Patents Issued in July 31, 2008
-
Publication number: 20080181359Abstract: A first laser device and a second laser device direct a laser beam towards a patient before a CT scan to visually indicate an outer boundary of an area where x-rays will be directed during the CT scan. Each laser device includes a prism that deflects the laser beams to form lines on the patient that define an outer boundary of an area of the patient that will be exposed to the x-rays. If the area of the patient between the lines is not the desired area, the operator can move the patient until the desired area of the patient is located between the lines. A third laser device can direct a laser beam to define an outer boundary that is used to ensure proper orientation of the patient in the space.Type: ApplicationFiled: January 29, 2008Publication date: July 31, 2008Inventors: Joseph Webster Stayman, Miodrag Rakic, David Phillipe Sarment, Michael Thomas Kusner
-
Publication number: 20080181360Abstract: To enhance results of an x-ray apparatus the invention relates to an apparatus for three-dimensional imaging of a human breast comprising a reconstruction means for reconstruction of a three-dimensional image volume, a compression paddle for holding said breast, an actuator for controlling the position of said compression paddle, and a position gauge for measurement of the position of said compression paddle. The reconstruction means is operatively arranged to receive signals, corresponding to measurements by said position gauge, from said position gauge and constrain the boundary of said image volume based on said received signal.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Applicant: SECTRA MAMEA ABInventor: Magnus Hemmendorff
-
Publication number: 20080181361Abstract: The present invention relates to a compression arrangement for use in an x-ray imaging apparatus, the arrangement comprising a compression paddle and an actuator for displacing said compression paddle in a distance, said paddle having an extension direction substantially transverse to an object insertion direction. The actuator is operatively arranged to incline said paddle along said extension direction.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Applicant: SECTRA MAMEA ABInventors: Kjell Eldered, Torbjorn Hjarn
-
Publication number: 20080181362Abstract: A radiosurgery system is described that is configured to deliver a therapeutic dose of radiation to a target structure in a patient. In some embodiments, inflammatory ocular disorders are treated, specifically macular degeneration. In some embodiments, the ocular structures are placed in a global coordinate system based on ocular imaging. In some embodiments, the ocular structures inside the global coordinate system lead to direction of an automated positioning system that is directed based on the ocular structures within the coordinate system. In some embodiments, the position of the ocular structure is tracked and related to the status of the radiosurgery system. In some embodiments, a treatment plan is utilized in which beam energy and direction and duration of time for treatment is determined for a specific disease to be treated and/or structures to be avoided. In some embodiments, the structure is an eye and the eye is tracked by the system.Type: ApplicationFiled: January 31, 2008Publication date: July 31, 2008Applicant: Oraya Therapeutics, Inc.Inventor: Michael Gertner
-
Publication number: 20080181363Abstract: A system and method for monitoring a surface or interfacial area. The system and method includes an intense X-ray beam directed to a surface or interface at a low angle to achieve specular reflection with phase contrast associated with an event, such as changing topography, chemistry or magnetic state being detected by a CCD. Upstream or downstream processing can be carried out with the X-ray phase contrast system.Type: ApplicationFiled: January 25, 2007Publication date: July 31, 2008Inventors: Paul Fenter, Wenbing Yun
-
Publication number: 20080181364Abstract: A method is provided for decontaminating biological pathogens residing in an enclosure of an electronic device. The method includes: identifying materials used to encase the enclosure of the electronic device; tailoring x-ray radiation to penetrate the materials encasing the enclosure; and directing x-ray radiation having a diffused radiation angle towards the electronic device.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Inventors: John R. DeSalvo, Charles M. Newton, William T. Silfvast, Gregory M. Shimkaveg
-
Publication number: 20080181365Abstract: To be able to achieve further small-sized formation and light-weighted formation and to promote a sensitivity by further efficiently detecting a fluorescent X-ray or the like in an X-ray tube and an X-ray analyzing apparatus, there are provided a vacuum cabinet 2 inside of which is brought into a vacuum state and which includes a window portion 1 formed by an X-ray transmitting film through which an X-ray can be transmitted, an electron beam source 3 installed at inside of the vacuum cabinet 2 for emitting an electron beam e, a target T generating a primary X-ray X1 by being irradiated with the electron beam e and installed at inside of the vacuum cabinet 2 to be able to emit the primary X-ray X1 to an outside sample S by way of the window portion 1, and an X-ray detecting element 4 arranged at inside of the vacuum cabinet 2 to be able to detect a fluorescent X-ray and a scattered X-ray X2 emitted from the sample S and incident from the window portion 1 for outputting a signal including energy information ofType: ApplicationFiled: January 10, 2008Publication date: July 31, 2008Inventor: Yoshiki Matoba
