Sign up


Match Document Document Title
8966270 Methods and systems for providing controlled access to the internet  
Novel, Internet-related architectures, methods and devices are proposed that are based on a fundamentally different philosophy: hosts (e.g., source and destination nodes) are given the ability to...
8966271 Data card verification system  
To verify a pair of correspondents in an electronic transaction, each of the correspondents utilizes respective parts of first and second signature schemes. The first signature scheme is...
8966248 Secure software file transfer systems and methods for vehicle control modules  
A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job...
8966274 File tamper detection  
This disclosure relates generally to methods and systems for determining when a file has changed. According to one aspect of the present disclosure, a method of determining if contents of a file...
8965039 Client-side watermarking using hybrid I-frames  
A system and method for client-side watermarking of digital content using hybrid Intra-Frames (I-Frames) are provided. In general, a content source provides a compressed video stream and a hybrid...
8964910 Method for identifying and detecting a radio signal for a cognitive communication system  
A method of identifying an RF signal for a cognitive radio system. The signal is identified with a digital watermarking performed downstream from the digital modulation of the symbols to be...
8966571 Detection of potentially copyrighted content in user-initiated live streams  
Systems and methods modifying a presentation of media content in response to a detected violation are provided. In particular, media content such as a media stream broadcasted by a user to other...
8966272 Method for author verification and software authorization  
Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a...
8966273 Lightweight group signature system and method with short signature  
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature...
8966021 Composable machine image  
A computer system image is executed on a computing node over a network. A system specification file transmitted over the network specifies the computer system image by specifying components of the...
8959642 Real time lockdown  
A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new...
8959598 Wireless device authentication between different networks  
A method and system for roaming between heterogeneous networks. The method involves authenticating a mobile communication device on a first network, and providing the device with a single-use token...
8959354 Method, secure device, system and computer program product for digitally signing a document  
A method for digitally signing a document, a secure device, and a computer program product for implementing the method. The method employs a secure device which is protected against malicious...
8959353 Distributed system for multi-function secure verifiable signer authentication  
A distributed multi-function secure system for verifiable signer authentication having a personal private key stored in a secure storage of a mobile device where the mobile device connects to a...
8959346 System and method for a single request—single response protocol with mutual replay attack protection  
Various embodiments of a system and method for a single request-single response protocol with mutual replay attack protection are described. Embodiments include a system that receives multiple...
8959355 Authentication device, authentication method, program, and signature generation device  
Provided is an authentication device including a key setting unit for setting sεKn to a secret key and setting a multi-order polynomial fi(xl, . . . , xn) (i=1 to m) on a ring K and yi=fi(s) to a ...
8959202 Generating statistics of popular content  
Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to...
8959362 Systems and methods for controlling file execution for industrial control systems  
A system includes a controller configured to control a process, and store at least one binary file, wherein the at least one binary files is generated from at least one source file, wherein the at...
8959352 Transmarking of multimedia signals  
The presently claimed invention relates generally to digital watermarking and data hiding. One claim recites a method including: receiving data representing video, the data comprising at least...
8954744 Verification methods and apparatus for use in providing application services to mobile communication devices  
A technique in a mobile device which is configured to communicate in a wireless network with use of a communication service provided by a service provider is described. The mobile device is...
8954743 System and method for watermarking content for tracking media consumption  
In a system and method of watermarking content for tracking media consumption, the method may include creating, by a computer processor, at least one copy of a mezzanine asset for distribution to...
8954732 Authenticating third-party programs for platforms  
In one example, a platform device includes a control unit configured to receive a first software package signed by a first software development entity with a first certificate of a first...
8953795 Forensic decryption tools  
Providing authorized copies of encrypted media content including: receiving application for authentication to make copies of the media content; providing forensic decryption tools to process the...
8954070 Method and system for selecting a communication network  
A method and system for selecting a communication network by a wireless communication device (106) includes receiving (310) an identification parameter at the wireless communication device from a...
8949613 Self-signed certificates for computer application signatures  
A computer-implemented method for signing computer applications is disclosed. The method includes generating a compiled version of a first software application, signing the first software...
