Having Compression Patents (Class 380/269)
  • Patent number: 7007165
    Abstract: A method for examining an electronic representation of an item for a watermark, the method including examining at least a first electronic representation of an item for a watermark in accordance with a first watermark definition, receiving a signal indicating that a second watermark definition is to be used for examining electronic representations, and examining at least a second electronic representation of an item for a watermark in accordance with the second watermark definition. Related apparatus and methods are also provided.
    Type: Grant
    Filed: April 7, 2000
    Date of Patent: February 28, 2006
    Assignee: NDS Limited
    Inventor: Yossef Tsuria
  • Patent number: 7006631
    Abstract: The present invention is a method and system which extracts, manipulates and embeds data from a compressed and standard compliant video bitstream which may be used for digital rights management, e.g. controlling access to a bitstream or for authenticating a video bitstream. The method embeds binary data bits into compressed and standard compliant video bitstream with minimal visual artifacts. The method first parses the compressed video bitstream and locates coded blocks. The codeword C for the last triplet in the original block(RUNc,LEVELc, LASTc=1) is replaced by the VLC code word C? for the last triplet (RUNC,LEVELC, LASTC?=0). A codeword corresponding to a triplet with LAST=1 is placed after C? whose sign bit “s” can be either 0 or 1 and is an embedded data bit, and can be used for authentication.
    Type: Grant
    Filed: July 12, 2000
    Date of Patent: February 28, 2006
    Assignee: Packet Video Corporation
    Inventors: Maximilian Luttrell, Jiangtao Wen
  • Patent number: 6990202
    Abstract: A device and method thereof for packetizing scalably encoded and progressively encrypted data. The device includes a receiver adapted to receive a stream of data from an encoding and encrypting device, in which some or all of the data are scalably encoded and progressively encrypted. The device also includes a packetizer adapted to packetize some or all of the data into secure and scalable data packets. In one embodiment, the device includes a memory unit for storing the data received from the encoding and encrypting device prior to packetization of the data. In another embodiment, the device includes a memory unit for storing the secure and scalable data packets. In yet another embodiment, the device includes a transmitter for transmitting some or all of the data packets to a downstream device.
    Type: Grant
    Filed: October 4, 2001
    Date of Patent: January 24, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Susie J. Wee, John G. Apostolopoulos
  • Patent number: 6985589
    Abstract: An apparatus and method for the encoding and storage of signals representing at least image information onto a storage medium is claimed. A source generator is configured to convert the signals into digitized image information. A compressor is configured to receive the digitized image information from the source generator and compress the digitized image. An encryptor is configured to receive the compressed digitized image information from the compressor and encrypt the compressed digitized image information. A storage device is configured to then store the encrypted compressed digitized image information onto the storage medium.
    Type: Grant
    Filed: May 3, 2000
    Date of Patent: January 10, 2006
    Assignee: Qualcomm Incorporated
    Inventors: Steven A. Morley, Juan Faus, John Ratzel
  • Patent number: 6985590
    Abstract: The present invention provides a method and a system with which information embedded in compressed digital audio data can be directly operated. An embodiment of the system for embedding additional information in compressed audio data includes: means for extracting MDCT (Modified Discrete Cosine Transform) coefficients from the compressed audio data; means for employing the MDCT coefficients to calculate a frequency component for the compressed audio data; means for embedding additional information in the frequency component obtained in a frequency domain; means for transforming into MDCT coefficients the frequency component in which the additional information is embedded; and means for using the MDCT coefficients, in which the additional information is embedded, to generate compressed audio data.
    Type: Grant
    Filed: December 20, 2000
    Date of Patent: January 10, 2006
    Assignee: International Business Machines Corporation
    Inventors: Ryuki Tachibana, Shuhichi Shimizu, Seiji Kobayashi
  • Patent number: 6961428
    Abstract: A technique of enciphering the graph-text document and its security transfer on a network. The sender of the graph-text document enciphers at least one graph-text document with digitizing algorithm provided by a control center and producing an enciphered and compressed cryptic document. Sender sends this enciphered cryptic document to a recipient, who prints out the enciphered graph-text document. The control center sends the positioning parameters of a reader sheet, the coordinates of the pole and the polar angle, to the recipient, who puts the reader sheet onto the document sheet at the right position and right orientation as indicated by the parameters received. The original document thus is revealed as a four dimensional (four parametric) document and is ready to be read.
