|Publication number||US1310719 A|
|Publication date||Jul 22, 1919|
|Filing date||Sep 13, 1918|
|Publication number||US 1310719 A, US 1310719A, US-A-1310719, US1310719 A, US1310719A|
|Inventors||Gilbert S. Vernam|
|Export Citation||BiBTeX, EndNote, RefMan|
|Referenced by (60), Classifications (5)|
|External Links: USPTO, USPTO Assignment, Espacenet|
(3. S. VERNAM.
SECRET SIGNALING SYSTEM. APPLICATION FILED SEPT. 13. mm.
Patented July 22, 1919.
2 SHEETS-SHEET l.
IN VEN TOR.
ATTORNEY 'ms COLUMBIA PLAnonRAPN cu., wAsHlNnroN, n c
6. S. VERNAM.
SECRET SIGNALING SYSTEM.
APPLICATION mu) SEPT. 13. mm.
Patented July 22, 1919.
2 SHEETS-SHEET 2.
IN V EN TOR. 61 61 %mam/ 2, fie/2.,
A TTORNEY "rm; COLUMBIA PLANOGIAPH c0.. WASHINGTON. D. c.
UNITED STATES PATENT OFFICE.
GILBERT S. VERNAM, OF BROOKLYN, NEW YORK, ASSIGNOR TO AMERICAN TELEPHONE AND TELEGRAPH COMPANY, A CORPORATION OF NEW YORK.
SECRET SIGNALING SYSTEM.
Application filed September 13, 1918.
To all whom it may concern:
Be it known that I, Glncnn'r S. VERNAM, residing at Brooklyn, in the county of Kings and State of New York, have invented certain Improvements in Secret Signaling Systems, of which the following is a specification.
This invention relates to signaling sys tems and especially to telegraph systems. Its object is to insure secrecy in the transmission of messages and, further, to pro vide a. system in which messages may be transmitted and received in plain characters or a well-known code but in which the signaling impulses are so altered before transmission over the line that they are unintelligible to anyone intercepting them.
The invention is here illustrated as applied to a well-known form of printing telegraph systems but, as will be readily understood, it is applicable to other signaling systems. The invention will be more fully described in connection with the accompanying drawings, in which Figure 1 illustrates circuit arrangements at one end of the line in a system embodying the invention, and Figs. 2 and 3 show modifications in the circuits of the sending apparatus.
Like sending and receiving apparatus is located at each end of the line. Normally the message is recorded by both the local and the distant receiving apparatus and since their operation is identical it will be unnecessary to show and describe the oppositc end of the line.
Referring to Fig. 1, A and B represent the transmitting and receiving faces respectively of a known form of distributor used in printing telegraph systems. Only such parts of the distributor and such parts of the circuit of the known "apparatus are here illustrated as are necessary to an understanding of the resent invention. Accordingly only two 0? the usual four rows of segments on the distributer are shown. The outer row on the transmitting side comprises five segments 1, 2, 3, 4: and 5 from which the code impulses are transmitted. It also includes the segment 6 on which the distributor arm normally rests, and the starting segment S. The inner contact ring 7 is continuous and is connected to one side of the transmitting circuit 9 which is normally closed through a. suitable source of current not shown. The distributor arm 10 carries a brush 11 Whose opposite ends con- Specification of Letters Patent.
Patented July 22, 1919.
Serial No. 253,962.
tact with the ring 7 and the segmental contacts repectively. When the apparatus is at rest this arm is detained by the latch 12 which may be withdrawn by means of mag net 13 under the control of the operator. The receiving side of the distributer has five segments 1, 2, 3', 4' and 5, corresponding to the five sending segments but shortened to receive only the central part of the current impulses transmitted. It also has a contact 6', upon which the distributer arm normally rests, and a contact P for controlling the energization of a relay whose purpose will appear hereinafter. The re ceiving distributor arm 10 carries a brush 11 and is controlled by a latch 12 and mag net 13 as in the case of the transmitting distributor arm.
