Patents by Inventor Thomas A. Berson
Thomas A. Berson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8818474Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.Type: GrantFiled: May 25, 2012Date of Patent: August 26, 2014Assignee: Covidien LPInventors: Thomas A. Berson, Bryan Olson, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Publication number: 20120237022Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.Type: ApplicationFiled: May 25, 2012Publication date: September 20, 2012Applicant: TYCO HEALTHCARE GROUP LPInventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Patent number: 8190226Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.Type: GrantFiled: May 6, 2008Date of Patent: May 29, 2012Assignee: Tyco Healthcare Group LPInventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Patent number: 7522949Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensures the code is accurate.Type: GrantFiled: February 10, 2004Date of Patent: April 21, 2009Assignee: Nellcor Puritan Bennett IncorporatedInventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Publication number: 20080287757Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.Type: ApplicationFiled: May 6, 2008Publication date: November 20, 2008Applicant: Mallinckrodt Inc.Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Patent number: 7421583Abstract: A system, method and article of manufacture are provided for pricing a cryptographic service. A request for a cryptographic service is received. An identification is made of one or more of a computational burden required to perform the cryptographic service, a privacy level of the cryptographic service, and/or a speed of performing the cryptographic service. A price of the cryptographic service is determined based on the computational burden, privacy level, and/or speed. A method is also provided for pricing a cryptographic service based on a compactness of a cryptographic message. A request for encrypting a message is received. The message is encrypted and is also compressed during the encryption. An amount of compression of the message is determined. A price of the encryption is determined based on the amount of compression.Type: GrantFiled: June 19, 2000Date of Patent: September 2, 2008Inventors: Thomas A Berson, R Drews Dean, Matthew K Franklin, Teresa F Lunt, Diana K Smetters
-
Patent number: 7400732Abstract: Systems and methods that allow the formation and distribution of session keys amongst a dynamic group of users communicating over an unreliable, or lossy, network.Type: GrantFiled: September 27, 2002Date of Patent: July 15, 2008Assignee: Xerox CorporationInventors: Jessica N. Staddon, Thomas A. Berson, Matthew Franklin, Sara More, Michael Malkin, Ralph C. Merkle, Dirk Balfanz
-
Patent number: 7383442Abstract: An apparatus and method provides one or more controlled, dynamically loaded, modular, cryptographic fillers. Fillers may be loaded by a single loader, multiple independent loaders, or nested loaders. Loaders may be adapted to load other loaders, within cryptographic controls extant and applicable thereto. Integration into a base executable having one or more slots, minimizes, controls, and links the interface between the fillers and base executables. The filler may itself operate recursively to load another filler in nested operations, whether or not the fillers are in nested relation to one another. An ability of any filler to be loaded may be controlled by the base executable verifying the integrity, authorization, or both for any filler. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy may limit each module function, access, and potential for modification or substitution.Type: GrantFiled: October 24, 2002Date of Patent: June 3, 2008Assignee: Novell, Inc.Inventors: Roger R. Schell, Kevin W. Kingdon, Thomas A. Berson
-
Patent number: 7051199Abstract: A system, method and article of manufacture are provided for affording a cryptographic service utilizing a server on a network. Initially, a client is identified utilizing the network. A first key is established, and a tunnel is generated on the network. Thereafter, information is received at the server from the client utilizing the tunnel. Such information is encrypted by the client using the first key. At the server, cryptographic work is performed using the first key.Type: GrantFiled: June 19, 2000Date of Patent: May 23, 2006Assignee: Xerox CorporationInventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Diana K. Smetters
-
Patent number: 7003668Abstract: An intermediate system provides remote clients with access to a primary system, such as a server. The intermediate system creates and stores a log-in record for each client. The log-in record contains an encrypted primary system client identifier (PSCI). The PSCI contains authentication information for verifying a client's right to access the primary system. Storing an encrypted version of the PSCI enhances the security of the authentication information on the intermediate system. In some implementations of the present invention, the PSCI itself is an encrypted value. When a client attempts to log into the primary system, the intermediate system initially verifies the client's intermediate system access rights. The intermediate system makes this determination using the log-in record and data provided by the client. Next, the intermediate system sends the PSCI to the client's primary system for further authentication. The primary system uses the PSCI to verify the client's right to access primary system data.Type: GrantFiled: November 2, 2001Date of Patent: February 21, 2006Assignee: Fusionone, Inc.Inventors: Thomas A. Berson, Stephen M. Rudy
-
Patent number: 6990468Abstract: A system, method, and article of manufacture are provided for pricing a cryptographic service on a network utilizing one or more cryptoservers. A request for a cryptographic service is received from a user utilizing a network. The request is received by a cryptographic service provider. A contract is generated based on a variable pricing scheme in response to the request. The contract is sent from the cryptographic service provider to the user utilizing the network. A method is also provided for auditing a security provision on a network utilizing a cryptoserver. A cryptographic key is obtained such as by obtaining it from a trusted source or generating the key. A plurality of users are allowed to request that a cryptoserver use the cryptographic key to sign a message in violation of a security provision. It is determined whether the cryptoserver signed the message in response to the request.Type: GrantFiled: June 19, 2000Date of Patent: January 24, 2006Assignee: Xerox CorporationInventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F Lunt, Diana K. Smetters
-
