Sign up


Match Document Document Title
8897442 Encryption device, decryption device, encryption method, decryption method, program, and recording medium  
In encryption, a random number r is generated to generate a ciphertext C2=M(+)R(r), function values HS(r, C2), a common key K, a ciphertext C(Ψ+1) of the random number r using the common key K, ...
8892896 Capability and behavior signatures  
Techniques for capability and behavior signatures are described. In one or more embodiments, various data describing the capabilities and behaviors of a client is collected. The collected data is...
8892867 Techniques for protecting data in cloud computing environments  
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into...
8887297 Creating and validating cryptographically secured documents  
Aspects of the subject matter described herein relate to creating and validating cryptographically secured documents. In aspects, documents are encrypted to protect them from unauthorized access....
8887298 Updating and validating documents secured cryptographically  
Aspects of the subject matter described herein relate to updating and validating documents secured cryptographically. In aspects, documents are encrypted to protect them from unauthorized access....
8887282 Techniques for protecting data in cloud computing environments  
A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into...
8874925 Systems and methods to scan memory for a threat  
A computer-implemented method to scan memory for a threat is described. At least one application programming interface (API) is monitored. A back-trace operation is performed from the at least one...
8874926 Increasing security in inter-chip communication  
An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between the...
8868501 Notifying users of file updates on computing devices using content signatures  
A method, computer program product, and apparatus for managing file updates using content signatures that use file identicality properties are provided. A method and computer program product are...
8862886 Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes  
Provided are methods, apparatus and computer programs for generating and using conditional electronic signatures enabling the parties to an online communication or transaction to link conditions...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8856879 Social authentication for account recovery  
A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account...
8843749 Visualization of trust in an address bar  
Described are a system and method for presenting security information about a current site or communications session. Briefly stated, a browsing software is configured to receive a certificate...
8838979 Advanced watermarking system and method  
A method, computer program product, and computing device for obtaining an uncompressed digital media data file. One or more default watermarks is inserted into the uncompressed digital media data...
8832438 Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus  
A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold...
8831272 Content item identifier  
A system (50) is used for identifying a content item. The system (50) receives a received first identifier (101) of the content item, the received first identifier being based on at least part of a...
8832800 Method for producing an electro-biometric signature allowing legal interaction between and identification of persons  
A method for producing an electro-biometric signature allowing legal interaction between and the identification of persons utilizing biometric features. The method includes inputting a user's...
8826008 Method and device for secure notification of identity  
A system, methods and devices for the secure notification of an identity in a communications network. The methods include sending or receiving a communication including a hash of a certificate of a...
8826005 Security for software in a computing system  
Systems, methods, and computer-program products enable a security system. Trust information is received, at a computer, where the trust information corresponds to an application and wherein the...
8826027 Method for producing acknowledged transaction data and corresponding device  
A method and a display preparation unit are proposed for the execution of a transaction during which transaction data are processed which have to be confirmed by a user. The display preparation...
8826026 Systems and methods for tracking electronic files in computer networks using electronic signatures  
Systems and methods are provided for tracking electronic files in computer networks using electronic signatures. A signature program installed on a network node inserts an electronic signature into...
8819439 Attributes in cryptographic credentials  
Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as...
8817977 Method for generating a digital signature  
A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the digital...
8819442 Assessing risk associated with a computer technology  
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a listing of vulnerability occurrences...
8819440 Directed signature workflow  
Techniques relating to directed signature workflow of a document are described. In one instance, a process enables a publishing user to populate a body portion of a document with content. The...
8812847 System and method for authenticating a resource-constrained client  
A system and method for authenticating a resource-constrained client are provided. The method includes transmitting, by the server, a query message including a first modified secret key to the...
8812855 Software protection  
A program (MC), which can be executed by a programmable circuit, is protected in the following manner. An instruction block (IB) is provided on the basis of at least a portion (MC-P) of the...
8806216 Implementation process for the use of cryptographic data of a user stored in a data base  
A security module (“SM”) implements user cryptographic data by means of a user terminal. The cryptographic data is encrypted by a first encryption key established from a secret key from the ter...
8806214 Communication with non-repudiation and blind signatures  
Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised...
8799664 Small public-key based digital signatures for authentication  
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a...
8800006 Authentication and authorization in network layer two and network layer three  
A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on the...
8799666 Secure user authentication using biometric information  
An apparatus includes a biometric sensor capable of identifying biometric information associated with a user. A storage device coupled to the biometric sensor stores user information. A biometric...
8793498 System and method for forensic analysis of media works  
A method and system for identifying a source of a copied work that in one embodiment includes obtaining at least some portions of a reference work, collecting at least some portions of the suspect...
8789152 Method for managing authentication procedures for a user  
A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager...
8788828 Non-transferable anonymous digital receipts  
A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent...
8787583 Systems and methods for distributing and securing data  
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and...
8782418 Entertainment device  
An entertainment device comprises communication means operable to receive media data from a media data source, storage means operable to store the received media data, in which the storage means...
8782759 Identification and access control of users in a disconnected mode environment  
The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile...
8774216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management  
Responsibility can be established for specific copies or instances of copies of digitized multimedia content using digital watermarks. Management and distribution of digital watermark keys (e.g.,...
8775813 ElGamal signature schemes  
In a method of generating a digital signature of a message m, a signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive...
8775814 Personalized biometric identification and non-repudiation system  
A system and a method for providing a personalized biometric identification system to facilitate in securing critical transactions have been disclosed. The system includes a server which captures...
8775604 Distributed frequency data collection via indicator embedded with DNS request  
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a...
8769294 Digital signatures  
Digital signature generation apparatus, comprising an envelope generator operable to generate an envelope representation, of only one polarity, of a sampled data segment, and operable for each of...
8769289 Authentication of a user accessing a protected resource using multi-channel protocol  
A user accessing a protected resource is authenticated using multiple channels, including a mobile device of the user. A user attempting to access a protected resource is authenticated by receiving...
8762985 User terminal device and service providing method thereof  
A method for providing a service in a user terminal device, which includes downloading a service hub program, installing the service hub program, generating an icon container corresponding to the...
8752185 Method for media fingerprinting  
A method of checking whether a content aggregator's content matches a content owner's content involves generating a fingerprint of the content and looking for a matching fingerprint from the...
8751791 Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event  
A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a communication network enables improved network...
8738919 Control of the integrity of a memory external to a microprocessor  
A method for recording at least one information block in a first volatile memory external to a circuit, a first digital signature being calculated based on information and data internal to the...
8731187 Computing genus-2 curves using general isogenies  
An Igusa class polynomial over rational numbers is computed from a set of Igusa class polynomials modulo a set of small primes. The set of Igusa class polynomials modulo a set of small primes is...
8724803 Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system  
A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a...