-
Publication number: 20080181366Abstract: This invention involves the application of dense, metallurgically bonded deposits of tungsten and tungsten rhenium coatings onto preformed based x-ray anodes to be used as focal tracks. The coatings are applied by low pressure DC plasma spraying. The invention also includes heat treatments that further densify the as-applied coatings improving their suitability for use as focal tracks.Type: ApplicationFiled: May 14, 2007Publication date: July 31, 2008Inventors: Rajan Bamola, Albert Sickinger
-
Publication number: 20080181367Abstract: The invention relates to a method for determining gray-scale values for volume elements of bodies to be mapped using an x-ray image recording system. When a body to be mapped is not mapped in full on a single projection image for a rotational position, a second projection image must be made and a virtual projection image derived from the two projection images, this being back-projected onto the volume elements. For calibration the present invention proposes making the same two projection images in each case at a calibration phantom and additionally a further projection image, corresponding to the position and orientation of the virtual projection image. As a result the mathematical relationships between the projection images and the virtual projection image and for the back-projection can be derived.Type: ApplicationFiled: January 15, 2008Publication date: July 31, 2008Inventors: Benno Heigl, Stefan Hoppe, Joachim Hornegger, Gunter Lauritsch
-
Publication number: 20080181368Abstract: A method of providing diagnostic functionality in a SIP enabled telephony system includes a plurality of SIP enabled functional elements each provided with a diagnostics agent, the method including transmitting a SIP diagnostics request from an originator diagnostics agent of a first element to a diagnostics agent of a second element.Type: ApplicationFiled: September 28, 2007Publication date: July 31, 2008Inventors: Mark O'Sullivan, Graham Streit, Mario Zancan
-
Publication number: 20080181369Abstract: Problem to Be Solved It is to evaluate whether or not various types of devices can achieve the required performances. Means to Solve the Problem An evaluation device 20 comprises a circuit element comprising respective pairs of inputs and outputs including several capacitances 25a-25c and resistances 26a-26d, one end of each being connected to both ends of the capacitances 25a-25c, wherein a resistance value of a signal input side is generally equal to that of a signal output side. The evaluation device 20 is further provided with a connecting terminal with an output device 10 for outputting signals to a device to be evaluated 30 on the signal input side, and is provided with a connecting terminal with the device to be evaluated 30 on the signal output side.Type: ApplicationFiled: January 23, 2008Publication date: July 31, 2008Inventors: Tomihiro Mugitani, Takashi Kobayashi, Tatsuhiko Nakajima
-
Publication number: 20080181370Abstract: According to one embodiment, a telephone system includes a plurality of telephone exchange apparatuses generate call information events specifying a plurality of telephone terminals to which call connections are made, a server apparatus which is connected to the plurality of telephone exchange apparatuses through the transmission paths, and a management unit executes call-state management of the plurality of telephone terminals, wherein each of the plurality of telephone exchange apparatuses include a determining unit which determines presence or absence of disconnections of call connections among the plurality of telephone exchange apparatuses and a transmitter which adds identification information to the call information event to be transmitted to the server apparatus, and the server apparatus includes a controller which controls execution and stop of the call-state management by the management unit based on the identification information, when the identification information is added to the received call inType: ApplicationFiled: January 24, 2008Publication date: July 31, 2008Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Makoto Takahashi
-
Publication number: 20080181371Abstract: Techniques are disclosed for making an automated telephone call more interactive and intelligent by saving responses gathered from a previous call and using that information to build more personal and engaging subsequent interactions. An initial telephone call can be designed with data needs in mind. Relevant responses from the initial calls can be captured and stored and a follow-up call can be created that includes dialogs that reference specific information from the previous interactions with the system. Such build call techniques can be utilized on outbound, as well as inbound calls, and can simulate a human being's ability to listen, remember and refer to past conversations, making the automated telephone calls more interactive and effective.Type: ApplicationFiled: January 30, 2008Publication date: July 31, 2008Applicant: Eliza CorporationInventors: Lucas Merrow, Alexandra Drane, Ivy Krull
