Sign up


Match Document Document Title
8850212 Extending an integrity measurement  
A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers...
8848919 Revocation status using other credentials  
Providing revocation status of at least one associated credential includes providing a primary credential that is at least initially independent of the associated credential, binding the at least...
8850188 Updating certificate status in a system and method for processing certificates located in a certificate search  
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a...
8850556 Interactive video captcha  
Provided is a Captcha Access Control System (CACS) for generating an improved captcha that are based, in one described embodiment, upon a command in one format and a response in a different format,...
8850540 Method and device for verifying dynamic password  
The examples of the present invention provide a method and device for verifying a dynamic password. In the method and device, some algorithm parameters can be exchanged in public by using a DH...
8850072 Secure communication network  
The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes...
8850209 Schema signing  
In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the...
8850211 Method and apparatus for improving code and data signing  
Methods and computing devices enable code and/or data software on computer devices to be verified using methods and signatures which can be updated by a signing server after distribution. Updated...
8848905 Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting  
Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing...
8850594 Digital rights management of captured content based on capture associated locations  
A certification is received from a user stating that captured content does not comprise a particular restricted element and a request from the user for an adjustment of a digital rights management...
8850213 Method for verifying an electronic signature and data processing device  
A method for verifying an electronic signature is described including determining a residue class given by the signature; determining an integer having the residue class; determining a field...
8850210 Authentication system, authentication device, terminal, and verifying device  
An authentication system, including a service use device 1 which presents blurred information obtained by blurring certification information desired to be certified, service providing devices 3a to...
8850214 Methods and systems for encoding and protecting data using digital signature and watermarking techniques  
Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved...
8843749 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
8843744 Method and devices for distributing media contents and related computer program product  
A method of distributing media content over networks where content is shared includes coupling downloading metadata, which is accessed to start downloading media contents from the network, with...
8843915 Signature-based update management  
A computing device to determine whether to update using a computer file by generating a file signature for that computer file based on its file header information and comparing the file signature...
8843534 Virtual session on a removable memory  
A virtual session for a computer in which files that are worked on or automatically stored to a portable device such as a hard drive. Depending on the options that are selected, helper files for...
8843751 IP address delegation  
A method of verifying a request made in respect of an IPv6 address comprising a network routing prefix and a cryptographically generated Interface Identifier. The request includes a delegation...
8844040 Systems and methods for using end point auditing in connection with traffic management  
The present invention provides a system and method of managing traffic traversing an intermediary based on a result of end point auditing. An authentication virtual server of an intermediary may...
8843752 Multi-factor device authentication  
A method and system for the secure delivery of data to a remote device that has been registered and which requires authentication through the use of a multifactor signature profile is disclosed,...
8844055 Methods and systems for establishing and enforcing document visibility rights with an electronic signature service  
Techniques for generating and enforcing document visibility rights associated with a document in use with an electronic signature service are described. Consistent with embodiments of the...
8838980 Mobile solution for signing and retaining third-party documents  
Techniques for signer-initiated electronic document signing via an electronic signature service using a mobile or other client device are described. Example embodiments provide an electronic...
8836817 Data processing apparatus, imaging apparatus, and medium storing data processing program  
A data processing apparatus includes a data conversion part converting first data into second data, an identification data generation part generating identification data which depends on the first...
8838974 System and method for verifying the integrity of read-only components in deployed mixed-mode applications  
A method of ensuring the integrity of read-only components in deployed mixed-mode applications that includes generating a digital fingerprint prior to the deployment of a mixed-mode application is...
8838975 System and method for protecting a password against brute force attacks  
In a system and method for authenticating a client device by an authentication device, the client device user is assigned a PIN generated by the authentication device. The user provides the PIN and...
8838977 Watermark extraction and content screening in a networked environment  
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening...
8838982 Systems and methods to secure user identification  
In one aspect, a computing apparatus is configured to verify a digital signature applied on a set of data received from a user device, including an user ID assigned by a partner system to uniquely...
8838978 Content access management using extracted watermark information  
Methods, devices, and computer program products facilitate the application of a content use policy based on watermarks that are embedded in a content. Watermark extraction and content screening...
8839438 Interdicting malicious file propagation  
An approach is provided for interdicting malicious file propagation. Packets of a message being transferred to a destination device are received. In response to packet(s) of the message being...
8838983 Article of manufacture for securing data in 2D bar codes using SSL  
An article of manufacture comprises a printed document associated with a source entity. The printed document is readable by a software application of an electronic device. The printed document...
8838998 Circuit personalization  
A method distributes personalized circuits to one or more parties. The method distributes a generic circuit to each party, encrypts a unique personalization value using a secret encryption key, and...
8838979 Advanced watermarking system and method  
A method, computer program product, and computing device for obtaining an uncompressed digital media data file. One or more default watermarks is inserted into the uncompressed digital media data...
8838981 Communication channel access based on channel identifier and use policy  
A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication...
8838976 Web content access using a client device identifier  
Systems and methods are provided for controlling access to online services. For example, the system may include an application running on a user computer (130) that collects platform data (e.g....
8832430 Remote certificate management  
A system for managing security certificates on a plurality of remote computers comprises a certificate manager that can determine in accordance with at least one preestablished criterion whether a...
8832448 Dual-channel electronic signature system using image codes and related computer program product  
A dual-channel electronic signature system is disclosed, having a signature verification server, a signature requester device, and a hand-held device. The signature requester device calculates a...
8832446 Secure data transfer in an automation network  
A method for secure data transfer in an automation network wherein the method comprises authenticating a user by a program invocation rights system aided by user data for approving a use of the...
8832435 Providing a real-time indication of platform trust  
Methods and apparatuses for providing a real-time indication of platform trust are provided. Embodiments include an integrity reporting module determining that a platform is currently operating in...
8832445 System and method for handling secure messages  
Systems and methods are provided for handling electronic messages. An electronic message is examined as to whether the message contains one or more encoding properties. A visual indication is...
8832202 E-mail information management apparatus, and E-mail information management method  
An E-mail information management apparatus acquires a plurality of predetermined information from a mail header and a mail body and signature related information as signature target information,...
8832447 System and method for using digital signatures to assign permissions  
According to one embodiment of the invention, a method for setting permission levels is described. First, an application and digital signature is received by logic performing the permission...
8831272 Content item identifier  
A system (50) is used for identifying a content item. The system (50) receives a received first identifier (101) of the content item, the received first identifier being based on at least part of a...
8832439 Multiple system images for over-the-air updates  
In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA...
8832440 Data security system  
A data security system includes providing a unique identification from a first system to a second system; copying the unique identification in the second system by the first system; and unlocking a...
8832800 Method for producing an electro-biometric signature allowing legal interaction between and identification of persons  
A method for producing an electro-biometric signature allowing legal interaction between and the identification of persons utilizing biometric features. The method includes inputting a user's...
8826023 System and method for securing access to hash-based storage systems  
Various methods and systems for securing access to hash-based storage systems are disclosed. One method involves receiving information to be stored in a storage system from a storage system client...
8826005 Security for software in a computing system  
Systems, methods, and computer-program products enable a security system. Trust information is received, at a computer, where the trust information corresponds to an application and wherein the...
8826024 Trusted compliance operations inside secure computing boundaries  
In one embodiment, a method of implementing trusted compliance operations inside secure computing boundaries comprises receiving, in a secure computing environment, a data envelope from an...
8826009 Method of handling a certification request  
In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the...
8826014 Authentication of remote host via closed ports  
A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a...