Patents by Inventor Matthew J. Campagna
Matthew J. Campagna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200403978Abstract: A first computing system establishes a cryptographically protected communication session with a second computing system by proposing a hybrid cryptographic scheme. In response to the proposed hybrid cryptographic scheme, a second computing system transmits cryptographic materials to the first computing system, and the first computing system transmits cryptographic materials to the second computing system. Using the cryptographic materials, two or more cryptographic keys are derived. One cryptographic key is used to perform an inner cryptographic operation on one or more data items, and another cryptographic key is used to perform an outer cryptographic operation on the one or more data items that have been cryptographically protected by the inner cryptographic operation.Type: ApplicationFiled: June 17, 2020Publication date: December 24, 2020Inventors: Nicholas Alexander Allen, Matthew J. Campagna
-
Patent number: 9455832Abstract: A portion of the signed message in an ECPVS is kept truly confidential by dividing the message being signed into at least three parts, wherein one portion is visible, another portion is recoverable by any entity and carries the necessary redundancy for verification, and at least one additional portion is kept confidential. The additional portion is kept confidential by encrypting such portion using a key generated from information specific to that verifying entity. In this way, any entity with access to the signer's public key can verify the signature by checking for a specific characteristic, such as a certain amount of redundancy in the one recovered portion, but cannot recover the confidential portion, only the specific entity can do so. Message recovery is also provided in an elliptic curve signature using a modification of the well analyzed ECDSA signing equation instead of, e.g. the Schnorr equation used in traditional PV signature schemes.Type: GrantFiled: September 4, 2008Date of Patent: September 27, 2016Assignee: Certicom Corp.Inventors: Daniel R. Brown, Matthew J. Campagna, Marinus Struik, Scott A. Vanstone
-
Patent number: 8891756Abstract: Elliptic curve hash functions are provided which do not require a pre-existing hash function, such as that required by the MuHash. The elliptic curve hash functions can be built from scratch and are collision free and can be incremental. In one embodiment, rather than a pre-existing hash function, the identity function with padding is used; and in another embodiment, rather than a pre-existing hash function, a block cipher with a fixed non-secret key is used.Type: GrantFiled: October 30, 2009Date of Patent: November 18, 2014Assignee: Certicom Corp.Inventors: Daniel R. L. Brown, Matthew J. Campagna, Marinus Struik
-
Patent number: 8750593Abstract: A method includes scanning a check to generate image data representative of an image of the check. The method further includes detecting at least one security feature of the check. The method also includes transforming the image data to include at least one encoded indication of the detected at least one security feature of the check.Type: GrantFiled: November 7, 2006Date of Patent: June 10, 2014Assignee: Pitney Bowes Inc.Inventors: Judith D. Auslander, Matthew J. Campagna, Robert A. Cordery, Cindy Mangiameli
-
Patent number: 8700894Abstract: Methods and systems for providing confidentiality of communications sent via a network that is efficient, easy to implement, and does not require significant key management. The identity of each node of the routing path of a communication is encrypted utilizing an identity-based encryption scheme. This allows each node of the routing path to decrypt only those portions of the routing path necessary to send the communication to the next node. Thus, each node will only know the immediate previous node from which the communication came, and the next node to which the communication is to be sent. The remainder of the routing path of the communication, along with the original sender and intended recipient, remain confidential from any intermediate nodes in the routing path. Use of the identity-based encryption scheme removes the need for significant key management to maintain the encryption/decryption keys.Type: GrantFiled: October 17, 2007Date of Patent: April 15, 2014Assignee: Pitney Bowes Inc.Inventors: Bradley R. Hammell, Matthew J. Campagna, Bertrand Haas, Leon A. Pintsov, Frederick W. Ryan, Jr.
-
Patent number: 8676715Abstract: Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.Type: GrantFiled: June 6, 2007Date of Patent: March 18, 2014Assignee: Pitney Bowes Inc.Inventors: Robert A. Cordery, Matthew J. Campagna, Bertrand Haas, Bradley R. Hammell, Leon A. Pintsov, Frederick W. Ryan, Jr.