-
Publication number: 20080181372Abstract: Methods, computer readable media, and system embodiments are provided for call routing in communication networks. One method embodiment includes initiating a call processing process by receiving a call for a called party, sending a message to a home location register to initiate a call termination, arming a trigger for transferring the call processing process to a set of executable instructions that can use a variable delay to pause the call processing process to allow a color ringback tone server to provide an initial play of a ringback tone, initiating an initial play of the ringback tone for receipt by the calling party, sending a message transferring the call processing process to the home location register, and setting a variable delay that allows the initial play of the ringback tone to the calling party to play for a predetermined period.Type: ApplicationFiled: January 25, 2007Publication date: July 31, 2008Inventors: Rob W. Heldenbrand, Anders H. Askerup
-
Publication number: 20080181373Abstract: Call messaging techniques are disclosed that allow a called party and a calling party to communicate without interfering with an on-going call in which the called party is participating, and enable the called party to communicate with the calling party even after the call has left the called party's endpoint. For example, a call messaging methodology includes the following steps. Information is maintained regarding an endpoint location of a call within a call switching system handling the call, wherein the call is placed by a calling party to a called party, but wherein the called party is not answering the call. In accordance with the methodology, a message channel is provided between the called party and the calling party, such that the called party and the calling party are able to communicate without having a call connection established between them.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Inventors: Thomas W. Brown, Jr., James L. Knight
-
Publication number: 20080181374Abstract: A system and method for providing private information content to a voice telephone call parties prior to, during or following a call. In one aspect, the system and method may be implemented in a voice telephone communication apparatus that is adapted to hold information content on behalf of the call party, gather information that is private to the call party and add it to the information store as part of the information content, and retrieve the information content from the information store and present it to the call party in response to an information presentation initiation action. In another aspect, the system cooperates with a premises or equipment monitoring system, such as a security system, to provide monitoring information to a telephone call party.Type: ApplicationFiled: January 26, 2007Publication date: July 31, 2008Inventor: Michael H. Script
-
Publication number: 20080181375Abstract: A method and apparatus for enhanced Internet telephony ensures that communication between a source and destination is not interrupted by common network address translation. According to one aspect of the invention, communication may continue through a router that employs network address translation.Type: ApplicationFiled: February 14, 2008Publication date: July 31, 2008Inventors: Louis Holder, Jeffrey Citron
-
Publication number: 20080181376Abstract: A method or device includes a telephone with an audio or video effects generator to produce audio or video effects that are transmitted as part of a signal from the telephone.Type: ApplicationFiled: April 2, 2008Publication date: July 31, 2008Inventor: John D. Patton
-
Publication number: 20080181377Abstract: Methods and apparatus to provide messages to television users are disclosed. An example method includes receiving a request for a voicemail message from the television user, determining a voicemail mailbox associated with the television user, and sending at least one of a list of one or more voicemail messages or a voicemail message to a display device associated with the television user.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Inventors: Chaoxin Charles Qiu, Jeffrey Lee Scruggs, John E. Lemay, Jessie Tsae-Jiuan Lee, Diana Maria Cantu
-
Publication number: 20080181378Abstract: In an example method of correlating charging data records within an offline charging system, each of a plurality of sources selects a same one of a plurality of charging functions in which to route charging information associated with a given call session or event. In an example, the plurality of sources corresponds to either a plurality of network elements or a plurality of charging data functions. In another example, the plurality of charging functions corresponds to either a plurality of charging data functions or a plurality of charging gateway functions. At the selected charging function, the routed charging information is correlated.Type: ApplicationFiled: August 16, 2007Publication date: July 31, 2008Inventors: Yigang Cai, Chun Guang Xu, Sheng Chen, Hong Wei Sun
