Patents by Inventor William C. Martin
William C. Martin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 5412313Abstract: A method and apparatus for testing the functionality of a circuit are disclosed which reduce the number of vectors required to simulate and test cells having, for example, similar functions. By using a number of vectors which is independent of the number of cells or blocks in the circuit, the need for multiple test modes is reduced such that the time and cost associated with a functionality test can be reduced.Type: GrantFiled: October 9, 1992Date of Patent: May 2, 1995Assignee: VLSI Technology, Inc.Inventor: William C. Martin
-
Patent number: 5265164Abstract: A computer apparatus, program and method function in a data processing system to replicate a cryptographic facility. The system includes a first cryptographic facility containing a portable part which personalizes the first cryptographic facility. The system also includes a second cryptographic facility which is linked to the first cryptographic facility by a public key cryptographic system. The portable part of the first cryptographic facility is encrypted and transferred to the second cryptographic facility, where it is decrypted and used to personalize the second cryptographic facility to enable replication of the first cryptographic facility. In one application, personalization of the second cryptographic facility can be in response to the detection of a failure in the first cryptographic facility. In another application, multiple cryptographic facilities can be brought on-line for parallel operation in the data processing system.Type: GrantFiled: October 31, 1991Date of Patent: November 23, 1993Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin, William S. Rohland, John D. Wilkins
-
Patent number: 5200999Abstract: A data processing system, method and program are disclosed, for managing a public key cryptographic system. The method includes the steps of generating a first public key and a first private key as a first pair in the data processing system, for use with a first public key algorithm and further generating a second public key and a second private key as a second pair in the data processing system, for use with a second public key algorithm. The method then continues by assigning a private control vector for the first private key and the second private key in the data processing system, for defining permitted uses for the first and second private keys. Then the method continues by forming a private key record which includes the first private key and the second private key in the data processing system, and encrypting the private key record under a first master key expression which is a function of the private control vector.Type: GrantFiled: September 27, 1991Date of Patent: April 6, 1993Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin, William S. Rohland, John D. Wilkins
-
Patent number: 5192881Abstract: Circuitry within a device provides an output signal to an output pad of the device. One of a plurality of current levels is selected. When a first current level is selected, the circuitry generates only a first amount of current to maintain the output signal on the output pad. When a second current level is selected, the circuitry, in addition to the first amount of current, generates a second amount of current to maintain the output signal on the output pad. The first current level may be used in a test mode. In this way high current switching noise can be eliminated during testing. The second current level may then be used in a normal operating mode.Type: GrantFiled: June 28, 1991Date of Patent: March 9, 1993Assignee: VLSI Technology, Inc.Inventor: William C. Martin
-
Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
Patent number: 5164988Abstract: Device A in a public key cryptographic network will be constrained to continue to faithfully practice a security policy dictated by a network certification center, long after device A's public key PUMa has been certified. If device A alters its operations from the limits encoded in its configuration vector, for example by loading a new configuration vector, device A will be denied participation in the network. To accomplish this enforcement of the network security policy dictated by the certification center, it is necessary for the certification center to verify at the time device A requests certification of its public key PUMa, that device A is configured with the currently authorized configuration vector. Device A is required to transmit to the certification center a copy of device A's current configuration vector, in an audit record. the certification center then compares device A's copy of the configuration vector with the authorized configuration vector for device A stored at the certification center.Type: GrantFiled: October 31, 1991Date of Patent: November 17, 1992Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin, William S. Rohland, John D. Wilkins -
Patent number: 5149987Abstract: An electronic device is reset using a reset line internal to the electronic device. The electronic device includes internal logic circuitry which performs logic operations. An internal logic power signal input to the electronic device is connected to an internal logic power signal line. The internal logic power signal line is used to deliver an internal logic power signal to the internal logic circuitry. The electronic device also includes a plurality of outputs. A plurality of output drivers buffer output signals generated by the internal logic circuitry. The output drivers place the output signals on the plurality of outputs. The electronic device additionally includes an output power signal input connected to an output power signal line. The output power signal line is used to deliver an output power signal from the output power signal input to the output drivers. A reset line, connected to the output power signal line and to the internal logic circuitry, is used to reset the internal logic circuitry.Type: GrantFiled: August 19, 1991Date of Patent: September 22, 1992Assignee: VLSI Technology, Inc.Inventor: William C. Martin
-
Patent number: 5142578Abstract: The patent describes a method and apparatus for securely distributing an initial Data Encryption Algorithm (DEA) key-encrypting key by encrypting a key record (consisting of the key-encrypting key and control information associated with that key-encrypting key) using a public key algorithm and a public key belonging to the intended recipient of the key record. The patent further describes a method and apparatus for securely recovering the distributed key-encrypting key by the recipient by decrypting the received key record using the same public key algorithm and private key associated with the public key and re-encrypting the key-encrypting key under a key formed by arithmetically combining the recipient's master key with a control vector contained in the control information of the received key record.Type: GrantFiled: August 22, 1991Date of Patent: August 25, 1992Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, John D. Wilkins, William C. Martin, William S. Rohland
