Sign up


Match Document Document Title
9037867 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...
9038064 Trace assisted prefetching of virtual machines in a distributed system  
The disclosed implementations are related to trace-assisted prefetching of a virtual machine from a network resource to improve interactive performance of the virtual machine on a host device....
9032211 Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message  
Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place...
9009482 Forensic marking using a common customization function  
Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization...
9009149 Systems and methods for mobile search using Bag of Hash Bits and boundary reranking  
Determining ranked candidate media in response to media query data corresponding to a query media includes receiving the media query data including feature data of the query media, coordinate...
9009483 Replacing blinded authentication authority  
A manufacturing entity provides a blinded signature to a secure device and associates a time with the blinded signature. If a signing key is compromised, the manufacturing entity provides a time...
9009464 Anonymous register system and method thereof  
A uniform certificate revocation list managing apparatus is provided for managing canceled register information of all believable groups in a believable anonymous register system. Canceled...
9009481 System and method for protecting cryptographic assets from a white-box attack  
A digital signature generation (DSG) process which provides resistance against white box attackers is disclosed. This is done by applying specially selected data transformations to the inputs,...
9009492 Prevention of playback attacks using OTP memory  
A method for data security includes receiving, in a processor having a one-time programmable (OTP) memory, which includes multiple bits and has a current state defined by the bits of the OTP that...
8984298 Managing access to a secure content-part of a PPCD using a key reset point  
In a method for managing access to a secure content-part of a PPCD, a key reset point of the secure content-part during a workflow among workflow participants is determined. In addition, key-map...
8984278 Code signing system and method  
A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or...
8972738 Incorporating data into an ECDSA signature component  
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature...
8972735 Methods and apparatus to certify digital signatures  
Methods and apparatus to certify digital signatures are disclosed. An example method includes retrieving, from a first database, a first geographical location associated with an identification...
8964763 Inter-router communication method and module  
A system and method of inter-router communication is described. The system and method include a routing protocol communication, configured to be sent between a plurality of routers on a network,...
8959353 Distributed system for multi-function secure verifiable signer authentication  
A distributed multi-function secure system for verifiable signer authentication having a personal private key stored in a secure storage of a mobile device where the mobile device connects to a...
8959202 Generating statistics of popular content  
Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as...
8949706 Systems and methods for distributed electronic signature documents  
Systems and methods for distributed electronic signature documents. A method for distributed electronic signature documents includes creating a signing template that contains information about how...
8949609 Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor  
The user device includes: a recording unit which stores system parameters as respective parameters given in advance, a disclosure public key, a user public key, a user private key, a member...
8943325 Use of a digital signature obtained from at least one structural characteristic of a material element to protect the direct reading of sensitive data and method for reading this protected data  
The invention is related to the use of one or several digital signatures obtained from at least one structural characteristic of a material element that has a complex, chaotic, unique and stable...
8938615 System and method for authenticating radio frequency identification (RFID) tags  
An authenticated RFID system is provided that uses elliptic curve cryptography (ECC) to reduce the signature size and read/write times when compared to traditional public key implementations such...
8938095 Verification method, verification device, and computer product  
A verification device 101 receives extracted and sanitized data 113 that has been sanitized to protect the privacy of person A. The verification device 101, extracts from among MCU-hash storage...
8918646 Data processing apparatus  
In the configuration performing a data processing by a hardware processing circuit (accelerator), to provide a technology capable of improving a poorness of processing efficiency by multiple...
8914641 Method for signing and verifying data using multiple hash algorithms and digests in PKCS  
Methods, systems, and apparatuses are disclosed for signing and verifying data using multiple hash algorithms and digests in PKCS including, for example, retrieving, at the originating computing...
8910247 Cross-site scripting prevention in dynamic content  
Embodiment relate to systems, methods, and computer storage media for suppressing cross-site scripting in a content delivery system. A request is received for content that includes a scripted item...
8897442 Encryption device, decryption device, encryption method, decryption method, program, and recording medium  
In encryption, a random number r is generated to generate a ciphertext C2=M(+)R(r), function values HS(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K,...
8892896 Capability and behavior signatures  
Techniques for capability and behavior signatures are described. In one or more embodiments, various data describing the capabilities and behaviors of a client is collected. The collected data is...
8892867 Techniques for protecting data in cloud computing environments  
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into...
8887297 Creating and validating cryptographically secured documents  
Aspects of the subject matter described herein relate to creating and validating cryptographically secured documents. In aspects, documents are encrypted to protect them from unauthorized access....
8887298 Updating and validating documents secured cryptographically  
Aspects of the subject matter described herein relate to updating and validating documents secured cryptographically. In aspects, documents are encrypted to protect them from unauthorized access....
8887282 Techniques for protecting data in cloud computing environments  
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into...
8874925 Systems and methods to scan memory for a threat  
A computer-implemented method to scan memory for a threat is described. At least one application programming interface (API) is monitored. A back-trace operation is performed from the at least one...
8874926 Increasing security in inter-chip communication  
An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between...
8868501 Notifying users of file updates on computing devices using content signatures  
A method, computer program product, and apparatus for managing file updates using content signatures that use file identicality properties are provided. A method and computer program product are...
8862886 Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes  
Provided are methods, apparatus and computer programs for generating and using conditional electronic signatures enabling the parties to an online communication or transaction to link conditions...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856879 Social authentication for account recovery  
A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account...
8843749 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
8838979 Advanced watermarking system and method  
A method, computer program product, and computing device for obtaining an uncompressed digital media data file. One or more default watermarks is inserted into the uncompressed digital media data...
8832438 Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus  
A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold...
8831272 Content item identifier  
A system (50) is used for identifying a content item. The system (50) receives a received first identifier (101) of the content item, the received first identifier being based on at least part of...
8832800 Method for producing an electro-biometric signature allowing legal interaction between and identification of persons  
A method for producing an electro-biometric signature allowing legal interaction between and the identification of persons utilizing biometric features. The method includes inputting a user's...
8826008 Method and device for secure notification of identity  
A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of...
8826005 Security for software in a computing system  
Systems, methods, and computer-program products enable a security system. Trust information is received, at a computer, where the trust information corresponds to an application and wherein the...
8826027 Method for producing acknowledged transaction data and corresponding device  
A method and a display preparation unit are proposed for the execution of a transaction during which transaction data are processed which have to be confirmed by a user. The display preparation...
8826026 Systems and methods for tracking electronic files in computer networks using electronic signatures  
Systems and methods are provided for tracking electronic files in computer networks using electronic signatures. A signature program installed on a network node inserts an electronic signature...
8819439 Attributes in cryptographic credentials  
Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as...
8817977 Method for generating a digital signature  
A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the...
8819442 Assessing risk associated with a computer technology  
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a listing of vulnerability occurrences...
8819440 Directed signature workflow  
Techniques relating to directed signature workflow of a document are described. In one instance, a process enables a publishing user to populate a body portion of a document with content. The...
8812847 System and method for authenticating a resource-constrained client  
A system and method for authenticating a resource-constrained client are provided. The method includes transmitting, by the server, a query message including a first modified secret key to the...