Patents by Inventor Thomas A. Berson

Thomas A. Berson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8818474
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: August 26, 2014
    Assignee: Covidien LP
    Inventors: Thomas A. Berson, Bryan Olson, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Publication number: 20120237022
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.
    Type: Application
    Filed: May 25, 2012
    Publication date: September 20, 2012
    Applicant: TYCO HEALTHCARE GROUP LP
    Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Patent number: 8190226
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.
    Type: Grant
    Filed: May 6, 2008
    Date of Patent: May 29, 2012
    Assignee: Tyco Healthcare Group LP
    Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Patent number: 7522949
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensures the code is accurate.
    Type: Grant
    Filed: February 10, 2004
    Date of Patent: April 21, 2009
    Assignee: Nellcor Puritan Bennett Incorporated
    Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Publication number: 20080287757
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensure the code is accurate.
    Type: Application
    Filed: May 6, 2008
    Publication date: November 20, 2008
    Applicant: Mallinckrodt Inc.
    Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Patent number: 7421583
    Abstract: A system, method and article of manufacture are provided for pricing a cryptographic service. A request for a cryptographic service is received. An identification is made of one or more of a computational burden required to perform the cryptographic service, a privacy level of the cryptographic service, and/or a speed of performing the cryptographic service. A price of the cryptographic service is determined based on the computational burden, privacy level, and/or speed. A method is also provided for pricing a cryptographic service based on a compactness of a cryptographic message. A request for encrypting a message is received. The message is encrypted and is also compressed during the encryption. An amount of compression of the message is determined. A price of the encryption is determined based on the amount of compression.
    Type: Grant
    Filed: June 19, 2000
    Date of Patent: September 2, 2008
    Inventors: Thomas A Berson, R Drews Dean, Matthew K Franklin, Teresa F Lunt, Diana K Smetters
  • Patent number: 7400732
    Abstract: Systems and methods that allow the formation and distribution of session keys amongst a dynamic group of users communicating over an unreliable, or lossy, network.
    Type: Grant
    Filed: September 27, 2002
    Date of Patent: July 15, 2008
    Assignee: Xerox Corporation
    Inventors: Jessica N. Staddon, Thomas A. Berson, Matthew Franklin, Sara More, Michael Malkin, Ralph C. Merkle, Dirk Balfanz
  • Patent number: 7383442
    Abstract: An apparatus and method provides one or more controlled, dynamically loaded, modular, cryptographic fillers. Fillers may be loaded by a single loader, multiple independent loaders, or nested loaders. Loaders may be adapted to load other loaders, within cryptographic controls extant and applicable thereto. Integration into a base executable having one or more slots, minimizes, controls, and links the interface between the fillers and base executables. The filler may itself operate recursively to load another filler in nested operations, whether or not the fillers are in nested relation to one another. An ability of any filler to be loaded may be controlled by the base executable verifying the integrity, authorization, or both for any filler. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy may limit each module function, access, and potential for modification or substitution.
    Type: Grant
    Filed: October 24, 2002
    Date of Patent: June 3, 2008
    Assignee: Novell, Inc.
    Inventors: Roger R. Schell, Kevin W. Kingdon, Thomas A. Berson
  • Patent number: 7051199
    Abstract: A system, method and article of manufacture are provided for affording a cryptographic service utilizing a server on a network. Initially, a client is identified utilizing the network. A first key is established, and a tunnel is generated on the network. Thereafter, information is received at the server from the client utilizing the tunnel. Such information is encrypted by the client using the first key. At the server, cryptographic work is performed using the first key.