-
Publication number: 20080181379Abstract: Caller name is authenticated using authentication certificates issued by a registration authority that registers callers who wish to terminate calls to callers subscribed to the registration authority. In one embodiment, the authentication certificates are sent to a called device or a proxy for the called device via a path that is separate from the call setup path. An indication is conveyed to the called party to indicate whether the caller name was successfully authenticated.Type: ApplicationFiled: January 30, 2007Publication date: July 31, 2008Applicant: Alcatel LucentInventors: Stanley TaiHai Chow, Vinod Choyi, Dmitri Vinokurov
-
Publication number: 20080181380Abstract: A method of completing a telephone call based on an authenticated caller name proxy, and related proxy, including one or more of the following: a caller dialing the authenticated caller name proxy on behalf of a RealName entity; verifying that the RealName entity is a registered RealName entity; retrieving a list of combinations of user identifications and passwords associated with an appropriate certificate corresponding to the RealName entity; the caller providing a combination of user identification and password to the authenticated caller name proxy; determining that the combination of user identification and password provided to the authenticated caller name proxy by the caller matches an entry in the list of combinations of user identifications and passwords associated with the appropriate certificate corresponding to the RealName entity; the caller providing a called party phone number to the authenticated caller name proxy; the authenticated caller name proxy establishing an authenticated telephone caType: ApplicationFiled: September 12, 2007Publication date: July 31, 2008Applicant: ALCATEL LUCENTInventors: Christophe Gustave, Stanley Chow
-
Publication number: 20080181381Abstract: The present invention relates in general to the field of voice and data communications, and in particular, to a novel system for providing interoperable on-demand communications and services across otherwise incompatible narrowband voice and broadband systems. The system is also based on sponsored or universal communications services supported by interactive communications between sponsors and service providers and their respective databases of business rules.Type: ApplicationFiled: December 21, 2007Publication date: July 31, 2008Inventor: Charles L. Manto
-
Publication number: 20080181382Abstract: Methods, systems, and computer program products for providing an enriched messaging service in a communications system is described. In one embodiment, the method includes receiving a signaling message associated with a call at one of a plurality of service dispatch and control (SDC) functions, wherein the call signaling message includes a subscriber identifier. A plurality of call services associated with the subscriber identifier that is to be applied to the call is determined. The method also includes communicating the signaling message from the SDC function to a service platform and receiving back at the SDC function for each of the plurality of call services and thereby sequentially applying the call services to the call.Type: ApplicationFiled: January 31, 2008Publication date: July 31, 2008Inventors: Yoogin Lean, Gaurang Kalyanpur, Amrit P.S. Wadhwa
-
Publication number: 20080181383Abstract: PoC server has an audio data receiving section 305 that receives the audio data transmitted from a cellular phone, an audio data transmitting section that transfers the audio data to individual cellular phones other than the speaker's one, of two or more cellular phones, a receiving user storage section that stores therein receiving association data indicative of the association between the cellular phone having the speaker right and the cellular phones of the receiving users, and a receiving user grasp section that causes the audio data transmitting section to transfer the audio data with designation of the cellular phone of the receiver.Type: ApplicationFiled: November 27, 2007Publication date: July 31, 2008Applicant: Fujitsu LimitedInventors: Takashi Ohno, Kenichi Horio, Masahide Noda
-
Publication number: 20080181384Abstract: The present invention is directed to a multi-way connection management (MWCM) system for monitoring and maintaining call connections among a group of participating parties. The multi-way call connection may be established by connecting the originating party and the desired participating parties. Once a multi-way call connection is established, the multi-way call connection may be maintained until the originating party desires to terminate the call. Any disconnected party may rejoin the multi-way call by an automatic redial performed by the MWCM system. Additionally, the originating party may provide a call continuation period of the multi-way call when the originating party can rejoin the multi-way call. In this manner, other participating parties may stay in the multi-way call during the provided period without the originating party being connected.Type: ApplicationFiled: March 28, 2008Publication date: July 31, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Herman Rodriguez, Newton James Smith, Clifford Jay Spinac