8949935 Secure account creation  
In one embodiment, non-transitory computer-readable medium stores instructions for establishing a trusted two-way communications session for account creation for an online store, which include...
8949610 Method for embedding secret message into PNG image  
A method for embedding a secret message into a PNG image comprises steps: converting a secret message into a plurality of secret codes; converting the secret codes into a plurality of secret...
8949880 Method and apparatus for interaction with hyperlinks in a television broadcast  
Various embodiments of the present invention relate to systems, methods, and computer-readable medium providing licensing rights for media content that follows a subscriber so that the subscriber...
8948388 Elliptic curve random number generation  
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random. An arbitrary string is chosen and a hash of that string computed. The...
8949609 Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor  
The user device includes: a recording unit which stores system parameters as respective parameters given in advance, a disclosure public key, a user public key, a user private key, a member...
8949611 Methods, apparatus and computer program products for authenticating and determining integrity of a software part of an air vehicle  
Methods, apparatus and computer program products are provided to authenticate and determine the integrity a software part. In this regard, a software part is authenticated and its integrity is...
8949612 One-to-many electronic signature process  
Aspects of the invention include methods and systems for electronically signing a plurality of documents, such as an insurance application, a loan application, a set of mortgage papers, a bank...
8942416 Method and apparatus for embedding auxiliary information within original data  
This patent application is generally related to watermarking and steganography. One claim recites a method of transmarking an audio or video signal previously embedded with a first digital...
8938623 Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program  
The object is to provide a secure functional encryption scheme having many cryptographic functions. An access structure is constituted by applying the inner-product of attribute vectors to a span...
8938792 Device authentication using a physically unclonable functions based key generation system  
At least one machine accessible medium having instructions stored thereon for authenticating a hardware device is provided. When executed by a processor, the instructions cause the processor to...
8938617 One way authentication  
A cryptosystem prevents replay attacks within existing authentication protocols, susceptible to such attacks but containing a random component, without requiring modification to said protocols. The...
8938615 System and method for authenticating radio frequency identification (RFID) tags  
An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such...
8938616 Authentication method  
According to one embodiment, a authentication method comprising: generating a second key by the first key, the first key being stored in a memory and being prohibited from being read from outside;...
8937537 Method and system for utilizing spread spectrum techniques for in car applications  
A method of operating an audio system in an automobile includes identifying a user of the audio system. An audio recording playing on the audio system is identified. An audio setting entered into...
8938095 Verification method, verification device, and computer product  
A verification device 101 receives extracted and sanitized data 113 that has been sanitized to protect the privacy of person A. The verification device 101, extracts from among MCU-hash storage...
8935532 Content distribution and aggregation  
In an example, a method for secure publication of content is described. The method may include encrypting content with a media key. The method may also include providing the encrypted content to a...
8935765 Method to enable mobile devices to rendezvous in a communication network  
There is provided a method to enable mobile devices to rendezvous on a shared communication service. The method includes steps for creating, via a device, a shared username and a shared password...
8935783 Document classification using multiscale text fingerprints  
Described systems and methods allow a classification of electronic documents such as email messages and HTML documents, according to a document-specific text fingerprint. The text fingerprint is...
8931071 Biometric authentication for video communication sessions  
Systems and methods for integrating biometric authentication with video conference sessions are described. An individual seeking to participate in a video conference may first be identified with a...
8930576 Secure communication network  
The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes...
8930704 Digital signature method and system  
A digital signature method, a method for initializing a digital signature scheme, a system for digitally signing a message and a computer program product are described. At least the digital...
8930707 Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message  
A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC) device are provided. The method...
8931102 Testing web applications for file upload vulnerabilities  
A system for detecting file upload vulnerabilities in web applications is provided. The system may include a black-box tester configured to upload, via a file upload interface exposed by a web...
8930705 System and method for authenticating remote execution  
With the widespread use of the distributed systems comes the need to secure such systems against a wide variety of threats. Recent security mechanisms are grossly inadequate in authenticating the...
8930698 Encrypting globally unique identifiers at communication boundaries  
Systems, methods, and computer-readable storage media for encrypting communications containing or referencing globally unique identifiers to prevent unauthorized access to content item data, such...