Patents by Inventor Addison M. Fischer

Addison M. Fischer has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 5422953
    Abstract: A personal data/time notary device is embodied in a token device such as a "smart card". The portable notary device includes an input/output (I/O) port, which is coupled to a single integrated circuit chip. The I/O port may be coupled to a conventional smart card reading device which in turn is coupled to a PC, lap-top computer or the like. A tamper resistant secret private key storage is embodied on the chip. The private key storage is coupled to the processor which, in turn, is coupled to a permanent memory that stores the program executed by the processor. At least one clock is embodied on the card. A second clock 14 and a random value generator 10 are also preferably coupled to the processor. The device combines digital time notarization into a digital signature operation to ensure that a time stamp is always automatically present. The user does not need to be involved in any additional decision making as to whether time stamping is necessary.
    Type: Grant
    Filed: May 5, 1993
    Date of Patent: June 6, 1995
    Inventor: Addison M. Fischer
  • Patent number: 5412717
    Abstract: Method and apparatus are disclosed including a system monitor which limits the ability of a program about to be executed to the use of predefined resources (e.g., data files, disk writing capabilities, etc.). The system monitor processes a data structure including a set of authorities defining that which a program is permitted to do and/or that which the program is precluded from doing. The set of authorities and/or restrictions assigned to a program to be executed are referred to as "program authorization information" (or "PAI"). Once defined, the program authorization information is thereafter associated with at least one program to be executed to thereby delineate the resources and functions that the program is allowed to utilize and/or is not allowed to utilize. The PAI associated with a particular program may be assigned by a computer system owner/user or by someone who the computer system owner/user implicitly trusts.
    Type: Grant
    Filed: May 15, 1992
    Date of Patent: May 2, 1995
    Inventor: Addison M. Fischer
  • Patent number: 5390247
    Abstract: A method and apparatus for creating, supporting and using a "travelling program" is disclosed. A "travelling program" is a digital data structure which includes a sequence of instructions and associated data and which has the capability of determining at least one next destination or recipient for receiving the travelling program and for transmitting itself together with all relevant data determined by the program to the next recipient or destination. The travelling program can compute, according to any algorithm, the digital material which is to be signed, and also, as needed, the digital material which is to be verified. The program can conditionally decide, based on any known criteria, which users should participate in the signature process. Digital signatures allow the travelling program to provide other types of valuable authentication. The travelling program operates to automate data collection among a group of users.
    Type: Grant
    Filed: September 20, 1993
    Date of Patent: February 14, 1995
    Inventor: Addison M. Fischer
  • Patent number: 5337360
    Abstract: A method and apparatus for creating, supporting and using a "travelling program" is disclosed. A "travelling program" is a digital data structure which includes a sequence of instructions and associated data and which has the capability of determining at least one next destination or recipient for receiving the travelling program and for transmitting itself together with all relevant data determined by the program to the next recipient or destination. The travelling program can compute, according to any algorithm, the digital material which is to be signed, and also, as needed, the digital material which is to be verified. The program can conditionally decide, based on any known criteria, which users should participate in the signature process. Digital signatures allow the travelling program to provide other types of valuable authentication. The travelling program operates to automate data collection among a group of users.
    Type: Grant
    Filed: January 5, 1994
    Date of Patent: August 9, 1994
    Inventor: Addison M. Fischer
  • Patent number: 5311591
    Abstract: Method and apparatus are disclosed including a system monitor which limits the ability of a program about to be executed to the use of predefined resources (e.g., data files, disk writing capabilities, etc.). The system monitor processes a data structure including a set of authorities defining that which a program is permitted to do and/or that which the program is precluded from doing. The set of authorities and/or restrictions assigned to a program to be executed are referred to as "program authorization information" (or "PAI"). Once defined, the program authorization information is thereafter associated with at least one program to be executed to thereby delineate the resources and functions that the program is allowed to utilize and/or is not allowed to utilize. The PAI associated with a particular program may be assigned by a computer system owner/user or by someone who the computer system owner/user implicitly trusts.
    Type: Grant
    Filed: June 3, 1993
    Date of Patent: May 10, 1994
    Inventor: Addison M. Fischer
  • Patent number: 5214702
    Abstract: A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose signature is being certified. The certifier in constructing a certificate generates a special message that includes fields identifying the public key which is being certified, and the name of the certifiee. The certificate is constructed by the certifier to define the authority which is being granted and which may relate to a wide range of authorizations, delegation responsibilities or restrictions given to, or placed on the certifiee. Methodology is also disclosed by which multiple objects such as, for example, a cover letter, an associated enclosed letter, an associated graphics file, etc., are signed together.
    Type: Grant
    Filed: May 13, 1992
    Date of Patent: May 25, 1993
    Inventor: Addison M. Fischer
  • Patent number: 5136643
    Abstract: A time notarization apparatus and method is disclosed which uses a secure, microprocessor based hardware platform which performs public key crytographic operations to obtain trusted time stamping with a minimum of intervention by third parties. The hardware platform is encapsulated in a secure fashion so that the device's timestamping mechanism may not be readily tampered with or altered. The hardware platform includes at least one digital clock and a stable, secure storage device to record the private half of a public/private key pair. Coupled to both the digital clock and the storage device is a data processing device which performs public key signature operations in a secure and tamper-proof manner. Only the processing device has access to the secure storage device and its associated private key.
    Type: Grant
    Filed: December 20, 1990
    Date of Patent: August 4, 1992
    Inventor: Addison M. Fischer
  • Patent number: 5005200
    Abstract: A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose signature is being certified. The certifier in constructing a certificate generates a special message that includes fields identifying the public key which is being certified, and the name of the certifiee. The certificate is constructed by the certifier to define the authority which is being granted and which may relate to a wide range of authorizations, delegation responsibilities or restrictions given to, or placed on the certifiee. Methodology is also disclosed by which multiple objects such as, for example, a cover letter, an associated enclosed letter, an associated graphics file, etc., are signed together.
    Type: Grant
    Filed: March 7, 1989
    Date of Patent: April 2, 1991
    Inventor: Addison M. Fischer
  • Patent number: 5001752
    Abstract: A time notarization apparatus and method is disclosed which uses a secure, microprocessor based hardware platform which performs public key cryptographic operations to obtain trusted time stamping with a minimum of intervention by third parties. The hardware platform is encapsulated in a secure fashion so that the device's timestamping mechanism may not be readily tampered with or altered. The hardware platform includes at least one digital clock and a stable, secure storage device to record the private half of a public/private key pair. Coupled to both the digital clock and the storage device is a data processing device which performs public key signature operations in a secure and tamper-proof manner. Only the processing device has access to the secure storage device and its associated private key.
    Type: Grant
    Filed: October 13, 1989
    Date of Patent: March 19, 1991
    Inventor: Addison M. Fischer
  • Patent number: 4868877
    Abstract: A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose signature is being certified. The present invention enhances the capabilities of public key cryptography so that it may be employed in a wider variety of business transactions, even those where two parties may be virtually unknown to each other. Counter-signature and joint-signature requirements are referenced in each digital certification to permit business transactions to take place electronically, which heretofore often only would take place after at least one party physically winds his way through a corporate bureaucracy. The certifier in constructing a certificate generates a special message that includes fields indentifying the public key which is being certified, and the name of the certifiee.
    Type: Grant
    Filed: February 12, 1988
    Date of Patent: September 19, 1989
    Inventor: Addison M. Fischer