Sign up


Match Document Document Title
9042555 On-demand download of partial encrypted content for partial super distributed content  
A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super...
9042598 Methods and apparatus to generate and use content-aware watermarks  
Methods and apparatus to generate and use content-aware watermarks are disclosed herein. In a disclosed example method, media composition data is received and at least one word present in an audio...
9043898 Access management system  
An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is...
9043601 Digital watermark key generation  
This disclosure relates to message encoding. One claim recites a digital watermark key generation method in which the key providing security for a plural-bit message. The method comprises:...
9037863 Terminal device, server device, content recording control system, recording method, and recording permission control method  
A terminal device recording content onto a recording medium device, a permission to record the content onto the recording medium device being granted by a server device, the terminal device...
9037845 System and method for obtaining certificate status of subkeys  
Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is...
9037847 System and method for enforcing digital rights management rules  
A method for enforcing digital rights management (DRM) rules in a first device is disclosed. In the method the first device receives a message that includes a rights object (RO) having a digital...
9037862 Instant messaging private tags  
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified...
9036891 Intrinsic physical layer authentication of integrated circuits  
A system and method of generating and comparing a fingerprint for an integrated circuit is provided. A sensor module captures electromagnetic emissions from the integrated circuit. A feature...
9037453 Embedder for embedding a watermark into an information representation, detector for detecting a watermark in an information representation, method and computer program  
An embedder for embedding a watermark to be embedded into an input information representation comprises an embedding parameter determiner that is implemented to apply a derivation function once or...
9032219 Securing speech recognition data  
Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a...
9032212 Self-refreshing distributed cryptography  
In one embodiment, a set of servers generates at least one challenge that is sent to a client. The servers receive from the client a response that includes a message generated as a function of the...
9032207 Method and system for processing digital content according to a workflow  
A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content,...
9031233 Method and storage device for protecting content  
A method for protecting content of a storage device including a memory for storing data and a controller for managing data input and output of the memory is provided, in which a Data Encryption...
9032510 Gesture- and expression-based authentication  
A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in...
9032211 Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message  
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place...
9032213 Data distribution path verification  
A method may include receiving data and first path-metadata. The first path-metadata may include a first entity identifier. The first entity identifier may be associated with a first receiving...
9026784 System and method for innovative management of transport layer security session tickets in a network environment  
An example method includes identifying a transport layer security (TLS) session between a client and a server, parsing one or more TLS messages to identify a session ticket associated with the...
9026796 Virtual world embedded security watermarking  
A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar...
9027110 System and method for communication between dynamic token and tool  
The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a...
9026794 Information processing device and information processing method, and program  
An information processing system including a medium where a content to be played is stored; and a playing apparatus for playing a content stored in the medium; with the playing apparatus being...
9026795 Apparatus and method for signing application  
When a signature apparatus cooperating with a market server receives signature request information for an optional application from the market server to sign an application, the signature...
9021246 Method to replace bootloader public key  
A system and method for writing a new or replacement public key to a bootloader stored in a memory segment in the memory of a vehicle ECU without having to rewrite the entire bootloader. The...
9021267 System and method for using digital signatures to assign permissions  
According to one embodiment of the invention, a method for setting permission levels is described. First, an application and digital signature is received by logic performing the permission...
9021266 Validation system and verification method including signature device and verification device to verify contents  
Provided are methods and a validation system that includes a signature device and a verification device for verifying a content. The signature device may generate verification information for each...
9015812 Transparent control of access invoking real-time analysis of the query history  
The invention relates to a method for granting an inquirer querying a repository access to the repository, a communication protocol between a client and a server, and a system for controlling...
9013266 Authenticated radio frequency identification and key distribution system therefor  
An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such...
9009841 Testing web applications for file upload vulnerabilities  
A system for detecting file upload vulnerabilities in web applications is provided. The system may include a black-box tester configured to upload, via a file upload interface exposed by a web...
9009482 Forensic marking using a common customization function  
Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization...
9009222 Verifying the transfer of a data file  
Techniques for verifying the transfer from a content provider of a selected data file selected by a client device using a proxy server is disclosed. By creating a local set of characteristics of...
9009149 Systems and methods for mobile search using Bag of Hash Bits and boundary reranking  
Determining ranked candidate media in response to media query data corresponding to a query media includes receiving the media query data including feature data of the query media, coordinate...
9009483 Replacing blinded authentication authority  
A manufacturing entity provides a blinded signature to a secure device and associates a time with the blinded signature. If a signing key is compromised, the manufacturing entity provides a time...
9009481 System and method for protecting cryptographic assets from a white-box attack  
A digital signature generation (DSG) process which provides resistance against white box attackers is disclosed. This is done by applying specially selected data transformations to the inputs,...
9009477 Archiving electronic content having digital signatures  
In various embodiments, a computerized method includes receiving electronic content to be archived. The electronic content comprises a digital signature. The method may include archiving the...
9001182 Efficient and on demand convergence of audio and non-audio portions of a communication session for phones  
In one embodiment, source data for a communication session may be split into an audio portion for transmission on a phone channel and a non-audio portion for transmission on a data channel. A...
9002856 Agent rank  
The present invention provides methods and apparatus, including computer program products, implementing techniques for searching and ranking linked information sources. The techniques include...
9003198 Method and apparatus for data processing  
A method for processing an operating sequence of instructions of a program in a processor, wherein each instruction is represented by an assigned instruction code which comprises one execution...
8997174 Configuring browser policy settings on client computing devices  
Systems and methods for configuring browser policy settings on client computing devices are provided. In some aspects, a method includes receiving login credentials from a client computing device....
8996874 Protection of a program waiting to be executed in a memory used by a microprocessor  
A method for authorizing an access to a table of address correspondence between a multitask CPU and at least one memory containing several programs, consisting of calculating, on each task change...
8996876 Method and system for using a smart phone for electrical vehicle charging  
Systems and methods are provided to allow a smart phone or any terminal to reserve and activate an electric vehicle charger using a web site or server computer system. An access control system is...
8996855 HTTP layer countermeasures against blockwise chosen boundary attack  
A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP...
8997249 Software activation and revalidation  
Software activation and revalidation. In one example embodiment, a method for software activation and revalidation includes collecting machine configuration information from a machine on which a...
8997179 Shared secret identification for secure communication  
Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify...
8997199 Token-based security for links to media streams  
Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may generate a first token based on a private key and an encryption...
8997221 System and method for validating and controlling applications  
A system and method for validating an application and for controlling execution of an application. A plurality of parameters may be computed for an authenticated object and for a tested object. A...
8996875 Detecting malware signed with multiple credentials  
Malware that is signed with multiple, valid credentials is detected. A central computer such as a server receives secure hashes of signed application bodies and immutable portions of corresponding...
8989376 Method and apparatus for authenticating video content  
A method for authenticating video content includes: receiving a digital signature, an unsecured video fingerprint, and an unsecured video content from a transmitting node at a receiving node in a...
8990575 Apparatus and method for electronic signature verification  
An apparatus for electronic signature verification, including a grouping unit to group, into at least one group, a plurality of kernels included in an application to which electronic signature...
8989704 Invisible mode for mobile phones to facilitate privacy without breaching trust  
Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a multi-user communications device,...
8990574 Secure device authentication protocol  
Disclosed is a system and method by which a multimedia source device communicates with a display device, allowing the multimedia devices to securely confirm the identity of the devices and confirm...