1
Don Coppersmith, Prabhakar Raghavan, Thomas G Zimmerman: System and method for near-field human-body coupling for encrypted communication with identification cards. International Business Machines Corporation, Khanh Q Tran, August 18, 1998: US05796827 (247 worldwide citation)

An apparatus and method are disclosed for encoding and transferring data from a transmitter to a receiver, using the human body as a transmission medium. The transmitter includes an electric field generator, a data encoder which operates by modulating the electric field, and electrodes to couple the ...


2
Richard H Guski, Raymond C Larson, Stephen M Matyas Jr, Donald B Johnson, Don Coppersmith: Authentication system using one-time passwords. International Business Machines Corporation, William A Kinnaman Jr, January 7, 1997: US05592553 (175 worldwide citation)

A system for authenticating a user located at a requesting node to a resource such as a host application located at an authenticating node using one-time passwords that change pseudorandomly with each request for authentication. At the requesting node a non-time-dependent value is generated from non ...


3
Richard Henry Guski, Raymond Craig Larson, Stephen Michael Matyas Jr, Donald Byron Johnson, Don Coppersmith: Authentication system using one-time passwords. International Business Machines Corporation, William A Kinnaman Jr, August 26, 1997: US05661807 (107 worldwide citation)

A system for authenticating a user located at a requesting node to a resource such as a host application located at an authenticating node using one-time passwords that change pseudorandomly with each request for authentication. At the requesting node a non-time-dependent value is generated from non ...


4
Don Coppersmith, Claude A Greengard, Charles P Tresser, Chai Wah Wu: System for protection of goods against counterfeiting. International Business Machines Corporation, Stephen C Kaufman Esq, Whitham Curtis & Whitham, May 30, 2000: US06069955 (92 worldwide citation)

A visible seal or label containing a serial number is placed in plain view on the product packaging. The visible label contains the serial number as well as a first public key encrypted version of the serial number. A second or hidden label inside of the package has thereon a second a second encrypt ...


5
Bruno O Brachtl, Don Coppersmith, Myrna M Hyden, Stephen M Matyas Jr, Carl H W Meyer, Jonathan Oseas, Shaiy Pilpel, Michael Schilling: Data authentication using modification detection codes based on a public one way encryption function. International Business Machines Corporation, John E Hoel, March 13, 1990: US04908861 (83 worldwide citation)

A cryptographic method and apparatus are disclosed which transform a message or arbitrary length into a block of fixed length (128 bits) defined modification detection code (MDC). Although there are a large number of messages which result in the same MDC, because the MDC is a many-to-one function of ...


6
Don Coppersmith, Claude A Greengard, Charles P Tresser, Chai Wah Wu: System for protection of goods against counterfeiting. International Business Machines Corporation, Whitham Curtis & Christofferson P C, Stephen C Kaufman, February 7, 2006: US06996543 (65 worldwide citation)

In order to verify the authenticity of manufactured goods, a smart tag is attached to the goods containing encrypted authentication information, such as a serial number, a description of the good's physical appearance or chemical decomposition, its color, or digital images of the good etc. The encry ...


7
Don Coppersmith, Phillip W Rogaway: Software-efficient pseudorandom function and the use thereof for encryption. International Business Machines Corporation, David H Judson, Jeffrey S LaBaw, September 26, 1995: US05454039 (59 worldwide citation)

A software-efficient pseudorandom function maps an index and an encryption key to a pseudorandom bit string useful for constructing a stream cipher. The method begins by preprocessing the encryption key into a table of pseudorandom values. The index and a set of values from the table is then used to ...


8
Don Coppersmith, Rosario Gennaro, Shai Halevi, Charanjit S Jutla, Stephen M Matyas Jr, Mohammed Peyravian, David Robert Safford, Nevenko Zunic: Method and apparatus for advanced symmetric key block cipher with variable length key and block. International Business Machines Corporation, Jeanine S Ray Yarletts, Marica L Doubet, June 5, 2001: US06243470 (37 worldwide citation)

A method and apparatus for an advanced symmetric key cipher for encryption and decryption, using a block cipher algorithm. Different block sizes and key sizes are supported, and a different sub-key is used in each round. Encryption is computed using a variable number of rounds of mixing, permutation ...


9
Don Coppersmith, Frederick Cole Mintzer, Charles P Tresser, Chai Wah Wu, Minerva Ming Yee Yeung: Secured signal modification and verification with privacy control. International Business Machines Corporation, Stephen C Kaufman, McGuireWoods, July 3, 2001: US06256736 (32 worldwide citation)

A watermarking scheme which allows the watermarked image to be authenticated by an authentication agent without revealing the human-readable content of the image. There is disclosed an approach which combines privacy control with watermarking and authentication mechanisms. The watermark can be made ...


10
Don Coppersmith, Donald Byron Johnson, Stephen Michael Matyas Jr: Cryptographic system with masking. International Business Machines Corporation, William A Kinnaman Jr, June 16, 1998: US05768390 (31 worldwide citation)

A system for cryptographically transforming a sequence of input blocks of plaintext or ciphertext data into corresponding sequence of output blocks of data while providing enhanced protection against cryptographic attacks. Each input block is enciphered using a first key to generate a first encrypti ...