The sending relays commonly used in the form of printing telegraph system here shown are indicated at 14, 15, 16, 17 and 18. The circuits controlled b i these relays ordinarily run directly to the distributor seg ments 1 to 5 for transmitting the signal impulses. In accordance with this invention, however, these sending relays control the circuits to the distributor segments through another set of relays 19, 20, 21, 22 and 23 which may be called cipher sending re lays. The circuits through the contacts of relays 1a to 18 accordingly run from the source of current 24 through the windings of the rela s 19 to 23 and thence to an au tomatic cip ering device D.
The relays 14 to 18 are under the control of a sending device here indicated at C as a known form of keyboard transmitter, which is provided with a set of contacts 25, 26, 27, 28 and 29, these being under the control of the key levers of the keyboard; as is well understood. The circuit of each of the relays 14 to 18 runs from ground through one of these contacts and to a source of current 30. The relays are in actual practice provided with looking windings, not shown, which facilitate the transmitting of the message; andtheir circuits are furthermore usually arranged to be. transferred at will to the contacts of a tape transmitter Which may be used instead of the keyboard transmitter, all as is now well known in the art. The circuit of each of the relays 19 to 23 is provided with a branch to ground through a resistance 31, to enable the relays to be controlled by the ciphering device as will appear hereinafter.
For automatically ciphering the message a. well-known form of tape transmitter I) may be employed. This transmitter, is provided as usual with two bus-bars 32 and 33, connected respectively to battery and ground at 34 and respectively. Five contacts 36, 31', 38, 39 and 40 vibrate between these bus-bars under the control of a perforated tape in a well-known manner, and the circuits of the five relays 19 to 23 run to these five contacts respectively, so that the energization of the relays depends upon the combined action of the normal transmitter C and the ciphering transmitter D.
The apparatus for receiving the message at the other end of the line is, as above stated, in all respects like that shown at the right hand end of Fig. 1 and it will therefore be explained by reference thereto. In order that the message may be received in plain characters the printer (not shown) is operated through a set of receiving relays 42, 43, 44, and 46, which in turn are under the combined control of the line relay 4.1 and the deciphering device D, the latter being the same instrument as the ciphering device at the sending end of the line, and at the other end a similar device operating synchronously and with an identical control tape. The windings of relays 42 to 46 are connected on one side to the contacts 36 to 10 respectively of the ciphering device I), and on the other side to the segments 1 to 5 of the receiving distributor.
The line relay 41 controls the armature 48, which has front and back contacts 49 and 50 connected to battery and ground respec tively. A conductor 51 connects the armature 48 and the inner segment 52 of the distributer, which is angularly co-extensive with the contacts 1' to 5'. The line relay also has an armature 53 which closes at proper intervals the normally open circuit of the starting magnet 13' of the distrlbuter.
The operating magnet 56 of the ciphermg and deciphering device is under the control of the relay 57 which is ener ized from the distributer contact P, its win ing being con nected between the grounded contact and a source of current at the printer (not shown) whenever the brush 11 passes over the contact P. The circuit of magnet 56 is thereby closed from ground at 58 to battery at 34 once for each revolution of the distributor to feed the tape and set the contacts in a manner now well understood in the art. It is obvious that the impulses to the ciphering and deciphering devices at opposite ends of the line may step the tapes forward only for every second or every third character transmitted, or at any other desired interval, instead of for each character.
If desired the ciphering device may be provided with apparatus to throw it into or out of operation at the will of the transmit ting operator. For this purpose I have shown a relay 60 provided with an operating winding 61 and a locking winding 62, the circuit of the locking winding being controlled by a relay (53. The circuits of windings 61 and 63 which respectively throw the ciphering device into and out of operation, run to the printer and are arranged to be there connected to battery by predetermined code signals transmitted over the line.
In the modification shown in Fig. 2, a series of cipher sending relays 19, 20, 21', 22 and 23,provided with difierential windings, are used in place of the relays 19 to 23, shown in Fig. 1. One end of each of the windings may conveniently be grounded at the relay while the opposite ends of each pair are connected to the sending and ciphering devices respectively. The windings will neutralize each other when both are encrgized, but the strength of either winding is suflicient to operate the relay when not op posed by the other. In this modification the ground connections, through the resistance 31 shown in Fig. 1, are unnecessary and are therefore omitted. Otherwise the circuits for this arrangement are the same as in Fig. 1.
