Sign up


Match Document Document Title
8875240 Tenant data center for establishing a virtual machine in a cloud environment  
Apparatuses, computer readable media, methods, and systems are described for generating a first measurement of a virtualization platform, receiving a create measured virtual machine request...
8874921 System and method for generating keyless digital multi-signatures  
A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees based...
8870067 Identification device having electronic key stored in a memory  
An identification device for identifying persons on an authenticated basis includes a support layer, an authentication device with a non-volatile, re-writeable semiconductor memory, a...
8874904 View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device  
A first cryptographic device is configured to store a set of keys that is refreshed in each of a plurality of epochs. The first cryptographic device computes for each of at least a subset of the...
8874923 Policy-based signature authentication system and method  
In various example embodiments, a system and method for providing policy-based authentication is provided. In example embodiments, a request to access and sign a document is received from a device...
8874900 Direct anonymous attestation scheme with outsourcing capability  
A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key...
8875247 Instant personalization security  
A method and system for instant personalization security are provided. The system includes a platform for a user to open applications and/or access web sites. When an application is integrated with...
8874920 Verifying cryptographic signature from stored primitives of previously received signature  
Embodiments provide systems and methods to optimize signature verification time for a cryptographic cache. Time is reduced by eliminating at least some of the duplicative application of...
8872636 Algorithm-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8874922 Systems and methods for multi-layered authentication/verification of trusted platform updates  
In accordance with the present disclosure, a system and method for multilayered authentication of trusted platform updates is described. The method may include storing first cryptographic data in a...
8874924 Methods and apparatus to identify media  
Methods and apparatus for identifying media are described. An example method includes determining application identification information for a media presentation application executing on a media...
8873744 Electronic document processing system  
An electronic document processing system 900 includes a digital image generating unit 15 generating a digital image in a predetermined range of the electronic document; an image encrypting unit 11...
8868916 Self-contained electronic signature  
Techniques for providing a self-contained electronic signature are disclosed. In some embodiments, techniques for providing a self-contained electronic signature include recording an audit trail...
8866595 Ticket-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8868904 Information processing device, disc, information processing method, and program  
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a...
8868917 Methods for identifying audio or video content  
The present disclosure relates to analyzing user uploaded visual or audio content. One method comprises: generating fingerprint data from user uploaded visual or audio content, the user uploaded...
8868915 Secure authentication for client application access to protected resources  
An authorization server receives a request for an access token, for accessing a protected resource, from a client application executing on a device, wherein the request includes a client identifier...
8868914 System and methods for distributing trusted time  
Systems and methods for distributing trusted time, including trusted dates with digital data files, which are accessed, created, modified, received, or transmitted by devices that include a trusted...
8868924 System and method for modifying a software distribution package  
Disclosed are systems, methods and computer program products for modifying a software distribution package. In one aspect, the system receives a software distribution package including one or more...
8869252 Methods, apparatuses, and computer program products for bootstrapping device and user authentication  
An apparatus may include a processor configured to receive a security certificate request from a remote device comprising a public key of the remote device and an authentication credential based...
8868736 Estimating a severity level of a network fault  
A method of estimating a level of severity of a network fault is provided. Performance parameters are monitored on upstream and downstream links to terminal network elements on a network to detect...
8866596 Code-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8868928 System and method that uses cryptographic certificates to define groups of entities  
A system and method for issuing a cryptographic certificate comprises describing prerequisite condition on the cryptographic certificate. The prerequisite conditions comprise membership in...
8862872 Ticket-based spectrum authorization and access control  
Aspects describe spectrum authorization, access control, and configuration parameters validation. Devices in an ad-hoc or peer-to-peer configuration can utilize a licensed spectrum if the devices...
8863227 Method and apparatus to create and manage a differentiated security framework for content oriented networks  
A network component comprising a receiver configured to receive a signed content item and an associated security information from a publisher, wherein the security information indicates which group...
8863234 Collaborative security and decision making in a service-oriented environment  
A method of providing collaborative security and collaborative decision making in a service-oriented environment. The method includes validating request(s) by application(s) for service(s) in the...
