Sign up


Match Document Document Title
8811247 Automating radio enablement to facilitate power saving  
In an example embodiment, there is disclosed herein an apparatus comprising a wireless transceiver and a controller coupled to the wireless transceiver and configured to receive data via the...
8812517 Watermarking of structured results and watermark detection  
A way of detecting a watermark present in a structured result, such as a search result or a machine translation. The structured result is received and a hash is computed based upon at least part of...
8812853 Traceability for threaded communications  
Individual chunks of a message are signed with their originators' signatures, thereby providing traceability in threaded messages so that every contributor's content as well as modifications...
8812855 Software protection  
A program (MC), which can be executed by a programmable circuit, is protected in the following manner. An instruction block (IB) is provided on the basis of at least a portion (MC-P) of the...
8813241 Content distribution system, content distribution method, and client terminal  
If the user of a first portable terminal intends to let a second portable terminal try out a certain content, the user sends to a distribution server trial permission information including the...
8812854 Firmware verified boot  
A computer-implemented method for verifying a boot process of a computing system includes reading, by the computing system during the boot process, a header section of a read-write portion of...
8812852 Method and system for marking digital content  
In one embodiment, a request to deliver a piece of digital content to a recipient is received. In response to the request, a datum is embedded in an equivalent piece of digital content that...
8812857 Smart card renewal  
A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for...
8813244 Developer switch  
A computing device comprising a security slot integral with an external surface of the computing device, wherein the security slot is configured to receive and mechanically cooperate with a...
8812856 Methods and systems for state synchronization over a non-reliable network using signature processing  
Systems and methods for facilitating confirmation of completion of a transaction(s) for state synchronization over a non reliable network using signature processing are described. One of the...
8811655 Circumvention of watermark analysis in a host content  
Methods and devices are provided to thwart analysis of a watermarking system by preventing analysis of watermarks in a host content. Upon receiving a content at a watermark embedding device, the...
8806526 Security processing unit with secure connection to head end  
A system includes a transport central processing unit of an information appliance device. The transport central processing unit receives a message from a head-end. The transport central processing...
8806640 Program execution integrity verification for a computer system  
A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating...
8806616 System, method, and apparatus for allowing a service provider system to authenticate that a credential is from a proximate device  
An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token...
8804958 Method for protecting data content  
A method is provided for protecting data content against illegal copying. The data content is provided by an entertainment system and is output to output units in an authorized playback environment...
8806212 Method and apparatus for generating and verifying electronic signature of software data, and computer readable recording medium thereof  
Provided are methods of generating and verifying an electronic signature of software data, wherein software data is split into a plurality of blocks, electronic signatures corresponding to each of...
8805689 Methods and apparatus to generate and use content-aware watermarks  
Methods and apparatus to generate and use content-aware watermarks are disclosed herein. In a disclosed example method, media composition data is received and at least one word present in an audio...
8806558 Unique watermarking of content objects according to end user identity  
A machine-implementable method for uniquely watermarking a content object according to end user identity includes transcoding an original content object to a format that is compatible with end user...
8806628 Tuning of data loss prevention signature effectiveness  
In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least...
8806211 Method and systems for computer security  
Methods and systems for maintaining computer security are provided. The method for maintaining security of a computer system comprises determining an initial system certainty value for the computer...
8806215 Method and system for robust watermark insertion and extraction for digital set-top boxes  
Methods and systems for robust watermark insertion and extraction for digital set-top boxes are disclosed and may include descrambling, detecting watermarking messages in a received video signal...
8804153 Method for printing on an imaging device  
A method for printing a print ready file transmitted by a print client on an imaging device includes creating a print data file associated with the print ready file, where the print data file...
8806216 Implementation process for the use of cryptographic data of a user stored in a data base  
A security module (“SM”) implements user cryptographic data by means of a user terminal. The cryptographic data is encrypted by a first encryption key established from a secret key from the ter...
8806217 Functionality watermarking and management  
A method, system and non-transitory computer-readable medium product are provided for functionality watermarking and management. In the context of a method, a method is provided that includes...
8806214 Communication with non-repudiation and blind signatures  
Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised...
8806197 Accelerated verification of digital signatures and public keys  
Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. In a elliptic curve...