In the modification shown in Fig. 3 the sending relays (let to 18) of the usual print ing telegraph system are omitted and the circuits of the relays 19 to 23 are run directly to contacts 64, 65, 6G, 67 and 68 of a tape transmitter C of known form whose bus-bars 69 and 70 are connected to battery and ground respectively. It will be seen that this arrangement, while simplifying the circuits, is not as conveniently applicable to the known form of printing telegraph system indicated in Fig. 1, in which the relays 14 to 18 are already present and arranged to be operated from either a keyboai d transmitter or a tape transmitter, depending upon the position of a switch controlled by the operator. By connecting the relay windings directly to a transmitter, as in Fig. 3, these windings will always be connected either to ground or to battery at each end and no separate set of grounded connections as in Fig. 1, is necessary.
The operation of the system shown in Fig. 1 is as follows: The sendin arm of the distributor will be started in the usual manner through the operation of the ma net 13 and will transmit an open or start lmpulse as it passes over the segment S of the distributer. This 0 ens the circuit 9, thereby deenergizing t e line relay 41, which permits switch 53 to close, whereupon magnet 13 of the receiving distributor is energized. This releases the arm 10 which starts to rotate in approximate synchronism with the sending arm 10. The start impulse of course puts into operation the receiving distributer at both ends ofthe line simultaneously, or at any other station which may be connected into the line circuit.
Let us suppose that the first character of the message to be transmitted is A. The code signal of A is ++f, Where represents an open or spacing impulse and represents a closed or marking impulse in the system here illustrated, although it will be understood that ositive and negative current impulses may e used instead of closed and open circuit 0 eration if desired. For ciphering and deciphering the message the ciphering devices at the opposite ends of the line are provided with identical sections of tape upon which are recorded a series of code signals which are preferably selected at random but if desired may themselves represent a predetermined series of letters or Words. Let us suppose that the letter B happens to be in the ciphering transmitter at the same moment that the letter A is being sent from the normal transmitter. The code for the letter B is The sending of A from the normal transmitter means that the contacts 25 and 26 will be closed, While the contacts 27, 28 and 29 are open. Thus, rei ays 14 and 15 will be energized and close their contacts, while relays 16, 17 and 18 remain unergized. The presence of the letter B in the code transmitter means that contacts 36, 39 and 40; representing the plus impulses for B, will be in contact with the bus-bar 32, which is connected to battery and that contacts 37 and 38, re resenting the negative impulses for this 0 aracter will be in contact with bus-bar 33 which is grounded.
As a result of this combination of contacts in the two transmitters, it will be seen that the relay 19 is connected at both ends tobattery; that relay 20 is connected at one end to battery at 24 and at the other end to ground at 35; that relay 21 is connected at one end to ground through the resistanc 31, and at the other end to ground at 35; that relay 22 is connected at one end to ground through resistance 31, and at the other end to battery at 34, and that relay 23 is connected to ground through the resistance 31 at one end and the battery 34 at the other. Therefore, relays 20, 22 and 23 will close their contacts, and relays 19 and 21 will remain open. Consequently, as the distributer arm 10 rotates over the contacts 1 to 5, impulses will be transmitted to the line from contacts 2, 4 and 5 and none from contacts 1 and 3. This means that the signal will be transmitted over the line and this signal represents the letter G andnot the letter A which is the character of the message to be transmitted.
The transmitted impulses will be received at the distant end of the line and at the receivin apparatus of the local station in ex actly the same manner, since both are operating with identical ciphering tapes. A reference to the operation of the receiving apparatus B will, therefore, serve to explain the operation at the distant end.
