Match
|
Document |
Document Title |
|
US20120260097 |
SYSTEM AND METHOD OF SIGNING A MESSAGE
A system and method of signing a message to be sent from a first communication device to a destination via a second communication device. The message includes a first portion on the first... |
|
US20120324229 |
SYSTEM AND METHOD FOR GENERATING KEYLESS DIGITAL MULTI-SIGNATURES
A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees... |
|
US20140075197 |
METHOD FOR SELECTIVE SOFTWARE ROLLBACK
A system and method for validating a software file to be installed into a controller. The method includes preparing the software file including assigning a software version code to the software... |
|
US20150026457 |
CONTROLLING ACCESS BY CODE
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or... |
|
US20140245019 |
APPARATUS FOR GENERATING PRIVACY-PROTECTING DOCUMENT AUTHENTICATION INFORMATION AND METHOD OF PERFORMING PRIVACY-PROTECTING DOCUMENT AUTHENTICATION USING THE SAME
Disclosed herein are an apparatus for generating the privacy-protecting document authentication information and a method of performing privacy-protecting document authentication. The apparatus for... |
|
US20150039893 |
DOCUMENT VERIFICATION WITH ID AUGMENTATION
At least one node in a distributed hash tree document verification infrastructure is augmented with an identifier of an entity in a registration path. A data signature, which includes parameters... |
|
US20130318356 |
DISTRIBUTION OF DIGITAL CONTENT PROTECTED BY WATERMARK-GENERATING PASSWORD
A receiver receives digital content scrambled using a control word and a user code for the scrambled content. A user inputs the user code that is forwarded to a code extractor that generates the... |
|
US20130073949 |
SYSTEM AND METHOD TO AID ASSISTIVE SOFTWARE IN DYNAMICALLY INTERPRETING INTERNET WEBSITES AND THE LIKE
Disclosed is a system and method for modifying the presentation of content and/or graphical elements and behavior of a digital presentation (e.g., a webpage) by identifying an information event... |
|
US20150156024 |
COMPUTER IMPLEMENTED METHOD AND A COMPUTER SYSTEM TO PREVENT SECURITY PROBLEMS IN THE USE OF DIGITAL CERTIFICATES IN CODE SIGNING AND A COMPUTER PROGRAM PRODUCT THEREOF
A computer implemented method including a software distributor signing via a first server at least one software file using a digital certificate with a digital signature and at least one user via... |
|
US20120095877 |
APPLICATION USAGE POLICY ENFORCEMENT
Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application... |
|
US20120278628 |
Digital Signature Method and System
A digital signature method, a method for initialising a digital signature scheme, a system for digitally signing a message and a computer program product are described. At least the digital... |
|
US20120124383 |
SYSTEM AND METHOD FOR PROTECTING NETWORK RESOURCES FROM DENIAL OF SERVICE ATTACKS
The present disclosure generally pertains to systems and methods for protecting network resources from denial of service attacks. In one exemplary embodiment, a responder stores an access filter... |
|
US20110225420 |
MODULE SIGNING FOR UNPRIVILEGED USERS TO CREATE AND LOAD TRUSTWORTHY KERNEL MODULES
A module building system, hosted by a server, receives a user script to be run to monitor software on a client using an introspection tool. The server adds safety constraints to the user script... |
|
US20110126018 |
Methods and systems for transaction digital watermarking in content delivery network
Methods and systems for applying a transaction digital watermark to content being downloaded over a content delivery network. The digital watermark carries information about the transaction... |
|
US20100318806 |
MULTI-FACTOR AUTHENTICATION WITH RECOVERY MECHANISMS
A single sign on facility provides redundancy and recovery functions through the use of a plurality of identifiers. Users prove identity to relying parties by demonstrating control over each of... |
|
US20120163654 |
METHOD AND SYSTEM FOR TRACKING ILLEGAL DISTRIBUTOR AND PREVENTING ILLEGAL CONTENT DISTRIBUTION
A system for tracking an illegal distributor and preventing an illegal content distribution includes: a forensic mark generator for receiving content and a content identification code from a... |
|
US20130046989 |
