Sign up


Match Document Document Title
8793487 Binding a digital certificate to multiple trust domains  
A public key infrastructure comprising a participant that issues digital certificates. Each digital certificate can be relied upon in at least two different trust domains. The public key...
8793769 Zero sign-on authentication  
A authenticating system and process for authenticating user devices to a access a media service where access to certain portions of the media service may be limited according to a gateway or other...
8792110 Secured document transmission  
Systems and methods for securing a document for transmission are discussed. In one embodiment, a document is checked for an indication of confidentiality. The document is then passed to a secure...
8793500 Hybrid signature scheme  
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as...
8793390 Systems and methods for protocol detection in a proxy  
Systems, methods, and computer products for detecting protocols in a network proxy are provided. Protocol detection includes receiving from a first computer a request for connection to a second...
8792416 Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station  
In a mobile communication system, a radio device is configured to transmit notification information transmitted from a distribution server, to a mobile station, by use of broadcast communication....
8793498 System and method for forensic analysis of media works  
A method and system for identifying a source of a copied work that in one embodiment includes obtaining at least some portions of a reference work, collecting at least some portions of the suspect...
8793499 Nested digital signatures with constant file size  
A system and method are provided for implementing a digital signature scheme for embedding and validating multiple nested digital signatures in digitally produced documents without modifying a file...
8788832 Virtual subscriber identity module  
A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a device manufacturer-trusted subsystem...
8788811 Server-side key generation for non-token clients  
A method and system for server-side key generation for non-token clients is described.
8788829 System and method for interapplication communications  
A first executable program on a computer system is enabled to exchange communications with a second executable program on the computer system by determining that the first executable program...
8788831 More elegant exastore apparatus and method of operation  
An apparatus to scale for multiple petabyte backup in redundant locations. Workload is automatically shared among many servers by a characteristic derived from the content itself. Duplicate storage...
8788828 Non-transferable anonymous digital receipts  
A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent...
8784195 Authentication system for gaming machines  
Disclosed is a system and method that uses digital signature technology to authenticate the contents of one or more manifests located on a storage device. Each manifest contains a list of file...
8788830 Method and apparatus for logging based identification  
A method and apparatus for logging based identification are described. In one embodiment, the method comprises extracting entries of a hash chained log that represents a series of previous...
8788848 Optical DNA  
The claimed subject matter relates to architectures and/or mechanisms that can facilitate issuing, embedding and verification of an optical DNA (o-DNA) signature. A first mechanism is provided for...
8789038 Information processing device, information processing method, and computer readable medium with function disabling  
An information processing device for installing and executing an application program which enables at least one of a plurality of information processing functions comprises: a storage part for...
8787615 Methods and apparatus for embedding watermarks  
Methods and apparatus for embedding a watermark are disclosed. An example method disclosed herein to embed a watermark in a compressed data stream comprises obtaining a set of transform...
8788810 Temporary registration of devices  
In a method of temporarily registering a second device with a first device, in which the first device includes a temporary registration mode, the temporary registration mode in the first device is...
8788507 Watermarking of structured results and watermark generation  
A way of generating a watermark for a structured result, such as a search result or a machine translation. A hash function is used to generate a bit sequence for each of a plurality of structured...
8782418 Entertainment device  
An entertainment device comprises communication means operable to receive media data from a media data source, storage means operable to store the received media data, in which the storage means...
8782420 System and method for obfuscation initiation values of a cryptography protocol  
A computer-implemented technique for determining whether a first computing device has the correct version of a software program may be used to provide a secure approach to verifying that a client...
8782422 System and method for authenticating documents  
A data processing system for distributing and authenticating documents from a plurality of parties to a recipient data processing apparatus is disclosed. The system comprises a plurality of...
8782419 Device and method for a backup of rights objects  
A common backup format of a backup rights object according to embodiments of the present invention has the following features: License information that is not critical for cryptographic security of...
8782399 Automated secure DNSSEC provisioning system  
A system and method that maintains a secure chain of trust from domain name owner to publication by extending the trust placed in existing cryptographic identity systems to the records published in...
8782435 System and method for validating program execution at run-time using control flow signatures  
A processor comprising: an instruction processing pipeline, configured to receive a sequence of instructions for execution, said sequence comprising at least one instruction including a flow...
