Sign up


Match Document Document Title
8705739 On-the-fly encryption on a gaming machine  
Systems, apparatus and methods for on-the-fly encryption of data storage on a computerized wagering gaming machine are described herein. In some embodiments, a method includes accessing, using an...
8707047 Verifying signatures for multiple encodings  
Digitally signing data for multiple encodings is disclosed. A first signature of the data is generated. A second signature of a second encoding of the data is generated. The first signature and the...
8700906 Secure computing in multi-tenant data centers  
This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation of a function to multiple physical...
8700902 Methods and apparatus to certify digital signatures  
Methods and apparatus to certify digital signatures are disclosed. An example method includes receiving a request to certify a digital signature from a user, receiving information about a physical...
8695056 Method for information tracking in multiple interdependent dimensions  
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, λI. The method provides a unified information-tracking framework ...
8695080 Information terminal apparatus, information processing apparatus and information communication system  
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may...
8689000 Use of certified secrets in communication  
A method is described by which the possessor of a secret certified in a particular manner can prove to a party with which the possessor of a secret needs to interact that it does indeed possess a...
8683208 Information processing device, program developing device, program verifying method, and program product  
According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection attributes for respective arguments...
8675869 Incorporating data into an ECDSA signature component  
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature...
8675867 Key generation algorithm using secret polynomial over finite ring and transformation  
Provided is an information processing apparatus for realizing an electronic signature system of the MPKC signature method capable of safety certification with respect to chosen-message attack. An...
8677130 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Authenticating electronic content
 
The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the...
8671279 Incremental secure backup and restore of user settings and data  
Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
8654974 Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices  
A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a...
8656177 Identity-based-encryption system  
A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient. A service name such as a universal resource locator...
8656174 Recovering from de-synchronization attacks against watermarking and fingerprinting  
The invention provides a method of recovering from de-synchronization attacks includes registering original and altered digital content using nonlinear transformations to iteratively attempt to...
8649509 Systems and computer program products for generating and verifying randomized hash values  
A system generates a randomized hash value and/or verifies data against a randomized hash value. A hashing circuit can respond to data by randomly selecting a hashing algorithm parameter among a...
8645703 Power analysis countermeasure for the ECMQV key agreement algorithm  
Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a...
8645691 System and method for securing data while minimizing bandwidth  
Systems and methods for securing data are disclosed. A method for securing data can comprise processing a data block to generate a signature, processing the signature to generate a reduced...
8645698 Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network  
A distributed Rivest Shamir Adleman (RSA) signature generation method in an ad-hoc network and a node of an ad-hoc network. The distributed RSA signature generation method in an ad-hoc network...
8645710 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...
8639934 Radio channel metrics for secure wireless network pairing  
Technologies are generally described for using metrics of radio path characteristics within a wireless network to establish signal signature vectors. These signal signature vectors may be used as a...
8639933 Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program  
An image reading apparatus which reads an original document and generates a digitized scanned document, and which includes a document storage section that stores the scanned document, a document...
8631241 Secure configuration of computing device  
In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital...
8631235 System and method for storing data using a virtual worm file system  
A system and method for storing data in a virtual file system using write once read many (WORM) protection includes a WORM server in communication with one or more storage devices and a controller...
8630620 Method and apparatus for securing location information and access control using the location information  
A method and apparatus for securing location information and access control using the location information are disclosed. A wireless transmit/receive unit (WTRU) includes a location sensing entity...
8631466 Machine to-machine (M2M) call flow security  
Systems, methods, and instrumentalities are disclosed to provide secure operations in an M2M device. An M2M device may receive an indication that an operation to be performed is security sensitive....
8631228 Hitless manual cryptographic key refresh in secure packet networks  
In a hitless manual cryptographic key refresh scheme, a state machine is independently maintained at each network node. The state machine includes a first state, a second state, and a third state....
8626122 Un-ciphered network operation solution  
The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network (100) The NAS signaling is performed between a user...
8627426 Cloud platform architecture  
A cloud computing environment provides the ability to deploy a web application that has been developed using one of a plurality of application frameworks and is configured to execute within one of...
8607046 System and method for signing a message to provide one-time approval to a plurality of parties  
A system and method for batch signing of a message is provided. An administrator initiates a management operation directed to a plurality of security appliances organized as a cluster. In response,...
8607354 Deriving multiple fingerprints from audio or video content  
Methods and apparatuses are provided for determining a first fingerprint of audio or video data. The first fingerprint is stored in a database or record including information pertaining to a first...
8607037 Pre-installation environment used by operating systems  
A pre-installation environment used by an operating system includes a pre-installation kit, a running unit, and a write inhibiting unit. The running unit is used for running the pre-installation...
8607057 Secure outsourced aggregation with one-way chains  
Secure outsourced aggregation of data using one-way chains is discussed in this application. Each input data source such as a sensor generates a Verifiable Synopsis (“VS”) which includes sensor dat...
8601273 Signed manifest for run-time verification of software program identity and integrity  
A measurement engine performs active platform observation. A program includes an integrity manifest to indicate an integrity check value for a section of the program's source code. The measurement...
8601265 Method and system for improving storage security in a cloud computing environment  
A method of improving storage security in a cloud environment includes interfacing a secure microcontroller with a storage controller associated with a client device in the cloud environment to...
8601276 Managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow  
In a method for managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow among a plurality of workflow participants, in a secure content manager, from a...
8595492 On-demand protection and authorization of playback of media assets  
On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a...
8595504 Light weight authentication and secret retrieval  
A method for authenticating a message in a network is provided. The method includes a step of generating, in a sink device, a private key and a public key. The private key includes a plurality of...
8589688 Message authentication device, message authentication method, message authentication program and storage medium therefor  
A message authentication device, a message authentication method, a message authentication program and a storage medium therefor are provided, so as to realize higher speed processing than an...
8590024 Method for generating digital fingerprint using pseudo random number code  
A method for authenticating the identity of a client device that is attempting to establish a communications link with a remotely located system server over a network. The method involves initially...
8589693 Method for two step digital signature  
The invention relates to a method for the digital signature of a message by a signer having an identity and holding a signature device, in which a public key cryptographic scheme is used. The...
8583925 Mix-net system  
Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a...
8565434 Methods and systems for maintaining security keys for wireless communication  
Certain embodiments allow security keys to be maintained across mobile device states, or communication events, such as hand-over, and system idle and sleep power savings modes. By monitoring the...
8566948 Method and system for controlling access to logical unit of a storage device shared by computers  
An acquisition unit of a user terminal acquires an initiator ID including a user ID and a computer ID. The initiator ID is transmitted by a transmitter unit, and then, received by a...
8553889 Mix-net system  
Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a...
8549041 Converter traversal using power of two-based operations  
A system includes reception of a request for a page location corresponding to a logical page number, determination of a difference between the logical page number and a smallest logical page number...
8549390 Verifying content of resources in markup language documents  
A markup element of a markup language document references a resource with a resource indicator. A method for verifying the content of the resource includes extracting a characteristic of the...
8549307 Forensic marking using a common customization function  
Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization...
8543822 Device authentication  
A first device in possession of a value is able to determine, without communicating the value and without communicating any information from which the value can be identified, whether a second...
8539232 Information terminal apparatus, information processing apparatus and information communication system  
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may...