DIGITAL SIGNATURE MANAGEMENT AND VERIFICATION SYSTEMS AND METHODS FOR DISTRIBUTED SOFTWARE
A digital signature management system for distributed software applications includes a communication network and a digital signature module coupled to the communication network. The system also... |
|
US20110208616 |
CONTENT SYSTEM
Systems, methods, and an article of manufacture for managing media content are shown and described. A method can include storing a plurality of collection maps on a server in communication with a... |
|
US20150229480 |
SIGNING METHOD DELIVERING A PARTIAL SIGNATURE ASSOCIATED WITH A MESSAGE, THRESHOLD SIGNING METHOD, SIGNATURE VERIFICATION METHOD, AND CORRESPONDING COMPUTER PROGRAM AND ELECTRONIC DEVICES
In one embodiment, it is proposed a signing method delivering a partial signature associated with a message, said partial signature being used in a threshold signing method, the signing method... |
|
US20130246798 |
METHOD FOR SECURING MESSAGES
There is provided a method for secure communications. The method comprises receiving a transmission comprising a signature of a broadcast message at a communication device, and verifying the... |
|
US20100318798 |
MESSAGE HANDLING AT A MOBILE DEVICE
A method for sending a message from a mobile device via a first application running on the mobile device is proposed. The method comprises a challenge step for supplying the first application with... |
|
US20140351601 |
PRODUCT AUTHENTICATION USING END-TO-END CRYPTOGRAPHIC SCHEME
A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured... |
|
US20140215224 |
STATUTORY LICENSE RESTRICTED DIGITAL MEDIA PLAYBACK ON PORTABLE DEVICES
Systems and methods are described for, e.g., providing a statutory audio content service on a portable device that complies with the provisions of the Digital Millennium Copyright Act (DMCA). The... |
|
US20130185565 |
Efficient, High Volume Digital Signature System for Medical and Business Applications
The system relates to a method for collecting signatures from pre-validated signers. In one aspect of the method, a pre-validated signer's signature is affixed to an electronic document in an... |
|
US20110145585 |
SYSTEM AND METHOD FOR PROVIDING CREDENTIALS
A method and system is operable to provide credentials by generating a first credential that conforms to a first specified format. A second credential conforming to a second specified format is... |
|
US20130212398 |
METHOD AND SYSTEM FOR VALIDATING A DEVICE THAT USES A DYNAMIC IDENTIFIER
A method that comprises obtaining a currently received signature from a device; obtaining a candidate identifier associated with the device; consulting a database to obtain a set of previously... |
|
US20130191643 |
ESTABLISHING A CHAIN OF TRUST WITHIN A VIRTUAL MACHINE
According to an aspect of an embodiment, a method of establishing a chain of trust into a virtual machine on a hardware system is described. The method may include measuring an immutable portion... |
|
US20140351599 |
SYSTEM AND METHOD FOR UPDATING MESSAGE TRUST STATUS
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an... |
|
US20130117569 |
METHOD AND APPARATUS FOR IMPROVING DIGITAL SIGNATURES
Systems and methods are provided for enchancing pseudo random number generation to thwart various security attacks to a system that relies on digital signature security measures. For example, a... |
|
US20110203000 |
PREVENTING UNAUTHORIZED FONT LINKING
Methods, computer readable media, and apparatuses for preventing unauthorized font linking are presented. A request for a font file may be received. It may be determined whether the request is... |
|
US20130031370 |
ELECTRONIC SIGNATURE AUTHENTICATION
Method of authenticating a signature on a work document in which a remote server generates a digital work fingerprint and a representation file of the work document. The representation file and... |
|
US20110197070 |
SYSTEM AND METHOD FOR IN- AND OUT-OF-BAND MULTI-FACTOR SERVER-TO-USER AUTHENTICATION
A method to authenticate a server to a client is provided, including in-band and out-of-band techniques. At least a first shared secret identifies a server path, including a plurality of... |
|
US20130117570 |
WATERMARK EXTRACTION BASED ON TENTATIVE WATERMARKS
Methods, devices and computer program products facilitate the extraction of embedded watermarks in the presence of content distortions. Pre-distorted synchronization templates are used to detect... |