    Type: Grant
    Filed: February 18, 2000
    Date of Patent: November 1, 2005
    Inventor: Chao Liu
  • Patent number: 6948073
    Abstract: Theft of decompressed digital content as the content is being rendered is prevented. A requested slow-down of the rendering of the content is detected. Transfers of relatively large amounts of data are detected. A re-compressor-based requested slow-down of the rendering of the content is detected. A re-compressor re-compressing the content is detected. In each situation, the detected activity is presumably initiated by a content thief attempting to steal the content. In each situation, the detected activity is responded to in a manner designed to frustrate the presumed attempt of the content thief to steal the content.
    Type: Grant
    Filed: June 27, 2001
    Date of Patent: September 20, 2005
    Assignee: Microsoft Corporation
    Inventors: Paul England, Marcus Peinado, Mukund Sankaranarayan
  • Patent number: 6941461
    Abstract: A system and method for unique authentication of each replication of a plurality of soft-copy documents, forming a group. One soft-copy document, out of the group, becomes a carrier for an authentication code aimed at protecting the group. The authentication code is computed from the concatenation of the plurality of soft-copy documents and a key. A random number is also generated for each replication of the group of files. The random number is combined with the authentication code to mark the soft-copy document which has been selected to become the carrier. Thus, the invention introduces randomization in the insertion of the authentication code so that for each replication of an identical group of data files, unique authentication data can be associated, merged and hidden in the transmitted information.
    Type: Grant
    Filed: May 9, 2001
    Date of Patent: September 6, 2005
    Assignee: International Business Machines Corporation
    Inventors: Fernando Incertis Carro, Stephen Matyas
  • Patent number: 6907123
    Abstract: A secure real time voice communication system 70 is provided that allows for the secure transmission of voice communications between a sending device 72 and a receiving device 78 through the public switch telephone network 76. The device 72 uses an encryption decryption engine 30 which is capable of executing a number of encryption algorithms which are selected using an encryption selection table 80. An encryption key can be calculated from a periodic key value and a public variable key value. Further, the encryption algorithm used can be periodically changed during a voice communication session so that multiple encryption techniques can be used within the same communication session.
    Type: Grant
    Filed: December 21, 2000
    Date of Patent: June 14, 2005
    Assignee: Cisco Technology, Inc.
    Inventor: John E. Schier
  • Patent number: 6892246
    Abstract: A computer system and method for storing video data in memory is disclosed. Memory capacity is evaluated. If the memory capacity is sufficient to allow the storing of video data in the mass storage device, then the video data is stored. If the memory capacity available is insufficient to storage the video data and the mass storage device, the oldest stored video data in the mass storage device is identified. The oldest stored video data is then removed from the mass storage device and stored in memory. The video data in memory is then modified to require less space in memory. The new video data and the modified video data are then written to the mass storage device.
    Type: Grant
    Filed: June 13, 2001
    Date of Patent: May 10, 2005
    Inventors: Alan N. Cooper, David W. Bauerle
  • Patent number: 6888944
    Abstract: Sets of encryption keys useful by devices for decrypting encrypted content are defined using an error-correcting code such as a Reed-Solomon code to define vectors of length “n” over an alphabet of (0, . . . , N?1), wherein “n” is the number of columns in a key matrix and “N” is the number of rows in the matrix. Each vector represents a set of keys that can be assigned to a device. With this invention, overlap between sets of keys can be minimized to minimize the possibility that the key set of an innocent device might be inadvertently revoked when the key set of a compromised device is revoked. Also, only the generating matrix of the error-correcting code and the index of one set of keys need be stored in memory, since all previously defined key sets can be regenerated if need be from just the generating matrix and index.
    Type: Grant
    Filed: February 5, 2001
    Date of Patent: May 3, 2005
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo Ismael Nin, Florian Pestoni
  • Patent number: 6885749
    Abstract: This invention provides methods and apparatus for protecting data transmitted using standard compression techniques such as Huffman coding. After input data is preprocessed (filtered, quantized, etc.), the data is encoded using a Huffman coder based on Huffman codes or code books which have been scrambled to change the order of the code books and/or codes from established standard Huffman code books and/or codes. When the transmitted information is received by a Huffman code receiver, the received data may be decoded using the scrambled Huffman code book/codes to obtain the data that was transmitted by the transmitter.
