Patents by Inventor Dennis G. Abraham

Dennis G. Abraham has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6684334
    Abstract: An apparatus and method is disclosed for securely establishing a unique cryptographic key in a first cryptographic device, for example an Automated Teller Machine (ATM). In a preferred embodiment, the ATM includes means for entering a key component and an ATM processor board, and the apparatus includes a microprocessor and a persistent, non-volatile memory device electrically disposed between the key component entry means and the ATM processor board. In a preferred embodiment of the method, the microprocessor detects and captures a key component entered by a key custodian. The microprocessor then determines whether a first key component is present in the non-volatile memory device. If not, the key component is stored in the non-volatile memory device as the persistent key component (PKC). If a PKC is present in the non-volatile memory device, the key component is temporarily stored as a second key component.
    Type: Grant
    Filed: May 27, 1999
    Date of Patent: January 27, 2004
    Assignee: Trusted Security Solutions, Inc.
    Inventor: Dennis G. Abraham
  • Patent number: 6606387
    Abstract: A system and method are disclosed for securely establishing a cryptographic key between a first cryptographic device, for example a host cryptographic security module, and a second cryptographic device, for example a bank Automated Teller Machine (ATM). A plurality of key components is generated from a pool of random numbers and a unique reference number indexes each of the key components. The key components are encrypted, stored and indexed in the host security module by the corresponding reference numbers. The key components are arbitrarily distributed to field personnel in tamper evident envelopes to be entered into the ATM. Each of the tamper evident envelopes is marked with the reference number corresponding to the key component contained in the envelope. At least two field personnel each enter a different key component into the ATM to form the cryptographic key.
    Type: Grant
    Filed: March 19, 1999
    Date of Patent: August 12, 2003
    Assignee: Trusted Security Solutions, Inc.
    Inventor: Dennis G. Abraham
  • Patent number: 5745576
    Abstract: The present invention provides a method and apparatus for initializing cryptographic terminals in a cryptographic system. The invention provides a base key that is common to all controllers produced by a manufacturer of cryptographic systems. The base key is installed by the manufacturer of cryptographic terminals in each controller prior to shipment of the controllers. The base key is used only for the purposes of initialization of cryptographic terminals, and is not used for normal operations. Each cryptographic terminal that is to be used with any of the controllers containing the common base key is provided with an initial key by the manufacturer of the terminal. Each initial key is derived from the particular terminal's serial number and the common base key. The initial key is used only for initialization purposes and not for system operation. The terminal and controller establish communications in a normal manner using whatever communication protocol is appropriate for them.
    Type: Grant
    Filed: May 17, 1996
    Date of Patent: April 28, 1998
    Assignee: Visa International Service Association
    Inventors: Dennis G. Abraham, Richard K. Hite
  • Patent number: 5301231
    Abstract: In a cryptographic module, a User Defined Function (UDF) facility is provided which provides users with the capability of defining and creating custom functions to meet their cryptographic processing needs. The cryptographic module is contained within a physically and logically secure environment and comprises a processing unit and memory connected to the processing unit. The memory includes code for translating User Defined Functions (UDFs) into a machine-readable form and at least one command for operating on the UDFs. The UDFs are loaded into and executed in the secure area of the cryptographic module without compromising the total security of the transaction security system.
    Type: Grant
    Filed: February 12, 1992
    Date of Patent: April 5, 1994
    Assignee: International Business Machines Corporation
    Inventors: Dennis G. Abraham, Daniela Henningsmeyer, John M. Hudson, Donald B. Johnson, An V. Le, Stephen M. Matyas, James V. Stevens
  • Patent number: 5237616
    Abstract: The microprocessor resides along with its protected real address space in a secure module surrounded by tamper resistant circuitry pad. Encryption programs and encryption keys are stored in the protected memory. A second real address space is also connected to the address and data bus of the microprocessor in order to provide program and data space for a user. Gating circuitry prevent the exposure of instructions and data form the privileged memory from appearing outside of the secure module. The gating circuits switch address spaces by recognizing a sequence of predetermined addresses.