The character to be recorded at the printer depends upon the combination of impulses transmitted to it over the conductors 47. These conductors run to ground throu h the normally open'relay contacts of the re ays 42 to 46, and these relays are under the joint control of the contacts of the device D and the contacts 49 to 50 of the line relay 41. Thus in receiving the transmitted signal above referred to, the absence of an impulse over the line when the transmitting distributer passes the contact 1, leaves the line relay 41 unenergized. The switch 48 is therefore on the back or grounded contact 50. Hence, when the receiving distributer arm passes over the contact 1, the circuit of the relay 42 Will be closed from battery 34 through contact 36 of device D, relay winding 42, contact 1, brush 11, segment 52, conductor 51 and to ground at 50. When the distributer arm is passing over the contact 2', the line relay 41 will be energized, due to an impulse transmitted from contact 2 of distributer A through the contact of relay 20. Switch 48 will therefore be on its front or battery contact 49 and relay 43 will therefore be energized, being connected at one end to the battery 54 and at the other end to ground at 35. When the distributer arm is passing over contact 3 the line relay will be again unenergized and the switch 48 upon its grounded contact and the relay 44 will therefore remain unergized, since it will be connected to ground at both ends. While the arm is passing over contacts 4 and 5 the line relay 41 is energized, due to impulses through the contacts of relays 22 and 23, so that switch 48 is upon its front or battery contact, and relays 45 and 46 therefore remain unergized, since they are connected at both ends to battery. In other words, relays 42 and 43 are successively closed and transmit impulses to the printer, while relays 44, 45 and 46 remain open.
The code signal upon which the printer operates is therefore, which is the symbol for the letter A and the printer accordingly prints the letter which it was desired to transmit.
As the distributer arm 10' passes the contact P, relay 57 is energized which closes the circuit of magnet 56, thereby feeding the tape one step and readjusting the contacts of the ciphering and deciphering de vice for the new ciphering letter. If it is desired to throw the ciphering and deciphering devices out of operation, the operator may transmit a prearranged signal as above suggested, thereby causing an i111- pulse to pass from the printer through the winding of relay (53 to ground. This opens the circuit of the locking winding 62 of the relay 60, which releases its armatures and whereupon both bus-bars of the ciphering device will be connected to ground, bar 33 at 35, and bar 32 at the grounded side of the battery 34. The take feed magnet 56 is likewise rendered inoperative. When it is desired to again throw the ciphering device into operation, another predetermined signal is transmitted, whereupon an impulse passes from the printer through the winding 61 of the relay 60 and to ground, which energizes the relay and reestablishes the connections shown on the drawing.
The operation of the modification shown in Fig. 2 is the same as that just described except that the operation of the relays 19' to 23 will depend upon the combined effect of their two windings instead of upon the effect of the connections at the opposite ends of a signal winding. Thus if both of the windings of any relay are connected to battery at the normal and ciphering transmitters respectively, the relay will remain unoperated because the magnetic effects of the two windings will neutralize each other. If they are both either open or grounded at the opposite ends, the relay will, of course, not, operate, but if either Winding is connected to battery while the other is grounded or open-circuited, the relay will operate, and obviously the circuit conditions which make a relay operate in Fig. 1 will likewise make it operate in Fig. 2. No separate description of the details'of the operation in connection with this figure is therefore necessary. The use of the grounded differential windings does away with the necessity for the resistances 31 shown in Fig. 1, since there is always a ground connection for any winding connected at the.
opposite end to battery.
The operation of the modification shown in Fig. 3 will be clear from the foregoing description. The ends of the relay Windings 19 to 23, which run to the normal transmitter C will always be connected either to battery or to ground, depending upon the position of the contacts 64 to 68 and there is, therefore, no need of the resistances 31 shown in Fig. 1.
The system as above described will therefore serve to change the impulses of the character to be transmitted into another set of impulses representing some other character of the same code and anyone attempting to intercept the message by tapping the wires will receive the im ulses so altered. A consideration of the clrcuits will show that even if the contacts of the eiphering transmitter are left in one position, a series of varying characters will be transmitted by the line which are different from the characters of the message to be sent, while if the contacts of the code transmitter are altered by shifting the tape thereof each time a letter of the message is to be transmitted, the rule by which the variation is made will be changed for each letter, in other words the cipher employed will be changed for each letter transmitted. It will also be clear that the set of impulses actually transmitted may represent some rinter operation other than the printing 0 a letter, such as the line shift or carriage return when a letter is in the normal transmitter. So that a printer tapped onto the line would show an indescribable confusion of signals unless it were provided with a deciphering device and was using the same deciphering tape as used at the transmitting station.