-
Publication number: 20080181385Abstract: The present invention is a wireless personal area network created utilizing the pre-existing wiring from conventional payphone devices. A data aggregator is operably connected to the wiring for the payphones to connect the aggregator to a public switch telephone network (PSTN) so that the data aggregator can communicate with a data concentrator via the PSTN. The data concentrator periodically retrieves and forwards data from the Internet to the data aggregator along the PSTN at speeds much greater than that of a conventional Internet connection. The data aggregator stores this data for subsequent transmission to a personal data access device via a wireless network access device operably connected to the data aggregator. In this manner the personal device can access data at speeds greater than conventional direct Internet connections without ever directly connecting to the Internet.Type: ApplicationFiled: January 31, 2008Publication date: July 31, 2008Inventor: Ronald Eveland
-
Publication number: 20080181386Abstract: In accordance with an improved call routing methodology, a call is routed within a communication network by reference to one or more databases. In response to receiving a local number portability request at a service control point (SCP), the SCP accesses one or more databases to determine whether or not to apply custom call routing to a call directed to a called telecommunications number. In response to determining to apply custom call routing to the call, the SCP performs at least a second access to the one or more databases to obtain a local routing number (LRN) associated within the one or more databases with a calling telecommunications number associated with the call. The SCP thereafter provides the LRN to a service switch point in the communication network so that the call is routed to a called station associated with the called telecommunications number.Type: ApplicationFiled: April 1, 2008Publication date: July 31, 2008Inventors: Thomas CREAMER, Victor Moore, Scott Winters
-
Publication number: 20080181387Abstract: According to one embodiment, a telephone system includes a plurality of telephone exchange apparatuses which execute exchange processing among a plurality of telephone terminals and a server apparatus which is connected to the plurality of telephone exchange apparatuses via transmission paths, receives a call information event to specify a plurality of telephone terminals to be call-connected, and executes a computer supported telephony application with prescribed standards regarding call state management of the plurality of telephone terminals, wherein the server apparatus includes a controller which returns a telephone terminal which has become an extra state of the standards to a state in the standards, when the sate in the standards changes into the extra state of the standards in a state in which call connections among a plurality of telephone terminals connected to telephone exchange apparatuses different from one another.Type: ApplicationFiled: January 29, 2008Publication date: July 31, 2008Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Takeo Watanabe
-
Publication number: 20080181388Abstract: According to one embodiment, a telephone exchange system includes a telephone exchange apparatus which accommodates a plurality of telephone terminals and is configured to connect a public network, a server apparatus which is connected to the telephone exchange apparatus and provides a service to execute at least a part of functions regarding exchange processing of the telephone exchange apparatus to telephone terminals on the public network, and a connector which conference-connects among a first telephone terminal to be an outgoing call origin, a second telephone terminal to be an incoming call destination and the server apparatus, when an incoming call arrives at the telephone exchange apparatus and it is determined that an incoming call destination is any one of the telephone terminals on the public network.Type: ApplicationFiled: September 26, 2007Publication date: July 31, 2008Applicant: KABUSHIKI KAISHA TOSHIBAInventor: Hideaki Nakai
-
Publication number: 20080181389Abstract: Systems and methods are disclosed for an optimizing operations at a contact center. In one embodiment, an integrated contact center comprises: a workforce manager comprising a scheduler and a tracking function; and a lesson assignment function configured to receive at least one indicator of performance of the agent, and further configured to assign a lesson to the agent based on the at least one indicator.Type: ApplicationFiled: March 31, 2008Publication date: July 31, 2008Inventors: John Bourne, Ed Murray, Jeff Iannone, Shimon Keren, Nick McLean, Mike Bourke, Jason Fama, Joseph Watson, James Gordon Nies, Thomas Lverly
-
