Matches 1 - 50 out of 104 1 2 3 >


Match Document Document Title
US20150143128 METHOD AND DEVICE FOR PRODUCT AND DOCUMENT AUTHENTICATION  
Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a...
US20140025956 METHOD AND DEVICE FOR PRODUCT AND DOCUMENT AUTHENTICATION  
Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a...
US20130179692 SYSTEMS AND METHODS FOR THREE-FACTOR AUTHENTICATION  
In one aspect, systems and methods for three-factor authentication include receiving a user's identification and password transmitted from the user's mobile device, generating a One Time Password...
US20110314293 Method of Handling a Server Delegation and Related Communication Device  
A method of handling a server delegation for a first server in a service system supporting a device management (DM) protocol is disclosed. The method comprises receiving a delegation message with...
US20120311341 CENTRALIZED KERNAL MODULE LOADING  
Methods and systems for centralized kernel module loading are described. In one embodiment, a computing system detects a kernel module load event to load a kernel module into a kernel of a client....
US20140359299 Method for Determination of User's Identity  
Method and system for determination of user's identity described herein, ensures a secure user authentication process using mobile device, e.g. a phone. Method can be used with any service...
US20130166917 AUTHENTICATED CHECKIN VIA PASSIVE NFC  
The present disclosure involves a method of verifying user check-ins to a venue. The method includes initializing a digital check-in chain for a venue. The method includes expanding,...
US20120297198 Privacy-Preserving Metering with Low Overhead  
Privacy-preserving metering with low overhead is described. In an embodiment consumption of a resource such as electricity, car insurance, cloud computing resources is monitored by a meter and...
US20110208972 METHOD OF SIGNING A MESSAGE  
A method of signing a message, a base station for a wireless sensor network, a node for a wireless sensor network and a wireless sensor network are provided. The method comprises, generating a...
US20120297197 Dynamic Domain Name Server Console for Disaster Recovery Server Management  
Methods, systems, and computer-readable media for updating a domain name server are provided. A console may receive a first request to access the console. The console may verify first permission...
US20120124385 METHOD, CONTROLLER AND SYSTEM FOR DETECTING INFRINGEMENTS OF THE AUTHENTICITY OF SYSTEM COMPONENTS  
In a method for detecting infringements of the authenticity of a system component an authentication request is sent from a controller to an authentication device of the system component. A first...
US20120054497 GATEWAY CERTIFICATE CREATION AND VALIDATION  
A gateway obtains a server side certificate which is signed with a key used for signing zone data for a DNS discovery procedure of discovering the gateway by a mobile node and transmits the signed...
US20140108810 PERFORMING CLIENT AUTHENTICATION USING CERTIFICATE STORE ON MOBILE DEVICE  
Techniques are disclosed for authenticating users to a computing application. A relying application transmits a login page to a user requesting access to the application. The login page may...
US20100115284 SUPPORT OF TAMPER DETECTION FOR A LOG OF RECORDS  
Tamper detection of audit records comprises configuring a proxy for adding tamper evidence information to audit information by obtaining audit records from at least one audit record generating...
US20130091362 GENERATING IMPLICIT CERTIFICATES  
Methods, systems, and computer programs for using an implicit certificate are disclosed. In some implementations, an identifier for an entity is obtained. A first cryptographic pair that includes...
US20060075249 Electromagnetic security device  
This invention is directed to a security thread having electromagnetic properties allowing the thread to have an electromagnetic signature. By using an electromagnetic scanner, the electromagnetic...
US20120265995 Exploiting Application Characteristics for Multiple-Authenticator Broadcast Authentication Schemes  
A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a...
US20120023336 System and method for designing secure client-server communication protocols based on certificateless public key infrastructure  
A system and method for facilitating secure client server communication using elliptical curve cryptography and certificateless public key infrastructure has been disclosed. The system includes a...
US20050132202 Attesting to establish trust between computer entities  
To establish trust between first and second entities, the first entity sends an attestation message to the second entity, including a code ID, relevant data, a digital signature based on the code...
US20110154046 METHOD AND APPARATUS FOR STORAGE OF DATA FOR MANUFACTURED ITEMS  
Exemplary embodiments are directed to a method and apparatus for storage of data for a batch of manufactured items. The method comprises defining, by a lower limit identifier and an upper limit...
US20050210259 Scan to confidential print job communications  
A system and method are provided for scan to confidential print job communications. The method comprises: at a source, scanning a document; accepting a password; encrypting the scanned document;...
US20070192613 Internet security news network  
A system and method are disclosed for collecting, analyzing, verifying, producing, and broadcasting security data. Internet security-related information may be broadcast continuously from a data...
US20120159179 DIGITAL SIGNATURES WITH ERROR POLYNOMIALS  
Representations of polynomials a, s, t, e—1 and e—2 can be provided. Values of coefficients of the polynomials can be limited, and can be computed using randomization techniques. A verification...
US20050086490 Material code recording and reading method and devices designed for protection of products and control of their authenticity  
Material code recording and reading method and devices designed for protection of products and control of their authenticity. The marking device 1 embeds a sign upon the product 4, the marked...
US20100095127 TUNABLE ENCRYPTION SYSTEM  
A method, programmed medium and system are provided for enabling a user to choose a user-preferred encryption type from among a plurality of encryption types listed in a user's Kerberos...
US20100138659 ELECTRONIC NOTARY  
A process is disclosed for notarizing document, by a client in the presence of a notary, comprising the steps of registering the notary, the client and the document, from a local workstation...
