Sign up


Match Document Document Title
8819439 Attributes in cryptographic credentials  
Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as...
8817977 Method for generating a digital signature  
A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the digital...
8819442 Assessing risk associated with a computer technology  
Systems and methods of assessing vulnerability or risk associated with a computer technology are presented. The system and method may include receiving a listing of vulnerability occurrences...
8819440 Directed signature workflow  
Techniques relating to directed signature workflow of a document are described. In one instance, a process enables a publishing user to populate a body portion of a document with content. The...
8812847 System and method for authenticating a resource-constrained client  
A system and method for authenticating a resource-constrained client are provided. The method includes transmitting, by the server, a query message including a first modified secret key to the...
8812855 Software protection  
A program (MC), which can be executed by a programmable circuit, is protected in the following manner. An instruction block (IB) is provided on the basis of at least a portion (MC-P) of the...
8806216 Implementation process for the use of cryptographic data of a user stored in a data base  
A security module (“SM”) implements user cryptographic data by means of a user terminal. The cryptographic data is encrypted by a first encryption key established from a secret key from the ter...
8806214 Communication with non-repudiation and blind signatures  
Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised...
8799664 Small public-key based digital signatures for authentication  
Embodiments disclosed allow authentication between two entities having agreed on the use of a common modulus N. The authentication includes generating a pseudorandom string value; generating a...
8800006 Authentication and authorization in network layer two and network layer three  
A method may include authenticating a node over layer 2 in a network based on authentication rules; sending a node authentication code to the node; and providing layer 3 network access based on the...
8799666 Secure user authentication using biometric information  
An apparatus includes a biometric sensor capable of identifying biometric information associated with a user. A storage device coupled to the biometric sensor stores user information. A biometric...
8793498 System and method for forensic analysis of media works  
A method and system for identifying a source of a copied work that in one embodiment includes obtaining at least some portions of a reference work, collecting at least some portions of the suspect...
8789152 Method for managing authentication procedures for a user  
A method and technique for managing authentication procedures for a user having access to several applications within a computing environment includes registering at an authentication manager...
8788828 Non-transferable anonymous digital receipts  
A system and method for verifying ownership of an electronic receipt in a communication system providing a public key infrastructure, the verification arising out of a series of messages being sent...
8787583 Systems and methods for distributing and securing data  
A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and...
8782418 Entertainment device  
An entertainment device comprises communication means operable to receive media data from a media data source, storage means operable to store the received media data, in which the storage means...
8782759 Identification and access control of users in a disconnected mode environment  
The present invention provides identification and access control for an end user mobile device in a disconnected mode environment, which refers generally to the situation where, in a mobile...
8774216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management  
Responsibility can be established for specific copies or instances of copies of digitized multimedia content using digital watermarks. Management and distribution of digital watermark keys (e.g.,...
8775813 ElGamal signature schemes  
In a method of generating a digital signature of a message m, a signature component s of the digital signature is calculated by first masking the long-term private key d using a single additive...
8775814 Personalized biometric identification and non-repudiation system  
A system and a method for providing a personalized biometric identification system to facilitate in securing critical transactions have been disclosed. The system includes a server which captures...
8775604 Distributed frequency data collection via indicator embedded with DNS request  
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a...
8769294 Digital signatures  
Digital signature generation apparatus, comprising an envelope generator operable to generate an envelope representation, of only one polarity, of a sampled data segment, and operable for each of...
8769289 Authentication of a user accessing a protected resource using multi-channel protocol  
A user accessing a protected resource is authenticated using multiple channels, including a mobile device of the user. A user attempting to access a protected resource is authenticated by receiving...
8762985 User terminal device and service providing method thereof  
A method for providing a service in a user terminal device, which includes downloading a service hub program, installing the service hub program, generating an icon container corresponding to the...
8752185 Method for media fingerprinting  
A method of checking whether a content aggregator's content matches a content owner's content involves generating a fingerprint of the content and looking for a matching fingerprint from the...
8751791 Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event  
A method and device for confirming authenticity of a public key infrastructure (PKI) transaction event between a relying node and a subject node in a communication network enables improved network...
