Sign up


Match Document Document Title
9015812 Transparent control of access invoking real-time analysis of the query history  
The invention relates to a method for granting an inquirer querying a repository access to the repository, a communication protocol between a client and a server, and a system for controlling...
9013266 Authenticated radio frequency identification and key distribution system therefor  
An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such...
9009841 Testing web applications for file upload vulnerabilities  
A system for detecting file upload vulnerabilities in web applications is provided. The system may include a black-box tester configured to upload, via a file upload interface exposed by a web...
9009482 Forensic marking using a common customization function  
Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization...
9009222 Verifying the transfer of a data file  
Techniques for verifying the transfer from a content provider of a selected data file selected by a client device using a proxy server is disclosed. By creating a local set of characteristics of...
9009149 Systems and methods for mobile search using Bag of Hash Bits and boundary reranking  
Determining ranked candidate media in response to media query data corresponding to a query media includes receiving the media query data including feature data of the query media, coordinate data,...
9009483 Replacing blinded authentication authority  
A manufacturing entity provides a blinded signature to a secure device and associates a time with the blinded signature. If a signing key is compromised, the manufacturing entity provides a time of...
9009481 System and method for protecting cryptographic assets from a white-box attack  
A digital signature generation (DSG) process which provides resistance against white box attackers is disclosed. This is done by applying specially selected data transformations to the inputs,...
9009477 Archiving electronic content having digital signatures  
In various embodiments, a computerized method includes receiving electronic content to be archived. The electronic content comprises a digital signature. The method may include archiving the...
9001182 Efficient and on demand convergence of audio and non-audio portions of a communication session for phones  
In one embodiment, source data for a communication session may be split into an audio portion for transmission on a phone channel and a non-audio portion for transmission on a data channel. A...
9002856 Agent rank  
The present invention provides methods and apparatus, including computer program products, implementing techniques for searching and ranking linked information sources. The techniques include...
9003198 Method and apparatus for data processing  
A method for processing an operating sequence of instructions of a program in a processor, wherein each instruction is represented by an assigned instruction code which comprises one execution step...
8997174 Configuring browser policy settings on client computing devices  
Systems and methods for configuring browser policy settings on client computing devices are provided. In some aspects, a method includes receiving login credentials from a client computing device....
8996874 Protection of a program waiting to be executed in a memory used by a microprocessor  
A method for authorizing an access to a table of address correspondence between a multitask CPU and at least one memory containing several programs, consisting of calculating, on each task change...
8996876 Method and system for using a smart phone for electrical vehicle charging  
Systems and methods are provided to allow a smart phone or any terminal to reserve and activate an electric vehicle charger using a web site or server computer system. An access control system is...
8996855 HTTP layer countermeasures against blockwise chosen boundary attack  
A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP...
8997249 Software activation and revalidation  
Software activation and revalidation. In one example embodiment, a method for software activation and revalidation includes collecting machine configuration information from a machine on which a...
8997179 Shared secret identification for secure communication  
Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify...
8997199 Token-based security for links to media streams  
Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may generate a first token based on a private key and an encryption...
8997221 System and method for validating and controlling applications  
A system and method for validating an application and for controlling execution of an application. A plurality of parameters may be computed for an authenticated object and for a tested object. A...
8996875 Detecting malware signed with multiple credentials  
Malware that is signed with multiple, valid credentials is detected. A central computer such as a server receives secure hashes of signed application bodies and immutable portions of corresponding...
8989376 Method and apparatus for authenticating video content  
A method for authenticating video content includes: receiving a digital signature, an unsecured video fingerprint, and an unsecured video content from a transmitting node at a receiving node in a...
8990575 Apparatus and method for electronic signature verification  
An apparatus for electronic signature verification, including a grouping unit to group, into at least one group, a plurality of kernels included in an application to which electronic signature...
8989704 Invisible mode for mobile phones to facilitate privacy without breaching trust  
Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a multi-user communications device,...
8990574 Secure device authentication protocol  
Disclosed is a system and method by which a multimedia source device communicates with a display device, allowing the multimedia devices to securely confirm the identity of the devices and confirm...