-
Patent number: 5088061Abstract: A method and apparatus are disclosed for storing and accessing information of both asynchronous and synchronous devices using, for example, pointers having grey code counters which reduce code conversion logic and which are less susceptible to clock glitches, such as improper clock pulses due to internal circuit timing errors. Because the devices are less clock dependent, they do not require the imposition of critical paths during the placement and routing of a circuit layout. Further, fast and reliable accessing of information stored in memory devices can be achieved by multiplexing output bits addressed, for example, via the aforementioned grey code pointers.Type: GrantFiled: July 24, 1990Date of Patent: February 11, 1992Assignee: VLSI Technology, Inc.Inventors: Habib Golnabi, William C. Martin, Timothy J. Powers
-
Patent number: 5073934Abstract: A method and apparatus in a public crypto system, control the use of a public key, based on the level of import integrity for the public key. The method and apparatus generate a control vector associated with the public key, having a history field. The public key and the control vector are transmitted from the location of generation over a communications link to a receiving location, using the selected one of a plurality of levels of import integrity for the transmission. At the receiving location, the public key and the control vector are tested to determine the actual level of import integrity for the transmission. Then, a value is written into the history field of the control vector which characterizes the actual level of import integrity.Type: GrantFiled: October 24, 1990Date of Patent: December 17, 1991Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Donald B. Johnson, An V. Le, William C. Martin, Rostislaw Prymak, William S. Rohland, John D. Wilkins
-
Patent number: 5007089Abstract: The invention includes a control vector checking code respository located either within the same system as the crytographic facility or alternately remotely from the system containing the cryptographic facility. The control vector checking code repository will be linked to the cryptographic facility by one of several means. A first means for linking the repository to the cryptographic facility would include a physically secure data communications link. A second means for connecting the repository to the cryptographic facility would be by using an insecure channel with authentication, wherein either a modification detection code or alternately a message authentication code would be transmitted to the cryptographic facility and then the desired control vector checking code would be transmitted over the link. The cryptographic facility will include a code authorization mechanism to compare the transmitted MAC or MDC with a corresponding value computed from the received control vector checking code.Type: GrantFiled: April 9, 1990Date of Patent: April 9, 1991Assignee: International Business Machines CorporationInventors: Stephen M. Matyas, Donald B. Johnson, An V. Le, William C. Martin, Rostislaw Prymak, John D. Wilkins
-
Patent number: 4876735Abstract: The present invention employs a method of choosing between the output of two different character recognition systems to improve the rate at which characters are recognized, without significantly increasing the number of undetected substitution errors. If the first recognition system cannot recognize a character, a random probability generator is used to determine whether to use the output of the second recognition system, or alternatively to generate a reject character.Type: GrantFiled: December 18, 1987Date of Patent: October 24, 1989Assignee: International Business Machines CorporationInventors: William C. Martin, Gene D. Rohrer
-
Patent number: 4644443Abstract: An enclosed, electronic system has a plurality of lower power-dissipating electronic components mounted on a chassis. The components are positioned adjacent each other to form low volume fluid ducts therebetween. A low volume fluid duct is formed between one side of the plurality and one end enclosure of the system. At least one higher power-dissipating electronc component is also mounted on the chassis, forming a high volume fluid duct between one of its sides and one side of the last of the lower power-dissipating electronic components, and a high volume fluid duct also formed between the other side of the higher power-dissipating electronic component and the other end enclosure. Air is caused to blow through the low volume fluid duct and then to be exhausted through the high volume fluid ducts. The rate of air flow through the high volume ducts is one half of the minimum required to cool the higher power-dissipating component.Type: GrantFiled: September 27, 1985Date of Patent: February 17, 1987Assignee: Texas Instruments IncorporatedInventors: Michael W. Swensen, William C. Martin, Henry H. Kight
-
Patent number: 4604890Abstract: A compression tool comprises a tool head and a pair of dies mounted in the tool head for compressingly, surroundingly engaging a generally tubular workpiece. The dies define a minimum opening and a maximum opening therebetween for accommodating workpieces over a corresponding range of sizes. A fluid operated drive urges the dies inwardly to compress the workpiece and a fluid pressure control is provided for controllably varying the maximum pressure of the fluid supplied to the fluid operated drive in accordance with the size of a workpiece to be compressed.Type: GrantFiled: March 25, 1985Date of Patent: August 12, 1986Assignee: Teledyne Penn-UnionInventor: William C. Martin
-
Patent number: 4337635Abstract: A compression tool for compressing a generally tubular workpiece, comprises a tool head having an open, workpiece-receiving end. A plurality of generally parallel, spaced apart movable compressing members are carried by the tool head. A stationary compression surface also carried by the tool head opposingly faces the movable compressing members. Guides are provided in the tool head for slidably mounting the movable compressing members. A ram drives the movable compressing members towards their respective maximum compressed positions, which are defined by the ram and a ram-carrying channel. This maximum compressed position generally increases in a predetermined sequence from the workpiece-receiving end of the tool head toward an interior portion of the tool head.Type: GrantFiled: July 3, 1980Date of Patent: July 6, 1982Assignee: Teledyne Penn-UnionInventors: William C. Martin, Stephen V. Hoydic, Jr.