Sign up


Match Document Document Title
8699701 Method of performing XZ-elliptic curve cryptography for use with network security protocols  
The method of performing XZ-elliptic curve cryptography for use with network security protocols provides a computerized method that allows for the encryption of messages through elliptic polynomial...
8700893 Key certification in one round trip  
Certification of a key, which a Trusted Platform Module (TPM) has attested as being non-migratable, can be performed in a single round trip between the certificate authority (CA) and the client...
8700904 Method for authentication in an automation system  
The invention relates to a method for planning an automation system project, a method for authenticating a user during access to an automation device in an automation system, an automation system...
8700914 Method and system for changing safety-relevant data for a control device  
A system and method for changing safety-relevant data for a control device is provided wherein an authorized user inputs new or altered safety-relevant data, which is received on a data processing...
8699747 Image-related methods and systems  
When a user prints a photograph from an online source, such as Facebook, a hidden digital watermark is automatically embedded in the printed output (e.g., by the printer, or by a cloud-based...
8700889 System and method of sharing web page that represents health information  
A method of displaying health information of a user, the method including: monitoring if a sharing request for a health information of a user is made by an external device, which provides a web...
8694788 Security system  
A security system includes an interface, a main computer, and an application server. The interface enables a user to access a remote document related to a product. The main computer stores...
8695103 Apparatus for and a method of copy-protecting a content carrying recording medium  
Recording data has content data and navigation control data to enable a legitimate player to navigate the content data. The recording data has a content data set and a spurious data set that is...
8694785 Broadband certified mail  
The present invention provides a system and method for providing certified voice and/or multimedia mail messages in a broadband signed communication system which uses packetized digital...
8693687 Method and apparatus of processing three-dimensional video content  
The present invention introduces methods and apparatus of encrypting/decrypting three-dimensional (3D) video content. The inventive methods and apparatus can achieve a flexible...
8694786 Virtual machine images encryption using trusted computing group sealing  
A host machine provisions a virtual machine from a catalog of stock virtual machines. The host machine instantiates the virtual machine. The host machine configures the virtual machine, based on...
8695068 Device authentication using display device irregularity  
A device authentication server authenticates a remotely located device using data representing pixel irregularities of a display of the device. Since each display will deteriorate in a unique and...
8695080 Information terminal apparatus, information processing apparatus and information communication system  
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may...
8688996 Multipad encryption  
A method for protecting a message or document. The method comprises encrypting the message using a first key associated with a first party; sending the encrypted message to a second party;...
8689102 User interface for creating and using media keys  
User interface for creating and using media keys. A user interface is provided for outputting media data corresponding to one or more media keys. The same user interface may be used to output media...
8688994 Federation among services for supporting virtual-network overlays  
Computerized methods, systems, and computer-readable media for promoting cooperation between a first and second virtual network overlay (“overlay”) are provided. The first overlay is governed by ...
8688993 Method and apparatus for determining and using the sampling frequency for decoding watermark information embedded in a received signal sampled with an original sampling frequency at encoder side  
In watermarked signal decoding, the embedded message is decoded by correlating the reference patterns with the watermarked signal. The watermark detector decides, depending on the size of the...
8689292 Method and systems for dynamically providing communities of interest on an end user workstation  
A method and system provide dynamic communities of interest on an end user workstation utilizing commercial off the shelf products, with central management and the ability for a users to log on...
8688997 Using digital certificates in document distribution  
One embodiment of the present invention provides a system that uses digital certificates to facilitate enforcing licensing terms for applications that manipulate documents. During operation, the...
8689000 Use of certified secrets in communication  
A method is described by which the possessor of a secret certified in a particular manner can prove to a party with which the possessor of a secret needs to interact that it does indeed possess a...
8688998 Resilent cryptographic scheme  
A system and method are provided for enabling a symmetric key to be derived, the method comprising: obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the...
8689005 Method for managing and controlling access to confidential information contained in portable electronic media  
A method of the management for confidential information contained in portable memory media provides recognition by a biometric identification element of the individual who is the proprietor of the...
8688461 Electronic registry for authenticating transferable records  
An electronic registry stores information relating to a transferable electronic record and the controller of an authoritative copy of the transferable electronic record. The electronic registry...
8687843 Method and system for restricting access to sensitive contents of digital images  
The method for restricting access to sensitive contents of digital images using the digital watermarking technique for encoding and decoding sensitive contents of images is characterized in that...