    Type: Grant
    Filed: December 30, 1999
    Date of Patent: April 26, 2005
    Assignee: AT&T Corp
    Inventors: Tzu-Chieh Chang, Schuyler Reynier Quackenbush, James H Snyder
  • Patent number: 6883137
    Abstract: A method (and system) for compressing an extensible markup language (XML) document, includes compressing an XML document such that information in a markup portion therein is maintained in a compressed form to allow the document to be reconstructed. During the compressing, the markup portion and a non-markup portion of the document are separated, and the non-markup component is compressed using a first compression method and the markup component is compressed using a second compression method.
    Type: Grant
    Filed: April 17, 2000
    Date of Patent: April 19, 2005
    Assignee: International Business Machines Corporation
    Inventors: Marc Georges Girardot, Neelakantan Sundaresan
  • Patent number: 6856687
    Abstract: A portable security device for providing secure communications over a plurality of networks is presented. In one embodiment, the device comprises, at least one communication port for transfer of audio data, at least one communication port for transfer of digital data, a keypad, an encoding/decoding device, a conversion device operable to covert between audio and digital data and a processor, in communication with a memory, the keypad, the said encoding/decoding device, operable to execute code for selecting a configuration of a transmission and a reception port from among said communication ports dependent upon the presence of a network communication device and an input/output device in communication with said selected ports, providing data received from said selected reception port to said encryption/decryption device for encrypting; and providing said encrypted data to said selected transmission port.
    Type: Grant
    Filed: June 5, 2002
    Date of Patent: February 15, 2005
    Assignee: Copytele, Inc.
    Inventors: Frank J. DiSanto, Denis A. Krusos
  • Patent number: 6856686
    Abstract: In accordance with a first aspect, a method for operating an electronic device adapted to be electronically coupled to at least one microprocessor based device and prevent unauthorized access to data exchanged between the at least one microprocessor based device and other microprocessor based devices, the method including: in a first mode, establishing a secure point-to-point communications session with another like device and receiving security data from the other like device, the security data being associated with an intended recipient microprocessor based device; and, in a second mode, receiving the data from an originating one of the at least one microprocessor based devices, encrypting the data using at least the received security data and sending the encrypted data to the originating microprocessor based device.
    Type: Grant
    Filed: March 13, 2002
    Date of Patent: February 15, 2005
    Assignee: Copytele, Inc.
    Inventors: Frank J. DiSanto, Denis A. Krusos, Edward Lewit
  • Patent number: 6845159
    Abstract: A data processing method and apparatus are proposed for used in the encryption, decryption and authentication of messages. A memory for storing input information, a set of operations and a processor for executing the operations on the stored input information are provided. The input information is utilized to select the order and number of operations performed. The operations are devised such that any possible input string will be interpreted as a valid program and the memory is extensible. Furthermore, data is output as a function of the input information. As a result the state of the memory generated during execution is indeterminate prior to execution and the process evolves differently for each possible input string. Accordingly, the process performed by the module cannot be described by an algorithm.
    Type: Grant
    Filed: October 7, 1999
    Date of Patent: January 18, 2005
    Assignee: Protego Information AB
    Inventors: Bo Dömstedt, Mats Stenfeldt
  • Publication number: 20040264698
    Abstract: In order to encrypt and decode image data at high speed without providing additional special hardware and placing a heavy load on a CPU, image data 10 is compressed by a compression scheme, and a portion of the compressed data 11 is extracted as encryption key data 12 and the portion, from which the encryption key data 12 is extracted, of the compressed data 11 is changed to zero to convert the compressed data 11 to encrypted data 13. The encrypted data 13 cannot be decoded because data in the beginning portion is corrupted. Moreover, since the decoding of the encrypted data is made impossible by utilizing the property of compressed data, the image data can be encrypted and decoded by a simple processing.
    Type: Application
    Filed: March 15, 2004
    Publication date: December 30, 2004
    Applicant: Konica Minolta Business Technologies, Inc.
    Inventor: Akihiko Oda
  • Publication number: 20040258242
    Abstract: A system and method of video stream encryption. A storage device stores a first quantization scale and a second quantization scale. An encryption application receives video data, a first quantization scale and a second quantization scale, generating quantized data by dividing the video into the first quantization scale, generating supplementary data by subtracting the quantized data multiplied by the first quantization scale from the video data, generating quantized supplementary data by dividing the supplementary data into the second quantization scale, and generating encrypted quantized supplementary data using variable length encoding and symmetrical/asymmetrical encryption algorithm.
