Sign up


Match Document Document Title
8997174 Configuring browser policy settings on client computing devices  
Systems and methods for configuring browser policy settings on client computing devices are provided. In some aspects, a method includes receiving login credentials from a client computing device....
8996874 Protection of a program waiting to be executed in a memory used by a microprocessor  
A method for authorizing an access to a table of address correspondence between a multitask CPU and at least one memory containing several programs, consisting of calculating, on each task change...
8996876 Method and system for using a smart phone for electrical vehicle charging  
Systems and methods are provided to allow a smart phone or any terminal to reserve and activate an electric vehicle charger using a web site or server computer system. An access control system is...
8996855 HTTP layer countermeasures against blockwise chosen boundary attack  
A client application, when executed by a processor, is operative to create a HyperText Transfer Protocol (HTTP) request containing a target header that includes a confidential value. The HTTP...
8997249 Software activation and revalidation  
Software activation and revalidation. In one example embodiment, a method for software activation and revalidation includes collecting machine configuration information from a machine on which a...
8997179 Shared secret identification for secure communication  
Technologies related to shared secret identification for secure communication are generally described. In some examples, devices may exchange hashes, such as file deduplication hashes, to identify...
8997199 Token-based security for links to media streams  
Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may generate a first token based on a private key and an encryption...
8997221 System and method for validating and controlling applications  
A system and method for validating an application and for controlling execution of an application. A plurality of parameters may be computed for an authenticated object and for a tested object. A...
8996875 Detecting malware signed with multiple credentials  
Malware that is signed with multiple, valid credentials is detected. A central computer such as a server receives secure hashes of signed application bodies and immutable portions of corresponding...
8989376 Method and apparatus for authenticating video content  
A method for authenticating video content includes: receiving a digital signature, an unsecured video fingerprint, and an unsecured video content from a transmitting node at a receiving node in a...
8990575 Apparatus and method for electronic signature verification  
An apparatus for electronic signature verification, including a grouping unit to group, into at least one group, a plurality of kernels included in an application to which electronic signature...
8989704 Invisible mode for mobile phones to facilitate privacy without breaching trust  
Systems and methods for providing information security in an unobtrusive manner are presented herein. An authentication component can enable a primary user of a multi-user communications device,...
8990574 Secure device authentication protocol  
Disclosed is a system and method by which a multimedia source device communicates with a display device, allowing the multimedia devices to securely confirm the identity of the devices and confirm...
8989883 Systems and methods for providing access to resources through enhanced audio signals  
Systems and methods are provided for using a hidden audio signal. In one exemplary embodiment, the method includes registering, at a central database, one or more of an identifier and a destination...
8984597 Protecting user credentials using an intermediary component  
An access component sends an access request to an intermediary component, the access request being a request to access a service or resource without credentials of a current user of the...
8984055 Relay device, information processing system, and computer-readable recording medium  
A relay device includes a memory and a processor coupled to the memory. The processor executes a process including storing association relationship information in which a session identifier for...
8984298 Managing access to a secure content-part of a PPCD using a key reset point  
In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map...
8984289 Classifying a message based on fraud indicators  
Systems, methods, and media for classifying messages are disclosed. A plurality of fraud indicators are identified in the message. A signature of the message is generated. The generated signature...
8984288 Electronic signing of content  
This specification describes technologies relating to applying electronic signatures to content items. In general, one aspect of the subject matter described in this specification can be embodied...
8984636 Content extractor and analysis system  
A security system provides a defense from known and unknown viruses, worms, spyware, hackers, and unwanted software. The system can implement centralized policies that allow an administrator to...
8984268 Encrypted record transmission  
The invention provides a method and apparatus for transmitting data securely using an unreliable communication protocol, such as User Datagram Protocol. In one variation, the invention retains...
8984296 Device driver self authentication method and system  
A method for device driver self authentication is provided. The method includes accessing a device driver having encrypted authentication parameters therein including, for instance, a vendor...
8982411 Image processing apparatus and method  
An image processing apparatus includes: an extractor to extract colors used in input data; a converter to convert signals of the extracted colors into intermediate color signals each including...
8977857 System and method for granting access to protected information on a remote server  
A client device has one or more processors and memory. An application running on the device obtains a client certificate from a system service running on the device. The certificate includes a...
8977858 Using space-filling curves to fingerprint data  
A file is received. Contents of the file are transformed using a space-filling curve. One example of a space-filling curve that can be used for the transformation is a Hilbert curve. The result of...
