Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5917830A
Filed: 1996-10-18
Issued: 1999-06-29
Patent Holder: (Original Assignee) General Instrument Corp     (Current Assignee) Google Technology Holdings LLC
Inventor(s): David Chen, Weidong Mao

Title: Splicing compressed packetized digital video streams

[FEATURE ID: 1] methodprocedure, computerized method, device, scheme, methodology, methods, technique[FEATURE ID: 1] method
[FEATURE ID: 2] data, endinformation, frames, bits, payload, each, media, signals[FEATURE ID: 2] data, packets, compressed digital data
[FEATURE ID: 3] transmitter, receiversystem, server, device, channel, user, client, stream[FEATURE ID: 3] primary stream, decoder
[TRANSITIVE ID: 4] comprisingincluding, with, of, containing, and, having, wherein[TRANSITIVE ID: 4] comprising, indicating
[TRANSITIVE ID: 5] providing, inserting, ascertaining, accepting, rejecting, ascertainingtransmitting, establishing, receiving, obtaining, defining, using, sending[TRANSITIVE ID: 5] providing, determining
[FEATURE ID: 6] application protocolinput, application, event, output[FEATURE ID: 6] anchor frame
[FEATURE ID: 7] whole RTP packet payloadblock, position, payload, segment, stream, field, sequence[FEATURE ID: 7] pre-splicing packet, first packet, post-slicing packet, number L, program specific information, packet, code
[FEATURE ID: 8] RTP packet level authentication data, timestamp, further parameter, cryptographic checksumpacket, message, parameter, data, protocol, value, time[FEATURE ID: 8] start signal, signal, post-splicing packet, packet identifier
[FEATURE ID: 9] claimpreceding claim, of claim, paragraph, item, figure, embodiment, clair[FEATURE ID: 9] claim
[FEATURE ID: 10] protocol data unit availableconnection, system, response, communication[FEATURE ID: 10] accordance
[FEATURE ID: 11] leastminus, lea, most, feast, lease[FEATURE ID: 11] least
[FEATURE ID: 12] sequence numberdata, field, packet, value, date, number[FEATURE ID: 12] information
[FEATURE ID: 13] parametersfunctions, procedures, operations, methods[FEATURE ID: 13] steps
[FEATURE ID: 14] virtueinformation, one, parameters, each[FEATURE ID: 14] respective data rates
1 . A method [FEATURE ID: 1]

for transmitting data [FEATURE ID: 2]

from a transmitter [FEATURE ID: 3]

to a receiver [FEATURE ID: 3]

, comprising [TRANSITIVE ID: 4]

: providing [TRANSITIVE ID: 5]

transmitter - to - receiver authentication at a Real Time Transport Protocol ( RTP ) packet level as an application protocol [FEATURE ID: 6]

on an application layer by inserting [TRANSITIVE ID: 5]

, at the transmitter , authentication data at end [FEATURE ID: 2]

of a whole RTP packet payload [FEATURE ID: 7]

; ascertaining [TRANSITIVE ID: 5]

, by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 8]

; and accepting [TRANSITIVE ID: 5]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting [TRANSITIVE ID: 5]

the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 9]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 10]

on the application layer , and the application protocol being linked to a secret by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least [FEATURE ID: 11]

one of a sequence number [FEATURE ID: 12]

and a timestamp [FEATURE ID: 8]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 5]

includes cryptographic verification using parameters [FEATURE ID: 13]

and including at least one of a decryption operation and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter [FEATURE ID: 8]

, particularly by virtue [FEATURE ID: 14]

of an encryption operation and a cryptographic checksum [FEATURE ID: 8]

1 . A method [FEATURE ID: 1]

for splicing a secondary packetized data stream with a primary packetized data stream , comprising [TRANSITIVE ID: 4]

the steps [FEATURE ID: 13]

of : providing [TRANSITIVE ID: 5]

a start signal [FEATURE ID: 8]

indicating [TRANSITIVE ID: 4]

a time to initiate said splicing ; determining [TRANSITIVE ID: 5]

a pre-splicing packet [FEATURE ID: 7]

of said primary stream [FEATURE ID: 3]

according to said start signal [FEATURE ID: 8]

; providing an output stream where a first packet [FEATURE ID: 7]

of said secondary stream is positioned to follow said pre-splicing packet ; determining a post-slicing packet [FEATURE ID: 7]

of said primary stream which follows said pre-splicing packet ; discarding data [FEATURE ID: 2]

of said pre-splicing packet which is associated with said post-splicing packet [FEATURE ID: 8]

; and adding an amount of stuffing data to said pre-splicing packet according to the amount of data discarded . 2 . A method in accordance [FEATURE ID: 10]

with claim [FEATURE ID: 9]

1 , wherein the packets [FEATURE ID: 2]

of said primary stream and said secondary stream have identifying data associated therewith , comprising the further steps of : retrieving said identifying data of said primary stream ; and replacing said identifying data of said secondary stream with said identifying data of said primary stream . 3 . A method in accordance with claim 1 , comprising the further steps of : providing a number L [FEATURE ID: 7]

of null packets in said output stream to prevent a buffer overflow at a decoder [FEATURE ID: 3]

which receives said output stream ; and inserting said null packets between said pre-splicing packet and said first packet ; wherein said number L is determined according to respective data rates [FEATURE ID: 14]

of said primary and secondary streams and according to a decoding delay time of said decoder . 4 . A method in accordance with claim 2 , wherein : the replaced identifying information [FEATURE ID: 12]

of said secondary stream comprises at least [FEATURE ID: 11]

one of program specific information [FEATURE ID: 7]

( PSI ) and packet identifier [FEATURE ID: 8]

( PID ) information . 5 . A method in accordance with claim 1 , wherein said pre-splicing packet is a packet [FEATURE ID: 7]

of said primary stream with an anchor frame [FEATURE ID: 6]

start code [FEATURE ID: 7]

which is closest to said start time . 6 . A method in accordance with claim 1 , wherein said primary stream carries compressed digital data [FEATURE ID: 2]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: EP0769230A2
Filed: 1995-05-04
Issued: 1997-04-23
Patent Holder: (Original Assignee) Koninklijke Philips Electronics NV; Philips Electronics NV; Philips Norden AB     (Current Assignee) Koninklijke Philips NV ; Philips Norden AB
Inventor(s): Carel Jan Leendert Van Driel, Petrus Augustinus Maria Van Grinsven

Title: Telecommunication network with improved access protocol

[TRANSITIVE ID: 1] transmittingsupplying, transferring, providing, receiving, transmission, sending, communicating[TRANSITIVE ID: 1] transmitting
[FEATURE ID: 2] data, parametersinformation, messages, traffic, bits, signals, payload, same[FEATURE ID: 2] allocation signal payload data, payload data, short information cells
[FEATURE ID: 3] transmitterreceiver, terminal, transmission, network[FEATURE ID: 3] secondary station
[FEATURE ID: 4] receiver, acceptingreceiving, transmitting, transceiver, recipient, processing, reception, decoding[FEATURE ID: 4] payload reception
[TRANSITIVE ID: 5] comprising, insertingincluding, having, containing, providing, includes, featuring, presenting[TRANSITIVE ID: 5] comprising, comprises
[FEATURE ID: 6] receiver authentication, cryptographic checksumsession, message, receiver, channel, link, communication, time[FEATURE ID: 6] timeslot
[FEATURE ID: 7] whole RTP packet payloadpacket, burst, frame, symbol, payload, transmission, sequence[FEATURE ID: 7] turn, single synchronous transfer mode cell
[FEATURE ID: 8] RTP packet level authentication datatransmission, data, response, request, message, reception, information[FEATURE ID: 8] transmission request signal, transmission request signals, payload, request reception
[FEATURE ID: 9] claimfigure, paragraph, preceding claim, clair, requirement, item, aspect[FEATURE ID: 9] claim
[FEATURE ID: 10] protocol data unit available, sequence number, timestamppayload, header, protocol, transmission, type, length, count[FEATURE ID: 10] transmission medium, allocation, size
[FEATURE ID: 11] leastmost, feast, lease, rest[FEATURE ID: 11] least pardy
1 . A method for transmitting [TRANSITIVE ID: 1]

data [FEATURE ID: 2]

from a transmitter [FEATURE ID: 3]

to a receiver [FEATURE ID: 4]

