Sign up


Match Document Document Title
8868916 Self-contained electronic signature  
Techniques for providing a self-contained electronic signature are disclosed. In some embodiments, techniques for providing a self-contained electronic signature include recording an audit trail...
8866595 Ticket-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8868904 Information processing device, disc, information processing method, and program  
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a...
8868917 Methods for identifying audio or video content  
The present disclosure relates to analyzing user uploaded visual or audio content. One method comprises: generating fingerprint data from user uploaded visual or audio content, the user uploaded...
8868915 Secure authentication for client application access to protected resources  
An authorization server receives a request for an access token, for accessing a protected resource, from a client application executing on a device, wherein the request includes a client identifier...
8868914 System and methods for distributing trusted time  
Systems and methods for distributing trusted time, including trusted dates with digital data files, which are accessed, created, modified, received, or transmitted by devices that include a trusted...
8868924 System and method for modifying a software distribution package  
Disclosed are systems, methods and computer program products for modifying a software distribution package. In one aspect, the system receives a software distribution package including one or more...
8869252 Methods, apparatuses, and computer program products for bootstrapping device and user authentication  
An apparatus may include a processor configured to receive a security certificate request from a remote device comprising a public key of the remote device and an authentication credential based...
8868736 Estimating a severity level of a network fault  
A method of estimating a level of severity of a network fault is provided. Performance parameters are monitored on upstream and downstream links to terminal network elements on a network to detect...
8866596 Code-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8868928 System and method that uses cryptographic certificates to define groups of entities  
A system and method for issuing a cryptographic certificate comprises describing prerequisite condition on the cryptographic certificate. The prerequisite conditions comprise membership in...
8862872 Ticket-based spectrum authorization and access control  
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices...
8863227 Method and apparatus to create and manage a differentiated security framework for content oriented networks  
A network component comprising a receiver configured to receive a signed content item and an associated security information from a publisher, wherein the security information indicates which group...
8863234 Collaborative security and decision making in a service-oriented environment  
A method of providing collaborative security and collaborative decision making in a service-oriented environment. The method includes validating request(s) by application(s) for service(s) in the...
8862886 Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes  
Provided are methods, apparatus and computer programs for generating and using conditional electronic signatures enabling the parties to an online communication or transaction to link conditions...
8862882 Systems and methods for authenticating devices by adding secure features to Wi-Fi tags  
Systems and methods are described herein for authenticating a user device that uses a wireless local area network. The user device may generate an encrypted authentication block and/or digitally...
8862887 Providing user contributions for re-published content  
In one embodiment, a method for providing user contributions for shared content on a network includes receiving content at a network system for publication on the network system where content is...
8862888 Systems and methods for three-factor authentication  
In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password...
8856532 Digital signatures of composite resource documents  
An embodiment of the disclosure can receive a composite resource document containing at least one resource. An updated manifest resource can be obtained. The updated manifest resource can list all...
8856524 Cryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program  
A cryptographic method is provided for a host system having an associated trusted platform module. A first contribution to a message is computed by the TPM based on a first secret parameter stored...
8856640 Method and apparatus for applying revision specific electronic signatures to an electronically stored document  
Aspects of the present disclosure are directed to methods and systems for applying electronic signatures to an electronically stored document wherein the electronic signatures are associated with a...
8856534 Method and apparatus for secure scan of data storage device from remote server  
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an in-band processor configured to...
8856516 Certificate revocation  
A communication system includes a plurality of nodes, the communication system being arranged to assign each of the plurality of nodes a certificate by means of which it can authenticate itself to...
8856934 Image forming apparatus, input control method, input control program, and storage medium  
Inputs from multiple input devices including an internal input device 22, a first external input device 54, and a second external input device 56 can be made to a printing apparatus 20. The...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856538 Secured flash programming of secondary processor  
A system and method for securely flashing a controller, where the controller includes at least one main processor and at least one secondary processor, and where the processing duties are...
8854692 Printing device and printing method generating watermark information  
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The present invention provides a...
8856536 Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system  
A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first...
8856537 Method for protecting a telecommunication network and secure router implementing such a method  
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine...
8856885 Managing cloud zones  
Methods and systems for managing cloud zones are described herein. A management server for a cloud of computing resources may add private zones to the cloud. The private zones may contain computers...
8856900 Method for authorising a connection between a computer terminal and a source server  
The disclosure relates to a method and a system for authorising a connection between a computer terminal and a source server, including an initialization phase wherein: the terminal connects to a...
8856898 Methods for DNSSEC proxying and deployment amelioration and systems thereof  
A method, computer readable medium, and device for providing authenticated domain name service includes forwarding at a traffic management device a request for a domain name from a client device to...
8856533 Device, system and method for determining authenticity of an item  
This invention relates to physical uncloneable function (PUF) devices for determining authenticity of an item, systems for determining authenticity of a physical item, and methods for determining...
8856353 Method and apparatus for providing an extended socket API for application services  
Methods and apparatus for providing an extended socket API are disclosed. A method for providing a socket API according to an implementation of the invention may include: receiving data at a first...
8856535 Determining response signature commonalities  
An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data to create signatures corresponding...
8854654 Method and apparatus for controlling routing of print jobs  
A computer-implemented method for controlling routing of print jobs, the computer-implemented method includes determining whether a print job meets at least one predetermined criteria and sending a...
8850212 Extending an integrity measurement  
A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers...
8848919 Revocation status using other credentials  
Providing revocation status of at least one associated credential includes providing a primary credential that is at least initially independent of the associated credential, binding the at least...
8850188 Updating certificate status in a system and method for processing certificates located in a certificate search  
A system and method for processing certificates located in a certificate search. Certificates located in a certificate search are processed at a data server (e.g. a mobile data server) coupled to a...
8850556 Interactive video captcha  
Provided is a Captcha Access Control System (CACS) for generating an improved captcha that are based, in one described embodiment, upon a command in one format and a response in a different format,...
8850540 Method and device for verifying dynamic password  
The examples of the present invention provide a method and device for verifying a dynamic password. In the method and device, some algorithm parameters can be exchanged in public by using a DH...
8850072 Secure communication network  
The present invention is directed to a secure communication network that enables multi-point to multi-point proxy communication over the network. The network employs a smart server that establishes...
8850209 Schema signing  
In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the...
8850211 Method and apparatus for improving code and data signing  
Methods and computing devices enable code and/or data software on computer devices to be verified using methods and signatures which can be updated by a signing server after distribution. Updated...
8848905 Deterrence of device counterfeiting, cloning, and subversion by substitution using hardware fingerprinting  
Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing...
8850594 Digital rights management of captured content based on capture associated locations  
A certification is received from a user stating that captured content does not comprise a particular restricted element and a request from the user for an adjustment of a digital rights management...
8850213 Method for verifying an electronic signature and data processing device  
A method for verifying an electronic signature is described including determining a residue class given by the signature; determining an integer having the residue class; determining a field...
8850210 Authentication system, authentication device, terminal, and verifying device  
An authentication system, including a service use device 1 which presents blurred information obtained by blurring certification information desired to be certified, service providing devices 3a to...
8850214 Methods and systems for encoding and protecting data using digital signature and watermarking techniques  
Systems and methods are provided for determining a presence of a watermark in electronic data. In certain embodiments, a plurality of keys is generated, and a plurality of payloads are retrieved...
8843749 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...