Matches 1 - 50 out of 111 1 2 3 >


Match Document Document Title
US20120166808 LATTICE-BASED RING SIGNATURE METHOD  
A lattice-based ring signature method includes generating a dimension, a bound, a length of a hashed message, a Gaussian parameter and an open parameter, which are parameters necessary for a ring...
US20110093210 MEASUREMENT DEVICE AND METHOD OF CONTROLLING THE SAME  
A measurement device includes: a first measurement unit (101) measuring first biological data at least k times (k≧2) to obtain any k first measurement values; a distributed-signature generation...
US20100306548 SYSTEM AND METHOD FOR SECURING THE LIFE-CYCLE OF USER DOMAIN RIGHTS OBJECTS  
In a method for enabling support for backwards compatibility in a User Domain, in one of a Rights Issuer (RI) and a Local Rights Manager (LRM), a Rights Object Encryption Key (REK) and encrypted...
US20110302420 SYSTEM AND METHOD FOR AUTHENTICATED AND PRIVACY PRESERVING BIOMETRIC IDENTIFICATION SYSTEMS  
A biometric based identification and authorization for a collected physical biometric for a security infrastructure is presented. The biometric identification and authorization is achieved with an...
US20130138967 Method and System for Replaying a Voice Message and Displaying a Signed Digital Photograph Contemporaneously  
Systems and methods for generating authentic digital memorabilia are described. A signor may be provided a digital photograph. The signor's signature, written message, or voice message may be...
US20070113096 Peer-to-Peer Networks with Protections  
In a peer-to-peer environment, copyrights and users' privacies can be protected by a tracking mechanism. In described implementations, tracking mechanisms can use certificates that are produced...
US20060248339 Security method using electronic signature  
A security method using an electronic signature, which improves the performance of an electronic signature authentication by generating and verifying an electronic signature using a mediator, and...
US20090110199 Toolbar Signature  
A method and system are provided for a web browser toolbar signature. In one example, the method includes receiving a submission of user content from a source webpage, receiving a producer...
US20120137136 GROUP SIGNATURE SCHEME  
An efficient and safe group signature scheme is provided. According to the present invention, an open unit is provided to not an issuer but an opener, and a data required for operating the open...
US20090094460 Method and system for signer self-managed, encryption-based identification and signature secret management to verify signer and to legitimize basic digital signature without the use of certificates, tokens or PKI (private key infrastructure)  
Method and system for signer self-managed, encryption-based identification and signature secret management to verify the signer and to legitimize basic electronic signature without the use of...
US20070192135 Signature feature of medical note-taking software  
Medical note-taking software is used by healthcare professionals to author notes to be used by the software in generating medical documents. The present invention adds automatic signature...
US20110191585 Device Authentication  
Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of...
US20080141035 Limited Blind Signature System  
The present invention is aimed at the proposal of a limited blind signature system which is highly safe such that its safety can be proven without the assumption of a random oracle model. A...
US20080148054 Secure Signatures  
Systems and methods for secure signatures are described. In one aspect, a secure signature is generated. The secure signature strongly binds an image of an electronic signature (an “electronic...
US20110302421 Authentication Method And Apparatus Using One Time Pads  
An authentication method is provided between entities (10A; 10B) having matching one-time pads each with multiple OTP blocks. From the standpoint of a first one (10A) of the entities, the method...
US20100082973 Direct anonymous attestation scheme with outsourcing capability  
A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key...
US20090217383 LOW-COST SECURITY USING WELL-DEFINED MESSAGES  
Well-defined messages may be transmitted from a sending device to a recipient device in order to reduce the processing and resource requirements imposed by the security semantics of general...
US20120254620 Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm  
Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a...
US20110173453 Capability and Behavior Signatures  
Techniques for capability and behavior signatures are described. In one or more embodiments, various data describing the capabilities and behaviors of a client is collected. The collected data is...
US20110246781 CLIENT TERMINAL, SERVER, SERVER-CLIENT SYSTEM, COOPERATION PROCESSING METHOD, PROGRAM AND RECORDING MEDIUM  
An application on a client terminal transmits application session information indicating a state of the application itself and an application signature proving the identity of the application to a...
US20080141028 Secure single sign-on authentication between WSRP consumers and producers  
One embodiment of the present invention provides a system that facilitates secure single sign-on (SSO) authentication for web-services communications. During operation, the system receives a Web...
US20070150740 Method for providing information security for wireless transmissions  
A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identify of the pager and attaches a certificate to the...
US20050137898 Replacing blinded authentication authority  
A manufacturing entity providing a blinded signature to a secure device, associating a time with the blinded signature, and if a signing key is compromised, providing a time of the compromise to a...
US20060095778 Analog and digital indicia authentication  
An authentication-enabled indicium contains authentication information in a digital recording medium. The information may be a digital signature that verifies the manufacturer's data and/or an...
US20080301458 Power Analysis Attack Countermeasure for the ECDSA  
Execution of the Elliptic Curve Digital Signature Algorithm (ECDSA) requires determination of a signature, which determination involves arithmetic operations. Some of the arithmetic operations...