, comprising [TRANSITIVE ID: 5]

: providing transmitter - to - receiver authentication [FEATURE ID: 6]

at a Real Time Transport Protocol ( RTP ) packet level as an application protocol on an application layer by inserting [TRANSITIVE ID: 5]

, at the transmitter , authentication data at end of a whole RTP packet payload [FEATURE ID: 7]

; ascertaining , by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 8]

; and accepting [TRANSITIVE ID: 4]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 9]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 10]

on the application layer , and the application protocol being linked to a secret by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least [FEATURE ID: 11]

one of a sequence number [FEATURE ID: 10]

and a timestamp [FEATURE ID: 10]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters [FEATURE ID: 2]

and including at least one of a decryption operation and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter , particularly by virtue of an encryption operation and a cryptographic checksum [FEATURE ID: 6]

1 . Telecommunication network comprising [TRANSITIVE ID: 5]

a primary station and a plurality of secondary stations , the secondary stations being linked to the primary station via a transmission medium [FEATURE ID: 10]

being at least partly in common for a number of secondary stations , characterised in that the secondary stations comprise request transmitting [TRANSITIVE ID: 1]

means for transmitting a transmission request signal [FEATURE ID: 8]

to the primary station , the primary station comprises [TRANSITIVE ID: 5]

allocation [FEATURE ID: 10]

transmitting means for transmitting an allocation signal to the secondary stations in response to transmission request signals [FEATURE ID: 8]

received , in that the secondary stations comprise payload [FEATURE ID: 8]

transmitting means for transmitting in response to the allocation signal payload data [FEATURE ID: 2]

in turn [FEATURE ID: 7]

to the primary station , and in that the request transmitting means are arranged to transmit a transmission request signal to the primary station directly after transmission of payload data [FEATURE ID: 2]

by the secondary stations . 2 . Telecommunication network according to claim [FEATURE ID: 9]

1 , characterised in that the request transmitting means of a secondary station [FEATURE ID: 3]

are arranged for transmitting the transmission request signal during a timeslot [FEATURE ID: 6]

associated to said secondary station . 3 . Telecommunication network according to claim 1 or 2 , characterised in that the allocation transmitting means are arranged for transmitting the transmission request signals as received by the primary station , as allocation signal . 4 . Telecommunication network according to one of the claims 1 to 3 , characterised in that the payload transmitting means are arranged for transmitting in a predetermined number of symbol intervals a integer plurality of short information cells [FEATURE ID: 2]

, or one single synchronous transfer mode cell [FEATURE ID: 7]

. 5 . Telecommunication network according to claim 4characterised in that the short information cells have a size [FEATURE ID: 10]

of sixteen bytes , and in that the predetermined number of short information cells is equal to four . 6 . Telecommunication network according to claim 5 , characterised in that the short information cells have a four byte header , and in that a the synchronous transfer mode cell is provided with an additional four byte header . 7 . Telecommunication network according to claim 4characterised in that the short information cells have a size of nine bytes , and in that the predetermined number of short information cells is equal to six . 8 . Telecommunication network according to claim 7 , characterised in that the short information cells have a one byte header , and in that a the synchronous transfer mode cell is provided with an additional one byte header . 9 . Secondary station , for use in a telecommunication network , in which a plurality of secondary stations are linked to a primary station via a transmission medium being at least partly in common for a number of secondary stations , characterised in that the secondary station comprise request transmitting means for transmitting a transmission request signal , in that the secondary station comprises payload transmitting means for transmitting in response to an allocation signal payload data to the primary station , and in that the request transmitting means are arranged to transmit a transmission request signal to the primary station directly after transmission of payload data by the secondary stations . 10 . Secondary station according to claim 9 , characterised in that the request transmitting means are arranged for transmitting the transmission request signal during a timeslot associated to said secondary station . 11 . Secondary station according to claim 9 or 10 , characterised in that the payload transmitting means are arranged for transmitting in a predetermined number of symbol intervals a integer plurality of short information cells , or a single synchronous transfer mode cell . 12 . Primary station , for use in a telecommunication network in which a plurality of secondary stations are linked to the primary station via a transmission medium being at least pardy [FEATURE ID: 11]

in common for a number of secondary stations , characterised in that the primary station comprises request reception [FEATURE ID: 8]

means for receiving a transmission request signal transmitted by secondary stations , the primary station comprises allocation transmitting means for transmitting an allocation signal to the secondary stations in response to transmission request signals received , in that primary station comprises payload reception [FEATURE ID: 4]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5621798A
Filed: 1995-04-18
Issued: 1997-04-15
Patent Holder: (Original Assignee) Intel Corp     (Current Assignee) Micron Technology Inc
Inventor(s): David W. Aucsmith

Title: Method and apparatus for cooperative messaging

[FEATURE ID: 1] method, cryptographic checksummeans, system, device, protocol, wireless method, computerized method, receiver[FEATURE ID: 1] cooperative messaging logic, method
[TRANSITIVE ID: 2] transmitting, ascertaining, accepting, rejecting, ascertainingprocessing, forwarding, sending, exchanging, transferring, communicating, delivering[TRANSITIVE ID: 2] transmitting, receiving, storing, controlling, retransmitting
[FEATURE ID: 3] data, protocol data unit availablecommunication, information, signals, response, frames, message, contents[FEATURE ID: 3] broadcast messages, messages
[FEATURE ID: 4] transmitter, receiver, receiver authenticationtransceiver, network, server, message, computer, device, transmission[FEATURE ID: 4] wireless network apparatus, wired communication network, transmitter, mobile communication device, other mobile communication devices, wireless transmitter, wireless medium
[TRANSITIVE ID: 5] comprising, providing, insertingincluding, combining, having, defining, with, of, and[TRANSITIVE ID: 5] comprising, using, central processing unit sharing
[FEATURE ID: 6] application protocol, application layerapplication, element, input, object, entity, output, event[FEATURE ID: 6] outbound message, outgoing message queue
[FEATURE ID: 7] whole RTP packet payloadpacket, transmission, communication, call[FEATURE ID: 7] message
[FEATURE ID: 8] RTP packet level authentication data, key pair, sequence number, way hash function, message authentication code, decryption operation, further parameterkey, signature, message, function, value, parameter, password[FEATURE ID: 8] confirmation message, unique identifier
[FEATURE ID: 9] claimfigure, preceding claim, item, of claim, embodiment, clair, requirement[FEATURE ID: 9] claim
[FEATURE ID: 10] secretpredetermined, value, password, parameter[FEATURE ID: 10] message age limit
[FEATURE ID: 11] timestampdeadline, stamp, date, flag[FEATURE ID: 11] time stamp
[FEATURE ID: 12] parametersfunctions, operations, data, messages, information, methods, addresses[FEATURE ID: 12] memory, steps
1 . A method [FEATURE ID: 1]

for transmitting [TRANSITIVE ID: 2]

data [FEATURE ID: 3]

from a transmitter [FEATURE ID: 4]

to a receiver [FEATURE ID: 4]