8782400 Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption  
A new trapdoor one-way function is provided. In a general sense, some quadratic algebraic integer z is used. One then finds a curve E and a rational map defining [z] on E. The rational map [z] is...
8782421 System and method for verification of personal identity  
A system and method for storing identifying information and telephone numbers associated with individuals, and cross-referencing said information so as to link a first individual to other referee...
8782392 Privacy-protective data transfer and storage  
A method is performed at a computer system having one or more processors and memory storing one or more programs executed by the one or more processors. The method includes receiving a first data...
8782423 Network based management of protected data sets  
A system that includes an account management module configured to maintain protected accounts. For instance, a particular protected account includes a protected data set that is not readable...
8782387 Secure boot of a data breakout appliance with multiple subsystems at the edge of a mobile data network  
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple...
8782434 System and method for validating program execution at run-time  
A pipelined processor comprising a cache memory system, fetching instructions for execution from a portion of said cache memory system, an instruction commencing processing before a digital...
8776043 Service image notifications  
An electronic marketplace for service images permits users to browse descriptions of service images implementing desired functionalities of a virtual machine image. The described service images may...
8773724 Method of superimposing an image onto another, method of personalizing a data carrier using the image superimposing method and a personalized data carrier  
A method of superimposing a first image onto a second image, wherein each image is defined by a plurality of pixels is disclosed. The method includes changing target pixels of the second image...
8775812 Received message verification  
A method of verifying the validity of a message received by a telecommunications terminal (8) having a processor (30) and which is operable in a boot mode and a runtime mode is disclosed. In the...
8776182 Secure boot of a data breakout appliance with multiple subsystems at the edge of a mobile data network  
A secure boot is provided for a breakout system having multiple subsystems at the edge of a mobile data network. The secure boot utilizes two trusted platform modules (TPM) to secure multiple...
8775811 Simple non-autonomous peering environment, watermarking and authentication  
A Secure Non-autonomous Peering (SNAP) system includes a hierarchical digital watermarking scheme, a central licensing authority, licensed fabricators and assemblers.
8776229 System and method of detecting malicious traffic while reducing false positives  
A system comprises a traffic analysis device and a network device. The traffic analysis device is configured to analyze network traffic received over a communication network and duplicate at least...
8775807 Credential tracking  
In one implementation, a credential associated with a user identifier and a location is stored at a client device. A request to output a representation of the credential in a manner that enables a...
8774216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management  
Responsibility can be established for specific copies or instances of copies of digitized multimedia content using digital watermarks. Management and distribution of digital watermark keys (e.g.,...
8776205 Secure connection systems and methods for vehicles  
A communication system of a vehicle includes a mode determination module and a connection control module. The mode determination module sets a mode of operation to one of a first mode and a second...
8775813 ElGamal signature schemes  
In a method of generating a digital signature of a message m, a signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive...
8775818 Multifactor validation of requests to thwart dynamic cross-site attacks  
An apparatus and a method for validating requests to thwart cross-site attacks is described. A user identifier token, a request identifier token, and a timestamp, are generated at a web application...
8775344 Determining and validating provenance data in data stream processing system  
Techniques are disclosed for determining and validating provenance data in such data stream processing systems. For example, a method for processing data associated with a data stream received by a...
8775814 Personalized biometric identification and non-repudiation system  
A system and a method for providing a personalized biometric identification system to facilitate in securing critical transactions have been disclosed. The system includes a server which captures...
8775815 Enterprise-specific functionality watermarking and management  
A method, system and non-transitory computer-readable medium product are provided for enterprise-specific functionality watermarking and management. In the context of a method, a method is provided...
8766778 System and method for authenticating RFID tags  
A system and method of providing authenticity to a radio frequency identification (RFID) tag are provided. The method comprises generating a plurality of digital signatures, wherein each digital...
8769312 Tampering monitoring system, protection control module, and detection module  
Tampering monitoring system can detect whether protection control module is tampered with even if some of detection modules are tampered with. Tampering monitoring system includes protection...
8769679 Tuning of data loss prevention signature effectiveness  
In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a...
8769296 Software signature tracking  
A method for preventing unauthorized use of software may be achieved by executing computer-readable code with instructions for recording an indication of at least one selected file of a software...