-
Patent number: 8631247Abstract: An asset management system is provided, which includes a hardware module operating as an asset control core. The asset control core generally includes a small hardware core embedded in a target system on chip that establishes a hardware-based point of trust on the silicon die. The asset control core can be used as a root of trust on a consumer device by having features that make it difficult to tamper with. The asset control core is able to generate a unique identifier for one device and participate in the tracking and provisioning of the device through a secure communication channel with an appliance. The appliance generally includes a secure module that caches and distributes provisioning data to one of many agents that connect to the asset control core, e.g. on a manufacturing line or in an after-market programming session.Type: GrantFiled: November 24, 2009Date of Patent: January 14, 2014Assignee: Certicom Corp.Inventors: Daniel O'Loughlin, Keelan Smith, Jay Scott Fuller, Joseph Ku, William Lattin, Marinus Struik, Yuri Poeluev, Matthew J. Campagna, Thomas Stiemerling
-
Patent number: 8560457Abstract: Systems and methods for increasing user trust by authenticating an electronic commerce server over an electronic communications channel using information received through an out-of-band communication in a physical communications channel are described. In one configuration, a paper bill is sent to a user by physical mail delivery and it includes challenge and response data used to authenticate the electronic commerce server over the electronic communications channel.Type: GrantFiled: September 30, 2006Date of Patent: October 15, 2013Assignee: Pitney Bowes Inc.Inventors: Andrei Obrea, Arthur J. Parkos, Gary G. Hansen, Matthew J. Campagna, George M. Macdonald
-
Patent number: 8380587Abstract: A system and method are described for establishing and managing a vendor inventory of emergency business supplies for a business. The vendor is compensated for costs of maintaining the inventory. The business supplies are released periodically, for discount sale, after they have been in the vendor inventory for a period of time expiring when a release condition occurs. The vendor inventory is then restocked, and the vendor is compensated at least partially for the discount provided in the discount sale.Type: GrantFiled: December 1, 2003Date of Patent: February 19, 2013Assignee: Pitney Bowes Inc.Inventor: Matthew J. Campagna
-
Patent number: 8078293Abstract: A system, method, and medium, the method including receiving parameter information associated with a mailer, associating the parameter information with a mailing, receiving statistical information, the statistical information including historical performance data of at least one carrier, determining a delivery sequence for the mailing based on the received mailer parameter information and the statistical information, and outputting the determined delivery sequence for the mailing.Type: GrantFiled: August 24, 2007Date of Patent: December 13, 2011Assignee: Pitney Bowes Inc.Inventors: Matthew J. Campagna, Bradley R. Hammell, Erik D. N. Monsen, Ronald Reichman, Frederick W. Ryan, Jr., Michael P. Swenson, Robert A. Cordery
-
Patent number: 7975919Abstract: A method of enabling a voter to vote by mail by using a secret vote code (SVC) that includes translating the SVC into a one-time code (OTC) valid only for the election, storing the OTC, and mailing to the voter a ballot, a return envelope, and a mechanism for enabling the SVC to be translated into a translated format. Further, the method includes receiving the return envelope from the voter that includes a completed ballot, the voter's signature, and the translated format, determining whether the signature obtained from the envelope matches a stored signature for the voter, obtaining a second one-time code based on the translated format and determining whether the second one-time code matches the stored one-time code. The ballot is counted only if it is determined that: (i) the signatures match, and (ii) the second one-time code matches the stored one-time code.Type: GrantFiled: December 20, 2007Date of Patent: July 12, 2011Assignee: Pitney Bowes Inc.Inventors: Bertrand Haas, Matthew J. Campagna
-
Patent number: 7922208Abstract: An envelope used in voting by mail includes a signature area on which the signature is affixed and a concealing portion structured to cover the signature area thereby concealing the signature. The concealing portion includes a concealing layer that is preferably positioned on top of a protective layer. The protective layer is positioned between the signature area and the concealing layer when the concealing portion covers the signature area. The concealing layer is formed from a material that is normally opaque but becomes at least partially transparent when one or more chemicals are applied to the concealing layer. The protective layer protects the signature from the one or more chemicals since the protective layer is impermeable to the one or more chemicals.Type: GrantFiled: December 11, 2006Date of Patent: April 12, 2011Assignee: Pitney Bowes Inc.Inventors: Bertrand Haas, Douglas B. Quine, Bradley R. Hammell, Matthew J. Campagna
-
Patent number: 7889885Abstract: A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output. The method may also include steps wherein the brightness values are low pass filtered and wherein the values in the selected row are high pass filtered prior to the step of performing a Fourier transform.Type: GrantFiled: November 23, 2005Date of Patent: February 15, 2011Assignee: Pitney Bowes Inc.Inventors: Robert A Cordery, Matthew J Campagna, Thomas J Foth, Bertrand Haas, Douglas B Quine
-
Patent number: 7813503Abstract: A method and deterministic random bit generator system operating in accordance with the method, for generating cryptographic keys and similar secret cryptographic inputs which are hard to guess. A entropy is input from an entropy source; and an initial seed is generated as a function of the entropy input. When a request to generate a cryptographic key is received a temporary seed is generated by applying the function to the seed. The requested cryptographic key is generated by applying a second function to the temporary seed; and output. A new seed is then generated by applying a third function to the temporary seed. In one embodiment of the subject invention all three functions are carried out by applying the same operator to appropriate inputs. In another embodiment of the subject invention new entropy is incorporated into the seed from time to time.Type: GrantFiled: September 13, 2006Date of Patent: October 12, 2010Assignee: Pitney Bowes Inc.Inventors: Matthew J. Campagna, Yiqun Yin
-
Patent number: 7794036Abstract: Print quality is ensured in a postage meter system employing an ink system and having settable modes of printing operation by detecting the type of ink system employed in the postage meter system, setting a first mode of printing operation for the postage meter system when the detected ink system is of a first type and setting a second mode of printing operation for the postage meter system when the detected ink system is of a second type. The detected information may be communicated to a data center to obtain modes of operation for the postage meter system and other corrective actions may be implemented. The method and system are applicable to other consumable item systems employing various types of consumable items.Type: GrantFiled: December 22, 2006Date of Patent: September 14, 2010Assignee: Pitney Bowes Inc.Inventors: Matthew J. Campagna, Gary G. Hansen, Frederick W. Ryan, Jr.
