Sign up


Match Document Document Title
8832430 Remote certificate management  
A system for managing security certificates on a plurality of remote computers comprises a certificate manager that can determine in accordance with at least one preestablished criterion whether a...
8832448 Dual-channel electronic signature system using image codes and related computer program product  
A dual-channel electronic signature system is disclosed, having a signature verification server, a signature requester device, and a hand-held device. The signature requester device calculates a...
8832446 Secure data transfer in an automation network  
A method for secure data transfer in an automation network wherein the method comprises authenticating a user by a program invocation rights system aided by user data for approving a use of the...
8832435 Providing a real-time indication of platform trust  
Methods and apparatuses for providing a real-time indication of platform trust are provided. Embodiments include an integrity reporting module determining that a platform is currently operating in...
8832445 System and method for handling secure messages  
Systems and methods are provided for handling electronic messages. An electronic message is examined as to whether the message contains one or more encoding properties. A visual indication is...
8832202 E-mail information management apparatus, and E-mail information management method  
An E-mail information management apparatus acquires a plurality of predetermined information from a mail header and a mail body and signature related information as signature target information,...
8832447 System and method for using digital signatures to assign permissions  
According to one embodiment of the invention, a method for setting permission levels is described. First, an application and digital signature is received by logic performing the permission...
8831272 Content item identifier  
A system (50) is used for identifying a content item. The system (50) receives a received first identifier (101) of the content item, the received first identifier being based on at least part of a...
8832439 Multiple system images for over-the-air updates  
In one embodiment, a mobile device performs an over-the-air firmware update by writing the updated firmware to a inactive system image partition, and rebooting the device. The security of the OTA...
8832440 Data security system  
A data security system includes providing a unique identification from a first system to a second system; copying the unique identification in the second system by the first system; and unlocking a...
8832800 Method for producing an electro-biometric signature allowing legal interaction between and identification of persons  
A method for producing an electro-biometric signature allowing legal interaction between and the identification of persons utilizing biometric features. The method includes inputting a user's...
8826023 System and method for securing access to hash-based storage systems  
Various methods and systems for securing access to hash-based storage systems are disclosed. One method involves receiving information to be stored in a storage system from a storage system client...
8826005 Security for software in a computing system  
Systems, methods, and computer-program products enable a security system. Trust information is received, at a computer, where the trust information corresponds to an application and wherein the...
8826024 Trusted compliance operations inside secure computing boundaries  
In one embodiment, a method of implementing trusted compliance operations inside secure computing boundaries comprises receiving, in a secure computing environment, a data envelope from an...
8826009 Method of handling a certification request  
In a certification request, a user device includes an object identifier. When a certification authority generates an identity certificate responsive to receiving the certification request, the...
8826014 Authentication of remote host via closed ports  
A method, system and apparatus for authenticating a communication request sent from a client computing device. The communication request is initially blocked by a firewall preventing delivery to a...
8826368 Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication  
The invention discloses a platform authentication method suitable for trusted network connect (TNC) architecture based on tri-element peer authentication (TePA). The method relates to a platform...
8824674 Information distribution system and program for the same  
An information distribution system described herein is capable of securely storing digitized personal information in an encrypted state in a storage section and securely transferring/disclosing the...
8824859 Adding watermarks to video content  
A method for data display includes storing an identification code and receiving encoded video content for playback. The encoded video content is decoded so as to output a series of video frames...
8826025 Authentication device, authentication method, program, and signature generation device  
Provided is an authentication device including a key setting unit for setting a multi-order polynomial ui(t) (i=1 to n−1) to a secret key and setting a multi-order polynomial f that satisfies f...
8826004 Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority  
A low-cost, network based, secure printer that can provide multiple vendors with independent protected access, as authorized by a secure printer authority, is provided. The secure printer authority...
8826007 System and method for validating certificate issuance notification messages  
To validate a received certificate issuance notification message, a device may verify that the certificate issuance notification message conforms to expected norms or authenticate a signature...
8826041 In-band detection mechanism for detecting intermediate layer in a storage I/O driver stack  
A system shares encryption-related metadata between layers of a storage I/O stack. Additionally, a detection mechanism ensures that certain layers within the storage I/O stack are present and...
8826410 Device API for securely monitoring and managing mobile broadband devices  
There is provided a device application programming interface (API) for securely monitoring and managing mobile broadband devices. There is provided a client device with a processor configured to...
