Sign up


Match Document Document Title
US20120260097 SYSTEM AND METHOD OF SIGNING A MESSAGE  
A system and method of signing a message to be sent from a first communication device to a destination via a second communication device. The message includes a first portion on the first...
US20120324229 SYSTEM AND METHOD FOR GENERATING KEYLESS DIGITAL MULTI-SIGNATURES  
A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees based...
US20140075197 METHOD FOR SELECTIVE SOFTWARE ROLLBACK  
A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software...
US20130318356 DISTRIBUTION OF DIGITAL CONTENT PROTECTED BY WATERMARK-GENERATING PASSWORD  
A receiver receives digital content scrambled using a control word and a user code for the scrambled content. A user inputs the user code that is forwarded to a code extractor that generates the...
US20130073949 SYSTEM AND METHOD TO AID ASSISTIVE SOFTWARE IN DYNAMICALLY INTERPRETING INTERNET WEBSITES AND THE LIKE  
Disclosed is a system and method for modifying the presentation of content and/or graphical elements and behavior of a digital presentation (e.g., a webpage) by identifying an information event and...
US20120095877 APPLICATION USAGE POLICY ENFORCEMENT  
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application...
US20120278628 Digital Signature Method and System  
A digital signature method, a method for initialising a digital signature scheme, a system for digitally signing a message and a computer program product are described. At least the digital...
US20120124383 SYSTEM AND METHOD FOR PROTECTING NETWORK RESOURCES FROM DENIAL OF SERVICE ATTACKS  
The present disclosure generally pertains to systems and methods for protecting network resources from denial of service attacks. In one exemplary embodiment, a responder stores an access filter...
US20110225420 MODULE SIGNING FOR UNPRIVILEGED USERS TO CREATE AND LOAD TRUSTWORTHY KERNEL MODULES  
A module building system, hosted by a server, receives a user script to be run to monitor software on a client using an introspection tool. The server adds safety constraints to the user script and...
US20110126018 Methods and systems for transaction digital watermarking in content delivery network  
Methods and systems for applying a transaction digital watermark to content being downloaded over a content delivery network. The digital watermark carries information about the transaction...
US20100318806 MULTI-FACTOR AUTHENTICATION WITH RECOVERY MECHANISMS  
A single sign on facility provides redundancy and recovery functions through the use of a plurality of identifiers. Users prove identity to relying parties by demonstrating control over each of the...
US20120163654 METHOD AND SYSTEM FOR TRACKING ILLEGAL DISTRIBUTOR AND PREVENTING ILLEGAL CONTENT DISTRIBUTION  
A system for tracking an illegal distributor and preventing an illegal content distribution includes: a forensic mark generator for receiving content and a content identification code from a...
US20130046989 DIGITAL SIGNATURE MANAGEMENT AND VERIFICATION SYSTEMS AND METHODS FOR DISTRIBUTED SOFTWARE  
A digital signature management system for distributed software applications includes a communication network and a digital signature module coupled to the communication network. The system also...
US20110208616 CONTENT SYSTEM  
Systems, methods, and an article of manufacture for managing media content are shown and described. A method can include storing a plurality of collection maps on a server in communication with a...
US20130246798 METHOD FOR SECURING MESSAGES  
There is provided a method for secure communications. The method comprises receiving a transmission comprising a signature of a broadcast message at a communication device, and verifying the...
US20100318798 MESSAGE HANDLING AT A MOBILE DEVICE  
A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with...
US20140215224 STATUTORY LICENSE RESTRICTED DIGITAL MEDIA PLAYBACK ON PORTABLE DEVICES  
Systems and methods are described for, e.g., providing a statutory audio content service on a portable device that complies with the provisions of the Digital Millennium Copyright Act (DMCA). The...
US20130185565 Efficient, High Volume Digital Signature System for Medical and Business Applications  
The system relates to a method for collecting signatures from pre-validated signers. In one aspect of the method, a pre-validated signer's signature is affixed to an electronic document in an...
US20110145585 SYSTEM AND METHOD FOR PROVIDING CREDENTIALS  
A method and system is operable to provide credentials by generating a first credential that conforms to a first specified format. A second credential conforming to a second specified format is...
US20130212398 METHOD AND SYSTEM FOR VALIDATING A DEVICE THAT USES A DYNAMIC IDENTIFIER  
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously...
US20130191643 ESTABLISHING A CHAIN OF TRUST WITHIN A VIRTUAL MACHINE  
According to an aspect of an embodiment, a method of establishing a chain of trust into a virtual machine on a hardware system is described. The method may include measuring an immutable portion of...
US20130117569 METHOD AND APPARATUS FOR IMPROVING DIGITAL SIGNATURES  
Systems and methods are provided for enchancing pseudo random number generation to thwart various security attacks to a system that relies on digital signature security measures. For example, a...
US20110203000 PREVENTING UNAUTHORIZED FONT LINKING  
Methods, computer readable media, and apparatuses for preventing unauthorized font linking are presented. A request for a font file may be received. It may be determined whether the request is...
