Frank Leighton (1908-1962) was an Australian actor best known for two leading roles in films for Ken G. Hall, Thoroughbred (1936) and Tall Timbers (1937). ...
Name / Title
Company / Classification
Phones & Addresses
Frank Leighton Director Information Technology
Aci Worldwide, Inc. Prepackaged Software
120 Broadway Ste 3350, New York, NY 10271
Frank Leighton Owner
Your Place & Ours Pizza Eating Place
8 Elm Park, Groveland, MA 01834 9783747409
Frank Leighton Director Information Technology
ACI Worldwide Computer Software · Software Sales And Service · Professional, Scientific and Techincal Servies · Computer Systems Design and Related Services · Prepackaged Software Services · Prepackaged Software Services Computers/Peripherals · Nonclassifiable Establishments · Prepackaged Software Services Whol Computers/Peripherals
3520 Kraft Rd SUITE 300, Naples, FL 34105 6060 Coventry Dr, Elkhorn, NE 68022 209 W Washington St, Charleston, WV 25302 330 S 108 Ave, Omaha, NE 68154 4023907600, 6463486700, 2393907600, 8007551596
Us Patents
Watermarking Process Resilient To Collusion Attacks
A watermarking procedure wherein each of a set of copies of the work has a slightly-modified form of a "baseline" watermark that is placed within a critical region of the data. The slight variations in the watermarks, however, are not perceptually visible and do not interfere with the work. If multiple persons collude to attempt to create an "illicit" copy of the work (i. e. , a copy without a watermark), however, at least one of the modified watermarks is present in the copy, thereby identifying both the illicit copy and the copier.
Switching Networks With Expansive And/Or Dispersive Logical Clusters For Message Routing
Sanjeev Arora - Berkeley CA Thomas F. Knight - Belmont MA Frank T. Leighton - Newton Center MA Bruce M. Maggs - Princeton NJ Eliezer Upfal - Palo Alto CA
Assignee:
Massachusetts Institute of Technology - Cambridge MA
International Classification:
H01H 6700
US Classification:
340826
Abstract:
A class of switching networks is comprised of expansive logical clusters and/or dispersive logical clusters. These clusters are of low degree. The class of networks include multibutterfly networks as well as multi-Benes networks. These networks provide for fault tolerance and routing and for efficient routing. Moreover, routing is provided in a non-blocking fashion.
Method For Authenticating Objects Identified By Images Or Other Identifying Information
Frank T. Leighton - Newtonville MA Silvio Micali - Brookline MA
International Classification:
H04L 930 H04L 932
US Classification:
380 30
Abstract:
The method and system of the present invention utilizes public-key cryptography to create "secure" titles for personal and real property such as vehicles and the like. The title preferably comprises a card in which is stored a digital signature of one or more identifiers such as a vehicle identification number, the vehicle license plate and the owner's name. To effect a transfer of the property, the digital signature on the title must first be shown to have been generated from the one or more identifiers.
Frank T. Leighton - Newton Center MA Silvio Micali - Cambridge MA
International Classification:
H04K 100
US Classification:
380 23
Abstract:
The method and system of the invention utilizes a private key of a public-key cryptosystem key pair to encrypt a non-secret password into a digital signature. The password and the digital signature are then encoded and stored on a magnetic stripe or other memory device of the card. To effect a transaction, the digital signature on a received card must be shown to have been generated from the password on the received card. The password preferably includes a digitized photograph of the authorized cardholder which is capable of being displayed at the transaction terminal. This enables the operator of the terminal to verify the identity of the cardholder by visual inspection.
A method of generating cryptographic keys to implement a Failsafe Key Escrow system. A prime modulus Q and a generator G for Z. sub. Q are publicly known. The public key P. sub. X that is escrowed for user X is G. sup. SX mod Q, where Sx is the secret key for user X. The user picks a random secret value A from [0, Q-2] and announces the value of G. sup. A mod Q to a set of trustees or a central authority. Next the user "shares" A with the trustees using a verifiable secret sharing scheme. The trustees and/or the central authority selects a random value B from the interval [0, Q-2] and they set the user's public key to be P. sub. X =(G. sup. A)G. sup. B mod Q. The value of B is returned to the user and is escrowed with the public key for X. The value of B is not released to the public. The user's then sets his secret key to be S. sub.
Method For Enabling Users Of A Cryptosystem To Generate And Use A Private Pair Key For Enciphering Communications Between The Users
Frank T. Leighton - Newtonville MA Silvio Micali - Brookline MA
International Classification:
H04L 908 H04L 930
US Classification:
380 30
Abstract:
The present invention describes a method for enabling users of a cryptosystem to agree on secret keys. In one embodiment, a trusted agent chooses at least one individual key for each user, with at least a portion of such individual key being secret. At least some of the individual keys are then stored in physically secure devices, and the pair of users i and j use their individual keys to compute a common secret key. In another embodiment, each trustee of a group of trustees choose at least one individual key for each user, with at least some portion of such individual key being secret. The keys chosen by a sufficiently small number of such trustees, however, are insufficient for computing the common secret key of the users. Other hardware and software key exchange protocols based on these two techniques are also disclosed.
Method And System For Personal Identification Using Proofs Of Legitimacy
Frank T. Leighton - Newton Center MA Silvio Micali - Cambridge MA
International Classification:
H04K 100
US Classification:
380 23
Abstract:
The method and system for the invention utilizes any of a number of "proofs of legitimacy" to generate and verify a personal identification card. A card is generated by computing a digital signature of a non-secret password. The password and the digital signature are then encoded and stored on a magnetic stripe or other memory device of the card. To effect a transaction, the digital signature on a received card must be shown to have been generated from the password on the received card. The password preferably includes a digitized photograph of the authorized cardholder which is capable of being displayed at the transaction terminal. This enables the operator of the terminal to verify the identity of the cardholder by visual inspection.
Large Provably Fast And Secure Digital Signature Schemes Based On Secure Hash Functions
Frank T. Leighton - Newtonville MA Silvio Micali - Brookline MA
International Classification:
H04L 900 H04L 930
US Classification:
380 30
Abstract:
The present invention describes new digital signature schemes that are provably secure against any adaptive chosen-message attack. The scheme, which is based on selection of a hash function from a space of such functions, has a very short public key, fast signing, a reasonable signature length and high security. Several algorithmic techniques are provided for enhancing the efficiency of the signature scheme in terms of time and memory.