Patents by Inventor W. Hopkins

W. Hopkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090033496
    Abstract: The method and system for a material cabinet for use in cooperation with a plurality of articles stored in the material cabinet is disclosed. Each of the plurality of articles having a radio frequency identification tag attached thereto is connected through at least an antenna or a plurality of antennas installed in the material cabinet to a radio frequency identification reader, which is interpreted through a software in a computer system. This method and system has capability to effectuate point of use control of the stored articles through a database in the computer system. This method and system also implements a security mechanism through a lock system to secure the store articles from unauthorized user/stock clerks.
    Type: Application
    Filed: May 16, 2008
    Publication date: February 5, 2009
    Applicant: American Airlines, Inc.
    Inventors: Jason M. Newton, David W. Hopkins
  • Patent number: 7392384
    Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: June 24, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
  • Publication number: 20080127869
    Abstract: A low NOx Cyclone furnace steam generator including redesigned or modified Cyclone furnaces, air flow distribution, and new or relocated air ports maintains and/or minimizes NOx emission levels from the Cyclone furnace steam generator while minimizing Cyclone furnace and steam generator furnace tube wastage.
    Type: Application
    Filed: February 6, 2006
    Publication date: June 5, 2008
    Inventors: Gerald J. Maringo, George H. Harth, Manvil O. Dahl, Linda P. Dahl, Steven N. Burge, Rosemary Burge, Mitchell W. Hopkins
  • Patent number: 7318160
    Abstract: A method is disclosed for performing cryptographic tasks, that include key setup tasks and work data processing tasks. This method comprises the steps of processing the key data in a first cryptographic engine and processing the work data in a second cryptographic engine. The processing of the key data comprises the steps of receiving key data, processing the key data, and generating processed key data. The processing of the work data comprises the steps of receiving the processed key data, receiving work data, processing the work data, and outputting the processed work data. In this method of the invention, the first cryptographic engine performs its tasks independently of the second cryptographic engine. A method for allocating cryptographic engines in a cryptographic system is also disclosed comprising monitoring a queue of cryptographic tasks, monitoring activity levels of a first allocation of a plurality of cryptographic engines, and dynamically adjusting the first allocation.
    Type: Grant
    Filed: February 1, 2002
    Date of Patent: January 8, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga
  • Publication number: 20070011736
    Abstract: Systems, methods, and apparatus are provided for policy protected cryptographic Application Programming Interfaces (APIs) that are deployed in secure memory. One embodiment is a method of software execution. The method includes executing an application in a first secure memory partition; formatting a request to comply with a pre-defined secure communication protocol; transmitting the request from the application to a cryptographic application programming interface (API) of the application, the API being in a second secure memory partition that is separate and secure from the first secure memory partition; and verifying, in the second secure memory partition, that the request complies with a security policy before executing the request.
    Type: Application
    Filed: July 8, 2005
    Publication date: January 11, 2007
    Inventors: Jeff Kalibjian, Ralph Bestock, Larry Hines, W. Hopkins, Vladimir Libershteyn, Steven Wierenga, Susan Langford
  • Patent number: 7093133
    Abstract: A method is provided for generating a group digital signature wherein each of a group of individuals may sign a message M to create a group digital signature S, wherein M corresponds to a number representative of a message, 0?M?n?1, n is a composite number formed from the product of a number k of distinct random prime factors p1·p2· . . . ·pk, k is an integer greater than 2, and S?Md(mod n). The method may include: performing a first partial digital signature subtask on a message M using a first individual private key to produce a first partial digital signature S1; performing at least a second partial digital signature subtask on the message M using a second individual private key to produce a second partial digital signature S2; and combining the partial digital signature results to produce a group digital signature S.
    Type: Grant
    Filed: December 20, 2001
    Date of Patent: August 15, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga
  • Patent number: 6938402
    Abstract: Mowing blades which include a one-piece member having a drive mechanism coupling section, a deformation section and a cutting section. When the mowing blades receive a particular load from an obstructing object, the deformation section deforms, dissipates energy and reduces damage to drive mechanisms of mowing machines.