It is obvious, of course, that the invention here disclosed is equally applicable to transmission through any known medium and is, therefore, suitable for either wire or wireless transmission. I
The forms of the invention here shown are illustrative only, as it will be obvious that various modifications may be made without departing from the spirit of the invention or the scope of the appended claims.
What is claimed is:
1. The method of enciphering si als where the characters are re resented i? a number of periods of di erent current values which consists in altering the normal code impulses of a character to be trans mitted in accordance with a rule represented by some other character in a like code.
2. The method of transmitting messages where the characters are re resented by a number of periods of di erent current values, which consists in altering the normal code impulses of a. character in accordance with a rule represented by some other character in a like code, and restoring the transmitted impulses so produced to their normal code form at the receiving end by altering the received impulses in accordance with a rule represented by the same character.
3. The method of transmitting messages where the characters are re resented by a number of periods of di erent current values, which consists in alterin the normal code impulses of a character in accordance with a rule represented by some other character in a like code, restoring the transmitted impulses so produced to their normal code form at the receiving end by altering the received impulses in accordance with a rule represented by the same character, and correspondingly changing the rule of alteration and restoration at both ends of the line at frequent intervals.
4. The method of enciphering signals which consist in combining the effect of elec trical conditions representing the message character, with the efl'ect of those representing a cipher-ing character, to produce electrical impulses representing some other character.
5. The method of eneiphering signals which consists in combining the effect of electrical conditions representin the message character, with the effect 0 those rep resenting a ciphering character, to produce electrical impulses representing some other character, and changing the ciphering character from time to time.
6. The method of decipherin a secret message, which consists in com ining the electrical effect of the received impulses with the efi ect of the electrical conditions representing a deciphering character to produce electrical impulses representing the message character.
7. The method of deciphering a secret message, which consists in combining the electrical effect of the received impulses with the efiect of the electrical conditions repre senting a deciphering character to produce electrical impulses representing the message character, and changing the decipheri character at intervals, to correspond witthe ciphering character used in transmitting the message.
8. The method of transmitting signals, which consists in producing a set of electrical conditions appropriate for transmitting a character of the message according to an accepted code, producing a second set of arbitrarily. chosen electrical conditions, combining the electrical effects of the two sets of conditions to produce a third set of electrical conditions, and transmitting impulses corresponding to said third set of conditions.
9. The method of transmitting messages, which consists in producing a set of electri: cal conditions appropriate for transmitting a character of the message according to an accepted code, producing a second set of arbitrarily chosen electrical conditions, combining the electrical effects of the two sets of conditions to produce a third set of elec trical conditions, transmitting impulses corresponding to said third set of conditions and changing the second set of electrical,
conditions from time totime during the transmission of the messages.
10. The method of transmitting messages which consists in producing a set of electrical conditions appropriate for transmitting a character of the message according to an accepted code, producing a second set of arbitrarily chosen electrical conditions, com b-ining the effects of the two sets of conditions to produce a third set of electrical conditions, transmitting impulses corresponding to said third set of conditions, producing at the receiving station a deciphering set of electrical conditions corrq sponding to said second set and combining the electrical effects of these conditions with the electrical effect of the transmitted impulses, to produce a set of impulses representing the message character.
11. The method of transmitting messages which consists in producing a set of electrical conditions appropriate for transmitting a character of the message according to an accepted code, producing a set of arbitrarily chosen electrical conditions of like kind for enciphering the character, combining the effects of the two sets of conditions to produce a third set of electrical conditions, transmitting impulses corresponding to said third set of conditions, producing at the receiving station a deciphering set of electrical conditions corresponding to said second set, combining the electrical effects of these conditions with the electrical effect of the transmitted impulses, to produce a set of impulses representing the message character and correspondingly changing the enciphering and deciphering sets of conditions at intervals.
12. The method of transmitting messages, which consists in producing electrical conditions suitable for representing a character of the message, altering the eflect of these conditions by and in accordance with the electrical conditions representing some other character, transmitting impulses according to said altered effect and reproducing at the receiving end the original electrical conditions by altering the effect of the transmitted impulses by and in accordance with electrical conditions representing the same character as the conditions used to effect the alteration at the transmitting end of the line.