8989883 Systems and methods for providing access to resources through enhanced audio signals  
Systems and methods are provided for using a hidden audio signal. In one exemplary embodiment, the method includes registering, at a central database, one or more of an identifier and a destination...
8984597 Protecting user credentials using an intermediary component  
An access component sends an access request to an intermediary component, the access request being a request to access a service or resource without credentials of a current user of the...
8984055 Relay device, information processing system, and computer-readable recording medium  
A relay device includes a memory and a processor coupled to the memory. The processor executes a process including storing association relationship information in which a session identifier for...
8984298 Managing access to a secure content-part of a PPCD using a key reset point  
In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map...
8984289 Classifying a message based on fraud indicators  
Systems, methods, and media for classifying messages are disclosed. A plurality of fraud indicators are identified in the message. A signature of the message is generated. The generated signature...
8984288 Electronic signing of content  
This specification describes technologies relating to applying electronic signatures to content items. In general, one aspect of the subject matter described in this specification can be embodied...
8984636 Content extractor and analysis system  
A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and unwanted software. The system can implement centralized policies that allow an administrator to...
8984268 Encrypted record transmission  
The invention provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the invention retains...
8984296 Device driver self authentication method and system  
A method for device driver self authentication is provided. The method includes accessing a device driver having encrypted authentication parameters therein including, for instance, a vendor...
8982411 Image processing apparatus and method  
An image processing apparatus includes: an extractor to extract colors used in input data; a converter to convert signals of the extracted colors into intermediate color signals each including...
8977857 System and method for granting access to protected information on a remote server  
A client device has one or more processors and memory. An application running on the device obtains a client certificate from a system service running on the device. The certificate includes a...
8977858 Using space-filling curves to fingerprint data  
A file is received. Contents of the file are transformed using a space-filling curve. One example of a space-filling curve that can be used for the transformation is a Hilbert curve. The result of...
8977859 Systems and methods for data compression and decompression  
In one aspect, the present invention comprises one or more processors that generate a first checksum value for a data block and a second checksum value for the data block, wherein the first...
8972736 Fully authenticated content transmission from a provider to a recipient device via an intermediary device  
A method, system, and computer readable medium containing programming for handling fully authenticated transmission of video or other data (content) from a provider to a recipient device via an...
8972745 Secure data handling in a computer system  
A computer system includes a first storage area accessible by an operating system and a second storage area accessible by authorized functions only. According to some embodiments of the invention...
8973152 Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using the same  
A vehicle black box technique guarantees the integrity of vehicle data stored in a black box in real time by forming input data streams as block data and performing a signature using a signing key...
8972737 Unauthorized contents detection system  
A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple...
8971528 Modified elliptic curve signature algorithm for message recovery  
A modified Chinese State Encryption Management Bureau's SM2 Elliptic Curve Signature Algorithm that offers partial message recovery and lowers the signature size for a given cryptographic strength....
8972738 Incorporating data into an ECDSA signature component  
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature...
8971532 System and methods for protecting video content  
Systems and methods for content-protecting video codecs are described. At least one embodiment of the invention comprises a system for protecting video content comprising computer memory comprising...
8970910 Visible and invisible watermarking of printed images via 2nd generation stochastic seed frequency modulation  
As set forth herein, computer-implemented methods and systems facilitate watermarking documents and/or images using 2nd generation stochastic halftoning. The watermark is used to spatially vary the...
8971531 Data embedding system  
A system and method for embedding data is provided. The method comprises dividing the host data set into a plurality of blocks, wherein each block comprises a plurality of elements, generating a...
8972468 Method for distributing a certified application employing a pre-certified master application template  
A computer system is used to distribute an application using a data resource. An application using a data resource is created using an authoring environment. The application is converted into a...
8966270 Methods and systems for providing controlled access to the internet  
Novel, Internet-related architectures, methods and devices are proposed that are based on a fundamentally different philosophy: hosts (e.g., source and destination nodes) are given the ability to...
8966271 Data card verification system  
To verify a pair of correspondents in an electronic transaction, each of the correspondents utilizes respective parts of first and second signature schemes. The first signature scheme is...