US20140237254 CRYPTOGRAPHIC DEVICES AND METHODS FOR GENERATING AND VERIFYING LINEARLY HOMOMORPHIC STRUCTURE-PRESERVING SIGNATURES  
Generation of linearly homomorphic structure-preserving signature σ on a vector (M1, . . . , Mn)∈n by computing, in a processor, using a signing key sk={χi, γi, δi}i=1n, signature elements (z, r,...
US20090006640 INCREMENTAL SECURE BACKUP AND RESTORE OF USER SETTINGS AND DATA  
Methods and apparatuses for performing secure incremental backup and restore operations are disclosed.
US20090031137 BLIND SIGNATURE METHOD AND ITS SYSTEM  
Signature requestor terminal device (10) codes a plurality of messages to a quantum state and transmits it to signer terminal device (20). Signer terminal device (20) issues a blind signature for...
US20060179319 Method and structure for challenge-response signatures and high-performance secure diffie-hellman protocols  
A method (and structure) of exchange between two parties interconnected by a device or network. A recipient party (verifier) chooses a secret value x for computing a value X=F1(x), where F1...
US20090327735 UNIDIRECTIONAL MULTI-USE PROXY RE-SIGNATURE PROCESS  
A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive...
US20060184798 Post-signing modification of software  
A technique for making post-signing modifications to a digitally-signed software application without invalidating the signature can be used to enhance a user experience when downloading the...
US20070124584 Proving ownership of shared information to a third party  
Establishing proof of authorized receipt of information between two recipients involves a sender developing an asymmetric key pair and sending one key to each of the two recipients. A first...
US20060156013 DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM  
Facilitating communication using a digital signature includes: communicating software to a first party; receiving from the first party a public key of a public-private key pair generated using the...
US20100100745 METHOD OF COMMUNICATING A DIGITAL SIGNATURE TO CERTIFY A TRANSMISSION, ASSOCIATED SYSTEM AND AIRCRAFT  
This invention relates to a communication method intended to ensure the receipt of digital data by at least one remote entity, and an associated system, in particular in the context of data...
US20080301459 Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm  
Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a...
US20100042845 IC TAG SYSTEM  
An IC tag system is provided which can perform transfer of a method of accessing an IC tag and assure data validity of the IC tag only between authorized users. The IC tag system comprises a data...
US20080005573 Credentials for blinded intended audiences  
Techniques for creating and using credentials for blinded intended audiences are provided. A principal desires access to a target service. An identity associated with the target service is hidden...
US20080072055 Digital signature scheme based on the division algorithm and the discrete logarithm problem  
A method of creating a secure digital signature, including one or more of the following: a sender, based on a private key K and message x, calculates a unique pair of integers q and r such that...
US20080046310 Method and System for Generating a List Signature  
The invention relates to a method for generating a list signature for a message to be signed, said method comprising steps which are carried out by an electronic material support of a member of a...
US20110126022 METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT  
A process for the generation of an advanced electronic signature of an electronic document (4) using a signature creation unit (1) comprises the generation of unambiguous user identification data...
US20050262355 Method of providing a signing key for digitally signing verifying or encrypting data and mobile terminal  
The present invention relates to a method of providing a key, in particular for digitally signing, verifying or encrypting data to be exchanged between a first party and a second party, comprising...
US20070283158 System and method for generating a forensic file  
A file having a data structure is provided which includes copied information, a first hash value, and a second hash value. The file can be generated by copying original information from an...
US20100122093 METHOD, APPARATUS AND SYSTEM FOR VERIFYING AUTHENTICITY OF AN OBJECT  
The invention relates to a method for proving authenticity of a prover PRV to a verifier VER, the method comprising generating a secret S using a physical token by the prover PRV. Obtaining a...
US20100174910 Public Key Encryption with Digital Signature Scheme  
An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process....
US20150052364 Increasing Security in Inter-Chip Communication  
An apparatus for increasing security in inter-chip communication includes a sending control module, a communication bus, and a receiving control module. The communication bus is coupled between...
US20090024852 GROUP SIGNATURE SYSTEM, METHOD, DEVICE, AND PROGRAM  
A signature device 2 creates encrypted data by encrypting a first element of a member certificate through use of a first random number and public information disclosed by said group management...
US20100223473 SYSTEMS AND METHODS FOR NETWORK MANAGEMENT USING SECURE MESH COMMAND AND CONTROL FRAMEWORK  
Embodiments relate to systems and methods for network management using a secure mesh command and control framework. A network management server can communicate with a set of supervisory hosts,...
US20100023777 SYSTEM AND METHOD FOR SECURE FIRMWARE UPDATE OF A SECURE TOKEN HAVING A FLASH MEMORY CONTROLLER AND A SMART CARD  
A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device....
US20110083016 Secure User Authentication Using Biometric Information  
An apparatus includes a biometric sensor capable of identifying biometric information associated with a user. A storage device coupled to the biometric sensor stores user information. A biometric...
US20090119512 System and method for providing secured electronic transactions  
Methods and systems are provided for a secured electronic communication in a network that includes a verification station, a registration station, and a authentication station. At the registration...

Matches 1 - 50 out of 111 1 2 3 >