13. In an electrical signaling system, a set of contacts arranged to be closed in accordance with a pro-determined code for representing characters; a similar set of contacts arranged to be closed in like manner; a third set of contacts, means for closing any or all of said third set of contacts to correspond with the relative positions of corresponding contacts in said first and second mentioned sets, and means for transmitting impulses to the line in accordance with the arrangement of said third set of contacts.
14. In an electrical si nalin system, a set ofrelays for control ing t e impulses transmitted to the line, means for connecting either end of any relay winding of said set to either pole of a current source, and means for transmitting impulses to the line in accordance with the circuit conditions produced by said relays under the varying connections for their windings thus produced.
15. In an electrical signaling system, a set of relays for controlling the impulses transmitted to the line, two sets of windin terminals for said relays, means for app ying differing electrical potentials to the terminals in either set to make the sets correspond with predetermined code si nals one of which represents the message 0 aracters and means for transmittin impulses to the line in accordance with t e circuit conditions established by the relays.
I 16. In a signal transmitting system, two sets of contacts, any one of which may be connected to either pole of a current source, whereby either set may represent any character of a code depending on the arrangement of its contacts, relays having windings connected between corresponding contacts 111 the two sets and means for sending current impulses through the contacts controlled by said relays.
17. In a device for automatically enciphering messages, the combination of switching mechanism for making sets of electrical connections to current sources of differing potential thereby representing the successive characters of the message, other switching mechanism for making other sets of electrical connections, circuits connecting the corresponding contacts in the two sets of connections and means controlled by the current in said circuits for governing the combination of impulses transmitted to the line.
18. In a device for automatically deciphering messages, a combination of switching mechanism for making sets of electrical connections corresponding to the connections used in ciphering the message, means responsive to the received impulses for altering the condition of a local circuit, and means for combining the effect of the electrical condition of the local circuit under successive line impulses with the effect of the conditions produced in said switching mechanism, whereby a set of impulses is created corresponding to the message character.
19. In a signal receiving instrument, switching mechanism for determining the code impulses to be recorded, a line relay responsive to the received impulses, a set of terminals whose electrical condition relative to eachother may be varied to repre sent ciphering symbo s, and means under the combined influence of said relay and said set of terminals for controlling said switching mechanism.
20. In a signal receiving instrument, a plurality of circuits for controlling the re- 1,ero,719
cording of characters, a relay for controlling each of said circuits, a deciphering device arranged to connect one terminal of each of said relays to either pole of a source of current, a distributor for connecting the opposite terminal of each of said relays successively to a single circuit, and a line relay responsive to receive impulses for connecting said single circuit to either pole of a source of current, according to the char actor of the impulse received.
21. In a signaling system, a main circuit, a plurality of branch circuits, a distributor for connecting the main circuit with said branch circuits successively, switching mech anism in said branch circuits for determining the character of the impulse transmitted over the main circuit when connected to the respective branch circuits, two controlling devices either one of which may transmit impulses representing code characters, and connections between said controlling devices and said switching mechanism whereby the switching mechanism may be operated by said controlling devices separately or in accordance with their combined effect.
22. In a signal transmitting systennmeans for transmittin normal code impulses over the line, ciphering and deciphering devices at opposite ends of the line for automatically altering the impulses to transform them into a different character and restoring them at the receiving end of the line, and means for throwing said devices into and out of operation by the transmission of predetermined signals over the line.
23. In .a signaling system, a main line, mechanism at each end of said line for sending and receiving messages, ciphering and deciphering devices at opposite ends of said line and associated with said mechanism for automatically ciphering the message at the transmitting end and for deciphering it at the receiving end, and means for throwing the ciphering and deciphering devices into or out of operation in response to the transmission of a predetermined signal over the line.
24. In a signal transmitting system, a sendiaig and receiving mechanism comprising a set of relays controlling the impulses imposed upon the line, another set of relays for controlling the impulses sent to the recording mechanism, a ciphering and decipherin device connected to both sets of relays w ereby the message to be sent is en- .ci'phered for transmission and received messages are deciphered by the same device.
In testimony whereof, I have si ned my to this specification this twe fth day of September 1918.
GILBERT S. VERNAM.
Copies of this patent may be obtained for five cents each, by addressing the-Gommissioner of IPatents, Washington, D. 0.
