scispace - formally typeset
Search or ask a question
Author

Michael W. Bright

Bio: Michael W. Bright is an academic researcher from Motorola. The author has contributed to research in topics: Encryption & Signal. The author has an hindex of 16, co-authored 27 publications receiving 577 citations.

Papers
More filters
Patent
11 Mar 1999
TL;DR: In this article, the authors describe an apparatus for and method of providing a secure method of downloading a program into a processor (101) from a device (103) external to the processor.
Abstract: The following describes an apparatus for and method of providing a secure method of downloading a program into a processor (101) from a device (103) external to the processor (101). The program may be encrypted (207) prior to its entry into the external device (103). The program may also have authentication information added (203 and 207) to it. Authentication information may be provided on an unencrypted and/or an encrypted program. The processor (101) decrypts (307) and/or successfully authenticates (311) the program before allowing the program to be executed by the processor (101).

82 citations

Patent
13 Aug 1987
TL;DR: In this article, a secure communication system for transmitting and receiving an encoded information signal was proposed, where a synchronized tracking signal is imposed on the information to be transmitted and added to the information in order to form an intermediate signal.
Abstract: A secure communication system for transmitting and receiving an encoded information signal. The system generates at transmitting and receiving locations a predetermined unique pseudorandom code. A synchronized tracking signal is imposed on the information to be transmitted and added to the information to form an intermediate signal. The pseudorandom code is then multiplied by the intermediate signal directly so that the ultimate result appears to assume the character of pseudorandom noise, which is then transmitted to the receiving location. The synchronization and transmitted encoded portion is decoded at the receiver and used to generate a base signal for a pseudorandom generator at the receiving location, as well as initiate initial clocking pulse time for operation of the receiver pseudorandom generator. The receiver then generates the predetermined pseudorandom code and divides the same against the encoded signal being received to form an intermediate signal having no pseudorandom signal component, which is then filtered to remove the tracking and masking signal and thereby generating the original information signal desired.

57 citations

Patent
27 Sep 1990
TL;DR: In this paper, a key management system is proposed to solve the key distribution problems of distance, time, operator error, and security risk by transferring encryption keys with appropriate system information between a KMC (key management controller) and a remote keyloader (109).
Abstract: This key management system effectively solves the key distribution problems of distance, time, operator error, and security risk by transferring encryption keys with appropriate system information between a key management controller (101) and a remote keyloader (109). The keyloader (109) is then coupled to a communication device to transfer (327) the keys and receive (329) identification information from the communication device. The keyloader (109) then sends (323) the information to the key management controller (101) that controls the distribution of the encryption keys and collection of the communication device identifications.

38 citations

Patent
Michael W. Bright1
27 Feb 1991
TL;DR: In this article, a key management controller (KMC) is used to create and send rekeying messages (305, 415, 515, and 605) in an encrypted communication system with over-the-channel Rekeying of communication units.
Abstract: Formation and sending of rekeying messages (305, 415, 515, and 605) in an encrypted communication system with over-the-channel rekeying of communication units is performed by a KMC, key management controller (101). The KMC (101) forms messages to provide new keys (1541), zeroization information (1549), and key indexing information (1543) to communication units (107), and to provide keyloader upload data (1563). Acknowledgments and rekey requests are also handled between the KMC (101) and communication units (107).

33 citations

Patent
Michael W. Bright1
27 Feb 1991
TL;DR: In this paper, a key management controller (101) is used to manage and distribute keys to a plurality of communication units and handle acknowledgments from the plurality of units that are delayed from receiving the rekeying message.
Abstract: This method of key distribution rekeys (605) a group of communication units (107) within an encrypted communication system with over-the-channel rekeying. The method uses a key management controller (101) to manage and distribute keys (1541) to a plurality of communication units and handle acknowledgments from the plurality of communication units that are delayed from receipt of the rekeying message. The rekeying message (615) is sent to any of the group of communication units (107) when an acknowledgment is not received (611) from one or more of the group of communication units (107).