, comprising [TRANSITIVE ID: 5]

: providing [TRANSITIVE ID: 5]

transmitter - to - receiver authentication [FEATURE ID: 4]

at a Real Time Transport Protocol ( RTP ) packet level as an application protocol [FEATURE ID: 6]

on an application layer [FEATURE ID: 6]

by inserting [TRANSITIVE ID: 5]

, at the transmitter , authentication data at end of a whole RTP packet payload [FEATURE ID: 7]

; ascertaining [TRANSITIVE ID: 2]

, by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 8]

; and accepting [TRANSITIVE ID: 2]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting [TRANSITIVE ID: 2]

the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 9]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 3]

on the application layer , and the application protocol being linked to a secret [FEATURE ID: 10]

by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair [FEATURE ID: 8]

for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number [FEATURE ID: 8]

and a timestamp [FEATURE ID: 11]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation performed using one of a one - way hash function [FEATURE ID: 8]

and a message authentication code [FEATURE ID: 8]

with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 2]

includes cryptographic verification using parameters [FEATURE ID: 12]

and including at least one of a decryption operation [FEATURE ID: 8]

and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter [FEATURE ID: 8]

, particularly by virtue of an encryption operation and a cryptographic checksum [FEATURE ID: 1]

1 . A wireless network apparatus [FEATURE ID: 4]

, said wireless network apparatus comprising [TRANSITIVE ID: 5]

the elements of : a wired communication network [FEATURE ID: 4]

; at least one transmitter [FEATURE ID: 4]

/ receiver base station , said transmitter / receiver base station coupled to said wired communication network ; at least one mobile communication device [FEATURE ID: 4]

, said mobile communication device comprising the elements of a transmitter / receiver component , said transmitter / receiver component for transmitting [TRANSITIVE ID: 2]

outbound messages and for receiving [TRANSITIVE ID: 2]

broadcast messages [FEATURE ID: 3]

from said transmitter / receiver base station and other mobile communication devices [FEATURE ID: 4]

; a memory unit , said memory unit for storing [TRANSITIVE ID: 2]

messages [FEATURE ID: 3]

; and a cooperative messaging logic [FEATURE ID: 1]

for controlling [TRANSITIVE ID: 2]

said transmitter / receiver component , said cooperative messaging logic for periodically retransmitting [TRANSITIVE ID: 2]

an outbound message [FEATURE ID: 6]

using [TRANSITIVE ID: 5]

said transmitter / receiver component until a corresponding confirmation message [FEATURE ID: 8]

is received . 2 . The apparatus as claimed in claim [FEATURE ID: 9]

1 wherein said mobile communication device further comprises a central processing unit , said central processing unit sharing [FEATURE ID: 5]

said memory unit with said cooperative messaging logic . 3 . The apparatus as claimed in claim 2 wherein said mobile communication device further comprises memory allocation means , said memory allocation means for allocating memory [FEATURE ID: 12]

between said cooperative messaging logic and said central processing unit . 4 . The apparatus as claimed in claim 1 wherein said mobile communication device further comprises a clock unit , said clock unit for placing a time stamp [FEATURE ID: 11]

on outbound messages . 5 . A method [FEATURE ID: 1]

of distributing messages , said method comprising the steps [FEATURE ID: 12]

of : generating an outgoing message in a mobile communication device ; assigning a unique identifier [FEATURE ID: 8]

to said outgoing message ; placing said outgoing message and unique identifier in an outgoing message queue [FEATURE ID: 6]

; and periodically transmitting said outgoing message with a wireless transmitter [FEATURE ID: 4]

until said mobile communication device receives a confirmation message having said unique identifier . 6 . The method of distributing messages as claimed in claim 5 further comprising the step of : encrypting said outgoing message in said mobile communication device . 7 . The method of distributing messages as claimed in claim 5 further comprising the steps of : assigning a time stamp to said outgoing message ; and deleting said outgoing message from outgoing message queues in a plurality of other mobile communication devices if said time stamp indicates said outgoing message is older than a message age limit [FEATURE ID: 10]

. 8 . A method of distributing messages , said method comprising the steps of : receiving a message [FEATURE ID: 7]

addressed to a device other than said mobile communication device , said message having a time stamp ; placing said message addressed to a device other than said mobile communication device in an outgoing message queue ; and transmitting said message addressed to a device other than said mobile communication device from said outgoing message queue onto a wireless medium [FEATURE ID: 4]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5602918A
Filed: 1995-12-22
Issued: 1997-02-11
Patent Holder: (Original Assignee) Virtual Open Network Environment Corp     (Current Assignee) SSL SERVICES LLC
Inventor(s): James F. Chen, Jieh-Shan Wang

Title: Application level security system and method

[FEATURE ID: 1] method, receivermeans, protocol, network, node, computer, terminal, solution[FEATURE ID: 1] system
[FEATURE ID: 2] data, protocol data unit available, encryption operationmessages, traffic, signaling, signals, calls, transmission, information[FEATURE ID: 2] access, communications, communication
[FEATURE ID: 3] transmitter, receiver authenticationclient, user, computer, network, terminal, device, server[FEATURE ID: 3] secured party, unsecured party, smartcard reader, smartcard, client node, gateway processor, card holder, smart card, communications line, key server
[TRANSITIVE ID: 4] comprisingincluding, containing, includes, with, and, featuring, of[TRANSITIVE ID: 4] comprising, having
[TRANSITIVE ID: 5] providing, inserting, accepting, ascertainingallowing, using, receiving, setting, permitting, transmitting, creating[TRANSITIVE ID: 5] establishing
[FEATURE ID: 6] application protocol, application layerendpoint, infrastructure, object, application, api, network, interface[FEATURE ID: 6] open unsecured network
[FEATURE ID: 7] whole RTP packet payloadtransmission, transaction, service, token, payload, protocol, sequence[FEATURE ID: 7] further communications, digital signature
[FEATURE ID: 8] RTP packet level authentication data, parameters, key informationverification, parameter, key, signature, data, message, certificate[FEATURE ID: 8] code, second session key
[FEATURE ID: 9] claimfigure, paragraph, any, preceding claim, clair, requirement, either claim[FEATURE ID: 9] claim
[FEATURE ID: 10] secret, key, symmetric encryption, timestamp, decryption operation, cryptographic checksum check, further parameter, cryptographic checksumcipher, password, value, code, session, nonce, signature[FEATURE ID: 10] shared, secret key, session keys, secret code, first session key
[FEATURE ID: 11] key pairnumber, combination, code, value, password[FEATURE ID: 11] second random number
[FEATURE ID: 12] sequence number, way hash functionvalue, sequence, function, part, number, key, hash[FEATURE ID: 12] combination
[FEATURE ID: 13] message authentication code, virtueconcatenation, comparison, message, hash, calculation, generation, digest[FEATURE ID: 13] portion
1 . A method [FEATURE ID: 1]

for transmitting data [FEATURE ID: 2]

from a transmitter [FEATURE ID: 3]

to a receiver [FEATURE ID: 1]