    Type: Grant
    Filed: June 19, 2000
    Date of Patent: May 23, 2006
    Assignee: Xerox Corporation
    Inventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Diana K. Smetters
  • Patent number: 7003668
    Abstract: An intermediate system provides remote clients with access to a primary system, such as a server. The intermediate system creates and stores a log-in record for each client. The log-in record contains an encrypted primary system client identifier (PSCI). The PSCI contains authentication information for verifying a client's right to access the primary system. Storing an encrypted version of the PSCI enhances the security of the authentication information on the intermediate system. In some implementations of the present invention, the PSCI itself is an encrypted value. When a client attempts to log into the primary system, the intermediate system initially verifies the client's intermediate system access rights. The intermediate system makes this determination using the log-in record and data provided by the client. Next, the intermediate system sends the PSCI to the client's primary system for further authentication. The primary system uses the PSCI to verify the client's right to access primary system data.
    Type: Grant
    Filed: November 2, 2001
    Date of Patent: February 21, 2006
    Assignee: Fusionone, Inc.
    Inventors: Thomas A. Berson, Stephen M. Rudy
  • Patent number: 6990468
    Abstract: A system, method, and article of manufacture are provided for pricing a cryptographic service on a network utilizing one or more cryptoservers. A request for a cryptographic service is received from a user utilizing a network. The request is received by a cryptographic service provider. A contract is generated based on a variable pricing scheme in response to the request. The contract is sent from the cryptographic service provider to the user utilizing the network. A method is also provided for auditing a security provision on a network utilizing a cryptoserver. A cryptographic key is obtained such as by obtaining it from a trusted source or generating the key. A plurality of users are allowed to request that a cryptoserver use the cryptographic key to sign a message in violation of a security provision. It is determined whether the cryptoserver signed the message in response to the request.
    Type: Grant
    Filed: June 19, 2000
    Date of Patent: January 24, 2006
    Assignee: Xerox Corporation
    Inventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F Lunt, Diana K. Smetters
  • Patent number: 6970259
    Abstract: A print management system includes a policy that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers are managed by a print management system. Each printer can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system routes the print job to a printer that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document.
    Type: Grant
    Filed: November 28, 2000
    Date of Patent: November 29, 2005
    Assignee: Xerox Corporation
    Inventors: Teresa F. Lunt, Matthew K. Franklin, David L. Hecht, Thomas A. Berson, Mark J. Stefik, R. Drew Dean, Alan G. Bell, Thomas M. Breuel, Todd A. Cass, Douglas N. Curry, Daniel H. Greene, Robert T. Krivacic
  • Patent number: 6938154
    Abstract: A system, method and article of manufacture are provided for secure operation of a network device. A digital certificate is assigned to a network user. A command for operation of a network device and the digital certificate are received from the network user. A cryptographic key stored in the network device is utilized to authenticate the digital certificate of the network user. Operation of the network device is enabled if the digital certificate of the network user is authenticated. According to another aspect of the present invention, a system, method and article of manufacture are provided for secure identification of a network device. A digital certificate is assigned to a network device. A command for operation of the network device is received from a network user. The digital certificate is sent to the network user. The network user utilizes a cryptographic key to authenticate the digital certificate of the network device.
    Type: Grant
    Filed: June 19, 2000
    Date of Patent: August 30, 2005
    Assignee: Xerox Corporation
    Inventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, Diana K. Smetters
  • Patent number: 6802000
    Abstract: A system for controlling access to online content referenced in a hardcopy document. A user requesting access to online content available on a server responds to an authentication challenge from the server using a password mechanism printed in the hardcopy document. The password mechanism allows the user to identify a password for responding to an authentication request by the server. After authenticating the user, the server initiates a state change to enable subsequent access to the online content by the user with a different password that is also identified with the password mechanism.
    Type: Grant
    Filed: October 28, 1999
    Date of Patent: October 5, 2004
    Assignee: Xerox Corporation
    Inventors: Daniel H. Greene, R. Drews Dean, Thomas A. Berson
  • Publication number: 20040162472
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensures the code is accurate.