US20120265994 SYSTEM AND METHOD TO ESTABLISH AND/OR MANAGE A TRUSTED RELATIONSHIP BETWEEN A HOST TO STORAGE ARRAY CONTROLLER AND/OR A STORAGE ARRAY TO STORAGE ARRAY CONTROLLER  
A method for establishing a secure connection between a first computer and a second computer, comprising the steps of (A) generating a signature authentication pair on the first computer, (B)...
US20100095128 DOCUMENT INTEGRITY VERIFICATION PREPARATION  
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering,...
US20100138662 DIGITAL SIGNATURE ASSURANCE SYSTEM, METHOD, PROGRAM AND APPARATUS  
According to respective embodiments of the present invention, it is possible to verify a security environment of an digital signature and assure validity of the digital signature. For example, in...
US20100115283 SYSTEMS AND METHODS FOR USING CRYPTOGRAPHY TO PROTECT SECURE AND INSECURE COMPUTING ENVIRONMENTS  
Computation environments are protected from bogus or rogue load modules, executables, and other data elements through use of digital signatures, seals, and certificates issued by a verifying...
US20100257111 Issuing Electronic Vouchers  
A method of issuing electronic vouchers (Vi) which a user (U) may submit to a merchant (M) in exchange for goods or services comprises the steps of: an issuer (I) receiving an electronic...
US20100299528 METHOD FOR PROVIDING ACCESS CONTROL TO MEDIA SERVICES  
The present invention proposes a solution to prevent a program flow in a processing unit from being modified with respect to an intended program flow, thereby ensuring that important steps such as...
US20110016325 SIGNATURE AND VERIFICATION METHOD, SIGNATURE GENERATION DEVICE, AND SIGNATURE VERIFICATION DEVICE  
The present invention provides a signature generation device and a signature verification device capable of countering a transcript attack that seeks a private key by analyzing a plurality of...
US20090106557 METHODS AND SYSTEMS FOR INDICATING TRUSTWORTHINESS OF SECURE COMMUNICATIONS  
Embodiments of the present invention enable a message recipient or messaging system to indicate the trustworthiness of a message, especially messages that comprise content that has been digitally...
US20090327144 SYSTEM FOR EXECUTING REMOTE ELECTRONIC NOTARIZATION AND SIGNATORY VERIFICATION AND AUTHENTICATION  
A system for remote electronic verification and authentication and screening of potential signatories for remote electronic notary transactions via remote pc encrypted platform to a broadband...
US20090313172 METHOD AND SYSTEM FOR LINKING AN ANONYMOUS ELECTRONIC TRADE ORDER TO AN IDENTITY OF A TRADER  
A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the...
US20100138664 SYSTEMS AND METHODS FOR DISTRIBUTING PRIVATE PLACEMENT DOCUMENTS  
Methods of providing a private placement document to a potential investor in a private placement. The methods may comprise the step of generating the private placement document in an encrypted...
US20110173452 METHOD OF GENERATING COMPOUND TYPE COMBINED PUBLIC KEY  
The present invention constructs a compound type combined public key system on the basis of a combined public key CPK system. The combined key is combined by an identity key and a randomly defined...
US20060005031 Methods and systems for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content  
A method for utilizing a single cryptographic integrity check to generate multiple cryptographic integrity check values for components of transcodable content is disclosed. In one embodiment, a...
US20120324233 Verifying Requests for Access to a Service Provider Using an Authentication Component  
The subject disclosure is directed towards processing requests for accessing a service provider. After examining at least one security token, a public key and a portion of attribute information...
US20110208971 Method of Using ECDSA with Winternitz One Time Signature  
A method is provided of authenticating a digitally signed message. A chain of messages is generated. A Winternitz pair of keys is generated for each respective message. A sequence number is...
US20090222668 Group Signature Scheme With Improved Efficiency, in Particular in a Join Procedure  
A method for managing a group signature scheme includes in a setup procedure for group initialization, generating, by a group manager, a group public key. In a join procedure for the group manager...
US20100138663 Method Of Providing Security Document  
A method of providing a security document is provided in which a computer system generates a digital signature of at least part of an identity associated with the security document, generates a...
US20090177891 METHOD AND SYSTEM FOR INVISIBLY EMBEDDING INTO A TEXT DOCUMENT THE LICENSE IDENTIFICATION OF THE GENERATING LICENSED SOFTWARE  
A method and system for embedding into a text document generated by a licensed software a License Identification Signature of the software.
US20090204235 TRIGGERING AND ACTIVATING DEVICE FOR TWO COUPLED CONTROL SYSTEMS THAT CAN BE MUTUALLY ACTIVATED, AND CORRESPONDING METHOD  
A triggering and activating device and an automated process coupling two reciprocally activatable monitoring devices or operational-intervention devices. A first synchronizing module synchronizes...
US20130268765 Instant Messaging Private Tags  
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified...
US20120011369 DIGITAL SIGNATURE GENERATION APPARATUS, DIGITAL SIGNATURE VERIFICATION APPARATUS, AND KEY GENERATION APPARATUS  
A digital signature generation apparatus includes memory to store finite field Fq and section D(ux(s, t), uy(s, t), s, t) as secret key, section being one of surfaces of three-dimensional manifold...
US20110072273 DATE-PROVABLE REGISTRATION SYSTEM FOR PUBLISHED DOCUMENTS  
A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering,...
US20080270801 Watermarking a Media Signal by Adjusting Frequency Domain Values and Adapting to the Media Signal  
A method of imperceptibly embedding a code signal in a media signal encodes auxiliary information in frequency components of the media signal. This method forms a code signal comprising a...
US20080098218 SECURE COMMUNICATION PROTOCOL AND METHOD THEREFOR  
A method is provided for secure communication between a transmitter and a receiver. The transmitter comprises a non-volatile memory for storing a first portion of a count value, where the count...

Matches 1 - 50 out of 104 1 2 3 >