, comprising [TRANSITIVE ID: 4]

: providing [TRANSITIVE ID: 5]

transmitter - to - receiver authentication [FEATURE ID: 3]

at a Real Time Transport Protocol ( RTP ) packet level as an application protocol [FEATURE ID: 6]

on an application layer [FEATURE ID: 6]

by inserting [TRANSITIVE ID: 5]

, at the transmitter , authentication data at end of a whole RTP packet payload [FEATURE ID: 7]

; ascertaining , by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 8]

; and accepting [TRANSITIVE ID: 5]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 9]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 2]

on the application layer , and the application protocol being linked to a secret [FEATURE ID: 10]

by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key [FEATURE ID: 10]

for symmetric encryption [FEATURE ID: 10]

and a key pair [FEATURE ID: 11]

for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number [FEATURE ID: 12]

and a timestamp [FEATURE ID: 10]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation [FEATURE ID: 2]

performed using one of a one - way hash function [FEATURE ID: 12]

and a message authentication code [FEATURE ID: 13]

with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 5]

includes cryptographic verification using parameters [FEATURE ID: 8]

and including at least one of a decryption operation [FEATURE ID: 10]

and a cryptographic checksum check [FEATURE ID: 10]

. 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter [FEATURE ID: 10]

, particularly by virtue [FEATURE ID: 13]

of an encryption operation and a cryptographic checksum [FEATURE ID: 10]

and key information [FEATURE ID: 8]

1 . A system [FEATURE ID: 1]

for establishing [TRANSITIVE ID: 5]

secured communications pathways across an open unsecured network [FEATURE ID: 6]

between a secured party [FEATURE ID: 3]

and a possibly unsecured party [FEATURE ID: 3]

, without compromising the security of either of the parties , comprising [TRANSITIVE ID: 4]

: a smartcard reader [FEATURE ID: 3]

and a smartcard [FEATURE ID: 3]

located at a client node [FEATURE ID: 3]

of the unsecured party , the smartcard having [TRANSITIVE ID: 4]

stored thereon a shared [TRANSITIVE ID: 10]

secret key [FEATURE ID: 10]

known to the secured party ; a gateway processor [FEATURE ID: 3]

which controls access [FEATURE ID: 2]

from the open unsecured network to said secured party and having access to the shared secret key ; means for authenticating communications [FEATURE ID: 2]

between the respective parties based on said shared secret key and for generating session keys [FEATURE ID: 10]

, wherein the smartcard reader includes means for prompting a card holder [FEATURE ID: 3]

to enter a secret code [FEATURE ID: 10]

and for confirming the code [FEATURE ID: 8]

in order to authenticate the card holder before permitting further communications [FEATURE ID: 7]

, and wherein the means for authenticating communication [FEATURE ID: 2]

between the respective parties and for generating the session keys comprises : means associated with the gateway processor for generating a first number and sending the first number to the smart card [FEATURE ID: 3]

; means on the smartcard for encrypting the first number by the shared secret key ; means on the smartcard for generating a second number and encrypting a combination [FEATURE ID: 12]

of the encrypted first number and the second number ; means in the gateway processor for verifying whether the first number has been encrypted by the shared secret key , thereby authenticating the smartcard ; means in the gateway processor for generating a first session key [FEATURE ID: 10]

by combining the encrypted first number with the second number and encrypting the combination ; means in the gateway processor for encrypting the second number by the shared secret key ; means in the smartcard for verifying whether the second random number [FEATURE ID: 11]

has been encrypted by the shared secret key and thereby authenticating the gateway processor ; and means in the smartcard for combining the encrypted first number with the second number and encrypting same to generate a second session key [FEATURE ID: 8]

corresponding to the first session key generated by the gateway processor ; and means for encrypting further communications between the respective parties using the first and second session keys . 2 . A system as claimed in claim [FEATURE ID: 9]

1 , wherein the secured party is connected by means of a secured communications line [FEATURE ID: 3]

with a key server [FEATURE ID: 3]

, and the further communications include a portion [FEATURE ID: 13]

of a digital signature [FEATURE ID: 7]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5371794A
Filed: 1993-11-02
Issued: 1994-12-06
Patent Holder: (Original Assignee) Sun Microsystems Inc     (Current Assignee) Sun Microsystems Inc
Inventor(s): Whitfield Diffie, Ashar Aziz

Title: Method and apparatus for privacy and authentication in wireless networks

[FEATURE ID: 1] method, application layer, protocol data unit available, encryption operationagreement, application, algorithm, protocol, exchange, system, procedure[FEATURE ID: 1] improved method
[TRANSITIVE ID: 2] transmitting, verificationprocessing, sending, communicating, supplying, passing, analyzing, checking[TRANSITIVE ID: 2] transmitting, receiving
[FEATURE ID: 3] transmitter, receiveruser, client, server, sender, message, computer, channel[FEATURE ID: 3] second data processing device, chosen, first certificate authority
[TRANSITIVE ID: 4] comprising, insertingincorporating, includes, having, involving, with, containing, and[TRANSITIVE ID: 4] comprising, including
[TRANSITIVE ID: 5] providing, accepting, ascertainingperforming, allowing, using, obtaining, creating, permitting, processing[TRANSITIVE ID: 5] providing, verifying
[FEATURE ID: 6] receiver authenticationreceiver, sender, message, recipient, verifier[FEATURE ID: 6] second signature
[FEATURE ID: 7] application protocolimplementation, extension, input, algorithm, output[FEATURE ID: 7] identifier
[FEATURE ID: 8] whole RTP packet payloadpacket, communication, data, transmission, token[FEATURE ID: 8] third message
[TRANSITIVE ID: 9] ascertainingdetermining, confirming, calculating, computing, examining, obtaining, identifying[TRANSITIVE ID: 9] verifying
[FEATURE ID: 10] RTP packet level authentication data, timestamp, message authentication code, decryption operation, further parameter, cryptographic checksum, key informationkey, message, parameter, signature, password, header, secret[FEATURE ID: 10] secure communications, mobile public key, first signature, base public key, second digital signature, value RN2, digital signature
[FEATURE ID: 11] secret, key, cryptographic checksum checkpassword, parameter, value, cipher, public, private, code[FEATURE ID: 11] challenge value, shared, private key
[FEATURE ID: 12] key pairpassword, secret, seed, parameter, key, counter, result[FEATURE ID: 12] random number, first session key
[FEATURE ID: 13] sequence numbersequence, number, length, key, signature[FEATURE ID: 13] value
[FEATURE ID: 14] parametersfunctions, numbers, identities, protocols, operations, methods, codes[FEATURE ID: 14] key algorithms
1 . A method [FEATURE ID: 1]

for transmitting [TRANSITIVE ID: 2]

data from a transmitter [FEATURE ID: 3]

to a receiver [FEATURE ID: 3]

, comprising [TRANSITIVE ID: 4]

: providing [TRANSITIVE ID: 5]

transmitter - to - receiver authentication [FEATURE ID: 6]

at a Real Time Transport Protocol ( RTP ) packet level as an application protocol [FEATURE ID: 7]

on an application layer [FEATURE ID: 1]

by inserting [TRANSITIVE ID: 4]

