Patents by Inventor Thomas O. Matthews

Thomas O. Matthews has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7305710
    Abstract: In a value dispensing system, a system and method for securely loading and executing software in a secure device that does not include any non-volatile programmable memory is provided. A non-secure portion of the value dispensing system stores software for loading into the secure portion when needed. Commands being sent to the secure printer are monitored to determine if the secure has the necessary software to execute the command. If the secure device currently does not have the necessary software to execute the command, the command is delayed and the proper software is loaded from the non-secure portion to the RAM of the secure device. A signature associated with the software is verified to ensure the authenticity of the software. If the signature is verified, the command is passed to the secure device, and, utilizing the software in the RAM, the command is executed by the secure device.
    Type: Grant
    Filed: April 29, 2003
    Date of Patent: December 4, 2007
    Assignee: Pitney Bowes Inc.
    Inventors: G. Thomas Athens, Robert G. Arsenault, Walter J. Baker, John A. Hurd, Wesley A. Kirschner, Roger J. Ratzenberger, Jr., Albert P. Jacques, Thomas O. Matthews
  • Publication number: 20040221175
    Abstract: In a value dispensing system, a system and method for securely loading and executing software in a secure device that does not include any non-volatile programmable memory is provided. A non-secure portion of the value dispensing system stores software for loading into the secure portion when needed. Commands being sent to the secure printer are monitored to determine if the secure has the necessary software to execute the command. If the secure device currently does not have the necessary software to execute the command, the command is delayed and the proper software is loaded from the non-secure portion to the RAM of the secure device. A signature associated with the software is verified to ensure the authenticity of the software. If the signature is verified, the command is passed to the secure device, and, utilizing the software in the RAM, the command is executed by the secure device.
    Type: Application
    Filed: April 29, 2003
    Publication date: November 4, 2004
    Applicant: Pitney Bowes Incorporated
    Inventors: G. Thomas Athens, Robert G. Arsenault, Walter J. Baker, John A. Hurd, Wesley A. Kirschner, Roger J. Ratzenberger, Albert P. Jacques, Thomas O. Matthews