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US2449789 *||Jul 29, 1943||Sep 21, 1948||Emily Y Reiber||Mechanical deciphering system|
|US2456733 *||May 27, 1946||Dec 21, 1948||Teletype Corp||Cipher checking system|
|US2458406 *||Sep 28, 1945||Jan 4, 1949||Ibm||Ciphering and checking device|
|US2465367 *||Mar 12, 1943||Mar 29, 1949||Friedman William F||System for enciphering facsimiles|
|US2466390 *||Mar 30, 1944||Apr 5, 1949||Bell Telephone Labor Inc||Secret telegraph system|
|US2504621 *||Dec 3, 1946||Apr 18, 1950||Bell Telephone Labor Inc||Enciphering and deciphering device for secret telegraph systems|
|US2539556 *||Jul 11, 1941||Jan 30, 1951||Bell Telephone Labor Inc||Variable delay speech privacy system|
|US2547515 *||Jun 23, 1949||Apr 3, 1951||Teletype Corp||Secrecy system|
|US2552548 *||Mar 6, 1943||May 15, 1951||Friedman William F||Facsimile enciphering system|
|US2656408 *||May 21, 1949||Oct 20, 1953||Zenith Radio Corp||Subscriber signaling system|
|US2993089 *||Dec 1, 1958||Jul 18, 1961||Olivetti & Co Spa||Enciphering and deciphering apparatus for secret telegraph systems|
|US3083263 *||Dec 31, 1958||Mar 26, 1963||Europ Handelsges Anst||Auxiliary apparatus for teletypers|
|US3384705 *||Aug 29, 1944||May 21, 1968||Leo Rosen||Facsimile privacy apparatus|
|US3967067 *||Sep 24, 1941||Jun 29, 1976||Bell Telephone Laboratories, Incorporated||Secret telephony|
|US4979832 *||Nov 1, 1989||Dec 25, 1990||Ritter Terry F||Dynamic substitution combiner and extractor|
|US5799090 *||Sep 25, 1995||Aug 25, 1998||Angert; Joseph C.||pad encryption method and software|
|US6266413 *||May 11, 1999||Jul 24, 2001||Benyamin Ron||System and method for synchronizing one time pad encryption keys for secure communication and access control|
|US6324287 *||Jun 5, 1998||Nov 27, 2001||Scm Microsystems, Inc.||Pad encryption method and software|
|US6445794 *||Jun 24, 1998||Sep 3, 2002||Benyamin Ron||System and method for synchronizing one time pad encryption keys for secure communication and access control|
|US7197142||Aug 24, 2001||Mar 27, 2007||Alten Alexander I||System and methods for a vernam stream cipher|
|US7664267 *||Jun 30, 2005||Feb 16, 2010||Agere Systems Inc.||Bit based arithmetic coding using variable size key cipher|
|US7853019||Nov 30, 2006||Dec 14, 2010||Netapp, Inc.||Tape failover across a cluster|
|US7971234||Sep 15, 2006||Jun 28, 2011||Netapp, Inc.||Method and apparatus for offline cryptographic key establishment|
|US7983423||Oct 29, 2007||Jul 19, 2011||Netapp, Inc.||Re-keying based on pre-generated keys|
|US7995759||Sep 28, 2006||Aug 9, 2011||Netapp, Inc.||System and method for parallel compression of a single data stream|
|US8022724||Nov 25, 2009||Sep 20, 2011||Xilinx, Inc.||Method and integrated circuit for secure reconfiguration of programmable logic|
|US8037524||Jun 19, 2007||Oct 11, 2011||Netapp, Inc.||System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys|
|US8042155||Sep 29, 2006||Oct 18, 2011||Netapp, Inc.||System and method for generating a single use password based on a challenge/response protocol|
|US8160257||Nov 2, 2010||Apr 17, 2012||Netapp, Inc.||Tape failover across a cluster|
|US8171307||May 26, 2006||May 1, 2012||Netapp, Inc.||Background encryption of disks in a large cluster|
|US8181011||Aug 23, 2006||May 15, 2012||Netapp, Inc.||iSCSI name forwarding technique|
|US8190905||Sep 29, 2006||May 29, 2012||Netapp, Inc.||Authorizing administrative operations using a split knowledge protocol|