    Type: Application
    Filed: September 18, 2003
    Publication date: December 23, 2004
    Inventor: Wen-Hao Hsu
  • Patent number: 6760443
    Abstract: A method of compressing media content in which a first predetermined portion of a media content is compressed using a first data-based compression algorithm and inserted into a first portion of a data frame. A second predetermined portion of the media content is compressed using a second data-based compression algorithm and is inserted into a second portion of the data frame. The second predetermined portion of the media content is different from the first predetermined portion of the media content, and the second data-based compression algorithm is different from the first data-based compression algorithm. At least one of the first and second data-based compression algorithms is a private data-based compression algorithm. A plurality of data frames are generated and are made available for distribution, for example, by transmission over a computer network, such as the Internet.
    Type: Grant
    Filed: May 24, 2001
    Date of Patent: July 6, 2004
    Assignee: AT&T Corp.
    Inventors: John Blakeway Lacy, Schuyler Reynier Quackenbush, James H. Snyder
  • Publication number: 20040125952
    Abstract: Methods for embedding digital watermarks in compressed video include perceptual adapting a digital watermark in predicted and non-predicted data based on block activity derived from the compressed video stream, embedding in predicted objects in a video stream having separately compressed video objects, and bit rate control of watermarked video.
    Type: Application
    Filed: August 6, 2003
    Publication date: July 1, 2004
    Inventors: Adnan M. Alattar, Eugene T. Lin, Mehmet Celik
  • Publication number: 20040109565
    Abstract: A method (40) and system (1) for bit modeling and encrypting a code block created from an image. There is also provided a method (60) and system (20) for inverse bit modeling and decrypting an encrypted version of the code block comprising context dependent sequence of bits. Both methods (40,60) and systems (1,20) use a respective encrypting sequence or decrypting sequence associated with an encryption key or seed. The method (40) effects a conducting coefficient bit modeling (46) on at least part of a selected code block in a bit modeling order identified by the encrypting sequence. The method (60) effects a constructing coded wavelet coefficients (66) from the context dependent modeled sequence of bits in an order identified by the decrypting sequence.
    Type: Application
    Filed: December 6, 2002
    Publication date: June 10, 2004
    Inventors: Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona
  • Publication number: 20040076299
    Abstract: Cryptographic methods for concealing information in data compression processes. The invention includes novel approaches of introducing pseudo random shuffles into the processes of dictionary coding (Lampel-Ziv compression), Huffman coding, and arithmetic coding.
    Type: Application
    Filed: October 18, 2002
    Publication date: April 22, 2004
    Inventor: Chung-E Wang
  • Patent number: 6704866
    Abstract: Process for controlling frames transporting data from a transmitting Terminal (DTE 1) to at least a receiving Terminal (DTE 2) through a plurality of consecutive nodes including a start access node (NODE 1) connected to said transmitting Terminal and at least an end access node (NODE 6) connected to said receiving Terminal and intermediary nodes (NODE 2 to NODE 5), with each data frame comprising one or several protocol layers respectively associated with one or several communication protocols of controlling the frame flow at each node; such a process consisting in adding to each data frame a Data Manipulation Layer (DML) defining the parameters necessary for managing the manipulation (compression and/or encryption) of each field of the data frame located after the DML, and adding to each data frame a Control message for transporting a control protocol defining new parameters to be used by some ones nodes for managing the communication flow through the consecutive nodes.
    Type: Grant
    Filed: November 5, 1998
    Date of Patent: March 9, 2004
    Assignee: Cisco Technology, Inc.
    Inventors: Alain Benayoun, Jacques Fieschi, Patrick Michel, Jean-Francois Le Pennec
  • Publication number: 20030235307
    Abstract: A novel hybrid cryptosystem proposed in the present invention comprises a step of removing a part of data from a compressed message to be later encrypted with a symmetric cryptography so as to encrypt a session key and the removed data with a public key, which is an additional step that a conventional hybrid cryptosystem does not have.