, at the transmitter , authentication data at end of a whole RTP packet payload [FEATURE ID: 8]

; ascertaining [TRANSITIVE ID: 9]

, by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 10]

; and accepting [TRANSITIVE ID: 5]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting the whole RTP packet payload . 2 . The method as claimed in claim 1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 1]

on the application layer , and the application protocol being linked to a secret [FEATURE ID: 11]

by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key [FEATURE ID: 11]

for symmetric encryption and a key pair [FEATURE ID: 12]

for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number [FEATURE ID: 13]

and a timestamp [FEATURE ID: 10]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation [FEATURE ID: 1]

performed using one of a one - way hash function and a message authentication code [FEATURE ID: 10]

with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 5]

includes cryptographic verification using parameters [FEATURE ID: 14]

and including at least one of a decryption operation [FEATURE ID: 10]

and a cryptographic checksum check [FEATURE ID: 11]

. 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter [FEATURE ID: 10]

, particularly by virtue of an encryption operation and a cryptographic checksum [FEATURE ID: 10]

and key information [FEATURE ID: 10]

. 9 . The method as claimed in claim 8 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 10 . The method as claimed in claim 8 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number and a timestamp . 11 . The method as claimed in claim 8 , wherein the encryption operation is performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 12 . The method as claimed in claim 8 , wherein said ascertaining includes verification [FEATURE ID: 2]

1 . An improved method [FEATURE ID: 1]

for providing [TRANSITIVE ID: 5]

secure communications [FEATURE ID: 10]

between . a first data processing device and a second data processing device [FEATURE ID: 3]

, comprising [TRANSITIVE ID: 4]

the steps of : ( a ) said first data processing device transmitting [TRANSITIVE ID: 2]

a first message including [TRANSITIVE ID: 4]

: a Mobile Certificate ( Cert -- Mobile ) including a mobile public key [FEATURE ID: 10]

( Pub -- Mobile ) , a chosen [TRANSITIVE ID: 3]

challenge value [FEATURE ID: 11]

( CH1 ) , and a list of supported shared [TRANSITIVE ID: 11]

key algorithms [FEATURE ID: 14]

( SKCS ) , to said second data processing device ; ( b ) said second data processing device receiving [TRANSITIVE ID: 2]

said first message and verifying [TRANSITIVE ID: 5]

a first signature [FEATURE ID: 10]

of a first certificate authority [FEATURE ID: 3]

( CA ) , said second data processing device validating said received Cert -- Mobile , and if said Cert -- Mobile is valid , said second data processing device transmitting a second message including : a Base Certificate ( Cert -- Base ) including a base public key [FEATURE ID: 10]

( Pub -- Base ) , a second digital signature [FEATURE ID: 10]

, a random number [FEATURE ID: 12]

( RN1 ) , and an identifier [FEATURE ID: 7]

of one of said SKCS chosen from said list of supported shared key algorithms , to said first data processing device ; ( c ) said first data processing device receiving said second message and validating said Cert -- Base , and if said Cert -- Base is valid , said first data processing device validating said second signature [FEATURE ID: 6]

of said Cert -- Base using said Pub -- Base , such that if said second signature is valid , said first data processing device determining the value [FEATURE ID: 13]

of RN1 by decrypting the value of E ( Pub -- Mobile , RN1 ) using a private key [FEATURE ID: 11]

of said first data processing device ( Priv -- Mobile ) ; ( d ) said first data processing device generating a value RN2 [FEATURE ID: 10]

and a first session key [FEATURE ID: 12]

having the value ( RN1 ⊕ RN2 ) , said first data processing device encrypting the value of RN2 using said base public key ( Pub -- Base ) , and sending a third message [FEATURE ID: 8]

to said second data processing device including said encrypted RN2 and the value of E ( Pub -- Mobile , RN1 ) along with a digital signature [FEATURE ID: 10]

corresponding to said first data processing device ; ( e ) said second data processing device receiving said third message and verifying [FEATURE ID: 9]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US5345507A
Filed: 1993-09-08
Issued: 1994-09-06
Patent Holder: (Original Assignee) International Business Machines Corp     (Current Assignee) International Business Machines Corp
Inventor(s): Amir Herzberg, Hugo M. Krawczyk, Shay Kutten, Yishay Mansour

Title: Secure message authentication for binary additive stream cipher systems

[FEATURE ID: 1] methodmeans, system, way, first method, reliable method, process, procedure[FEATURE ID: 1] method
[TRANSITIVE ID: 2] transmitting, inserting, rejectingsending, passing, moving, providing, forwarding, using, receiving[TRANSITIVE ID: 2] transmitted, exchanging
[FEATURE ID: 3] data, key, timestamp, message authentication code, decryption operationcipher, secret, nonce, password, code, packet, value[FEATURE ID: 3] message
[FEATURE ID: 4] transmitter, receiver, receiver authentication, further parameter, cryptographic checksummessage, user, channel, server, device, client, recipient[FEATURE ID: 4] communication system, sender, receiver
[TRANSITIVE ID: 5] comprisingincluding, with, and, containing, using, featuring, of[TRANSITIVE ID: 5] comprising, having
[TRANSITIVE ID: 6] providing, accepting, ascertainingusing, obtaining, determining, validating, establishing, allowing, checking[TRANSITIVE ID: 6] verifying, appending
[FEATURE ID: 7] endexpense, place, start, beginning, level, commencement[FEATURE ID: 7] time
[FEATURE ID: 8] whole RTP packet payloadpacket, transaction, byte, transmission, communication, data[FEATURE ID: 8] message M
[TRANSITIVE ID: 9] ascertaining, verificationchecking, verifying, evaluating, computing, querying, obtaining, testing[TRANSITIVE ID: 9] decrypting
[FEATURE ID: 10] RTP packet level authentication datakey, encryption, data, message, response, output, digest[FEATURE ID: 10] encryption key, decrypted residue, message m
[FEATURE ID: 11] claimitem, step, either claim, figure, clair, paragraph, claimed[FEATURE ID: 11] claim
[FEATURE ID: 12] protocol data unit availableresponse, transaction, data, communication, sequence, signal, message[FEATURE ID: 12] reception, message m '
[FEATURE ID: 13] secretpredetermined, value, key, constant[FEATURE ID: 13] predetermined value
[FEATURE ID: 14] key pairnumber, function, code, value, signature[FEATURE ID: 14] polynomial
[FEATURE ID: 15] sequence numbersequence, message, value, number[FEATURE ID: 15] string
[FEATURE ID: 16] encryption operationoperator, identity, integer, element, array, index[FEATURE ID: 16] irreducible polynomial p, arbitrary string S
[FEATURE ID: 17] parametersbits, arguments, numbers, variables[FEATURE ID: 17] coefficients
1 . A method [FEATURE ID: 1]

for transmitting [TRANSITIVE ID: 2]

data [FEATURE ID: 3]

from a transmitter [FEATURE ID: 4]

to a receiver [FEATURE ID: 4]

, comprising [TRANSITIVE ID: 5]

: providing [TRANSITIVE ID: 6]

transmitter - to - receiver authentication [FEATURE ID: 4]

at a Real Time Transport Protocol ( RTP ) packet level as an application protocol on an application layer by inserting [TRANSITIVE ID: 2]