Patent number: 6970259Abstract: A print management system includes a policy that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers are managed by a print management system. Each printer can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system routes the print job to a printer that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document.Type: GrantFiled: November 28, 2000Date of Patent: November 29, 2005Assignee: Xerox CorporationInventors: Teresa F. Lunt, Matthew K. Franklin, David L. Hecht, Thomas A. Berson, Mark J. Stefik, R. Drew Dean, Alan G. Bell, Thomas M. Breuel, Todd A. Cass, Douglas N. Curry, Daniel H. Greene, Robert T. Krivacic
-
Patent number: 6938154Abstract: A system, method and article of manufacture are provided for secure operation of a network device. A digital certificate is assigned to a network user. A command for operation of a network device and the digital certificate are received from the network user. A cryptographic key stored in the network device is utilized to authenticate the digital certificate of the network user. Operation of the network device is enabled if the digital certificate of the network user is authenticated. According to another aspect of the present invention, a system, method and article of manufacture are provided for secure identification of a network device. A digital certificate is assigned to a network device. A command for operation of the network device is received from a network user. The digital certificate is sent to the network user. The network user utilizes a cryptographic key to authenticate the digital certificate of the network device.Type: GrantFiled: June 19, 2000Date of Patent: August 30, 2005Assignee: Xerox CorporationInventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, Diana K. Smetters
-
Patent number: 6802000Abstract: A system for controlling access to online content referenced in a hardcopy document. A user requesting access to online content available on a server responds to an authentication challenge from the server using a password mechanism printed in the hardcopy document. The password mechanism allows the user to identify a password for responding to an authentication request by the server. After authenticating the user, the server initiates a state change to enable subsequent access to the online content by the user with a different password that is also identified with the password mechanism.Type: GrantFiled: October 28, 1999Date of Patent: October 5, 2004Assignee: Xerox CorporationInventors: Daniel H. Greene, R. Drews Dean, Thomas A. Berson
-
Publication number: 20040162472Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensures the code is accurate.Type: ApplicationFiled: February 10, 2004Publication date: August 19, 2004Applicant: Nellcor Puritan Bennett IncorporatedInventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Patent number: 6754821Abstract: A system, method and article of manufacture are provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is sent to a server utilizing a network upon reaching a state in the application. The request includes a state key associated with the state. A reply is received from the server in response to the request. The reply includes an access key for providing the access if the state key is valid. According to another embodiment of the present invention, a method is provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is received from a client to a server utilizing a network. The state key is verified at the server. A reply is sent from the server in response to the request. The reply includes an access key for providing the access if the state key is verified.Type: GrantFiled: June 19, 2000Date of Patent: June 22, 2004Assignee: Xerox CorporationInventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, Diana K. Smetters
-
Patent number: 6751735Abstract: An apparatus and method provide a controlled, dynamically loaded, modular, cryptographic implementation for integration of flexible policy implementations on policy engines, and the like, into a base executable having at least one slot. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy module may be included for use in limiting each module's function, access, and potential for modification or substitution. The policy may be implemented organically within a manager layer or may be modularized further in an underlying engine layer as an independent policy, or as a policy created by a policy engine existing in an engine layer. The policy module is subordinate to the manager module in the manager layer in that the manager module calls the policy module when it is needed by the manager module. The policy module is preferably dynamically linkable, providing flexibility, and is layered deeper within the filler module than the manager module.Type: GrantFiled: May 26, 1999Date of Patent: June 15, 2004Assignee: Novell, Inc.Inventors: Roger R. Schell, Kevin W. Kingdon, Thomas A. Berson, Robert R. Jueneman
-
Patent number: 6708049Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensures the code is accurate.Type: GrantFiled: September 14, 2000Date of Patent: March 16, 2004Assignee: Nellcor Puritan Bennett IncorporatedInventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
-
Patent number: 6701433Abstract: An apparatus and method provide a controlled, dynamically loaded, modular, cryptographic implementation for integration of flexible policy implementations on policy engines, and the like, into a base executable having at least one slot. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy module may be included for use in limiting each module's function, access, and potential for modification or substitution. The policy may be implemented organically within a manager layer or may be modularized further in an underlying engine layer as an independent policy, or as a policy created by a policy engine existing in an engine layer. The policy module is subordinate to the manager module in the manager layer in that the manager module calls the policy module when it is needed by the manager module. The policy module is preferably dynamically linkable, providing flexibility, and is layered deeper within the filler module than the manager module.Type: GrantFiled: March 23, 1999Date of Patent: March 2, 2004Assignee: Novell, Inc.Inventors: Roger R. Schell, Kevin W. Kingdon, Thomas A. Berson, Robert R. Jueneman
-
Publication number: 20040017916Abstract: Systems and methods that allow the formation and distribution of session keys amongst a dynamic group of users communicating over an unreliable, or lossy, network.Type: ApplicationFiled: September 27, 2002Publication date: January 29, 2004Applicant: XEROX CORPORATIONInventors: Jessica N. Staddon, Thomas A. Berson, Matthew Franklin, Sara More, Michael Malkin, Ralph C. Merkle, Dirk Balfanz