    Type: Application
    Filed: June 9, 2003
    Publication date: December 25, 2003
    Inventor: Kazuhiro Miyamoto
  • Patent number: 6654501
    Abstract: In accordance with one embodiment of the invention, a method of integrating a watermark, or portion thereof, into an image, or portion thereof, includes the following. The watermark, or portion thereof, is blended into the image, or portion thereof, so as to appear as noise.
    Type: Grant
    Filed: March 6, 2000
    Date of Patent: November 25, 2003
    Assignee: Intel Corporation
    Inventors: Tinku Acharya, Kannan Raj
  • Publication number: 20030206635
    Abstract: An apparatus and method for the encoding and storage of signals representing at least image information onto a storage medium is claimed. A source generator is configured to convert the signals into digitized image information. A compressor is configured to receive the digitized image information from the source generator and compress the digitized image. An encryptor is configured to receive the compressed digitized image information from the compressor and encrypt the compressed digitized image information. A storage device is configured to then store the encrypted compressed digitized image information onto the storage medium.
    Type: Application
    Filed: May 3, 2000
    Publication date: November 6, 2003
    Applicant: Qualcomm Incorporated
    Inventors: Steven A. Morley , Juan Faus , John Ratzel
  • Patent number: 6591365
    Abstract: A system for protecting against use of pirated music. Two watermarks are inserted into the music to be protected by the music publisher. One watermark is robust—it will not be destroyed by compression. The other watermark is weak—it is designed to be destroyed by compression. The robust mark tells a player that the music is protected, i.e., that it is not authorized to be delivered in compressed form over an insecure channel. If the music is found to have been compressed and it was delivered over an insecure channel, then its play or other processing can be restricted.
    Type: Grant
    Filed: January 6, 2000
    Date of Patent: July 8, 2003
    Assignee: Time Warner Entertainment Co., LP
    Inventor: Christopher J. Cookson
  • Patent number: 6542992
    Abstract: Two network entities allocate the performance of encryption and compression algorithms amongst each other in a controlled and coordinated manner so as to avoid unnecessary duplication of encryption and compression at different protocol layers and an associated waste of CPU power. For example, a first network entity performs both encryption and compression at the IP layer, and instructs the second network entity to disable PPP-layer encryption and compression. In a wireless networking example of the invention, the first network entity is a home agent (e.g., a router) for a wireless communications device and the second network entity is a foreign agent (e.g., a network access server) providing network access for the communications device. The foreign agent terminates a Point-to-Point Protocol (PPP) session with the communications device, but implements (or does not implement) PPP-layer compression and encryption algorithms under the supervision and control of the home agent.
    Type: Grant
    Filed: January 26, 1999
    Date of Patent: April 1, 2003
    Assignee: 3Com Corporation
    Inventors: Kenneth L. Peirce, Jr., Yingchun Xu, Timothy Glenn Mortsolf, Matthew Harper
  • Publication number: 20020164027
    Abstract: A method is provided for asymmetrically compressing data communicated between a ground platform and multiple airborne platforms. The method includes packet compressing ground-based data so as to preserve routing information while compressing the remaining data. The packet-compressed data is then transmitted to the airborne platforms. The method also includes bulk compressing airborne-based data so as to maximize compression and minimize use of available bandwidth. The bulk-compressed data is then transmitted to the ground platform.
    Type: Application
    Filed: May 4, 2001
    Publication date: November 7, 2002
    Inventors: Gary V. Stephenson, David S. Parkman
  • Patent number: 6411714
    Abstract: An information processing system including a data input means (203, 208, 217, 219) for inputting or receiving data, a data compressing means (206) for compressing the data, a decompressing means (221) for decompressing the compressed data and a main storage (209, 222) is provided with an encrypting means (207) for encrypting the data and a decrypting means (220) for decrypting the encrypted data.
    Type: Grant
    Filed: August 25, 2000
    Date of Patent: June 25, 2002
    Assignee: Hitachi, Ltd.
    Inventors: Hiroshi Yoshiura, Kazuo Takaragi, Yusuke Hino, Yutaka Otsu
  • Patent number: 6400824
    Abstract: An imaging device integrating a photosensing array, at least one analog-to-digital converter, and an encryption circuit on a single substrate. An optical image can be directly converted into encrypted digital data prior to transmission the image off the chip.