    Type: Grant
    Filed: November 1, 2002
    Date of Patent: September 6, 2005
    Assignee: Deere & Company
    Inventors: Jack E. Arfstrom, John W. Hopkins, David J. Pahl
  • Publication number: 20050190912
    Abstract: A method and apparatus provides cryptographic parameters for use in cryptographic applications in response to requests therefor. The method includes the steps of: pre-computing one or more different types of sets of cryptographic parameters, each the type of set being adapted for use by an associated type of cryptographic application; securely storing the pre-computed sets of cryptographic parameters in a memory storage unit; receiving a request for a set of cryptographic parameters having specified characteristics for use in a particular cryptographic application; determining one of the sets of cryptographic parameters stored in the memory storage unit that has specified characteristics; accessing the determined set of cryptographic parameters from the memory storage unit; and providing the determined set of cryptographic parameters with minimal latency.
    Type: Application
    Filed: March 26, 2001
    Publication date: September 1, 2005
    Inventors: W. Hopkins, Thomas Collins, Steven Wierenga, Larry Hines
  • Publication number: 20050172137
    Abstract: A key management technique establishes a secure channel through an indeterminate number of nodes in a network. The technique comprises enrolling a smart card with a unique key per smart card. The unique key is derived from a private key that is assigned and distinctive to systems and a card base of a card issuer. An enrolled smart card contains a stored public entity-identifier and the secret unique key. The technique further comprises transacting at a point of entry to the network. The transaction creates a PIN encryption key derived from the smart card unique key and a transaction identifier that uniquely identifies the point of entry and transaction sequence number. The technique also comprises communicating the PIN encryption key point-to-point in encrypted form through a plurality of nodes in the network, and recovering the PIN at a card issuer server from the PIN encryption key using the card issuer private key.
    Type: Application
    Filed: February 3, 2004
    Publication date: August 4, 2005
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventor: W. Hopkins
  • Publication number: 20050156029
    Abstract: A method for off-line Personal Identification Number (PIN) verification using a smart card accessed on an off-line terminal comprises creating a unique secret key for an enrolled smart card using a card issuer private key, and generating signatures on an entered PIN using the unique key. The signatures are verifiable by the smart card and/or the terminal.
    Type: Application
    Filed: January 20, 2004
    Publication date: July 21, 2005
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventor: W. Hopkins
  • Patent number: 6918216
    Abstract: A square skylight panel is vacuum-formed of light transmitting sheet plastic and has a lower peripheral flange which projects under roof shingles. The skylight panel covers a one-piece upper coupler member which is vacuum-formed of light transmitting sheet plastic and has an upper flange projecting under the skylight panel flange. A flexible and collapsible cylindrical tube has an upper end portion surrounding a lower wall portion of the upper coupler member and a lower end portion surrounding an upper wall portion of a similarly formed lower coupler member having a bottom flange received within a square frame attached to a ceiling and supporting a light diffusing ceiling panel. The skylight panel, upper and lower coupler members and ceiling panel define three dead air chambers providing for high thermal insulation, and the upper coupler member provides natural light into the attic between the roof and ceiling.
    Type: Grant
    Filed: August 20, 2003
    Date of Patent: July 19, 2005
    Assignee: Fox Lite, Inc.
    Inventors: Walter S. Hoy, Mark W. Hopkins
  • Publication number: 20050149739
    Abstract: A PIN verification apparatus comprises a plurality of cipher blocks linked in a Cipher Block Chain (CBC) and keyed with a secret PIN Verification Key (PVK). A first input block is coupled to a first cipher block in the CBC chain and is configured to receive a plaintext block derived from a secret PIN. A second input block is coupled to a second cipher block in the CBC chain capable of receiving a plaintext block derived from a non-secret entity-identifier and ciphertext from a cipher block in the CBC chain.