8977859 Systems and methods for data compression and decompression  
In one aspect, the present invention comprises one or more processors that generate a first checksum value for a data block and a second checksum value for the data block, wherein the first...
8972736 Fully authenticated content transmission from a provider to a recipient device via an intermediary device  
A method, system, and computer readable medium containing programming for handling fully authenticated transmission of video or other data (content) from a provider to a recipient device via an...
8972745 Secure data handling in a computer system  
A computer system includes a first storage area accessible by an operating system and a second storage area accessible by authorized functions only. According to some embodiments of the invention...
8973152 Apparatus and method for guaranteeing integrity of real-time vehicle data and vehicle black box system using the same  
A vehicle black box technique guarantees the integrity of vehicle data stored in a black box in real time by forming input data streams as block data and performing a signature using a signing key...
8972737 Unauthorized contents detection system  
A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple...
8971528 Modified elliptic curve signature algorithm for message recovery  
A modified Chinese State Encryption Management Bureau's SM2 Elliptic Curve Signature Algorithm that offers partial message recovery and lowers the signature size for a given cryptographic strength....
8972738 Incorporating data into an ECDSA signature component  
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature...
8971532 System and methods for protecting video content  
Systems and methods for content-protecting video codecs are described. At least one embodiment of the invention comprises a system for protecting video content comprising computer memory comprising...
8970910 Visible and invisible watermarking of printed images via 2nd generation stochastic seed frequency modulation  
As set forth herein, computer-implemented methods and systems facilitate watermarking documents and/or images using 2nd generation stochastic halftoning. The watermark is used to spatially vary the...
8971531 Data embedding system  
A system and method for embedding data is provided. The method comprises dividing the host data set into a plurality of blocks, wherein each block comprises a plurality of elements, generating a...
8972468 Method for distributing a certified application employing a pre-certified master application template  
A computer system is used to distribute an application using a data resource. An application using a data resource is created using an authoring environment. The application is converted into a...
8966270 Methods and systems for providing controlled access to the internet  
Novel, Internet-related architectures, methods and devices are proposed that are based on a fundamentally different philosophy: hosts (e.g., source and destination nodes) are given the ability to...
8966271 Data card verification system  
To verify a pair of correspondents in an electronic transaction, each of the correspondents utilizes respective parts of first and second signature schemes. The first signature scheme is...
8966248 Secure software file transfer systems and methods for vehicle control modules  
A server includes an import module that receives a first content file and a first instruction file from a design network. The first instruction file includes a first set of parameters. A job...
8966274 File tamper detection  
This disclosure relates generally to methods and systems for determining when a file has changed. According to one aspect of the present disclosure, a method of determining if contents of a file...
8965039 Client-side watermarking using hybrid I-frames  
A system and method for client-side watermarking of digital content using hybrid Intra-Frames (I-Frames) are provided. In general, a content source provides a compressed video stream and a hybrid...
8964910 Method for identifying and detecting a radio signal for a cognitive communication system  
A method of identifying an RF signal for a cognitive radio system. The signal is identified with a digital watermarking performed downstream from the digital modulation of the symbols to be...
8966571 Detection of potentially copyrighted content in user-initiated live streams  
Systems and methods modifying a presentation of media content in response to a detected violation are provided. In particular, media content such as a media stream broadcasted by a user to other...
8966272 Method for author verification and software authorization  
Embodiments of the present invention are directed to a computer-implemented method for author verification and authorization of object code. In one embodiment, program object code is linked with a...
8966273 Lightweight group signature system and method with short signature  
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature...
8966021 Composable machine image  
A computer system image is executed on a computing node over a network. A system specification file transmitted over the network specifies the computer system image by specifying components of the...
8959642 Real time lockdown  
A system and method that trusts software executables existent on a machine prior to activation for different types of accesses e.g. execution, network, and registry. The system detects new...
8959598 Wireless device authentication between different networks  
A method and system for roaming between heterogeneous networks. The method involves authenticating a mobile communication device on a first network, and providing the device with a single-use token...
8959354 Method, secure device, system and computer program product for digitally signing a document  
A method for digitally signing a document, a secure device, and a computer program product for implementing the method. The method employs a secure device which is protected against malicious...
8959353 Distributed system for multi-function secure verifiable signer authentication  
A distributed multi-function secure system for verifiable signer authentication having a personal private key stored in a secure storage of a mobile device where the mobile device connects to a...