US20130031370 ELECTRONIC SIGNATURE AUTHENTICATION  
Method of authenticating a signature on a work document in which a remote server generates a digital work fingerprint and a representation file of the work document. The representation file and the...
US20110197070 SYSTEM AND METHOD FOR IN- AND OUT-OF-BAND MULTI-FACTOR SERVER-TO-USER AUTHENTICATION  
A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of...
US20130117570 WATERMARK EXTRACTION BASED ON TENTATIVE WATERMARKS  
Methods, devices and computer program products facilitate the extraction of embedded watermarks in the presence of content distortions. Pre-distorted synchronization templates are used to detect...
US20130254546 Methods for Identifying the Guarantor of an Application  
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of...
US20120117386 Methods for Identifying the Guarantor of an Application  
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of...
US20140215220 APPLICATION DISTRIBUTION SYSTEM AND METHOD  
The present invention relates to an application distribution system and method, and the application distribution system according to the present invention includes a developer terminal for...
US20130007890 METHOD AND SYSTEM FOR DETECTING VIOLATION OF INTELLECTUAL PROPERTY RIGHTS OF A DIGITAL FILE  
A computer-based method and system for detecting violation of intellectual property rights of a digital file, comprising, in a distribution channel, digitally sending or streaming the file from a...
US20130326224 System and Method for Message Verification in Broadcast and Multicast Networks  
In a network device, a method for verified communication includes generating a network communication message using a selection of predetermined message elements having digital signatures generated...
US20100250950 COMMUNICATION APPARATUS  
A communication apparatus includes: a first storage unit storing a received electronic mail; a verification unit executing a first verification about an electronic signature attached to the...
US20110151836 Secure subscriber identity module service  
A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to...
US20130054972 SYSTEMS AND METHODS FOR SECURING CONTENT DELIVERED USING A PLAYLIST  
Systems and methods in accordance with embodiments of the invention enhance the security of content distribution using individualized playlists. In many embodiments, a playlist is individually...
US20100293386 DISTRIBUTION AND PRINTING OF TRAVEL DOCUMENTS  
A system for generating and printing travel documents for a customer associated with a journey having one or more parts, the system comprising: a travel documentation distribution module capable of...
US20060026431 Cryptographic letterheads  
Digital watermark data is embedded into compressed media content that is transmarked when the compressed media content is converted to an analog format or into an uncompressed digital format. The...
US20110264585 METHOD AND SYSTEM FOR MANAGING EMAIL  
A system is provided for managing email and eliminating spam wherein an email client (112) is configured to receive digitally signed email (117), identify spam email, and allow a user to report...
US20130238903 SERVICE PROVISION METHOD  
A method of providing a service from a service provider to users is described. The method comprises: a step of generating an electronic signature on a first information provided by a user with a...
US20120297196 MAINTAINING PRIVACY FOR TRANSACTIONS PERFORMABLE BY A USER DEVICE HAVING A SECURITY MODULE  
A method and system for maintaining privacy for transactions performable by a user device having a security module with a privacy certification authority and a verifier are disclosed. The system...
US20140006789 DEVICES, SYSTEMS, AND METHODS FOR MONITORING AND ASSERTING TRUST LEVEL USING PERSISTENT TRUST LOG  
Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored...
US20110231840 TECHNIQUES FOR SHARING VIRTUAL MACHINE (VM) RESOURCES  
Techniques for sharing virtual machine (VM) resources are provided. A relative location for a resource within a VM is created; the relative location dynamically resolves to a particular physical...
US20120066502 SYSTEMS AND METHODS FOR ENABLING TRUST IN A FEDERATED COLLABORATION  
Systems and methods consistent with the present invention enable explicit and multilateral trust across a community of federated servers via a network. A trusted third party establishes a framework...
US20130024697 SYSTEM AND METHOD FOR OBFUSCATION INITIATION VALUES OF A CRYPTOGRAPHY PROTOCOL  
A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client...
US20120084565 CRYPTOGRAPHIC DEVICE THAT BINDS AN ADDITIONAL AUTHENTICATION FACTOR TO MULTIPLE IDENTITIES  
Binding a security artifact to a service provider. A method includes generating a pseudonym for a security artifact. The pseudonym is an identifier of the security artifact to the service provider...
US20130145167 Optimized Integrity Verification Procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
US20140006791 SYSTEMS AND METHODS USING CRYPTOGRAPHY TO PROTECT SECURE COMPUTING ENVIRONMENTS  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20120166807 Systems and Methods Using Cryptography to Protect Secure Computing Environments  
Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying...
US20120324231 ATTRIBUTES IN CRYPTOGRAPHIC CREDENTIALS  
Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as...
US20050278535 Profile protection  
Tampering with pieces of software is inhibited. Profiles are stored in a central hierarchical database and such profiles are protected from tampering. The obfuscation of a software image so as to...
US20110004765 LICENSE MANAGING METHOD AND DEVICE  
A license managing device sets a security area for storing a license file, maintains the security area as an encoded file in an inactive state of the security area by encoding the security area,...