Publication number: 20080181390Abstract: Analyzing transcripts of conversation between at least two users by receiving input information from a first user via a voice call, creating conversational transcripts from the information received from the first user, selecting at least one defined situation from a list of defined situations, identifying the selected situation in the conversational transcripts, identifying a set of procedural sequences by comparing the at least one identified situation in the conversational transcripts with knowledge derived from a corpus of historical conversational transcripts; and providing the set of procedural sequences to the first user.Type: ApplicationFiled: April 3, 2008Publication date: July 31, 2008Applicant: International Business Machines CorporationInventor: Krishna Kummamuru
-
Publication number: 20080181391Abstract: A hook switch turns on a transistor by connecting the positive electrode terminal of a capacitor to a base terminal of a transistor in an off-hook state, causing a speech circuit and telephone lines to be connected. The hook switch turns off the transistor by disconnecting the positive electrode terminal of the capacitor from the base terminal of the transistor in an on-hook state, causing the speech circuit and the telephone lines to be disconnected. A holding circuit holds the voltage at the positive electrode terminal of the capacitor at a substantially fixed value by charging the capacitor with electric power supplied from the telephone lines in an off-hook state.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Applicant: UNIDEN CORPORATIONInventor: Yoshinobu Fujiwara
-
Publication number: 20080181392Abstract: Methods and apparatus for noise suppression and echo cancellation are disclosed. An example embodiment of a method for noise suppression and echo cancellation includes monitoring an audio channel in a telephony device and determining, as a result of the monitoring, whether an active voice channel is established in the audio channel. The example method also includes, in the event the active voice channel is not established in the audio channel, calibrating at least one of a noise suppression module of the telephony device and an echo cancellation module of the telephony device.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Inventor: Mohammad Reza Zad-Issa
-
Publication number: 20080181393Abstract: Methods and apparatus to maintain communication services during a power failure are disclosed. An example method comprises detecting a loss of power at a digital subscriber line (DSL) modem and detecting a power status of the DSL modem. The example method also includes, when the power status is in an on state, transmitting a message indicative of the on state of the power status along a subscriber line to a digital subscriber line access multiplexer (DSLAM).Type: ApplicationFiled: January 26, 2007Publication date: July 31, 2008Inventors: Ronald Brost, Goangshiuan Shawn Ying, Stephen Aspell, Eugene L. Edmon, Renee C. Estes
-
Publication number: 20080181394Abstract: The encryption/decryption device includes a plaintext unit, a ciphertext unit and a cryptographic unit connected therebetween. The plaintext unit may include a logic device such as a first programmable logic device (PLD), e.g. a field programmable gate array (FPGA), for interfacing with the protected network to perform encapsulation of data from the protected network to define outgoing datagrams, and to perform decapsulation of incoming datagrams from the cytographic unit. The ciphertext unit may include a second logic device such as a PLD or FPGA for interfacing with the unprotected network to perform routing of incoming encrypted datagrams from the unprotected network to the cryptographic unit, and to perform routing of outgoing encrypted datagrams from the cryptographic unit to the unprotected network.Type: ApplicationFiled: January 30, 2007Publication date: July 31, 2008Applicant: Harris CorporationInventors: Richard John Keefe, Robert Jeffery White, Gary Roger Dennis
-
Publication number: 20080181395Abstract: In a cryptographic operation apparatus, the result of an encryption process, or decryption process, is obtained by disposing two operational circuits in parallel, each comprising four multiplying devices and an exclusive-OR device, and by processing an input data string in two cycles; or by processing an input data string by a single operational circuit in four cycles.Type: ApplicationFiled: November 30, 2007Publication date: July 31, 2008Applicant: FUJITSU LIMITEDInventors: Souichi OKADA, Kouichi ITOH
-
Publication number: 20080181396Abstract: A data obfuscation method, apparatus and computer program product are disclosed in which at least selected text entities such as words or abbreviations in a document are obfuscated to prevent the disclosure of private information if the document is disclosed. A user establishes various configuration parameters for selected text entities desired to obfuscated. The document is processed and text entities matching the configuration parameters are tagged for obfuscation. The tagged entities are then substituted in the document with obfuscating text. The obfuscating text can be derived from a hash table. The hash table may be used to provide a reverse obfuscation method by which original data can be restored to an obfuscated document.Type: ApplicationFiled: April 3, 2008Publication date: July 31, 2008Applicant: International Business Machines CorporationInventors: Sreeram Viswanath Balakrishnan, Rema Ananthanarayanan, Souptik Datta