, at the transmitter , authentication data at end [FEATURE ID: 7]

of a whole RTP packet payload [FEATURE ID: 8]

; ascertaining [TRANSITIVE ID: 9]

, by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 10]

; and accepting [TRANSITIVE ID: 6]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting [TRANSITIVE ID: 2]

the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 11]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 12]

on the application layer , and the application protocol being linked to a secret [FEATURE ID: 13]

by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key [FEATURE ID: 3]

for symmetric encryption and a key pair [FEATURE ID: 14]

for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number [FEATURE ID: 15]

and a timestamp [FEATURE ID: 3]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation [FEATURE ID: 16]

performed using one of a one - way hash function and a message authentication code [FEATURE ID: 3]

with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 6]

includes cryptographic verification using parameters [FEATURE ID: 17]

and including at least one of a decryption operation [FEATURE ID: 3]

and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter [FEATURE ID: 4]

, particularly by virtue of an encryption operation and a cryptographic checksum [FEATURE ID: 4]

and key information . 9 . The method as claimed in claim 8 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 10 . The method as claimed in claim 8 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number and a timestamp . 11 . The method as claimed in claim 8 , wherein the encryption operation is performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 12 . The method as claimed in claim 8 , wherein said ascertaining includes verification [FEATURE ID: 9]

1 . In a communication system [FEATURE ID: 4]

, a method [FEATURE ID: 1]

of verifying [TRANSITIVE ID: 6]

the authenticity of a message [FEATURE ID: 3]

transmitted [TRANSITIVE ID: 2]

from a sender [FEATURE ID: 4]

to a receiver [FEATURE ID: 4]

comprising [TRANSITIVE ID: 5]

the steps of : ( a ) secretly exchanging [TRANSITIVE ID: 2]

between the sender and receiver an encryption key [FEATURE ID: 10]

and an irreducible polynomial p [FEATURE ID: 16]

( x ) of degree n ; ( b ) for each message M [FEATURE ID: 8]

to be transmitted by the sender , appending [TRANSITIVE ID: 6]

a leading non-zero string and n tail bits to the message M to generate an augmented message M ' that corresponds to a polynomial [FEATURE ID: 14]

having [TRANSITIVE ID: 5]

coefficients [FEATURE ID: 17]

corresponding to bits of the message M ; ( c ) computing a polynomial residue r resulting from the division of the polynomial corresponding to the augmented message M ' generated in step ( b ) by the polynomial p ( x ) exchanged in step ( a ) ; ( d ) encrypting the residue computed in step ( c ) using the encryption key exchanged in step ( a ) ; ( e ) transmitting the message M and the encrypted residue generated in step ( d ) ; ( f ) decrypting [FEATURE ID: 9]

by the receiver the transmitted encrypted residue at the time [FEATURE ID: 7]

of reception [FEATURE ID: 12]

using the encryption key exchanged in step ( a ) ; ( g ) concatenating the decrypted residue [FEATURE ID: 10]

in step ( f ) with a received message m [FEATURE ID: 10]

and appending a non-zero leading string [FEATURE ID: 15]

to generate an augmented received message m ' [FEATURE ID: 12]

; ( h ) computing a residue r of a division between a polynomial represented by the augmented message m ' and the polynomial p ( x ) exchanged in step ( a ) ; and ( i ) accepting the received message m as authentic only if the residue computed in step ( h ) is a predetermined value [FEATURE ID: 13]

. 2 . The method recited in claim [FEATURE ID: 11]

1 wherein the step ( b ) is performed by appending a leading bit " 1 " as the non-zero string . 3 . The method recited in claim 1 wherein the step ( b ) is performed by appending n " 0s " as the tail bits and the predetermined value in step ( i ) is zero . 4 . The method recited in claim 1 wherein the step ( b ) is performed by appending an arbitrary string S [FEATURE ID: 16]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US4926475A
Filed: 1988-11-30
Issued: 1990-05-15
Patent Holder: (Original Assignee) Motorola Inc     (Current Assignee) NOTOROLA Inc SCHAUMBURG IL A DE CORP ; Motorola Solutions Inc
Inventor(s): Mark G. Spiotta, Erling Bjerga

Title: Data encryption key failure monitor

[FEATURE ID: 1] methodmeans, system, process, device, security method, methodology, methods[FEATURE ID: 1] method, test circuit
[TRANSITIVE ID: 2] transmittingsupplying, receiving, securing, providing[TRANSITIVE ID: 2] storing
[FEATURE ID: 3] data, authentication data, protocol data unit available, message authentication code, parametersinformation, communication, messages, results, images, transmissions, key[FEATURE ID: 3] data, plain data, encryption signals
[FEATURE ID: 4] transmitter, receiver, receiver authenticationterminal, transceiver, network, computer, user, client, sender[FEATURE ID: 4] first input, digital multiplexor
[TRANSITIVE ID: 5] comprisingincluding, and, by, having, involving, containing[TRANSITIVE ID: 5] using
[TRANSITIVE ID: 6] providingcreating, making, determining, establishing, obtaining[TRANSITIVE ID: 6] generating
[FEATURE ID: 7] application protocoloutput, action, activity, error, indication, implementation, operation[FEATURE ID: 7] encryption key, invalid encryption key
[FEATURE ID: 8] application layerinterconnection, apparatus, algorithm, interface, infrastructure, architecture[FEATURE ID: 8] encryption key monitoring system
[TRANSITIVE ID: 9] insertingdetermining, using, providing, storing[TRANSITIVE ID: 9] monitoring
[TRANSITIVE ID: 10] ascertaining, ascertaining, verificationchecking, monitoring, verifying, confirming, examining, identifying, detecting[TRANSITIVE ID: 10] testing, encryption key testing, determining
[FEATURE ID: 11] RTP packet level authentication data, symmetric encryption, key pair, asymmetric encryption, sequence number, timestamp, cryptographic checksumkey, data, message, value, signature, cipher, parameter[FEATURE ID: 11] unencrypted data signals, data signal, data encryption, encryption
[FEATURE ID: 12] claimitem, paragraph, preceding claim, figure, embodiment[FEATURE ID: 12] claim
[FEATURE ID: 13] secretpredetermined, code, value, parameter[FEATURE ID: 13] test signal
[FEATURE ID: 14] leastmost, least of, lease, the least[FEATURE ID: 14] least
[FEATURE ID: 15] encryption operationidentification, identity, evaluation, index[FEATURE ID: 15] indication
[FEATURE ID: 16] cryptographic verificationencryption, authentication, security, cryptographic[FEATURE ID: 16] encrypted
[FEATURE ID: 17] virtueone, generation, processing, execution, any, each, verification[FEATURE ID: 17] inactive periods
1 . A method [FEATURE ID: 1]

for transmitting [TRANSITIVE ID: 2]

data [FEATURE ID: 3]

from a transmitter [FEATURE ID: 4]

to a receiver [FEATURE ID: 4]

, comprising [TRANSITIVE ID: 5]

: providing [TRANSITIVE ID: 6]

transmitter - to - receiver authentication [FEATURE ID: 4]

at a Real Time Transport Protocol ( RTP ) packet level as an application protocol [FEATURE ID: 7]

on an application layer [FEATURE ID: 8]

by inserting [TRANSITIVE ID: 9]

, at the transmitter , authentication data [FEATURE ID: 3]

at end of a whole RTP packet payload ; ascertaining [TRANSITIVE ID: 10]