33 citations


Cited by
More filters
Patent
21 Jun 1991
TL;DR: In this paper, a system and method for communicating information signals using spread spectrum communication techniques is presented, where PN sequences are constructed that provide orthogonality between the users so that mutual interference will be reduced, allowing higher capacity and better link performance.
Abstract: A system and method for communicating information signals using spread spectrum communication techniques. PN sequences are constructed that provide orthogonality between the users so that mutual interference will be reduced, allowing higher capacity and better link performance. With orthogonal PN codes, the cross-correlation is zero over a predetermined time interval, resulting in no interference between the orthogonal codes, provided only that the code time frames are time aligned with each other. In an exemplary embodiment, signals are communicated between a cell-site and mobile units using direct sequence spread spectrum communication signals. In the cell-to-mobile link, pilot, sync, paging and voice channels are defined. Information communicated on the cell-to-mobile link channels are, in general, encoded, interleaved, bi-phase shift key (BPSK) modulated with orthogonal covering of each BPSK symbol along with quadrature phase shift key (QPSK) spreading of the covered symbols. In the mobile-to-cell link, access and voice channels are defined. Information communicated on the mobile-to-cell link channels are, in general, encoded, interleaved, orthogonal signaling along with QPSK spreading.

1,891 citations

Patent
29 Oct 1999
TL;DR: In this article, a load balancer that distributes packets across different transmission paths according to transmission path quality is introduced, along with a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry.
Abstract: A plurality of computer nodes communicate using seemingly random Internet Protocol source and destination addresses. Data packets matching criteria defined by a moving window of valid addresses are accepted for further processing, while those that do not meet the criteria are quickly rejected. Improvements to the basic design include (1) a load balancer that distributes packets across different transmission paths according to transmission path quality; (2) a DNS proxy server that transparently creates a virtual private network in response to a domain name inquiry; (3) a large-to-small link bandwidth management feature that prevents denial-of-service attacks at system chokepoints; (4) a traffic limiter that regulates incoming packets by limiting the rate at which a transmitter can be synchronized with a receiver; and (5) a signaling synchronizer that allows a large number of nodes to communicate with a central node by partitioning the communication function between two separate entities.

786 citations

Patent
31 Jan 2011
TL;DR: In this article, the authors proposed a system and method for data communication connecting on-line networks with on-online and off-line computers, which provides for broadcast of up to the minute notification centric information thereby providing an instant call to action for users who are provided with the ability to instantaneously retrieve further detailed information.
Abstract: A system and method for data communication connecting on-line networks with on-line and off-line computers. The present system provides for broadcast of up to the minute notification centric information thereby providing an instant call to action for users who are provided with the ability to instantaneously retrieve further detailed information. The notification centric portions of information is wirelessly broadcast to wireless receiving devices which are attached to computing devices. Upon receipt of the information at the personal computer, the user is notified through different multimedia alerts that there is an incoming message. Wirelessly broadcasted URL's, associated with the data, are embedded in data packets and provide an automated wired or wireless connection back to the information source for obtaining detailed data.

478 citations

Patent
25 May 2006
TL;DR: A data management system for managing the storage of data on primary and secondary storage from a primary information source having original file content to be stored that may be accessed without stateful middleware.
Abstract: The present invention provides a system to ensure security of data in a computer network system A center certifies a public-key of user of the system and distributes a secret-key A first system comprises the center in a network, an information provider and a plurality of users The center identifies utilization status by requests of the secret-key The data is encrypted by the secret-key and is stored and transferred, while the data to be stored and transferred is encrypted by a secret-key different from the secret-key of the transferred data An original data label is added to the original data, and an edit label is added to the edited data, and the center does not store the data and stores only the original data label and the edit label A second system comprises a center and an information provider in a network, and a plurality of users utilizing the network The center stores the original data and editing scenario, and also the original data label, user label and edit label The data is not transferred between the users, but data label encrypted by the public-key is transferred In electronic commerce system, every data is distributed through a mediator in the network, data which is transferred from a maker to a user is encrypted by a secret-key for encryption, and data which is transferred from the user to the maker is encrypted by a secret-key for re-encryption

413 citations

Patent
19 Jan 1993
TL;DR: In this paper, a method and apparatus for arranging various types of data, and at various rates, into a uniquely structured format for transmission is presented, where data for transmission formatting may be speech data provided by vocoder (14) or different types of secondary traffic.
Abstract: A method and apparatus for arranging various types of data, and at various rates, into a uniquely structured format for transmission. Data for transmission formatting may be speech data provided by vocoder (14) or different types of secondary traffic. The data organized into frames of a predetermined time duration for transmission by a microprocessor (18). The data frames are organized, depending on the data, to be at one of several data rates. Vocoder data is provided by vocoder (14) at one of several data rates and is organized in the frame according to a predermined format. Frames may be formatted with a sharing of vocoder data with non-vocoder data to be at a highest frame data rate. Different types of non-vocoder data may be organized so as to also be at the highest frame data rate. Additional control data may be provided within the data frames to support various aspects of the transmission and recovery upon reception.

392 citations