8862886 Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes  
Provided are methods, apparatus and computer programs for generating and using conditional electronic signatures enabling the parties to an online communication or transaction to link conditions...
8862882 Systems and methods for authenticating devices by adding secure features to Wi-Fi tags  
Systems and methods are described herein for authenticating a user device that uses a wireless local area network. The user device may generate an encrypted authentication block and/or digitally...
8862887 Providing user contributions for re-published content  
In one embodiment, a method for providing user contributions for shared content on a network includes receiving content at a network system for publication on the network system where content is...
8862888 Systems and methods for three-factor authentication  
In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password...
8856532 Digital signatures of composite resource documents  
An embodiment of the disclosure can receive a composite resource document containing at least one resource. An updated manifest resource can be obtained. The updated manifest resource can list all...
8856524 Cryptographic methods, host system, trusted platform module, computer arrangement, computer program product and computer program  
A cryptographic method is provided for a host system having an associated trusted platform module. A first contribution to a message is computed by the TPM based on a first secret parameter stored...
8856640 Method and apparatus for applying revision specific electronic signatures to an electronically stored document  
Aspects of the present disclosure are directed to methods and systems for applying electronic signatures to an electronically stored document wherein the electronic signatures are associated with a...
8856534 Method and apparatus for secure scan of data storage device from remote server  
A method and device for providing a secure scan of a data storage device from a remote server are disclosed. In some embodiments, a computing device may include an in-band processor configured to...
8856516 Certificate revocation  
A communication system includes a plurality of nodes, the communication system being arranged to assign each of the plurality of nodes a certificate by means of which it can authenticate itself to...
8856934 Image forming apparatus, input control method, input control program, and storage medium  
Inputs from multiple input devices including an internal input device 22, a first external input device 54, and a second external input device 56 can be made to a printing apparatus 20. The...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856538 Secured flash programming of secondary processor  
A system and method for securely flashing a controller, where the controller includes at least one main processor and at least one secondary processor, and where the processing duties are...
8854692 Printing device and printing method generating watermark information  
The present invention provides an information printing method and a printing device, which assure a higher level of security when outputting printed matter. The present invention provides a...
8856536 Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system  
A method for authenticating a piece of firmware to be downloaded to a controller. The method includes signing the firmware or a first part of the firmware with a first private key at a first...
8856537 Method for protecting a telecommunication network and secure router implementing such a method  
This invention pertains to a method for protecting a telecommunication network comprising at least one secure router (100) equipped with a topology map (103) of that network in order to determine...
8856885 Managing cloud zones  
Methods and systems for managing cloud zones are described herein. A management server for a cloud of computing resources may add private zones to the cloud. The private zones may contain computers...
8856900 Method for authorising a connection between a computer terminal and a source server  
The disclosure relates to a method and a system for authorising a connection between a computer terminal and a source server, including an initialization phase wherein: the terminal connects to a...
8856898 Methods for DNSSEC proxying and deployment amelioration and systems thereof  
A method, computer readable medium, and device for providing authenticated domain name service includes forwarding at a traffic management device a request for a domain name from a client device to...
8856533 Device, system and method for determining authenticity of an item  
This invention relates to physical uncloneable function (PUF) devices for determining authenticity of an item, systems for determining authenticity of a physical item, and methods for determining...
8856353 Method and apparatus for providing an extended socket API for application services  
Methods and apparatus for providing an extended socket API are disclosed. A method for providing a socket API according to an implementation of the invention may include: receiving data at a first...
8856535 Determining response signature commonalities  
An analyzer can obtain data regarding signal characteristics in each of multiple communication channels within an access network. The analyzer can use that data to create signatures corresponding...
8854654 Method and apparatus for controlling routing of print jobs  
A computer-implemented method for controlling routing of print jobs, the computer-implemented method includes determining whether a print job meets at least one predetermined criteria and sending a...
8850212 Extending an integrity measurement  
A method of extending an integrity measurement in a trusted device operating in an embedded trusted platform by using a set of policy commands to extend a list of Platform Configuration Registers...
8848919 Revocation status using other credentials  
Providing revocation status of at least one associated credential includes providing a primary credential that is at least initially independent of the associated credential, binding the at least...