, by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 11]

; and accepting , by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 12]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 3]

on the application layer , and the application protocol being linked to a secret [FEATURE ID: 13]

by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption [FEATURE ID: 11]

and a key pair [FEATURE ID: 11]

for asymmetric encryption [FEATURE ID: 11]

. 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least [FEATURE ID: 14]

one of a sequence number [FEATURE ID: 11]

and a timestamp [FEATURE ID: 11]

. 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation [FEATURE ID: 15]

performed using one of a one - way hash function and a message authentication code [FEATURE ID: 3]

with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 10]

includes cryptographic verification [FEATURE ID: 16]

using parameters [FEATURE ID: 3]

and including at least one of a decryption operation and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter , particularly by virtue [FEATURE ID: 17]

of an encryption operation and a cryptographic checksum [FEATURE ID: 11]

and key information . 9 . The method as claimed in claim 8 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 10 . The method as claimed in claim 8 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number and a timestamp . 11 . The method as claimed in claim 8 , wherein the encryption operation is performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 12 . The method as claimed in claim 8 , wherein said ascertaining includes verification [FEATURE ID: 10]

1 . An encryption key monitoring system [FEATURE ID: 8]

for periodically testing [TRANSITIVE ID: 10]

an encryption key [FEATURE ID: 7]

of at least one of a plurality of encryption circuit means , each of said encryption circuit means generating [TRANSITIVE ID: 6]

encrypted [TRANSITIVE ID: 16]

data [FEATURE ID: 3]

from plain data [FEATURE ID: 3]

using [TRANSITIVE ID: 5]

an encryption key , said system comprised of : a plurality of encryption circuit means for generating encryption signals [FEATURE ID: 3]

from unencrypted data signals [FEATURE ID: 11]

, each of said encryption circuit means being comprised of : volatile memory means for storing [TRANSITIVE ID: 2]

an encryption key ; encryption key testing [FEATURE ID: 10]

means for determining [TRANSITIVE ID: 10]

when said encryption key is invalid in response to a test signal [FEATURE ID: 13]

applied to a first input [FEATURE ID: 4]

thereby producing a fail signal at a first output when said encryption key is invalid , said volatile memory means and said encryption key testing means being integral components of said encryption circuit means ; and control means for periodically generating said test signal , said control means generating said test signal during inactive periods [FEATURE ID: 17]

of said encryption circuit means and , for detecting said fail signals and for providing an indication [FEATURE ID: 15]

of which of said plurality of encryption circuit means has an invalid encryption key [FEATURE ID: 7]

. 2 . The system of claim [FEATURE ID: 12]

1 , further comprising means for transmitting a predetermined encrypted data signal [FEATURE ID: 11]

from said plurality of communications circuits . 3 . The system of claim 2 , wherein said means for transmitting a predetermined encrypted data signal is a digital multiplexor [FEATURE ID: 4]

. 4 . The system of claim 1 , wherein said control means includes means for detecting when said communications circuits are not generating encrypted data . 5 . The system of claim 1 , further comprising means for loading an encryption key into said means for storing an encryption key . 6 . The system of claim 1 , further comprising means for loading an encryption key into said means for storing an encryption key , said means for loading an encryption key being coupled and responsive to said control means . 7 . The system of claim 1 where said control means is a computer . 8 . A method [FEATURE ID: 1]

of monitoring [FEATURE ID: 9]

at least [FEATURE ID: 14]

one encryption key in a plurality of data encryption [FEATURE ID: 11]

and decryption circuits which encrypt and decrypt data , each encryption [FEATURE ID: 11]

and decryption circuit having a volatile encryption key , a test circuit [FEATURE ID: 1]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US4736094A
Filed: 1984-04-03
Issued: 1988-04-05
Patent Holder: (Original Assignee) Omron Tateisi Electronics Co     (Current Assignee) Omron Corp
Inventor(s): Shinya Yoshida

Title: Financial transaction processing system using an integrated circuit card device

[TRANSITIVE ID: 1] transmitting, providing, acceptingtransferring, sending, receiving, handling, processing, supplying, passing[TRANSITIVE ID: 1] transaction data outputting, writing
[FEATURE ID: 2] transmitter, receiver, whole RTP packet payload, RTP packet level authentication data, protocol data unit availabledata, terminal, transaction, computer, card, communication, device[FEATURE ID: 2] processing, system, specific account, customer, center apparatus, transaction data, second storage means
[TRANSITIVE ID: 3] comprisingcontaining, and, providing, with, of, forming, storing[TRANSITIVE ID: 3] comprising, including, having, specifying
[FEATURE ID: 4] application protocol, application layerelement, application, object, envelope, interface, apparatus, encapsulation[FEATURE ID: 4] integrated circuit card
[TRANSITIVE ID: 5] insertingincluding, setting, providing, receiving, writing[TRANSITIVE ID: 5] storing
[FEATURE ID: 6] claimitem, requirement, paragraph, claimed, aspect, feature, figure[FEATURE ID: 6] claim
[FEATURE ID: 7] sequence numbervalue, type, data, number[FEATURE ID: 7] balance
[FEATURE ID: 8] parametersdata, information, numbers, addresses[FEATURE ID: 8] transaction accounts
[FEATURE ID: 9] virtueprocessing, using, linking, coupling[FEATURE ID: 9] communicating
[FEATURE ID: 10] cryptographic checksumdata, code, message, number[FEATURE ID: 10] signal
1 . A method for transmitting [TRANSITIVE ID: 1]

data from a transmitter [FEATURE ID: 2]

to a receiver [FEATURE ID: 2]

, comprising [TRANSITIVE ID: 3]

: providing [TRANSITIVE ID: 1]

transmitter - to - receiver authentication at a Real Time Transport Protocol ( RTP ) packet level as an application protocol [FEATURE ID: 4]

on an application layer [FEATURE ID: 4]

by inserting [TRANSITIVE ID: 5]

, at the transmitter , authentication data at end of a whole RTP packet payload [FEATURE ID: 2]

; ascertaining , by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 2]

; and accepting [TRANSITIVE ID: 1]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 6]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 2]

on the application layer , and the application protocol being linked to a secret by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number [FEATURE ID: 7]

and a timestamp . 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters [FEATURE ID: 8]

and including at least one of a decryption operation and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter , particularly by virtue [FEATURE ID: 9]

of an encryption operation and a cryptographic checksum [FEATURE ID: 10]

1 . A financial transaction processing [TRANSITIVE ID: 2]

system [FEATURE ID: 2]

comprising [TRANSITIVE ID: 3]

: an integrated circuit card [FEATURE ID: 4]

for use in financial transaction processing , said integrated circuit card including [TRANSITIVE ID: 3]

first data storage means having [TRANSITIVE ID: 3]

storage area for storing [TRANSITIVE ID: 5]

data specifying [TRANSITIVE ID: 3]

a plurality of transaction accounts [FEATURE ID: 8]

corresponding to a plurality of financial institutions ; and a terminal for communicating [TRANSITIVE ID: 9]

with said integrated circuit card , said terminal including account designating means for designating a specific account [FEATURE ID: 2]

which a customer [FEATURE ID: 2]

wishes to use , out of said plurality of transaction accounts corresponding to the plurality of financial institutions ; said integrated circuit card further including transaction data outputting [FEATURE ID: 1]

means responsive to said account designating means for reading out data specifying the account designated by said account designating means from the data specifying transaction accounts corresponding to said plurality of financial institutions stored in said storage area and for transmitting the read data to said terminal . 2 . A financial transaction processing system in accordance with claim [FEATURE ID: 6]