8824728 Method and system for tracking illegal distributor and preventing illegal content distribution  
A system for tracking an illegal distributor and preventing an illegal content distribution includes: a forensic mark generator for receiving content and a content identification code from a...
8826026 Systems and methods for tracking electronic files in computer networks using electronic signatures  
Systems and methods are provided for tracking electronic files in computer networks using electronic signatures. A signature program installed on a network node inserts an electronic signature into...
8819547 Image processing apparatus and image processing method  
Upon adding a visible electronic signature to an electronic file, deterioration in visibility of characters is prevented by arranging a character image data of a portion overlapping with a region...
8819813 Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer  
A system and method for signing and authenticating electronic documents using public key cryptography applied by one or more server computer clusters operated in a trustworthy manner, which may act...
8818017 Geographic-based signal detection  
The disclosure relates generally to geographic-based signal detection. One claims recites a method including: receiving information indicating a geographical area; with reference to at least a...
8817986 Cross enterprise communication  
A system enables intermediary communication components to carry out cross enterprise communication. At a first sending enterprise the system comprises: a processor executing code to: receive a...
8818020 Method of providing security for transmitting a digital medical image  
A method of preparing a digital medical image for secure transmission, the method comprising embedding data into the digital medical image using a reversible watermarking process, generating a code...
8817977 Method for generating a digital signature  
A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the digital...
8819441 Long-term signature server, long-term signature terminal, and long-term signature verification server  
A long-term signature server includes a signing target data acquisition function for acquiring signing target data, a signature data transmission function for transmitting to a long-term signature...
8819440 Directed signature workflow  
Techniques relating to directed signature workflow of a document are described. In one instance, a process enables a publishing user to populate a body portion of a document with content. The...
8811247 Automating radio enablement to facilitate power saving  
In an example embodiment, there is disclosed herein an apparatus comprising a wireless transceiver and a controller coupled to the wireless transceiver and configured to receive data via the...
8812517 Watermarking of structured results and watermark detection  
A way of detecting a watermark present in a structured result, such as a search result or a machine translation. The structured result is received and a hash is computed based upon at least part of...
8812853 Traceability for threaded communications  
Individual chunks of a message are signed with their originators' signatures, thereby providing traceability in threaded messages so that every contributor's content as well as modifications...
8812855 Software protection  
A program (MC), which can be executed by a programmable circuit, is protected in the following manner. An instruction block (IB) is provided on the basis of at least a portion (MC-P) of the...
8813241 Content distribution system, content distribution method, and client terminal  
If the user of a first portable terminal intends to let a second portable terminal try out a certain content, the user sends to a distribution server trial permission information including the...
8812854 Firmware verified boot  
A computer-implemented method for verifying a boot process of a computing system includes reading, by the computing system during the boot process, a header section of a read-write portion of...
8812852 Method and system for marking digital content  
In one embodiment, a request to deliver a piece of digital content to a recipient is received. In response to the request, a datum is embedded in an equivalent piece of digital content that...
8812857 Smart card renewal  
A method includes storing creating a smart card with an expiration date and renewing the smart card after the expiration date. The smart card may be created with data stored upon the smart card for...
8813244 Developer switch  
A computing device comprising a security slot integral with an external surface of the computing device, wherein the security slot is configured to receive and mechanically cooperate with a...
8812856 Methods and systems for state synchronization over a non-reliable network using signature processing  
Systems and methods for facilitating confirmation of completion of a transaction(s) for state synchronization over a non reliable network using signature processing are described. One of the...
8811655 Circumvention of watermark analysis in a host content  
Methods and devices are provided to thwart analysis of a watermarking system by preventing analysis of watermarks in a host content. Upon receiving a content at a watermark embedding device, the...
8806526 Security processing unit with secure connection to head end  
A system includes a transport central processing unit of an information appliance device. The transport central processing unit receives a message from a head-end. The transport central processing...
8806640 Program execution integrity verification for a computer system  
A computer system may be employed to verify program execution integrity by receiving a request to launch a program that has been instrumented to include at least one integrity marker, instantiating...
8806616 System, method, and apparatus for allowing a service provider system to authenticate that a credential is from a proximate device  
An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token...
8804958 Method for protecting data content  
A method is provided for protecting data content against illegal copying. The data content is provided by an entertainment system and is output to output units in an authorized playback environment...
8806212 Method and apparatus for generating and verifying electronic signature of software data, and computer readable recording medium thereof  
Provided are methods of generating and verifying an electronic signature of software data, wherein software data is split into a plurality of blocks, electronic signatures corresponding to each of...