    Type: Grant
    Filed: November 12, 1997
    Date of Patent: June 4, 2002
    Assignee: California Institute of Technology
    Inventors: Barmak Mansoorian, Eric R. Fossum
  • Publication number: 20020027994
    Abstract: An audio signal processor, audio player, audio distribution system and the method thereof which permit sample playback and are applicable to uncompressed audio contents, and wherein the sound quality is possible to control per frequency band.
    Type: Application
    Filed: August 17, 2001
    Publication date: March 7, 2002
    Inventors: Taro Katayama, Tomoki Ogawa, Mitsuhiko Serikawa
  • Publication number: 20020006203
    Abstract: The present invention provides a method and a system with which information embedded in compressed digital audio data can be directly operated. An embodiment of the system for embedding additional information in compressed audio data includes: means for extracting MDCT (Modified Discrete Cosine Transform) coefficients from the compressed audio data; means for employing the MDCT coefficients to calculate a frequency component for the compressed audio data; means for embedding additional information in the frequency component obtained in a frequency domain; means for transforming into MDCT coefficients the frequency component in which the additional information is embedded; and means for using the MDCT coefficients, in which the additional information is embedded, to generate compressed audio data.
    Type: Application
    Filed: December 20, 2000
    Publication date: January 17, 2002
    Inventors: Ryuki Tachibana, Shuhichi Shimizu, Seiji Kobayashi
  • Publication number: 20020006204
    Abstract: Encrypted compressed content is produced by encrypting content based at least in part on a content key, and compressing the content based at least in part on the content key. Thus, the content key is employed to encrypt the content and also to compress the content. Similarly, decrypted decompressed content is produced from the encrypted compressed content by decrypting the content based at least in part on a content key, and decompressing the content based at least in part on the content key. Thus, the content key is employed to decrypt the content and also to decompress the content.
    Type: Application
    Filed: June 27, 2001
    Publication date: January 17, 2002
    Inventors: Paul England, Marcus Peinado, Mukund Sankaranarayan
  • Publication number: 20020003885
    Abstract: This system enhances the security of a digital communication system by adding a new axis of encryption. This is achieved by randomly varying the connection pattern of the interleaver utilized in a Turbo coding system.
    Type: Application
    Filed: December 8, 2000
    Publication date: January 10, 2002
    Applicant: Digital Cinema Systems Corporation
    Inventor: Donald C. Mead
  • Patent number: 6334187
    Abstract: An apparatus for embedding secret information in an image signal transmitted with a shape signal showing the shape of an object is described. This apparatus comprises an embedding position decision unit for deciding a position in the object where the secret information is to be embedded, according to the shape signal; and a compositor for embedding the secret information in the position decided by the decision unit. Therefore, the secret information is protected against translation or clipping of image.
    Type: Grant
    Filed: June 30, 1998
    Date of Patent: December 25, 2001
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventor: Shinya Kadono
  • Publication number: 20010051927
    Abstract: Data for selected web sites likely to be accessed are stored on memory media (compact disks) that are physically transported to subscribers for use when browsing the Internet. New copies of the memory media with the data for the selected web sites are periodically produced and distributed to the subscribers. In addition, if the data cached on the memory media are stored on a local hard drive of the subscriber, the content of the cache can be updated by a local proxy program during the subscriber's connection to the network when the connection is not otherwise in use. The local proxy program is installed on the subscriber's computer from the distributed memory media. A data center provides Intelligent Prefetching and implements a validation service to determine if the cached data items are current. If not, the current data are loaded into the browser program through the Internet connection.
    Type: Application
    Filed: June 8, 2001
    Publication date: December 13, 2001
    Applicant: BlinkSpeed, Inc.
    Inventors: Mitchell London, Richard Saville
  • Patent number: 6330334
    Abstract: A system and method of information dissemination that permits the user to listen to the specific content of information when and where he or she wants to. A radio or television receiver system receives information from an FM subcarrier, a television vertical blanking interval transmission, a television separate audio program transmission or a dedicated channel and stores the transmitted information in a memory. A user interface allows selection from the memory of the stored information via a set of menus controlling a hierarchical database, so as to access particular items of information. Typically the system includes RAM and/or a storage medium such as a digital audio tape,a magneto-optical mini-disk, a magnetic disk or optical disk, sufficient to store information for 10 hours of audio. A decompression device, accepts the accessed compressed digital audio information items which may have been encrypted and transforms them into spoken speech.