    Type: Grant
    Filed: September 21, 1992
    Date of Patent: August 17, 1993
    Assignee: International Business Machines Corporation
    Inventors: Dennis G. Abraham, Steven G. Aden
  • Patent number: 5177791
    Abstract: A working key of a certain key type is to be transmitted from a first system (having a first usage-control value associated with keys of the certain type) and a second system (having a second usage-control value associated with keys of the certain type). A translation control value, associated with the certain key type, is generated, functionally relating the first and second usage-control values. The translation control value is used in a cryptographic function to send or receive the working key between systems, the cryptographic function being designed to produce valid results when the correct translation control value, and usage-control values, are employed, and unpredictable results otherwise. Effectively, the first usage-control value is translated to the second usage-control value.
    Type: Grant
    Filed: August 30, 1991
    Date of Patent: January 5, 1993
    Assignee: International Business Machines Corp.
    Inventors: Phil C. Yeh, Dennis G. Abraham, Donald B. Johnson, An Van Le, Stephen M. Matyas, Rotislaw Prymak, Ronald M. Smith, Sr., John D. Wilkins
  • Patent number: 5148481
    Abstract: An improved security system is disclosed which uses an IC card to enhance the security functions involving component authentication, user verification, user authorization and access control, protection of message secrecy and integrity, management of cryptographic keys, and auditability. Both the security method and the apparatus for embodying these functions across a total system or network using a common cryptographic architecture are disclosed. Authorization to perform these functions in the various security component device nodes in the network can be distributed to the various nodes at which they will be executed in order to personalize the use of the components.
    Type: Grant
    Filed: July 1, 1991
    Date of Patent: September 15, 1992
    Assignee: International Business Machines Corporation
    Inventors: Dennis G. Abraham, Steven G. Aden, Todd W. Arnold, Steven W. Neckyfarow, William S. Rohland
  • Patent number: 5103478
    Abstract: A requested cryptographic function is validated for performance in conjunction with a cryptographic key, by inputting a first portion of an associated control vector into a first control vector checker, which outputs a first authorization signal if the requested cryptographic function has been authorized by the originator of the key. A second portion of the control vector is input to a second control vector checker, which outputs a second authorization signal if the requested cryptographic function has been authorized by the originator of the key. Both the first and the second authorization signals are applied to a cryptographic processor which initiates the execution of the requested cryptographic function.
    Type: Grant
    Filed: October 12, 1990
    Date of Patent: April 7, 1992
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Patrick J. McCormack, Rostislaw Prymak, John D. Wilkins
  • Patent number: 5048085
    Abstract: An improved security system is disclosed which uses an IC card to enchance the security functions involving component authentication, user verification, user authorization and access control, protection of message secrecy and integrity, management of cryptographic keys, and auditablity. Both the security method and the apparatus for embodying these functions across a total system or network using a common cryptographic architecture are disclosed. Authorization to perform there functions in the various security component device nodes in the network can be distributed to the various nodes at which they will be executed in order to personalize the use of the components.
    Type: Grant
    Filed: October 6, 1989
    Date of Patent: September 10, 1991
    Assignee: International Business Machines Corporation
    Inventors: Dennis G. Abraham, Steven G. Aden, Todd W. Arnold, Steven W. Neckyfarow, William S. Rohland
  • Patent number: 4993069
    Abstract: A cryptographic system and method is provided which accepts a key K encrypted under a key formed by exclusive-ORing a key-encrypting key KK with a first control vector C5 and outputs the same key K encrypted under a key formed by exclusive-ORing KK with a second control vector C6. The set (C5, C6) represents a mapping of the type and usage of the key K defined by the control vector C5 to the type and usage defined by the control vector C6. The set of allowable control vector mappings, that is from C5 to C6, are defined in a control vector translation table, which is specified in advance by authorized installation personnel.
    Type: Grant
    Filed: November 29, 1989
    Date of Patent: February 12, 1991
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, An V. Le, Rostislaw Prymak, John D. Wilkins, Phil C. Yeh
  • Patent number: 4941176
    Abstract: The invention is an apparatus and method for validating that key management functions requested for a cryptographic key by the program have been authorized by the originator of the key. The invention includes a cryptographic facility characterized by a secure boundary through which passes an input path for receiving the cryptographic service requests, cryptographic keys and their associated control vectors, and an output path for providing responses thereto. There can be included within the boundary a cryptographic instruction storage coupled to the input path, a control vector checking unit and a cryptographic processing unit coupled to the instruction storage, and a master key storage coupled to the processing means, for providing a secure location for executing key management functions in response to the received service requests. The cryptographic instruction storage receives over the input path a cryptographic service request for performing a key management function on a cryptographic key.