1 , which further comprises a center apparatus [FEATURE ID: 2]

provided for each of said plurality of financial institutions , and wherein said terminal further includes claimed amount information entering means for entering information concerning a first claimed amount , and transaction data [FEATURE ID: 2]

transmitting means for transmitting said first claimed amount information and said designated account specifying data to the center apparatus which said designated account belongs to , said center apparatus includes a center file for storing information associated with related accounts , including balance information of the related accounts , and account balance [FEATURE ID: 7]

collating means for determining whether said first claimed amount is less than the balance of said designated account stored in said center file and for transmitting a signal [FEATURE ID: 10]

indicating lack of balance when the first claimed amount is more than the balance , and said terminal further includes instructing means responsive to said lack - of - balance - indicating signal for instructing a customer to designate a new account from said plurality of transaction accounts except for said designated account , using said account designating means . 3 . A financial transaction processing system in accordance with claim 1 , which further comprises a center apparatus provided for each of said plurality of financial institutions , and wherein said integrated circuit card further includes second data storage means which is writable and readable and having a storage area at least for amount information , said terminal further includes claimed amount information entering means for entering first claimed amount information , transaction data transmitting means for transmitting said first claimed amount information and data specifying said designated account to a center apparatus which said designated account belongs to , and writing means for writing [FEATURE ID: 1]

said first claimed amount information and said designated account specifying data into said storage area of said second storage means [FEATURE ID: 2]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US4375097A
Filed: 1978-06-02
Issued: 1983-02-22
Patent Holder: (Original Assignee) Texas Instruments Inc     (Current Assignee) Texas Instruments Inc
Inventor(s): Mehmet E. Ulug

Title: Transparent intelligent network for data and voice

[TRANSITIVE ID: 1] transmitting, accepting, rejecting, ascertainingreceiving, processing, delivering, passing, forwarding, sending, transferring[TRANSITIVE ID: 1] inputting, containing
[FEATURE ID: 2] data, whole RTP packet payload, protocol data unit available, parameterspayload, communication, transmission, information, messages, connection, traffic[FEATURE ID: 2] multi-user packets
[FEATURE ID: 3] transmittertransmission, computer, transceiver, system, device[FEATURE ID: 3] communications network
[FEATURE ID: 4] receivernode, network, terminal, site, destination, respective node, associated node[FEATURE ID: 4] other, exit node
[TRANSITIVE ID: 5] comprising, insertingincluding, of, providing, using, combining, defining, featuring[TRANSITIVE ID: 5] having
[FEATURE ID: 6] packet levelused, employed, configured, operable[FEATURE ID: 6] effective
[FEATURE ID: 7] authentication datainformation, it, the data, additional data[FEATURE ID: 7] data
[FEATURE ID: 8] RTP packet level authentication datatransmission, reception, communication, data, information[FEATURE ID: 8] sampling data input
[FEATURE ID: 9] claimfigure, item, claimed, preceding claim, clair, paragraph[FEATURE ID: 9] claim
[FEATURE ID: 10] virtuelinking, combining, binding, coupling[FEATURE ID: 10] connecting
1 . A method for transmitting [TRANSITIVE ID: 1]

data [FEATURE ID: 2]

from a transmitter [FEATURE ID: 3]

to a receiver [FEATURE ID: 4]

, comprising [TRANSITIVE ID: 5]

: providing transmitter - to - receiver authentication at a Real Time Transport Protocol ( RTP ) packet level [FEATURE ID: 6]

as an application protocol on an application layer by inserting [TRANSITIVE ID: 5]

, at the transmitter , authentication data [FEATURE ID: 7]

at end of a whole RTP packet payload [FEATURE ID: 2]

; ascertaining , by the receiver , whether the receiver knows the transmitter based on the RTP packet level authentication data [FEATURE ID: 8]

; and accepting [TRANSITIVE ID: 1]

, by the receiver , the whole RTP packet payload , if the receiver knows the transmitter , and otherwise rejecting [TRANSITIVE ID: 1]

the whole RTP packet payload . 2 . The method as claimed in claim [FEATURE ID: 9]

1 , wherein the authentication data are determined based on at least part of a protocol data unit available [FEATURE ID: 2]

on the application layer , and the application protocol being linked to a secret by the transmitter . 3 . The method as claimed in claim 2 , wherein the secret between the transmitter and the receiver is one of a key for symmetric encryption and a key pair for asymmetric encryption . 4 . The method as claimed in claim 2 , wherein the part of the protocol data unit available on the application layer includes at least one of a sequence number and a timestamp . 5 . The method as claimed in claim 2 , wherein the secret is an encryption operation performed using one of a one - way hash function and a message authentication code with a key known only to the receiver and the transmitter to be authenticated . 6 . The method as claimed in claim 2 , wherein said ascertaining [FEATURE ID: 1]

includes cryptographic verification using parameters [FEATURE ID: 2]

and including at least one of a decryption operation and a cryptographic checksum check . 7 . The method as claimed in claim 2 , wherein said ascertaining includes cryptographic verification using parameters and including at least one of a decryption operation and a cryptographic checksum check . 8 . The method as claimed in claim 2 , wherein the linking to the secret is carried out by at least one of cryptographical linking to at least one further parameter , particularly by virtue [FEATURE ID: 10]

1 . A communications network [FEATURE ID: 3]

having [TRANSITIVE ID: 5]

a plurality of peripheral and central communications nodes , a first plurality of terrestrial communications links connecting [TRANSITIVE ID: 10]

said central nodes directly to each other [FEATURE ID: 4]

, a second plurality of terrestrial communications links individually connecting said peripheral nodes to said central nodes , means for connecting a plurality of customers to each peripheral node , certain of said means being effective [FEATURE ID: 6]

to input data at a first given speed and certain others for inputting [TRANSITIVE ID: 1]

data [FEATURE ID: 7]

at a different speed , developing means at each of said nodes for successively developing at a first repetition rate multi-user packets each containing [TRANSITIVE ID: 1]

data from at least two of said plurality of customers connected to that node , said developing means including means effective in a first mode for sampling data input [FEATURE ID: 8]

from said customers at intervals directly related to their output speeds at the exit node [FEATURE ID: 4]

and , when in another mode , effective upon the existence of available channel space , at speeds higher than said output speeds at the exit node , and means connected to said peripheral node for conducting said multi-user packets [FEATURE ID: 2]

to other nodes within said network . 2 . A communications network according to claim [FEATURE ID: 9]








Targeted Patent:

Patent: US7266682B2
Filed: 2000-01-18
Issued: 2007-09-04
Patent Holder: (Original Assignee) Siemens AG     (Current Assignee) Vl Collective Ip LLC ; Vl Ip Holdings LLC
Inventor(s): Martin Euchner

Title: Method and system for transmitting data from a transmitter to a receiver and transmitter and receiver therefor

 
Cross Reference / Shared Meaning between the Lines
Charted Against:

Patent: US1546465A
Filed: 1922-02-20
Issued: 1925-07-21
Patent Holder: (Original Assignee) United Shoe Machinery Corp     (Current Assignee) United Shoe Machinery Corp
Inventor(s): William C Baxter

Title: Safety device

1