    Type: Grant
    Filed: July 26, 2000
    Date of Patent: December 11, 2001
    Assignee: Command Audio Corporation
    Inventor: John O. Ryan
  • Patent number: 6275588
    Abstract: A technique for performing compression, encryption and transmission, and reception, decryption and decompression, respectively, of data communication packages on an area network.
    Type: Grant
    Filed: March 21, 2000
    Date of Patent: August 14, 2001
    Assignee: I-Data International A/S
    Inventors: Peter Videcrantz, Søren Steen, Kim Steenberg
  • Patent number: 6272633
    Abstract: This disclosure describes systems and methods for processing voice data for secure transmission and secure receipt over a network, such as the Internet. The systems and methods include the processing of analog voice and digital information, including conversion of a voice signal into digital information (or of digital information into a voice signal) and transmission of digital information representing voice data over a network. The analog-to-digital conversion (and digital-to-analog conversion) includes coding and decoding digital information according to voice coding techniques and encrypting and decrypting digital information according to encryption techniques. The transmission of the digital information includes creation of a secure voice frame.
    Type: Grant
    Filed: April 14, 1999
    Date of Patent: August 7, 2001
    Assignee: General Dynamics Government Systems Corporation
    Inventors: Andrew Cameron Duke, Robert Michael Giramma, Ryan Charles Tomasetti
  • Patent number: 6266418
    Abstract: An encryption device for a telephone having a handset and a base unit is disclosed. The device includes a handset interface, a first converter, an encryption processor, a second converter, and a host interface. The handset interface receives analog output signals from the handset. The first converter converts the analog output signals into digital output signals. The encryption processor includes a compressor, a key manager, an encryptor, and a modulator. The key manager generates key material for encrypting the digital output signals. The compressor compresses the digital output signals, the encryptor encrypts the digital output signals based on the key material, and the modulator modulates the encrypted digital output signals. The second converter converts the encrypted digital output signals into encrypted analog output signals. The host interface receives the encrypted analog output signals from the encryption processor, and forwards the encrypted analog output signals to the base unit.
    Type: Grant
    Filed: October 28, 1999
    Date of Patent: July 24, 2001
    Assignee: L3-Communications Corporation
    Inventors: Matthew Carter, Frank Costantini, Moishe Kleidermacher, Ellwood McGrogan, Ronald Paraggio
  • Patent number: 6266419
    Abstract: A method of compressing media content in which a first predetermined portion of a media content is compressed using a first data-based compression algorithm and inserted into a first portion of a data frame. A second predetermined portion of the media content is compressed using a second data-based compression algorithm and is inserted into a second portion of the data frame. The second predetermined portion of the media content is different from the first predetermined portion of the media content, and the second data-based compression algorithm is different from the first data-based compression algorithm. At least one of the first and second data-based compression algorithms is a private data-based compression algorithm. A plurality of data frames are generated and are made available for distribution, for example, by transmission over a computer network, such as the Internet.
    Type: Grant
    Filed: July 3, 1997
    Date of Patent: July 24, 2001
    Assignee: AT&T Corp.
    Inventors: John Blakeway Lacy, Schuyler Reynier Quackenbush, James H. Snyder
  • Patent number: 6219420
    Abstract: A processor (22) of an encryption system (20) receives plain text (24) and operates an encryption algorithm to convert the plain text (24) to cipher text (26). A state monitor (30) confirms a conversion sequence within each of a plurality of conversion cycles performed by the encryption algorithm. The state monitor (30) produces a first enablement signal (38) when the conversion sequence is confirmed. An encryption activity monitor (34) determines a number of blocks of cipher text (24) that are not encrypted. The encryption activity monitor (34) produces a second enablement signal (42) when the number of unencrypted blocks of cipher text (26) is less than a predetermined failure threshold (86). A monitor gate (36) enables output of the cipher text (26) in response to the first and second enablement signals (38, 42).
    Type: Grant
    Filed: September 2, 1998
    Date of Patent: April 17, 2001
    Assignee: Motorola, Inc.
