BackgroundCheck.run
Search For

Daniel N Heer, 6829 Thornell Rd, Newton, NH 03858

Daniel Heer Phones & Addresses

29 Thornell Rd, Newton, NH 03858    603-3825349   

Parsippany, NJ   

Lake Hiawatha, NJ   

Columbus, OH   

Littleton, CO   

Dover, NJ   

Salem, NH   

Work

Position: Sales Occupations

Mentions for Daniel N Heer

Daniel Heer resumes & CV records

Resumes

Daniel Heer Photo 12

Daniel Heer

Daniel Heer Photo 13

Daniel Heer

Publications & IP owners

Us Patents

Method And Apparatus For Using Multiple Co-Dependent Dma Controllers To Provide A Single Set Of Read And Write Commands

US Patent:
6341328, Jan 22, 2002
Filed:
Apr 20, 1999
Appl. No.:
09/295010
Inventors:
Daniel Nelson Heer - Newton NH
Assignee:
Lucent Technologies, Inc. - Murray Hill NJ
International Classification:
G06F 1200
US Classification:
711112, 711154, 714 11, 712247, 710101
Abstract:
A microcomputer incorporates a pair of DMA controllers that are co-dependently operated to read and write common data blocks to two peripheral devices. In an exemplary embodiment of the invention, one of the DMA controllers is designated to read a data block from memory, store the data, and then write the data in a single write cycle to each of the two peripheral devices. This DMA controller provides the address and control signals necessary for writing the data to a first of the two peripheral devices, while the other DMA controller provides the address and control signals necessary for writing the data block to a second of the two peripheral devices. As a result, only one read and one write command are required for the data to be written to the two peripheral devices.

Methods And Apparatus For Enhanced Cmea Employing Enhanced Transformations

US Patent:
6377687, Apr 23, 2002
Filed:
Jul 29, 1998
Appl. No.:
09/124300
Inventors:
Mark H. Etzel - Harvard MA
Robert John Frank - Silver Spring MD
Daniel Nelson Heer - Newton NH
Robert Joseph McNelis - Columbia MD
Semyon B. Mizikovsky - Morganville NJ
Robert John Rance - Andover MA
R. Dale Shipp - Columbia MD
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 928
US Classification:
380 28, 380 42
Abstract:
Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a transformation, an iteration of the CMEA process, and an inverse transformation. The reverse ECMEA process employs a reverse transformation, an iteration of the CMEA process, and a reverse inverse transformation. The transformations and inverse transformations, and the iteration of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table.

Methods And Apparatus For Self-Inverting Multiple-Iteration Cmea Crypto-Processing For Improved Security For Wireless Telephone Messages

US Patent:
6418224, Jul 9, 2002
Filed:
May 5, 1998
Appl. No.:
09/073131
Inventors:
Mark H. Etzel - Harvard MA
Robert John Frank - Silver Spring MD
Daniel Nelson Heer - Newton NH
Robert Joseph McNelis - Columbia MD
Semyon B. Mizikovsky - Morganville NJ
Robert John Rance - Andover MA
R. Dale Shipp - Columbia MD
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04M 166
US Classification:
380247, 380255, 380270, 380274, 380284, 380281, 455410
Abstract:
A self-inverting enhanced CMEA encryption system suitable for use in wireless telephony. An unprocessed text message is introduced into the system and subjected to a first iteration of a CMEA process, using a first CMEA key to produce a first intermediate message, a first intermediate processed text message, a first intermediate ciphertext message or the like. The first intermediate processed text message is subjected to a further iteration of the CMEA process, using a second CMEA key, to produce a second intermediate processed text message. The second intermediate processed text message is subjected to a final iteration of the CMEA process, using the first CMEA key, to produce the final processed text message. Security may be additionally enhanced by subjecting each message to an input/output transformation before and after each iteration of the CMEA process. In a three-iteration process, a total of four input/output transformations are used with the first and fourth input/output transformations being identical, and with the second and third input/output transformations being identical.

Data Encryption Key Management System

US Patent:
6577734, Jun 10, 2003
Filed:
Oct 31, 1995
Appl. No.:
08/550909
Inventors:
Mark H. Etzel - Harvard MA
David W. Faucher - Guthrie Center IA
Daniel Nelson Heer - Newton NH
David P. Maher - Largo FL
Robert John Rance - Andover MA
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 900
US Classification:
380277, 380273, 713194
Abstract:
The secure management of encryption keys is obtained by preventing external access thereto and ensuring that the keys do not leave an encryption unit in their original form. This result is obtained via a facility which (a) generates a unique device encryption key and at least one program encryption key, (b) encrypts the program encryption key using the device encryption key, and (c) stores the result in local memory. Thereafter, responsive to receipt of an indication to encrypt data, the program encryption key is retrieved from memory and is decrypted using the unique device encryption key. The data is then encrypted using the decrypted program encryption key and the encrypted data is stored in a server for distribution to a user who enters a request for the data. When there is a need to transport the latter key to another element, then the program key is encrypted using a symmetrical encryption key that the facility shares with the other element and the result is supplied to that element. The element then decrypts the encrypted program key using its own version of the symmetrical key.

