Match
|
Document |
Document Title |
|
US20080034114 |
System and method for managing emergency notifications over network
Systems and methods are disclosed for managing event and emergency notification over a network. A message is generated in a first interface according to an emergency data sharing standard, the... |
|
US20050039023 |
Digital signatures on a smartcard
A digital signature scheme for a “smart” card utilizes a set of prestored signing elements and combines pairs of the elements to produce a new session pair. The combination of the elements is... |
|
US20050262355 |
Method of providing a signing key for digitally signing verifying or encrypting data and mobile terminal
The present invention relates to a method of providing a key, in particular for digitally signing, verifying or encrypting data to be exchanged between a first party and a second party, comprising... |
|
US20090083413 |
Distributed frequency data collection via DNS
Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a... |
|
US20050172132 |
Secure key authentication and ladder system
Method and system for secure key authentication and key ladder are provided herein. Aspects of the method for secure key authentication may include generating a digital signature of a secure key... |
|
US20050114670 |
Server-side digital signature system
A digital signature system is provided on a server for use by remote clients, such as by using a browser. The server generates and maintains all of the users' keys used for producing a digital... |
|
US20060095778 |
Analog and digital indicia authentication
An authentication-enabled indicium contains authentication information in a digital recording medium. The information may be a digital signature that verifies the manufacturer's data and/or an... |
|
US20150074417 |
APPARATUS AND METHOD FOR ACCESS CONTROL OF CONTENT IN DISTRIBUTED ENVIRONMENT NETWORK
An apparatus for generating a key for access control of content in a distributed environment network is provided. The apparatus includes a first key distributor configured to generate first... |
|
US20070283158 |
System and method for generating a forensic file
A file having a data structure is provided which includes copied information, a first hash value, and a second hash value. The file can be generated by copying original information from an... |
|
US20080095360 |
Signature System and Signature Method
A signature system in which size of data to be transmitted is small and data can be processed efficiently in a Merkle signature system having high security. A processing part 112 of a smartcard... |
|
US20080089435 |
COMPUTER-IMPLEMENTED METHOD AND SYSTEM TO ENABLE OUT OF BAND TRACKING FOR DIGITAL DISTRIBUTION
A computer-implemented method and system to enable out of band tracking for digital distribution are disclosed. The method and system include storing an ancillary data block related to a unit of... |
|
US20120166808 |
LATTICE-BASED RING SIGNATURE METHOD
A lattice-based ring signature method includes generating a dimension, a bound, a length of a hashed message, a Gaussian parameter and an open parameter, which are parameters necessary for a ring... |
|
US20070124584 |
Proving ownership of shared information to a third party
Establishing proof of authorized receipt of information between two recipients involves a sender developing an asymmetric key pair and sending one key to each of the two recipients. A first... |
|
US20070118752 |
Authentication of control units in a vehicle
A control unit transmits an authentication request to an authentication device via the bus system. The authentication device signs the authentication request using a first symmetric key and... |
|
US20060265595 |
Cascading key encryption
A method for securely transmitting data involves generating keys depending on previous keys and additional information, such as a password, in order to create a pseudo one-time pad. The data is... |
|
US20080091941 |
Group Signature System, Member Status Judging Device, Group Signature Method And Member Status Judging Program
For group signature data capable of keeping anonymity, it is possible to efficiently determine whether the user having created the group signature data is a valid member of the group. When a... |
|
US20050210260 |
Unimodular matrix-based message authentication codes (MAC)
The present invention leverages the invertibility of determinants of unimodular matrices to provide a universal hash function means with reversible properties and high speed performance. This... |
|
US20090327735 |
UNIDIRECTIONAL MULTI-USE PROXY RE-SIGNATURE PROCESS
A “proxy re-signature system” provides various techniques for transforming a delegatee's signature on a message m into a delegator's on the same message m. Various embodiments of non-interactive... |
|
US20060089809 |
Data processing apparatus
When receiving prescribed entry data from an input device, a data entry device issues an authenticate request to a biological authentication device. Upon receipt of the authenticate request, the... |
|
US20140237254 |
CRYPTOGRAPHIC DEVICES AND METHODS FOR GENERATING AND VERIFYING LINEARLY HOMOMORPHIC STRUCTURE-PRESERVING SIGNATURES
Generation of linearly homomorphic structure-preserving signature σ on a vector (M1, . . . , Mn)∈n by computing, in a processor, using a signing key sk={χi, γi, δi}i=1n, signature elements (z, r,... |
|
US20110126022 |
METHOD FOR GENERATING AN ADVANCED ELECTRONIC SIGNATURE FOR AN ELECTRONIC DOCUMENT
A process for the generation of an advanced electronic signature of an electronic document (4) using a signature creation unit (1) comprises the generation of unambiguous user identification data... |