-
Publication number: 20080181397Abstract: An encryption system and method using a set of reversible functions that iteratively reduce the message to be encrypted. In an exemplary embodiment, an encryption module can first receive a data set, or a message, to be encrypted. In a single iterative step, the message can be reduced to a smaller message through the use of a tailored first function, a reduction process. A second function can generate an extra data set based on the message, which can be essential to decrypting the message later. The iterations continue until the reduction process can no longer reduce the message. When the iterations cease, the resulting encrypted message can comprise the extra data sets output during the iterations. Because the utilized functions can be reversible, a decryption module can effect decryption by simply reversing the steps of encryption.Type: ApplicationFiled: January 25, 2008Publication date: July 31, 2008Inventor: JOHN WILSON DORMINY
-
Publication number: 20080181398Abstract: Encoding radio-frequency identification (RFID) tags, each of the RFID tags having an tag identifier, t, and associated with a corresponding item, in a manner that preserves privacy of information associated with the item includes the steps of: generating a key, k; encrypting each of a plurality of tag identifiers, t, using the key, k to produce a plurality of encrypted tag identifiers; selecting a threshold value, T; dividing the key, k, into a plurality of key shares, n, such that retrieval of T or more key shares allows the key, k, to be reconstituted; and encoding each of a plurality of RFID tags with a concatenation of the encrypted tag identifier and one of the key shares, and any other data useful to reconstitute the key k.Type: ApplicationFiled: January 26, 2007Publication date: July 31, 2008Inventor: Ravikanth Pappu
-
Publication number: 20080181399Abstract: The functionality of a hardware security module is combined with that of a cryptographic accelerator in a single device. A single device comprising a hardware security module configured to generate and securely store at least one cryptographic key is combined with hardware configured to accelerate cryptographic computations associated with a plurality of encryption algorithms. The cryptographic keys generated are managed entirely within the composite HSM cryptographic accelerator. Once generated, cryptographic keys may be stored either within the device or outside the device in an encrypted form. The master key used to encrypt the cryptographic keys remains within the device at all times and is isolated on a separate bus. Clear text versions of the cryptographic keys are not accessible outside of the composite HSM cryptographic accelerator.Type: ApplicationFiled: January 29, 2007Publication date: July 31, 2008Applicant: SUN MICROSYSTEMS, INC.Inventors: Joel M. Weise, Gary D. Morton
-
Publication number: 20080181400Abstract: A method and apparatus is disclosed herein for performing content-based and royalty-based encoding. In one embodiment, the method comprises: selecting one or more encoding tools to encode media based on a royalty cost associated with at least one of the one or more encoding tools and a corresponding decoding tool for each of the one or more encoding tools, decoded media quality that each corresponding decoding tool produces, and one or more transmission bandwidth constraints; encoding the media, in accordance with the media content, using the one or more encoding tools; and transmitting encoded data generated by at least one of the one or more encoding tools.Type: ApplicationFiled: January 28, 2008Publication date: July 31, 2008Inventors: Onur G. Guleryuz, M. Reha Civanlar
-
Publication number: 20080181401Abstract: In a method of establishing a secure communication link between a first terminal and a second terminal, the first terminal is connected to a third terminal which can be connected to a mobile telephone network and the second terminal is connected to an authentication element of the telephone network. The method includes: transfer of an authentication datum from the third terminal to the network authentication element; following authentication of the third terminal, the transfer of a random variable from the network authentication element to the third terminal; the parallel generation of a session key by the third terminal and the network authentication element from the random variable; the generation by the first and second terminals of a shared key from the session key; and the opening of a secure communication link with the use of the shared key.Type: ApplicationFiled: March 2, 2006Publication date: July 31, 2008Applicant: FRANCE TELECOMInventors: David Picquenot, Gilles Macario-Rat, Pierre Lemoine
-
Publication number: 20080181402Abstract: A system and method are disclosed for securely transmitting and receiving a signal. A nonlinear keying modulator is used in the transmitter to encrypt the signal using a nonlinear keying modulation technique. A nonlinear keying demodulator is used in the receiver to decrypt the signal.Type: ApplicationFiled: January 10, 2008Publication date: July 31, 2008Inventor: Roy G. Batruni
-
