived. A virtual inventory accounting is provided by tracking from customer release orders to supplier shipments and rack returns.
    Type: Grant
    Filed: January 26, 1998
    Date of Patent: November 14, 2000
    Assignee: K & T of Lorain, Ltd.
    Inventor: Joseph E. Radican
  • Patent number: 6148382
    Abstract: A digital data processing system comprises a host information generating device, a mass storage subsystem, and a back-up information storage subsystem. The host information generating device generates information and provides it to the mass storage subsystem for storage. The mass storage subsystem receives the generated information from the host information generating device and transfers the generated information to the storage element for storage, and further transfers the generated information to the back-up information storage subsystem. The back-up information storage subsystem receives and stores the generated information from the mass storage subsystem's control element. The back-up information storage subsystem includes a filter/buffer module, a tape log module and a reconstruction module. The filter/buffer module filters and buffers the information received from the mass storage subsystem and provides the buffered information to the tape log module for storage.
    Type: Grant
    Filed: December 23, 1996
    Date of Patent: November 14, 2000
    Assignee: EMC Corporation
    Inventors: Haim Bitner, Ariel J. Ish-Shalom
  • Patent number: 6148406
    Abstract: A method and a security system for applying this method, for securing a device by making use of a security system equipped with a logic control device (1), includes assigning a personal code Y to each user, who from such code Y and from a series Ai of at least a random number, letter and/or symbol determines a password Z, and enters this password Z in the logic control device, and where access to the secured device is granted when the password Z is correctly entered, whereby the personal code is used having at least two distinct parts, whereby a first part is formed by an index I and a second part is formed by a figure code X, whereby the user of this index I determines which element out of series is used to form the password Z out of the figure code X by an operation or a function.
    Type: Grant
    Filed: September 30, 1997
    Date of Patent: November 14, 2000
    Inventors: Herman Weisz, Ornella Lo Piano
  • Patent number: 6145081
    Abstract: Apparatus and methods are provided for embedding watermark information into a cover signal, such as an audio signal, video signal, or still image signal, in a manner that prevents the watermark information from being removed without degrading the quality of the cover signal. This is accomplished by subjecting the cover signal to a phase modulation prior to being embedded with the watermark information, wherein the amount or degree of phase modulation is changed at least for each different watermark to be embedded in a particular instance or copy of the cover signal. As such, if two copies of the same cover signal, each containing a different watermark, are averaged or combined in an attempt to obliterate the watermark information, the cover signal will be subjected to phase cancellation, rendering any illicit copy of such signal so derived to be valueless.
    Type: Grant
    Filed: February 2, 1998
    Date of Patent: November 7, 2000
    Assignee: Verance Corporation
    Inventors: Joseph M. Winograd, Rade Petrovic, Eric Metois, Kanaan Jemili
  • Patent number: 6144740
    Abstract: Disclosed is a method for designing public key cryptosystems against fault-based attacks in which secret information stored in a tamperfree device is revealed during the encryption/decryption or signature generation processes due to fault-based attacks. A new fault-resistant system which enables any fault existing in modular multiplications and exponential computations to be detected with a very high probability based on a coding approach. This method can be used to implement all cryptosystems whose basic operations are modular multiplications for resisting both memory and computational fault-based attacks with a very low computational overhead.
    Type: Grant
    Filed: May 20, 1998
    Date of Patent: November 7, 2000
    Assignees: Network Security Technology Co., Lan-Ying Chiang
    Inventors: Chi-Sung Laih, Fu-Kuan Tu, Yung-Chen Lee
  • Patent number: 6144745
    Abstract: For warranting a validity of data recorded on a medium such as a rewritable magneto-optic disk etc, when registering a plurality of documents (n, n+1 . . . ) on the same recording medium, an n-th authenticator obtained by executing an encrypting process of data of the n-th document is recorded together with the n-th document data, and, when registering data of the (n+1)th document, an (n+1)-th authenticator is generated by executing the encrypting process of the n-th authenticator and the (n+1)-th document data as the (n+1)th authenticator.