8738919 Control of the integrity of a memory external to a microprocessor  
A method for recording at least one information block in a first volatile memory external to a circuit, a first digital signature being calculated based on information and data internal to the...
8731187 Computing genus-2 curves using general isogenies  
An Igusa class polynomial over rational numbers is computed from a set of Igusa class polynomials modulo a set of small primes. The set of Igusa class polynomials modulo a set of small primes is...
8724803 Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system  
A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a...
8726031 Watermark generator, watermark decoder, and method for providing binary message data  
A watermark generator for providing a watermark signal in dependence on binary message data, the watermark generator has an information spreader configured to spread an information unit to a...
8705739 On-the-fly encryption on a gaming machine  
Systems, apparatus and methods for on-the-fly encryption of data storage on a computerized wagering gaming machine are described herein. In some embodiments, a method includes accessing, using an...
8707047 Verifying signatures for multiple encodings  
Digitally signing data for multiple encodings is disclosed. A first signature of the data is generated. A second signature of a second encoding of the data is generated. The first signature and the...
8700906 Secure computing in multi-tenant data centers  
This document describes techniques and apparatuses for secure computing in multi-tenant data centers. These techniques permit a client to delegate computation of a function to multiple physical...
8700902 Methods and apparatus to certify digital signatures  
Methods and apparatus to certify digital signatures are disclosed. An example method includes receiving a request to certify a digital signature from a user, receiving information about a physical...
8695056 Method for information tracking in multiple interdependent dimensions  
A method for information flow tracking is provided using, for example, a functional programming language based on lambda calculus, λI. The method provides a unified information-tracking framework ...
8695080 Information terminal apparatus, information processing apparatus and information communication system  
When transmitting position/time information calculated by means of a GPS function to a server apparatus, authentication is carried out with the server apparatus. The position/time information may...
8689000 Use of certified secrets in communication  
A method is described by which the possessor of a secret certified in a particular manner can prove to a party with which the possessor of a secret needs to interact that it does indeed possess a...
8683208 Information processing device, program developing device, program verifying method, and program product  
According to one embodiment, an information processing device stores a program list and plural types of security functions each defining therein protection attributes for respective arguments...
8675869 Incorporating data into an ECDSA signature component  
During generation of a signature on a message to create a signed message, a signer determines one of the signature components such that particular information can be extracted from the signature...
8675867 Key generation algorithm using secret polynomial over finite ring and transformation  
Provided is an information processing apparatus for realizing an electronic signature system of the MPKC signature method capable of safety certification with respect to chosen-message attack. An...
8677130 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Authenticating electronic content
 
The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the...
8671279 Incremental secure backup and restore of user settings and data  
Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
8654974 Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices  
A system for securing information. The system includes a first tracking device associated with an object or an individual. In one embodiment, the first tracking device generates independently a...
8656177 Identity-based-encryption system  
A system is provided that uses identity-based encryption (IBE) to allow a sender to securely convey information in a message to a recipient. A service name such as a universal resource locator...
8656174 Recovering from de-synchronization attacks against watermarking and fingerprinting  
The invention provides a method of recovering from de-synchronization attacks includes registering original and altered digital content using nonlinear transformations to iteratively attempt to...
8649509 Systems and computer program products for generating and verifying randomized hash values  
A system generates a randomized hash value and/or verifies data against a randomized hash value. A hashing circuit can respond to data by randomly selecting a hashing algorithm parameter among a...
8645703 Power analysis countermeasure for the ECMQV key agreement algorithm  
Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a...
8645691 System and method for securing data while minimizing bandwidth  
Systems and methods for securing data are disclosed. A method for securing data can comprise processing a data block to generate a signature, processing the signature to generate a reduced...
8645698 Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network  
A distributed Rivest Shamir Adleman (RSA) signature generation method in an ad-hoc network and a node of an ad-hoc network. The distributed RSA signature generation method in an ad-hoc network...
8645710 Information processing apparatus, information storage medium, content management system, data processing method, and computer program  
A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information...