Sign up


Match Document Document Title
8898474 Support of multiple pre-shared keys in access point  
A method of operating an access point (AP) configured to support multiple pre-shared keys at a given time to authenticate its associated client devices. Each client device associated with the AP is...
8898477 System and method for secure firmware update of a secure token having a flash memory controller and a smart card  
A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device. Determining...
8898473 System and method for compressing secure E-mail for exchange with a mobile data communication device  
A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is...
8898240 Messaging policy controlled email de-duplication  
Example methods and apparatus associated with a messaging policy controlled email deduplication are provided. In one example a messaging policy is accessed. It is determined whether a received...
8892893 Systems and methods for watermarking software and other media  
Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert,...
8892900 Privacy-protecting integrity attestation of a computing platform  
Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a...
8892894 Computer-implemented method and system for embedding and authenticating ancillary information in digitally signed content  
A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed. The method and system include: loading digital content...
8893295 Secure and private location  
Systems and methods of restricting access to mobile platform location information may involve receiving, via a link, location information for a mobile platform at a processor of the mobile...
8892866 Secure cloud storage and synchronization systems and methods  
A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can...
8893308 Counterfeit prevention for optical media  
A method and system are provided for counterfeit prevention for optical media. In one example, a system is provided for verifying authenticity information on an optical medium. The system receives...
8893242 System and method for pool-based identity generation and use for service access  
A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with...
8892880 System and method for obtaining an authorization key to use a product  
A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based...
8893187 Digital contents receiving apparatus  
A television set is capable of receiving both broadcast program from television station and corresponding digital file of the same contents from a server station through internet. The television...
8893241 Systems and methods for universal enhanced log-in, identity document verification and dedicated survey participation  
Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber...
8886943 Authentication of a vehicle-external device  
A method for authenticating a vehicle-external device in a bus system of a motor vehicle comprising control units is provided. In order to effectively and inexpensively prevent a sequence control...
8885921 Method and system for forensic marking of stereoscopic 3D content media  
Anti-piracy measures for stereoscopic 3D content media displayed in dual lens projection systems are achieved by the forensic marking of each image in a stereoscopic image pair with separate...
8887297 Creating and validating cryptographically secured documents  
Aspects of the subject matter described herein relate to creating and validating cryptographically secured documents. In aspects, documents are encrypted to protect them from unauthorized access....
8886946 Authentication method and system  
The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system...
8886944 Watermark to identify leak source  
Watermarks may be used to deter certain types of information leaks. In one example, leaks occur in the form of posting, in public forums, screen shots of private pages. To deter this example kind...
8886940 Hash function using a card shuffling process  
In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of...
8886945 System and method for conveying session information for use in forensic watermarking  
Methods for providing content session information using a content manager, streaming server, and one or more watermarking devices are disclosed. A content asset is also disclosed. The content asset...
8887287 Method and apparatus for software integrity protection using timed executable agents  
A method and apparatus are disclosed for evaluating the security of at least one client. An executable program is executed by the client being evaluated. A result is received from the executable...
8887254 Database system, computer system, and computer-readable storage medium for decrypting a data record  
A database system comprising: a memory containing multiple data records, wherein each of the data records has a data record asymmetric key pair for cryptographic encryption and decryption, wherein...
8886948 Identity management on a wireless device  
A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP)...
8886947 Optimized integrity verification procedures  
Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by...
8887307 Method and system for using location information acquired from GPS for secure authentication  
Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device. The password may be unique per chip location, per...
8881272 System and method for selecting and applying filters for intrusion protection system within a vulnerability management system  
A system for controlling selection of filters for protecting against vulnerabilities of a computer network includes a vulnerability management system analyzes the computer network and determines...
8880897 Method and apparatus for incremental code signing  
The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an...
8880890 Write accessibility for electronic paper  
A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The...
8880891 Method, system and apparatus for establishing communication  
A method, a system, and an apparatus for establishing communication are disclosed. The method is invented to establish communication between at least two communication parties including a first...
8881242 Information communication system, information communication method, node apparatus and recording medium  
A node apparatus of an information communication system in which a content is distributed and stored by an overlay network configured by a plurality of node apparatuses and which has a center...
8880889 Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)  
The invention relates to systems and methods for secure, remote, wireless submission of financial transactions. Authentication and authorization functionality are provided through use of proof of...
8880633 Proxy server with byte-based include interpreter  
According to this disclosure, a proxy server is enhanced to be able to interpret instructions that specify how to modify an input object to create an output object to serve to a requesting client....
8875240 Tenant data center for establishing a virtual machine in a cloud environment  
Apparatuses, computer readable media, methods, and systems are described for generating a first measurement of a virtualization platform, receiving a create measured virtual machine request...
8874921 System and method for generating keyless digital multi-signatures  
A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees based...
8870067 Identification device having electronic key stored in a memory  
An identification device for identifying persons on an authenticated basis includes a support layer, an authentication device with a non-volatile, re-writeable semiconductor memory, a...
8874904 View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device  
A first cryptographic device is configured to store a set of keys that is refreshed in each of a plurality of epochs. The first cryptographic device computes for each of at least a subset of the...
8874923 Policy-based signature authentication system and method  
In various example embodiments, a system and method for providing policy-based authentication is provided. In example embodiments, a request to access and sign a document is received from a device...
8874900 Direct anonymous attestation scheme with outsourcing capability  
A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key...
8875247 Instant personalization security  
A method and system for instant personalization security are provided. The system includes a platform for a user to open applications and/or access web sites. When an application is integrated with...
8874920 Verifying cryptographic signature from stored primitives of previously received signature  
Embodiments provide systems and methods to optimize signature verification time for a cryptographic cache. Time is reduced by eliminating at least some of the duplicative application of...
8872636 Algorithm-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8874922 Systems and methods for multi-layered authentication/verification of trusted platform updates  
In accordance with the present disclosure, a system and method for multilayered authentication of trusted platform updates is described. The method may include storing first cryptographic data in a...
8874924 Methods and apparatus to identify media  
Methods and apparatus for identifying media are described. An example method includes determining application identification information for a media presentation application executing on a media...
8873744 Electronic document processing system  
An electronic document processing system 900 includes a digital image generating unit 15 generating a digital image in a predetermined range of the electronic document; an image encrypting unit 11...
8868916 Self-contained electronic signature  
Techniques for providing a self-contained electronic signature are disclosed. In some embodiments, techniques for providing a self-contained electronic signature include recording an audit trail...
8866595 Ticket-based RFID loss-prevention system  
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which...
8868904 Information processing device, disc, information processing method, and program  
A configuration is provided wherein usage restrictions of an application are determined in accordance with timestamps. A certificate revocation list (CRL) in which the revocation information of a...
8868917 Methods for identifying audio or video content  
The present disclosure relates to analyzing user uploaded visual or audio content. One method comprises: generating fingerprint data from user uploaded visual or audio content, the user uploaded...
8868915 Secure authentication for client application access to protected resources  
An authorization server receives a request for an access token, for accessing a protected resource, from a client application executing on a device, wherein the request includes a client identifier...