    Type: Grant
    Filed: January 27, 1998
    Date of Patent: November 7, 2000
    Assignee: Fujitsu Limited
    Inventors: Ryota Akiyama, Seiichi Urita, Gengo Tazaki
  • Patent number: 6141421
    Abstract: A method and apparatus for generating a highly secured hash value without deteriorating the processing speed is provided. A hash function such that when a message M is given, the message M is compressed so as to have a certain kind of characteristics of cipher is realized. In a step, (1) one to one expanding process so that divided data of the message is inputted and longer data is outputted is executed, and (2) a plurality of cyclic shifting processes in which the number of shifting is different are executed. Consequently, the hash function can be calculated at higher speed than a conventional method of simple repetitive compression of divided data of a message.
    Type: Grant
    Filed: December 8, 1997
    Date of Patent: October 31, 2000
    Assignee: Hitachi, Ltd.
    Inventors: Kazuo Takaragi, Hiroyuki Kurumatani
  • Patent number: 6141756
    Abstract: The following describes an apparatus for and method of providing a secure method of downloading a program into a processor (101) from a device (103) external to the processor (101). The program may be encrypted (207) prior to its entry into the external device (103). The program may also have authentication information added (203 and 207) to it. Authentication information may be provided on an unencrypted and/or an encrypted program. The processor (101) decrypts (307) and/or successfully authenticates (311) the program before allowing the program to be executed by the processor (101).
    Type: Grant
    Filed: April 27, 1998
    Date of Patent: October 31, 2000
    Assignee: Motorola, Inc.
    Inventors: Michael W. Bright, Kenneth Carl Fuchs, Kelly Jo Marquardt
  • Patent number: 6141624
    Abstract: A fluid sample contains a plurality of different types of particles of interest. The method sets a limit for the maximum volume of the fluid sample to be analyzed, a limit for each of the different plurality of particle types, and a limit for the maximum number of particles to be analyzed with the maximum number being less than the sum of the limits for each of the different types. In the method, an aliquot of the fluid sample including the particles therein are analyzed to determine the type of the particles. The total volume of aliquots analyzed is counted. The method is stopped in the event the total of aliquots counted equals or exceeds the limit for the maximum value. For each type of particle in the fluid sample determined, a test is made if the total number of particles determined equals or exceeds the limit for each particle type. If the number does not exceed the individual type, the number of particles for that type is added and is counted. The total number of particles for all the types is counted.
    Type: Grant
    Filed: May 13, 1997
    Date of Patent: October 31, 2000
    Assignee: International Remote Imaging Systems
    Inventors: Harvey Lee Kasdan, Sanford Widran
  • Patent number: 6141422
    Abstract: A system for performing high speed exponentiation in a secure environment. The system includes an interface for receiving encrypted data sent from a host system, a plurality of exponentiators capable of operating concurrently, an encyptor decrypting data received from a host system and encrypting data produced from the exponentiators, and logic circuitry for selecting an available and properly functioning exponentiator to perform exponentiation on the received data.
    Type: Grant
    Filed: June 4, 1997
    Date of Patent: October 31, 2000
    Assignee: Philips Electronics North America Corporation
    Inventors: Charles Robert Rimpo, John Charles Ciccone, Yongyut Yuenyongsgool
  • Patent number: 6137885
    Abstract: A method for enabling encrypted communication to be performed directly in a single hop or merely directly between two terminals of a mobile radio network by satellite and/or of the GSM/DCS type, after one of said terminals has called via a fixed radio station of the network. After a first encryption stage, performed in conventional manner, a cipher key is simultaneously generated by the identity card associated with the calling terminal and by the network control structure for encrypting/decrypting data transmitted over the radio link between said calling terminal and the station. This cipher key is then stored in a memory of the station so as to be transmitted to the called terminal when a radio link is set up between said station and said called terminal for the call requested by the calling terminal, and the key is used for the purpose of encrypting/decrypting the data interchanged between the calling and called terminals.
    Type: Grant
    Filed: May 20, 1998
    Date of Patent: October 24, 2000
    Assignee: Alcatel
    Inventors: Antoine Totaro, Erick Flores