    Type: Application
    Filed: December 31, 2003
    Publication date: July 7, 2005
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: W. Hopkins, Steven Wierenga, Ching-Hsuan Chen, Jack Schifando
  • Publication number: 20050139657
    Abstract: A technique for on-line Personal Identification Number (PIN) verification uses polynomial hiding. The technique comprises enrolling a smart card, including initializing a smart card with an entity-selected PIN hidden in a polynomial over a finite field. The initialization polynomial is a function of the PIN, an entity-identifier, and a random number. The random number and the PIN are discarded after smart card initialization.
    Type: Application
    Filed: December 31, 2003
    Publication date: June 30, 2005
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventor: W. Hopkins
  • Patent number: 6856436
    Abstract: A scanning light source system combines the outputs from multiple, spatially separated, sequentially pulsed light sources for travel in rapid succession along one or more common delivery paths to provide one or more collective outputs that are comparatively higher than would otherwise be possible with the light sources operating singly.
    Type: Grant
    Filed: June 23, 2003
    Date of Patent: February 15, 2005
    Assignee: Innovations In Optics, Inc.
    Inventors: Thomas J. Brukilacchio, John R. Householder, Patrick W. Hopkins
  • Publication number: 20040083700
    Abstract: The present invention relates to mowing blades, which in one embodiment, include a one-piece member having a drive mechanism coupling section, a deformation section and a cutting section. When the mowing blades receive a particular load from an obstructing object, the deformation section deforms, dissipates energy and reduces damage to drive mechanisms of mowing machines.
    Type: Application
    Filed: November 1, 2002
    Publication date: May 6, 2004
    Inventors: Jack E. Arfstrom, John W. Hopkins, David J. Pahl
  • Publication number: 20040001595
    Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Applicant: Compaq Information technologies Group, L.P.
    Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
  • Publication number: 20040003246
    Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and MAC fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A MAC algorithm is applied across the key and control for generating a MAC field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
    Type: Application
    Filed: June 28, 2002
    Publication date: January 1, 2004
    Applicant: Compaq Information Technologies Group, L.P.
    Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
  • Publication number: 20040001239
    Abstract: A scanning light source system combines the outputs from multiple, spatially separated, sequentially pulsed light sources for travel in rapid succession along one or more common delivery paths to provide one or more collective outputs that are comparatively higher than would otherwise be possible with the light sources operating singly.
    Type: Application
    Filed: June 23, 2003
    Publication date: January 1, 2004
    Inventors: Thomas J. Brukilacchio, John R. Householder, Patrick W. Hopkins
  • Patent number: 6604329
    Abstract: An elongated open ended tube has a square or rectangular cross-section and light reflecting inner surfaces. The tube is formed with flat semi-rigid side walls flexibly connected at the corners for collapsing or folding the tube between a generally flat storage and shipping position and an expanded tubular position for installation. The tube extends within an attic of a building with its upper open end portion covered by a light transmitting skylight attached to the roof of the building and its lower open end portion covered by a light transmitting and diffusing panel or lens attached to a ceiling of the building.
    Type: Grant
    Filed: December 18, 2001
    Date of Patent: August 12, 2003
    Assignee: Fox Lite, Inc.
    Inventors: Walter S. Hoy, Gary F. Cunagin, Mark W. Hopkins
  • Publication number: 20030149883
    Abstract: A method is disclosed for performing cryptographic tasks, that include key setup tasks and work data processing tasks. This method comprises the steps of processing the key data in a first cryptographic engine and processing the work data in a second cryptographic engine. The processing of the key data comprises the steps of receiving key data, processing the key data, and generating processed key data. The processing of the work data comprises the steps of receiving the processed key data, receiving work data, processing the work data, and outputting the processed work data. In this method of the invention, the first cryptographic engine performs its tasks independently of the second cryptographic engine. A method for allocating cryptographic engines in a cryptographic system is also disclosed comprising monitoring a queue of cryptographic tasks, monitoring activity levels of a first allocation of a plurality of cryptographic engines, and dynamically adjusting the first allocation.
    Type: Application
    Filed: February 1, 2002
    Publication date: August 7, 2003
    Inventors: Dale W. Hopkins, Thomas W. Collins, Steven W. Wierenga