8688999 Methods for identifying audio or video content  
Methods and systems for identifying audio and video entertainment content are provided. Certain shortcomings of fingerprint-based content identification can be redressed through use of...
8687902 System, method, and computer program product for decompression of block compressed images  
A system, method, and computer program product that may use a cache in the decompression of block compressed image data. Each data entry in the cache may represent decompressed image data...
8688991 Media player embodiments and secure playlist packaging  
A system identifies a playlist comprising at least one reference to content. The system provides a digital signature to the playlist. The digital signature links the playlist to a creator of the...
8688992 System and method for generating agreements  
System and method for creation and use of an agreement object having content packages and a transportable agreement, including both the content of the agreement and data used to validate the...
8688995 Method and apparatus for detection of a fault attack  
The invention concerns a method of detecting a fault attack including providing a plurality of blinding values; generating a first set of data elements including a first group of data elements and...
8683207 Updating signature algorithms for strong name binding  
The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of...
8681978 Efficient and secure forensic marking in compressed domain  
Methods, devices, and computer program products enable the embedding of forensic marks in a host content that is in compressed domain. These and other features are achieved by preprocessing of a...
8683198 Master key trust grants and revocations for minor keys  
A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master...
8683205 Accessing data utilizing entity registration in multiple dispersed storage networks  
A method begins by a processing module determining whether a data access request is requesting access to data stored in a plurality of dispersed storage networks (DSNs). The method continues with...
8683605 Long-term validation of a digital signature status indicator  
Long-Term Validation (LTV) of a digital signature status indicator is disclosed. In some embodiments, the Long-Term Validation of a digital signature status indicator includes automatically...
8683201 Third-party-secured zones on web pages  
A computer-implemented method is provided, including storing, in an authentication server system, a URL identifying at least one web page, and providing a secure zone browser-side script to be...
8683206 System and method of authenticating multiple files using a detached digital signature  
A system and method of authenticating data files is provided. The method includes providing a plurality of software part files and a manifest file associated with the software part files. The...
8681995 Supporting DNS security in a multi-master environment  
Multiple peer domain name system (DNS) servers are included in a multi-master DNS environment. One of the multiple peer DNS servers is a key master peer DNS server that generates one or more keys...
8682082 Pictogram and ISO symbol decoder service  
This invention provides an instantaneous method for a user or traveler to obtain a meaning of a symbol that is unfamiliar to said user. The symbol is captured in a format that is easily transmitted...
8677132 Document security  
A method for managing a secured document. The method includes storing and retrieving the secured document based on hybrid fragmentation and replication scheme to provide user viewing of the secured...
8676995 System and method for enabling pairing of a companion device with a mate device for performing a companion service  
A method is provided in one example embodiment and includes establishing a connection between a first client and a messaging fabric of a conductor element associated with a video system; receiving...
8677113 Transmission of secure electronic mail formats  
A method and system for providing e-mail messages to a receiving e-mail application. The e-mail messages as sent from a sending e-mail application being secure and in opaque signed format. The...
8676878 Domain managing method, domain extending method and reference point controller electing method  
A method of managing a domain, a method of extending a domain, and a method of selecting a reference point controller are provided. The method of operating the domain includes: receiving a request...
8677503 Mechanism for embedding device identification information into graphical user interface objects  
A mechanism for protecting software and computing devices from unintentional pre-release disclosure (“leak”) is provided that includes applying a security enhancement to an object on the gra...
8677130 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Authenticating electronic content
 
The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the...
8676187 Dynamic binding of service on bearer  
Methods that facilitate automatic selection of service bearers in a mobile based on user-initiated policies and service-provider-initiated policies set forth in a policy document are described...
8677126 Method and system for digital rights management of documents  
A method and system for transmission of digital content via e-mail with point of use digital rights management is disclosed. The secured access rights to the digital content may be customized for...
8676998 Reverse network authentication for nonstandard threat profiles  
A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection,...
8677134 HTTP signing  
A system and method for signing data transferred over a computer network is described. In one aspect, the HTTP header of an HTTP response message is extended to include a content identifier, a...
8672221 System and method of securely delivering and verifying a mobile boarding pass  
A system and method of securely delivering and verifying a mobile boarding pass which validates the mobile boarding pass. An example method includes receiving boarding pass data for a traveler,...
8677131 Method of securing data in 2D bar codes using SSL  
Methods and apparatus authenticate a printed document associated with a source entity. The printed document includes a two-dimensional code (2-D code) that includes data encoded therein. The...