Publication number: 20080181403Abstract: The present invention is an authenticating system including: a client (hereinafter, referred to as C) including a creator for, by employing a first hash algorithm (hereinafter, referred to as 1A), creating a first hash value (hereinafter, referred to as 1V) from authentication information including an ID and a password, and creating 2V from the 1V and a random number, and a receiver for receiving the random number and an 1A identifier from a server (hereinafter, referred to as S), transmitting the ID and the 2V to the S, and receiving an authentication result from the S; and the S including a storage for storing 3V created from the authentication information by employing an 2A identifier and the 2A ID by ID, and a device for transmitting the random number and the 1A identifier to a PC, receiving the ID and the 2V from the PC, determining whether the 2A identifier, which corresponds to the ID, coincides with the 1A identifier, creating 4V from the 3V and the random number by employing the 1A in a case where itType: ApplicationFiled: January 17, 2008Publication date: July 31, 2008Inventor: YU SAKAMOTO
-
Publication number: 20080181404Abstract: The communications between terminals are encrypted, and even a gateway device is permitted to analyze the encrypted communications, thereby to incarnate censorship for the prevention of information leakage. A gateway device 3 prepares a public key and a secret key in a pair on the basis of a public key encryption system, and distributes the public key to terminals 2a-2c which are managed by the gateway device 3. The terminals 2a-2c subject a communication packet to a prior-art common key encryption, and they thereafter encrypt a common key with the public key and bestow the encrypted common key on the packet. The gateway device 3 decrypts the common key by using the secret key, censors the packet and returns the packet into a prior-art encrypted packet format, and it thereafter transfers the packet to a network 1c where opposite terminals 2d-2f exist.Type: ApplicationFiled: December 28, 2007Publication date: July 31, 2008Inventors: Josuke Matsuki, Masashi Takatsuki, Yukihiro Shimmura
-
Publication number: 20080181405Abstract: The invention allows anonymization of user identifications associated with telecommunication traffic measurement data that is fast, secure, and easy to use with distributed traffic measurements. Acquired user identification is input as an initialization vector to a block cipher. The block cipher is executed in cipher-block chaining mode to output a ciphertext. The output ciphertext is provided for use as an anonymized user identification in place of the user identification in further processing of the telecommunication traffic measurement data.Type: ApplicationFiled: January 11, 2008Publication date: July 31, 2008Inventor: Kari Seppanen
-
Publication number: 20080181406Abstract: Systems and methods of storage device data encryption and data access via a hardware key are described herein. One embodiment includes a hardware key intercepting a request sent from a host to a storage device to access data stored on the storage device, wherein the data stored on the storage device has been encrypted using a first encryption key, the hardware key configured to be plugged into a port of the host and the hardware key comprising a controller comprising the first encryption key to decipher the encrypted data from the storage device. The hardware key interpreting the request and issuing a command to the storage device to access the encrypted data. The hardware key providing the first encryption key to decipher the encrypted data from the storage device.Type: ApplicationFiled: January 30, 2007Publication date: July 31, 2008Applicant: TECHNOLOGY PROPERTIES LIMITEDInventors: Sree M. Iyer, Nicholas Antonopoulos
-
Publication number: 20080181407Abstract: A method for protecting a control device against manipulation in which a number of key sentences for decoding cryptographic functions is provided, a key switch being additionally provided, via which the cryptographic functions access key sentences.Type: ApplicationFiled: November 26, 2007Publication date: July 31, 2008Inventors: Holger Ceskutti, Klaus Schneider, Ioannis Liakos
-
Publication number: 20080181408Abstract: A confidential datum, such as a private key used in public key signature systems, is secured in a digital wallet using a “generation camouflaging” technique. With this technique, the private key is not necessarily stored in the digital wallet, not even in an encrypted form. Instead, the wallet contains a private key generation function that reproduces the correct private key when the user inputs his or her pre-selected PIN. If the user inputs an incorrect PIN, an incorrect private key is outputted. Such private key can be configured so that it cannot be readily distinguished from the correct private key through the use of private key formatting, and/or the use of pseudo-public keys corresponding to the private key. The techniques described herein are also applicable to other forms of regeneratable confidential data besides private keys.Type: ApplicationFiled: January 22, 2008Publication date: July 31, 2008Applicant: Arcot Systems, Inc.Inventor: Geoffrey R. Hird