|
US20150121082 |
CRYPTOGRAPHIC WATERMARKING OF CONTENT IN FUEL DISPENSING ENVIRONMENTS
Systems and methods for watermarking content and authenticating watermarked content are provided. Content is rendered on a display while watermarking information embedded in portions of the... |
|
US20150067342 |
SYSTEMS AND METHODS FOR EXECUTING COMPLIANCE VERIFICATION OR REMEDIATION SCRIPTS
Systems and methods for executing compliance verification or remediation scripts. An example method may comprise: identifying, by a computer system, a compliance script to be executed; determining... |
|
US20130254546 |
Methods for Identifying the Guarantor of an Application
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of... |
|
US20120117386 |
Methods for Identifying the Guarantor of an Application
Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of... |
|
US20140215220 |
APPLICATION DISTRIBUTION SYSTEM AND METHOD
The present invention relates to an application distribution system and method, and the application distribution system according to the present invention includes a developer terminal for... |
|
US20130007890 |
METHOD AND SYSTEM FOR DETECTING VIOLATION OF INTELLECTUAL PROPERTY RIGHTS OF A DIGITAL FILE
A computer-based method and system for detecting violation of intellectual property rights of a digital file, comprising, in a distribution channel, digitally sending or streaming the file from a... |
|
US20150172059 |
METHODS AND SYSTEMS FOR MESSAGING WITH PHYSICAL PRESENCE AND TEMPORAL VERIFICATIONS
A system and method for verifying proximity to a computational tag by receiving a first token from a server and transmitting the first token to the computational tag. The computational tag can... |
|
US20130326224 |
System and Method for Message Verification in Broadcast and Multicast Networks
In a network device, a method for verified communication includes generating a network communication message using a selection of predetermined message elements having digital signatures generated... |
|
US20100250950 |
COMMUNICATION APPARATUS
A communication apparatus includes: a first storage unit storing a received electronic mail; a verification unit executing a first verification about an electronic signature attached to the... |
|
US20110151836 |
Secure subscriber identity module service
A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to... |
|
US20130054972 |
SYSTEMS AND METHODS FOR SECURING CONTENT DELIVERED USING A PLAYLIST
Systems and methods in accordance with embodiments of the invention enhance the security of content distribution using individualized playlists. In many embodiments, a playlist is individually... |
|
US20100293386 |
DISTRIBUTION AND PRINTING OF TRAVEL DOCUMENTS
A system for generating and printing travel documents for a customer associated with a journey having one or more parts, the system comprising: a travel documentation distribution module capable... |
|
US20150006898 |
Method For Provisioning Security Credentials In User Equipment For Restrictive Binding
A binding verification scheme based on a proof of possession of the device-specific secret key associated with the reported IMEI is provided. The IMEI reported by user equipment (UE) is checked to... |
|
US20060026431 |
Cryptographic letterheads
Digital watermark data is embedded into compressed media content that is transmarked when the compressed media content is converted to an analog format or into an uncompressed digital format. The... |
|
US20110264585 |
METHOD AND SYSTEM FOR MANAGING EMAIL
A system is provided for managing email and eliminating spam wherein an email client (112) is configured to receive digitally signed email (117), identify spam email, and allow a user to report... |
|
US20130238903 |
SERVICE PROVISION METHOD
A method of providing a service from a service provider to users is described. The method comprises: a step of generating an electronic signature on a first information provided by a user with a... |
|
US20150026477 |
SYSTEM AND METHOD FOR DELIVERING APPLICATION CONTENT
A system and method for messaging application content that includes providing an application content messaging application programming interface (API); receiving a content delivery request from an... |