|
US20070028115 |
Method for guaranteeing the integrity and authenticity of flashware for control devices
The invention relates to a simplified symmetrical, cryptographic method. The basis of this method is an authentication code. This authentication code is calculated in a secured area, referred to... |
|
US20070150740 |
Method for providing information security for wireless transmissions
A wireless communication system includes a pager or similar device that communicates to a home terminal. The home terminal confirms the identify of the pager and attaches a certificate to the... |
|
US20170063550 |
Secure Digital Signature Apparatus and Methods
The invention is a secure digital signature device which generates digital signature key pairs using a hardware random number generator. It transmits public keys to one or more smart devices and... |
|
US20110302421 |
Authentication Method And Apparatus Using One Time Pads
An authentication method is provided between entities (10A; 10B) having matching one-time pads each with multiple OTP blocks. From the standpoint of a first one (10A) of the entities, the method... |
|
US20080141035 |
Limited Blind Signature System
The present invention is aimed at the proposal of a limited blind signature system which is highly safe such that its safety can be proven without the assumption of a random oracle model. A... |
|
US20060085647 |
Detecting compromised ballots
A facility for transmitting a ballot choice selected by a voter is described. The facility encrypts the ballot choice with a first secret known only to the client to generate a first encrypted... |
|
US20120137136 |
GROUP SIGNATURE SCHEME
An efficient and safe group signature scheme is provided. According to the present invention, an open unit is provided to not an issuer but an opener, and a data required for operating the open... |
|
US20090031137 |
BLIND SIGNATURE METHOD AND ITS SYSTEM
Signature requestor terminal device (10) codes a plurality of messages to a quantum state and transmits it to signer terminal device (20). Signer terminal device (20) issues a blind signature for... |
|
US20060156013 |
DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM
Facilitating communication using a digital signature includes: communicating software to a first party; receiving from the first party a public key of a public-private key pair generated using the... |
|
US20070277043 |
Methods for Generating Identification Values for Identifying Electronic Messages
In a method for generating an identification value for identifying an electronic message by application of a first hash function with fixed compression that compresses n blocks of data into a... |
|
US20090210720 |
METHOD FOR GENERATING ONE-TIME PASSWORD
A method for generating a one-time password (OTP) by using software only is provided. The method is suitable for generating a common dynamic password in a first electronic device and a second... |
|
US20090024852 |
GROUP SIGNATURE SYSTEM, METHOD, DEVICE, AND PROGRAM
A signature device 2 creates encrypted data by encrypting a first element of a member certificate through use of a first random number and public information disclosed by said group management... |
|
US20100146289 |
RADIO SCENE ENCRYPTION AND AUTHENTICATION PROCESS
A method is provided for encryption/decryption for secure the privacy of the information flow between two communicating nodes, and authentication to establish the identity of the communicating... |
|
US20080148054 |
Secure Signatures
Systems and methods for secure signatures are described. In one aspect, a secure signature is generated. The secure signature strongly binds an image of an electronic signature (an “electronic... |
|
US20080072055 |
Digital signature scheme based on the division algorithm and the discrete logarithm problem
A method of creating a secure digital signature, including one or more of the following: a sender, based on a private key K and message x, calculates a unique pair of integers q and r such that... |
|
US20090217383 |
LOW-COST SECURITY USING WELL-DEFINED MESSAGES
Well-defined messages may be transmitted from a sending device to a recipient device in order to reduce the processing and resource requirements imposed by the security semantics of general... |
|
US20100042845 |
IC TAG SYSTEM
An IC tag system is provided which can perform transfer of a method of accessing an IC tag and assure data validity of the IC tag only between authorized users. The IC tag system comprises a data... |
|
US20090094460 |
Method and system for signer self-managed, encryption-based identification and signature secret management to verify signer and to legitimize basic digital signature without the use of certificates, tokens or PKI (private key infrastructure)
Method and system for signer self-managed, encryption-based identification and signature secret management to verify the signer and to legitimize basic electronic signature without the use of... |
|
US20070174626 |
Method and apparatus for generating and validating digital signature
Provided are a method and an apparatus for generating and validating a digital signature. The apparatus for generating the digital signature includes: a converter converting a message to be... |
|
US20070192135 |
Signature feature of medical note-taking software
Medical note-taking software is used by healthcare professionals to author notes to be used by the software in generating medical documents. The present invention adds automatic signature... |