-
Patent number: 7747544Abstract: A method for producing a metered tape and an indicium on a meter tape comprising determining a location on the meter tape where the indicium is to be printed, generating the indicium with information related to the location incorporated therein, and printing the indicium on the meter tape at the location. A method of authenticating an indicium printed on a meter tape comprising retrieving information stored within the indicium, the information identifying a first location where the indicium is supposed to be positioned relative to the meter tape, detecting a spatial indicator identifying a second location where the indicium is actually positioned relative to the meter tape, and comparing the first location to the second location. Mail metering and authenticating systems for implementing the methods are also disclosed.Type: GrantFiled: December 7, 2005Date of Patent: June 29, 2010Assignee: Pitney Bowes Inc.Inventors: Robert A. Cordery, Erik D. N. Monsen, Claude Zeller, Matthew J. Campagna
-
Publication number: 20100111296Abstract: Elliptic curve hash functions are provided which do not require a pre-existing hash function, such as that required by the MuHash. The elliptic curve hash functions can be built from scratch and are collision free and can be incremental. In one embodiment, rather than a pre-existing hash function, the identity function with padding is used; and in another embodiment, rather than a pre-existing hash function, a block cipher with a fixed non-secret key is used.Type: ApplicationFiled: October 30, 2009Publication date: May 6, 2010Applicant: CERTICOM CORP.Inventors: Daniel R.L. Brown, Matthew J. Campagna, Marius Struik
-
Patent number: 7673790Abstract: A vote-by-mail return envelope that includes a pouch portion for containing the ballot and a stub portion on which the voter applies his/her signature and method for processing are provided. Each portion of the envelope contains a respective barcode that identifies the respective portion. When the envelope is received at the vote-counting location, the stub is separated from the pouch, thereby separating the voter's signature, name, etc. from the ballot. The signature is then verified from the stub, and subsequent processing of the pouch uses the pouch barcode identifier as a link to the stub barcode identifier and/or to the result of the signature verification, to determine whether the ballot in the pouch is eligible for counting or whether some remedial procedure is necessary.Type: GrantFiled: June 25, 2007Date of Patent: March 9, 2010Assignee: Pitney Bowes Inc.Inventors: Bertrand Haas, Matthew J. Campagna
-
Publication number: 20100049536Abstract: A method includes receiving a plurality of mail messages. The plurality of mail messages are all appointed for delivery by mail to the same recipient. Each of the mail messages includes a respective account number for the mail recipient. The method further includes combining the received mail messages into a single combined mailpiece addressed to the mail recipient. All of the account numbers included in the mail messages are mutually different from each other.Type: ApplicationFiled: August 21, 2008Publication date: February 25, 2010Applicant: Pitney Bowes Inc.Inventors: Douglas B. Quine, Bradley R. Hammell, Frederick W. Ryan, JR., Matthew J. Campagna, Erik D.N. Monsen, Michael P. Swenson
-
Patent number: 7668786Abstract: A method and system for selecting a characterizing algorithm to be used to characterize blocks of printed material. A digital image of printed material, such as an address block, on an object is obtained, and the image is processed to extract characterizing information descriptive of aspects of the printed material. An indicium representative of the information is then printed on the object. The object's relationship to the indicium can be verified by regenerating the characterizing information from the printed material and comparing the regenerated characterizing information with characterizing information recovered from the indicium. A particular algorithm is selected from a predetermined group of characterizing algorithms by determining an estimate for the robustness of each algorithm.Type: GrantFiled: December 15, 2003Date of Patent: February 23, 2010Assignee: Pitney Bowes Inc.Inventors: Matthew J. Campagna, Danny Lelli