    Inventors: Douglas Allan Hardy, Steven Robert Tugenberg
  • Patent number: 6157720
    Abstract: In the process of compressing and encrypting data, without increase of a processing time, a cipher capability is secured against the latest cryptanalysis such as differential and linear cryptanalyses. The differential and linear cryptanalyses are executed to collect plural pair of plaintext and cryptosystem for the same key and perform the statistical operation for estimating the key. An I/O process is executed to receive plaintext data and generate a random number. Then, an operation is executed to generate a different key for each data on the random number and set the key to a work key. The encrypted intermediate result or the pre-encrypted result is fed back for frequently changing the work key. These series of operations makes it possible to protect the ciphertext from the differential and the linear cryptanalyses.
    Type: Grant
    Filed: February 26, 1997
    Date of Patent: December 5, 2000
    Assignee: Hitachi, Ltd.
    Inventors: Hiroshi Yoshiura, Kazuo Takaragi, Mayuko Shimizu
  • Patent number: 6154542
    Abstract: A method and apparatus for simultaneously encrypting and compressing data identifies an encryption key and uses the encryption key to identify one compression algorithm from a set of compression algorithms. The data is then compressed according to the one compression algorithm.
    Type: Grant
    Filed: December 17, 1997
    Date of Patent: November 28, 2000
    Assignee: Apple Computer, Inc.
    Inventor: Richard E. Crandall
  • Patent number: 6141421
    Abstract: A method and apparatus for generating a highly secured hash value without deteriorating the processing speed is provided. A hash function such that when a message M is given, the message M is compressed so as to have a certain kind of characteristics of cipher is realized. In a step, (1) one to one expanding process so that divided data of the message is inputted and longer data is outputted is executed, and (2) a plurality of cyclic shifting processes in which the number of shifting is different are executed. Consequently, the hash function can be calculated at higher speed than a conventional method of simple repetitive compression of divided data of a message.
    Type: Grant
    Filed: December 8, 1997
    Date of Patent: October 31, 2000
    Assignee: Hitachi, Ltd.
    Inventors: Kazuo Takaragi, Hiroyuki Kurumatani
  • Patent number: 6122378
    Abstract: An information processing system including a data input means (203, 208, 217, 219) for inputting or receiving data, a data compressing means (206) for compressing the data, a decompressing means (221) for decompressing the compressed data and a main storage (209, 222) is provided with an encrypting means (207) for encrypting the data and a decrypting means (220) for decrypting the encrypted data.
    Type: Grant
    Filed: March 5, 1998
    Date of Patent: September 19, 2000
    Assignee: Hitachi, Ltd.
    Inventors: Hiroshi Yoshiura, Kazuo Takaragi, Yusuke Hino, Yutaka Otsu
  • Patent number: 6122379
    Abstract: A method and apparatus for performing simultaneous data compression and encryption both compresses and encrypts data in a single step. The invention includes a novel modeling method for use in conjunction with a coder, such as an arithmetic coder. The modeling method introduces randomness into the compression process, with the result that the output stream is secure.
    Type: Grant
    Filed: May 30, 1997
    Date of Patent: September 19, 2000
    Assignee: Deloitte & Touche Inc.
    Inventor: Abbulkader Omar Barbir
  • Patent number: 6072873
    Abstract: In order to implement the Digital Video Broadcasting descrambling algorithm in the context of MPEG compressed data streams containing interleaved sections of scrambled and unscrambled data, at a data rate of 60 MBits/sec with a clock of 2.7 MHz, a stream cipher has an input to receive scrambled video data, and an output coupled to a block cipher for providing descrambled data, the stream cipher comprises shift register means for holding input data coupled to a first mapping logic mechanism comprising at least a first logic means and a second logic means coupled in sequence and arranged to carry out similar logical steps, and the block cipher means comprising shift register means for holding the output of the stream cipher means and a second logic mapping mechanism, comprising at least a first logic means, a second logic means, a third logic means and a fourth logic means coupled in sequence being arranged to carry out similar logical steps.
    Type: Grant
    Filed: March 3, 1998
    Date of Patent: June 6, 2000
    Assignee: LSI Logic Corporation
    Inventor: Simon Bewick
  • Patent number: 6041409
    Abstract: Various aspects of data security such as validation, authentication and encryption are accomplished by the combinations of encoding and decoding employing a mapping or inverse mapping controllable by a key k, between a source document x and a transformed document y or a highly compressed transformed document v. In the preferred embodiment, a single mapping module is the basis for an expedient and economic implementation of a unified and comprehensive data security system.
    Type: Grant
    Filed: April 14, 1998
    Date of Patent: March 21, 2000
    Inventor: Liu Zunquan