    Type: Grant
    Filed: August 11, 1988
    Date of Patent: July 10, 1990
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Julian Thomas, John D. Wilkins, Phil C. Yeh
  • Patent number: 4924515
    Abstract: A method and apparatus are disclosed for use in a data processing system which executes a program which outputs cryptographic service requests for operations with cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform. The improved method and apparatus enable the use of control vectors having an arbitrary length. It includes a control vector register having an arbitrary length, for storing a control vector of arbitrary length associated with an N-bit cryptographic key. It further includes a control vector checking means having an input coupled to the control vector register, for checking that the control vector authorizes the cryptographic function which is requested by the cryptographic service request. It further includes a hash function generator having an input coupled to the control vector register and an N-bit output, for mapping the control vector output from the control vector register, into an N-bit hash value.
    Type: Grant
    Filed: August 24, 1989
    Date of Patent: May 8, 1990
    Assignee: International Business Machines Coprporation
    Inventors: Stephen M. Matyas, Dennis G. Abraham, William C. Arnold, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Steve R. White, John D. Wilkins
  • Patent number: 4924514
    Abstract: Cryptographic PIN processing is achieved in an improved manner by associating control vectors with the PIN generating (verification) keys and PIN encrypting keys which provide authorization for the uses of the keys intended by the originator of the keys. The originator may be the local cryptographic facility (CF) and a utility program under the control of a security administrator, or the originator may be another network node which uses the key management methods described in the above-referenced copending patent applications to distribute said keys.Among the uses specified by the control vector are limitations on the authority to use the associated key with certain PIN processing instructions, such as PIN generation, verification, translation and PIN block creation. Furthermore, the control vector may limit the authority of certain instructions to process clear PIN inputs (such as in PIN verification).
    Type: Grant
    Filed: August 24, 1989
    Date of Patent: May 8, 1990
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Julian Thomas, John D. Wilkins, Phil C. Yeh, Ronald M. Smith
  • Patent number: 4918728
    Abstract: Data cryptography is achieved in an improved manner by associating with the data cryptography key, a control vector which provides the authorization for the uses of the key intended by the originator of the key. Among the uses specified by the control vector are limitations on encryption, decryption, authentication code generation and verification, translation of the user's data. Complex combinations of data manipulation functions are possible using the control vectors, in accordance with the invention. The system administrator can exercise flexibility in changing the implementation of his security policy by selecting appropriate control vectors in accordance with the invention.
    Type: Grant
    Filed: August 30, 1989
    Date of Patent: April 17, 1990
    Assignee: International Business Machines Corporation
    Inventors: Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le, Rostislaw Prymak, Julian Thomas, John D. Wilkins, Phil C. Yeh
  • Patent number: 4799061
    Abstract: A system for authenticating components in a communications system using cryptographic techniques to determine if each has the proper key without disclosing information which would be useful to an imposter in deriving the key. A random number generated at a first terminal is encrypted under its key for transmission as a first value to a second terminal whose identity is to be authenticated. The second terminal decrypts the transmitted first value using its key deriving a second value (which equals the random number if the keys are identical.) The second terminal then encrypts its key using the second value as the key, generating a third value which is transmitted back to the first terminal for verification. The first terminal then verifies the third value, either by decrypting it using the random number as the key to obtain its key or by encrypting its key using the random number as key to derive the third number (if the two keys are identical.
    Type: Grant
    Filed: November 18, 1985
    Date of Patent: January 17, 1989
    Assignee: International Business Machines Corporation
    Inventors: Dennis G. Abraham, Glen P. Double, Steven W. Neckyfarow
  • Patent number: 4486784
    Abstract: A system for compressing image data, when input in the form of run length coded sequential lines of image data, encodes variable length segments of the current to-be-coded line two dimensionally in terms of the detected relationship between the constants of five registers. The run length code words of the current line and the immediately previous reference line are accessed sequentially and selectively from respective FIFO buffers under the control of switching logic which also establishes a pattern of connections, unique to the generated code representing the immediately previous current line segment, coupling the outputs of the registers and the buffers to the inputs of the registers through adders to establish the next set of five values in terms of which segment coding takes place. One dimensional coding can be accommodated.
    Type: Grant
    Filed: December 27, 1982
    Date of Patent: December 4, 1984
    Assignee: International Business Machines Corporation
    Inventors: Dennis G. Abraham, Thomas W. Gallman