Methods And Apparatus For Enhanced Cmea Including A Cmea Iteration Preceded And Followed By Transformations And Employing An Involuntary Lookup

US Patent:
6876744, Apr 5, 2005
Filed:
Jul 22, 1998
Appl. No.:
09/120763
Inventors:
Mark H. Etzel - Harvard MA, US
Robert John Frank - Silver Spring MD, US
Daniel Nelson Heer - Newton NH, US
Robert Joseph McNelis - Columbia MD, US
Semyon B. Mizikovsky - Morganville NJ, US
Robert John Rance - Andover MA, US
R. Dale Shipp - Columbia MD, US
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L009/32
US Classification:
380 28, 380247, 380281
Abstract:
Methods and apparatus for enhanced CMEA, or ECMEA, processing. A forward ECMEA and a reverse ECMEA process are provided. The forward ECMEA process decrypts text encrypted by the reverse ECMEA process and the reverse ECMEA process decrypts text encrypted by the forward ECMEA process. The forward ECMEA process employs a first transformation, an iteration of the CMEA process, and a second transformation. The reverse ECMEA process employs a first inverse transformation, an iteration of the CMEA process, and a second inverse transformation. The transformations and inverse transformations, and the iterations of the CMEA process, employ secret offsets to improve security. The transformations and the iteration of the CMEA process also employ an enhanced tbox function using an involutary lookup table.

Electronic Identifiers For Network Terminal Devices

US Patent:
6005943, Dec 21, 1999
Filed:
Oct 29, 1996
Appl. No.:
8/739371
Inventors:
Joshua L. Cohen - Highland Park NJ
Cecil A. Dean - Andover MA
Thomas L. du Breuil - Georgetown MA
Daniel Nelson Heer - Newton NH
David P. Maher - Largo FL
Vance Eugene Poteat - Windham NH
Robert John Rance - Andover MA
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 900
US Classification:
380 30
Abstract:
The generation of electronic identifiers for network interface units connected to a data network for use in detecting unauthorized decryption of encrypted data transmitted over the data network. A random number is generated for use as a private key decryption code and is stored in memory in each network interface unit. A public key is calculated from the stored private key using a non-invertible mathematical formula. If the calculated public key is unique, then a portion of the public key (e. g. a subset of its bits) is stored in a data provider database as an electronic identifier for use in detecting unauthorized decryption of data by the interface unit.

Secure Telecommunications

US Patent:
5455861, Oct 3, 1995
Filed:
Aug 27, 1993
Appl. No.:
8/113155
Inventors:
David W. Faucher - Salem NH
Daniel N. Heer - Salem NH
Michael M. Kaplan - Rockport MA
David P. Maher - Windham NH
Assignee:
AT&T Corp. - Murray Hill NJ
International Classification:
H04L 900
H04M 119
H04N 144
US Classification:
380 9
Abstract:
A security node disposed in the telecommunications network connecting calling and called parties transforms information (which can be voice, data, facsimile, video and other types of calls or messages) encrypted in a first format to (a) encrypted information in a different format or to (b) non-encrypted information, and vice-versa. The node is accessible from any location connected to the network. By routing calls or messages originated by the calling party and destined for the called party via the security node, and providing appropriate control signals to the node, the information may be encrypted only over a portion of the transmission path between the parties, and clear over the remainder of the transmission path. Alternatively, the information may be encrypted in different portions of the path using different encryption algorithms. This arrangement enables the parties to obtain relatively secure communications even if only one party has a security device at the originating or terminating end, or if the parties have security devices using different handshaking protocols and encryption algorithms.

Encrypting Method And Apparatus Enabling Multiple Access For Multiple Services And Multiple Transmission Modes Over A Broadband Communication Network

US Patent:
6028933, Feb 22, 2000
Filed:
Apr 17, 1997
Appl. No.:
8/837423
Inventors:
Daniel N. Heer - Newton NH
Robert J. Rance - Andover MA
Assignee:
Lucent Technologies Inc. - Murray Hill NJ
International Classification:
H04L 900
US Classification:
380 9
Abstract:
The specification relates to the encryption of data transmitted over a broadband multiple access bi-directional hybrid fiber/coax (HFC) network. The method supports downstream broadcast encryption from headend to cable modem, and also provides for encryption of transmissions from cable modems back to the headend. Although the present invention is described in relation to an HFC network, it is also equally applicable to a cellular wireless communications environment or any other digital broadcast medium. The invention is implemented in two subdivisions, a slow but secure software encrypting algorithm, and a fast but less secure hardware encrypting algorithm. The combination produces the security of the software subdivision, with the encrypting speed of the hardware subdivision. The encryption method and apparatus supports the various access and transmission modes, such as STM, ATM, and VL. The present invention utilizes a virtual random number generator at the individual cable modems to reduce cable modem hardware.

NOTICE: You may not use BackgroundCheck or the information it provides to make decisions about employment, credit, housing or any other purpose that would require Fair Credit Reporting Act (FCRA) compliance. BackgroundCheck is not a Consumer Reporting Agency (CRA) as defined by the FCRA and does not provide consumer reports.