|US8196182||Aug 21, 2008||Jun 5, 2012||Netapp, Inc.||Distributed management of crypto module white lists|
|US8245050||Sep 29, 2006||Aug 14, 2012||Netapp, Inc.||System and method for initial key establishment using a split knowledge protocol|
|US8335915||May 14, 2002||Dec 18, 2012||Netapp, Inc.||Encryption based security system for network storage|
|US8369529||Jul 1, 2011||Feb 5, 2013||Netapp, Inc.||Re-keying based on pre-generated keys|
|US8397083||Aug 23, 2006||Mar 12, 2013||Netapp, Inc.||System and method for efficiently deleting a file from secure storage served by a storage system|
|US8423780||Feb 7, 2006||Apr 16, 2013||Netapp, Inc.||Encryption based security system for network storage|
|US8469790||Oct 15, 2010||Jun 25, 2013||Fortunet, Inc.||Wireless wagering system|
|US8568224||May 25, 2004||Oct 29, 2013||Fortunet, Inc.||Wireless wagering system|
|US8593172||Aug 16, 2011||Nov 26, 2013||Xilinx, Inc.||Secure reconfiguration of programmable logic|
|US8607046||Apr 23, 2007||Dec 10, 2013||Netapp, Inc.||System and method for signing a message to provide one-time approval to a plurality of parties|
|US8611542||Apr 26, 2007||Dec 17, 2013||Netapp, Inc.||Peer to peer key synchronization|
|US8824686||Apr 27, 2007||Sep 2, 2014||Netapp, Inc.||Cluster key synchronization|
|US8898452||Sep 8, 2005||Nov 25, 2014||Netapp, Inc.||Protocol translation|
|US8948377||Aug 24, 2010||Feb 3, 2015||Mitsubishi Electric Corporation||Encryption device, encryption system, encryption method, and encryption program|
|US9032208||Aug 24, 2010||May 12, 2015||Mitsubishi Electric Corporation||Communication terminal, communication system, communication method and communication program|
|US9672025||Dec 10, 2014||Jun 6, 2017||Ford Global Technologies, Llc||Encryption for telematics flashing of a vehicle|
|US20020094080 *||Nov 30, 2000||Jul 18, 2002||Chenggang Duan||Variable size key cipher and method and device using the same|
|US20030039357 *||Aug 24, 2001||Feb 27, 2003||Alten Alexander I.||System and methods for a vernam stream cipher, a keyed one-way hash and a non-cyclic pseudo-random number generator|
|US20040153642 *||May 14, 2002||Aug 5, 2004||Serge Plotkin||Encryption based security system for network storage|
|US20050149739 *||Dec 31, 2003||Jul 7, 2005||Hewlett-Packard Development Company, L.P.||PIN verification using cipher block chaining|
|US20050254646 *||Jun 30, 2005||Nov 17, 2005||Chenggang Duan||Variable size key cipher and method and device using the same|
|US20060072763 *||Oct 6, 2005||Apr 6, 2006||Samsung Electronics Co., Ltd.||Apparatus and method for storing data|
|US20060136735 *||Feb 7, 2006||Jun 22, 2006||Serge Plotkin||Encryption based security system for network storage|
|US20070055891 *||Sep 8, 2005||Mar 8, 2007||Serge Plotkin||Protocol translation|
|DE102015117022A1||Oct 6, 2015||Apr 6, 2017||Qutools Gmbh||Verfahren und Vorrichtungen zur lokalen Schlüsselverteilung|
|WO2015028830A1||Aug 26, 2014||Mar 5, 2015||Pannon Szoftver Kft.||Cryptographic apparatuses and methods for encrypting and decrypting data using automata|
|WO2016038428A1||Sep 14, 2014||Mar 17, 2016||Alexandre Durand||Cryptographic system based on reproducible random sequences|
|WO2017090014A1||Nov 28, 2016||Jun 1, 2017||Murguia Cosentino Agustin||Technique to generate symmetric encryption algorithms|
|U.S. Classification||380/33, 380/26, 380/259|
|Cooperative Classification||H04K1/00, H04L9/00|