Sign up


Match Document Document Title
8789152 Method for managing authentication procedures for a user  
A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager...
8788828 Non-transferable anonymous digital receipts  
A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent...
8787583 Systems and methods for distributing and securing data  
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and...
8782418 Entertainment device  
An entertainment device comprises communication means operable to receive media data from a media data source, storage means operable to store the received media data, in which the storage means...
8782759 Identification and access control of users in a disconnected mode environment  
The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile...
8774216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management  
Responsibility can be established for specific copies or instances of copies of digitized multimedia content using digital watermarks. Management and distribution of digital watermark keys (e.g.,...
8775813 ElGamal signature schemes  
In a method of generating a digital signature of a message m, a signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive...
8775814 Personalized biometric identification and non-repudiation system  
A system and a method for providing a personalized biometric identification system to facilitate in securing critical transactions have been disclosed. The system includes a server which captures...
8775604 Distributed frequency data collection via indicator embedded with DNS request  
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a...
8769294 Digital signatures  
Digital signature generation apparatus, comprising an envelope generator operable to generate an envelope representation, of only one polarity, of a sampled data segment, and operable for each of...
8769289 Authentication of a user accessing a protected resource using multi-channel protocol  
A user accessing a protected resource is authenticated using multiple channels, including a mobile device of the user. A user attempting to access a protected resource is authenticated by receiving...
8762985 User terminal device and service providing method thereof  
A method for providing a service in a user terminal device, which includes downloading a service hub program, installing the service hub program, generating an icon container corresponding to the...
8752185 Method for media fingerprinting  
A method of checking whether a content aggregator's content matches a content owner's content involves generating a fingerprint of the content and looking for a matching fingerprint from the...
8751791 Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event  
A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a communication network enables improved network...
8738919 Control of the integrity of a memory external to a microprocessor  
A method for recording at least one information block in a first volatile memory external to a circuit, a first digital signature being calculated based on information and data internal to the...
8731187 Computing genus-2 curves using general isogenies  
An Igusa class polynomial over rational numbers is computed from a set of Igusa class polynomials modulo a set of small primes. The set of Igusa class polynomials modulo a set of small primes is...
8724803 Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system  
A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a...
8726031 Watermark generator, watermark decoder, and method for providing binary message data  
A watermark generator for providing a watermark signal in dependence on binary message data, the watermark generator has an information spreader configured to spread an information unit to a...
8705739 On-the-fly encryption on a gaming machine  
Systems, apparatus and methods for on-the-fly encryption of data storage on a computerized wagering gaming machine are described herein. In some embodiments, a method includes accessing, using an...
8707047 Verifying signatures for multiple encodings  
Digitally signing data for multiple encodings is disclosed. A first signature of the data is generated. A second signature of a second encoding of the data is generated. The first signature and the...
8700906 Secure computing in multi-tenant data centers  
This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation of a function to multiple physical...
8700902 Methods and apparatus to certify digital signatures  
Methods and apparatus to certify digital signatures are disclosed. An example method includes receiving a request to certify a digital signature from a user, receiving information about a physical...
8695056 Method for information tracking in multiple interdependent dimensions  
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, λI. The method provides a unified information-tracking framework ...
8695080 Information terminal apparatus, information processing apparatus and information communication system  
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may...
8689000 Use of certified secrets in communication  
A method is described by which the possessor of a secret certified in a particular manner can prove to a party with which the possessor of a secret needs to interact that it does indeed possess a...
8683208 Information processing device, program developing device, program verifying method, and program product  
According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection attributes for respective arguments...
8675869 Incorporating data into an ECDSA signature component  
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature...
8675867 Key generation algorithm using secret polynomial over finite ring and transformation  
Provided is an information processing apparatus for realizing an electronic signature system of the MPKC signature method capable of safety certification with respect to chosen-message attack. An...
8677130 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Authenticating electronic content
 
The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the...
8671279 Incremental secure backup and restore of user settings and data  
Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
8654974 Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices  
A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a...
8656177 Identity-based-encryption system  
A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient. A service name such as a universal resource locator...
8656174 Recovering from de-synchronization attacks against watermarking and fingerprinting  
The invention provides a method of recovering from de-synchronization attacks includes registering original and altered digital content using nonlinear transformations to iteratively attempt to...
8649509 Systems and computer program products for generating and verifying randomized hash values  
A system generates a randomized hash value and/or verifies data against a randomized hash value. A hashing circuit can respond to data by randomly selecting a hashing algorithm parameter among a...
8645703 Power analysis countermeasure for the ECMQV key agreement algorithm  
Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a...
8645691 System and method for securing data while minimizing bandwidth  
Systems and methods for securing data are disclosed. A method for securing data can comprise processing a data block to generate a signature, processing the signature to generate a reduced...
8645698 Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network  
A distributed Rivest Shamir Adleman (RSA) signature generation method in an ad-hoc network and a node of an ad-hoc network. The distributed RSA signature generation method in an ad-hoc network...
8645710 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...
8639934 Radio channel metrics for secure wireless network pairing  
Technologies are generally described for using metrics of radio path characteristics within a wireless network to establish signal signature vectors. These signal signature vectors may be used as a...
8639933 Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program  
An image reading apparatus which reads an original document and generates a digitized scanned document, and which includes a document storage section that stores the scanned document, a document...
8631241 Secure configuration of computing device  
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital...
8631235 System and method for storing data using a virtual worm file system  
A system and method for storing data in a virtual file system using write once read many (WORM) protection includes a WORM server in communication with one or more storage devices and a controller...
8630620 Method and apparatus for securing location information and access control using the location information  
A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity...
8631466 Machine to-machine (M2M) call flow security  
Systems, methods, and instrumentalities are disclosed to provide secure operations in an M2M device. An M2M device may receive an indication that an operation to be performed is security sensitive....
8631228 Hitless manual cryptographic key refresh in secure packet networks  
In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state....
8626122 Un-ciphered network operation solution  
The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network (100) The NAS signaling is performed between a user...
8627426 Cloud platform architecture  
A cloud computing environment provides the ability to deploy a web application that has been developed using one of a plurality of application frameworks and is configured to execute within one of...
8607046 System and method for signing a message to provide one-time approval to a plurality of parties  
A system and method for batch signing of a message is provided. An administrator initiates a management operation directed to a plurality of security appliances organized as a cluster. In response,...
8607354 Deriving multiple fingerprints from audio or video content  
Methods and apparatuses are provided for determining a first fingerprint of audio or video data. The first fingerprint is stored in a database or record including information pertaining to a first...
8607037 Pre-installation environment used by operating systems  
A pre-installation environment used by an operating system includes a pre-installation kit, a running unit, and a write inhibiting unit. The running unit is used for running the pre-installation...