    Type: Application
    Filed: February 10, 2004
    Publication date: August 19, 2004
    Applicant: Nellcor Puritan Bennett Incorporated
    Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Patent number: 6754821
    Abstract: A system, method and article of manufacture are provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is sent to a server utilizing a network upon reaching a state in the application. The request includes a state key associated with the state. A reply is received from the server in response to the request. The reply includes an access key for providing the access if the state key is valid. According to another embodiment of the present invention, a method is provided for transition state-based cryptography in an application including at least one state having a state key associated with it. A request for access is received from a client to a server utilizing a network. The state key is verified at the server. A reply is sent from the server in response to the request. The reply includes an access key for providing the access if the state key is verified.
    Type: Grant
    Filed: June 19, 2000
    Date of Patent: June 22, 2004
    Assignee: Xerox Corporation
    Inventors: Thomas A. Berson, R. Drews Dean, Matthew K. Franklin, Teresa F. Lunt, Diana K. Smetters
  • Patent number: 6751735
    Abstract: An apparatus and method provide a controlled, dynamically loaded, modular, cryptographic implementation for integration of flexible policy implementations on policy engines, and the like, into a base executable having at least one slot. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy module may be included for use in limiting each module's function, access, and potential for modification or substitution. The policy may be implemented organically within a manager layer or may be modularized further in an underlying engine layer as an independent policy, or as a policy created by a policy engine existing in an engine layer. The policy module is subordinate to the manager module in the manager layer in that the manager module calls the policy module when it is needed by the manager module. The policy module is preferably dynamically linkable, providing flexibility, and is layered deeper within the filler module than the manager module.
    Type: Grant
    Filed: May 26, 1999
    Date of Patent: June 15, 2004
    Assignee: Novell, Inc.
    Inventors: Roger R. Schell, Kevin W. Kingdon, Thomas A. Berson, Robert R. Jueneman
  • Patent number: 6708049
    Abstract: A sensor has codes useful for a monitor which can be authenticated as accurate. The sensor produces a signal corresponding to a measured physiological characteristic and provides codes which can be assured of being accurate and authentic when used by a monitor. A memory associated with the sensor stores both data relating to the sensor and a digital signature. The digital signature authenticates the quality of the code by ensuring it was generated by an entity having predetermined quality controls, and ensures the code is accurate.
    Type: Grant
    Filed: September 14, 2000
    Date of Patent: March 16, 2004
    Assignee: Nellcor Puritan Bennett Incorporated
    Inventors: Thomas A. Berson, Bryan Olson, Michael E. Fein, Paul D. Mannheimer, Charles E. Porges, David Schloemer
  • Patent number: 6701433
    Abstract: An apparatus and method provide a controlled, dynamically loaded, modular, cryptographic implementation for integration of flexible policy implementations on policy engines, and the like, into a base executable having at least one slot. The base executable may rely on an integrated loader to control loading and linking of fillers and submodules. A policy module may be included for use in limiting each module's function, access, and potential for modification or substitution. The policy may be implemented organically within a manager layer or may be modularized further in an underlying engine layer as an independent policy, or as a policy created by a policy engine existing in an engine layer. The policy module is subordinate to the manager module in the manager layer in that the manager module calls the policy module when it is needed by the manager module. The policy module is preferably dynamically linkable, providing flexibility, and is layered deeper within the filler module than the manager module.
    Type: Grant
    Filed: March 23, 1999
    Date of Patent: March 2, 2004
    Assignee: Novell, Inc.
    Inventors: Roger R. Schell, Kevin W. Kingdon, Thomas A. Berson, Robert R. Jueneman
  • Publication number: 20040017916
    Abstract: Systems and methods that allow the formation and distribution of session keys amongst a dynamic group of users communicating over an unreliable, or lossy, network.
    Type: Application
    Filed: September 27, 2002
    Publication date: January 29, 2004
    Applicant: XEROX CORPORATION
    Inventors: Jessica N. Staddon, Thomas A. Berson, Matthew Franklin, Sara More, Michael Malkin, Ralph C. Merkle, Dirk Balfanz