1
Geoffrey R Hendrey, Hirohisa A Tanaka, Philip J Koopman Jr: Method and system for analyzing advertisements delivered to a mobile unit. Telcontar, Fenwick & West, November 11, 2003: US06647269 (504 worldwide citation)

Accurate location information about a mobile telecommunication transceiver is used to generate advertising content responsive to a user approaching the location of a business. This advertising content is tailored to the user's preferences and the particular business involved. Once the advertisi ...


2
Geoffrey R Hendrey, Hirohisa A Tanaka, Philip J Koopman Jr: Method and system for selectively connecting mobile users based on physical proximity. Telcontar, Fenwick & West, April 1, 2003: US06542750 (378 worldwide citation)

A method and system for selectively connecting proximately located telecommunications units are disclosed. The method and system may be used in a location aware telecommunications system that can determine the location of a telecommunications unit (TU) being used within the system. Proximately locat ...


3
Geoffrey R Hendrey, Hirohisa A Tanaka, Philip J Koopman Jr, Joseph D King: Method and system for connecting mobile users based on degree of separation. Telcontar, Fenwick & West, March 25, 2003: US06539232 (300 worldwide citation)

A method and system for selectively connecting proximately located telecommunications units are disclosed. The method and system may be used in a location aware telecommunications system that can determine the location of a telecommunications unit (TU) being used within the system. A first TU may be ...


4
Philip J Koopman Jr, Alan M Finn: Pseudorandom number generation and cryptographic authentication. United Technologies Automotive, M P Williams, November 8, 1994: US05363448 (171 worldwide citation)

An automobile door lock receiver module (30) and a plurality of keychain fob transmitter units (16) contain identification numbers, secret initial values, and secret feedback masks so as to authenticate encrypted messages from any of the assigned fobs, indicative of commands registered by closing sw ...


5
Philip J Koopman Jr: Method of generating secret identification numbers. UT Automotive Dearborn, Ozer M N Teitelbaum, May 26, 1998: US05757923 (161 worldwide citation)

The present invention teaches a method of generating a secret identification number from a random digital data stream. The method comprises the step of initially selecting a first and a second group of bytes from the random digital data stream, wherein the first and second groups of bytes have a fir ...


6
Hirohisa A Tanaka, Geoffrey R Hendrey, Philip J Koopman Jr, Joseph D King: Method and system for connecting proximately located mobile users based on compatible attributes. Telcontar, Fenwick & West, April 1, 2003: US06542749 (123 worldwide citation)

A method and system for connecting proximately located telecommunications units are disclosed. The method and system may be used in a location aware telecommunications system that can determine the location of a telecommunications unit (TU) being used within the system. A user may be connected to on ...


7
Philip J Koopman Jr: Random number generating system and process based on chaos. United Technologies Automotive, Ozer M N Teitelbaum, December 9, 1997: US05696828 (104 worldwide citation)

The present invention teaches a method of generating a plurality of random numbers is disclosed. The method comprises the initial step of generating chaotic noise. Subsequently, the chaotic noise is sampled such that a plurality of samples are created. Each sample of the plurality of samples is then ...


8
Robert E LaBarre, Philip J Koopman Jr: Random clock composition-based cryptographic authentication process and locking system. United Technologies Automotive, January 28, 1997: US05598476 (51 worldwide citation)

The first and second devices exchange randomly generated messages that are used in a composition-based encryption/decryption process. At least one of the randomly generated messages is, itself, encrypted before transmission. The composition-based process (a cyclic redundancy code process, preferably ...


9
Philip J Koopman Jr, Alan M Finn: Cryptographic authentication of transmitted messages using pseudorandom numbers. United Technologies Automotive, M P Williams, December 27, 1994: US05377270 (50 worldwide citation)

An automobile door lock receiver module (30) and a plurality of keychain fob transmitter units (16) contain identification numbers, secret initial values, and secret feedback masks so as to authenticate encrypted messages from any of the assigned fobs, indicative of commands registered by closing sw ...


10
Philip J Koopman Jr, Glen B Haydon: Stack-memory-based writable instruction set computer having a single data bus. WISC Technologies, Edward B Anderson, October 1, 1991: US05053952 (42 worldwide citation)

A computer is provided as an add-on processor for attachment to a host computer. Included are a single data bus, a 32-bit arithmetic logic unit, a data stack, a return stack, a main program memory, data registers, program memory addressing logic, micro-program memory, and a micro-instruction registe ...