8799675 System and method for electronic certification and authentication of data  
A system and method for authenticating data. Data may be received that is individually encrypted in a first encryption layer by each of a plurality of users using user-specific private keys. The...
8799661 Active and passive filter digital data authentication and security system  
The present invention includes a system and process for monitoring the existence of secured, marked digital files. A cryptographic token inertly embedded in markup language tags of digital files is...
8799672 Apparatus, system and method for reviewing game information by referees  
The present disclosure relates generally to an apparatus, system and method, and more particularly to an apparatus, system and method providing for referees to communicate with each other and/or...
8799663 Method and a system for a secure execution of workflow tasks of a workflow in a decentralized workflow system  
Secure execution of workflow tasks are executed according to a given execution pattern in a decentralized workflow system with a central workflow engine and multiple task execution agents. The...
8800053 Executable content filtering  
A executable content message stream filter applies a plurality of executable content filters to a stream of parsed elements of a network message. Each of the plurality of executable content filters...
8799659 Advanced multi-channel watermarking system and method  
A method, computer program product, and computing device for modifying a first channel portion of a digital media data file to include at least a first primary watermark. A second channel portion...
8799664 Small public-key based digital signatures for authentication  
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a...
8799660 Communication apparatus  
A communication apparatus includes: a first storage unit storing a received electronic mail; a verification unit executing a first verification about an electronic signature attached to the...
8799662 Method and apparatus for validating the integrity of installer files prior to installation  
A method and apparatus for validating the integrity of computer software installer files prior to installation of computer software comprising: generating at least one signature file for at least...
8800006 Authentication and authorization in network layer two and network layer three  
A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on the...
8799656 Methods for anonymous authentication and key agreement  
Methods for anonymous authentication and key exchange are presented. In one embodiment, a method includes initiating a two-way mutual authentication between a device and a remote entity. The device...
8799665 Proof-of-purchase watermarks  
A third-party watermark is inserted into a file or files uploaded by a client to a storing party such as a file backup server. The third-party watermark may contain information about the upload...
8799641 Secure proxying using network intermediaries  
Methods and apparatus for secure proxying using network intermediaries. A system may include one or more servers and a network intermediary. The network intermediary may generate security metadata...
8800011 Validating pointer records in a domain name system (DNS) service  
In one embodiment a method for receiving a request from a user to update a pointer record of a domain name system (DNS) in a DNS service includes issuing a query from the DNS service to a resource...
8793487 Binding a digital certificate to multiple trust domains  
A public key infrastructure comprising a participant that issues digital certificates. Each digital certificate can be relied upon in at least two different trust domains. The public key...
8793769 Zero sign-on authentication  
A authenticating system and process for authenticating user devices to a access a media service where access to certain portions of the media service may be limited according to a gateway or other...
8792110 Secured document transmission  
Systems and methods for securing a document for transmission are discussed. In one embodiment, a document is checked for an indication of confidentiality. The document is then passed to a secure...
8793500 Hybrid signature scheme  
A signature scheme is provided in which a message is divided in to a first portion which is hidden and is recovered during verification, and a second portion which is visible and is required as...
8793390 Systems and methods for protocol detection in a proxy  
Systems, methods, and computer products for detecting protocols in a network proxy are provided. Protocol detection includes receiving from a first computer a request for connection to a second...
8792416 Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station  
In a mobile communication system, a radio device is configured to transmit notification information transmitted from a distribution server, to a mobile station, by use of broadcast communication....
8793498 System and method for forensic analysis of media works  
A method and system for identifying a source of a copied work that in one embodiment includes obtaining at least some portions of a reference work, collecting at least some portions of the suspect...
8793499 Nested digital signatures with constant file size  
A system and method are provided for implementing a digital signature scheme for embedding and validating multiple nested digital signatures in digitally produced documents without modifying a file...
8788832 Virtual subscriber identity module  
A mobile trusted platform (MTP) configured to provide virtual subscriber identify module (vSIM) services is disclosed. In one embodiment, the MTP includes: a device manufacturer-trusted subsystem...
8788811 Server-side key generation for non-token clients  
A method and system for server-side key generation for non-token clients is described.