Patents Examined by Shaun Gregory
  • Patent number: 7933407
    Abstract: A method and apparatus for verifying the authenticity and integrity of an ordered sequence of digital video frames, without having access to the original recording, by embedding therein a respective series of digital signatures based on a secret key, or keys, and on the video content of respective frames. Signatures are camouflaged by embedding in transform coefficients of a transformed representation of the video data in parts of the frame corresponding to motion. If there is sufficient motion to contain all of the signature bits, a supplementary technique embeds in high-texture areas of a frame. A final fall-back is to embed in a pre-defined default zone. A method of predicting when supplementary embedding is needed enables the process to be applied in a single pass allowing real-time operation. Verification is done during decoding by comparing, for identity, embedded signatures with signatures calculated anew using the method employed to embed.
    Type: Grant
    Filed: April 11, 2002
    Date of Patent: April 26, 2011
    Assignee: Nice Systems Ltd.
    Inventors: Oren Keidar, Ran Bar-Sella, Igal Dvir
  • Patent number: 7891005
    Abstract: A human interaction proof may restrict access to computer systems by testing the image orientation detection capabilities of the user making the access attempt. The human interaction proof includes a challenge where a plurality of images is presented. The images in the challenge may be drawn from image databases or the Internet, and may be part of a set of images that have been screened for difficulty with respect to computers. Some of the presented images are rotated away from their proper orientations. A user presented with the challenge is asked to differentiate the rotated images from the non-rotated images. A correct response leads to a grant of access, and an incorrect answer leads to a denial of access. The images in the challenge may be further modified with regard to color, lighting, cropping, etc. before presentation; the modifications increase the difficulty of the challenge for computers.
    Type: Grant
    Filed: August 10, 2006
    Date of Patent: February 15, 2011
    Assignee: Google Inc.
    Inventors: Shumeet Baluja, Maryam Kamvar
  • Patent number: 7885406
    Abstract: Computing endomorphism rings of Abelian surfaces over finite fields is described. In one aspect, an endomorphism ring of an Abelian surface over a finite field is probabilistically computed. A genus-two curve is generated based on the probabilistically determined endomorphism ring. The genus-2 curve is used for encryption and decryption operations and a cryptosystem.
    Type: Grant
    Filed: October 10, 2006
    Date of Patent: February 8, 2011
    Assignee: Microsoft Corporation
    Inventors: Kristin E. Lauter, David Freeman
  • Patent number: 7877805
    Abstract: A method for detecting a security breach in a network comprises at one of a plurality of transceivers each having a different media access control address, receiving a signal from an access point, the signal representing one or more packets of data, determining a source media access control address for each of the packets, and alerting the access point when the source media access control address of one of the packets is the media access control address of the transceiver.
    Type: Grant
    Filed: June 13, 2007
    Date of Patent: January 25, 2011
    Assignee: Marvell International Ltd.
    Inventors: Peter Loc, Tyson Leistiko, Hedley Rainnie
  • Patent number: 7877788
    Abstract: A method and apparatus for controlling connectivity comprising a connectivity control element coupled between an interface connector and an interface circuit, and an interface controller, coupled to the connectivity control element, for authenticating a peripheral device and controlling connectivity between the interface connector and the interface circuit based upon authentication of the peripheral device.
    Type: Grant
    Filed: February 27, 2007
    Date of Patent: January 25, 2011
    Assignee: Teradici Corporation
    Inventors: Christopher Lawrence Topp, Kevin Bradley Citterelle, Ngo Bach Long, Charles Kevin Huscroft, David Victor Hobbs
  • Patent number: 7877813
    Abstract: A copy protection method and a copy protection system are disclosed. The system includes a private key verifier receiving a media certificate that includes a private key identification of a compliant playing device and searching for an actual private key corresponding to the private key identification, an intermediate key decryptor receiving an encrypted intermediate key and decrypting the intermediate key with the actual private key, a media key decryptor obtaining an original media key by decrypting the decrypted intermediate key with a media identification; and a media data decryptor receiving an encrypted media data set and decrypting the media data set with the original media key. The method and system of the present invention are applicable to all types of digital media data, and it makes no assumption of any specific media properties.
    Type: Grant
    Filed: July 26, 2007
    Date of Patent: January 25, 2011
    Assignee: LG Electronics Inc.
    Inventors: Hyung Sun Kim, Alexandre Stechkine, Byung Jin Kim, Soung Hyun Um
  • Patent number: 7870602
    Abstract: A system and method of using a controller and firewall devices. Each of the firewall devices operate in an active mode during normal operation. The method may include the steps of determining when a first and/or second redundant data packet is received from a first/second firewall device, respectively, determining a valid sequence number, and transmitting the first/second redundant data packet to a target device when a sequence number of the first/second redundant data packet matches the valid sequence number and a first/second logical condition is satisfied, respectively. The first/second logical condition is at least one of the second/first firewall device is failed, a sequence number of the second/first redundant data packet varies from the valid sequence number, and the first/second firewall device is a primary firewall device.
    Type: Grant
    Filed: September 14, 2005
    Date of Patent: January 11, 2011
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Thomas H. Adams, Michael Raftelis
  • Patent number: 7826612
    Abstract: A computer connected to a memory. The computer to execute an encryption program in the memory. The encryption program including an incremental modular multiplication portion to calculate a first product. The incremental modular multiplication portion to calculate a second product from a prefixed first product. A modular reduction portion to reduce the second product. The reduced second product is provided to a multiplication portion of the encryption program to generate encryption keys.
    Type: Grant
    Filed: June 29, 2006
    Date of Patent: November 2, 2010
    Assignee: Intel Corporation
    Inventors: Michael E. Kounavis, Arun Raghunath
  • Patent number: 7822203
    Abstract: An information processing apparatus decrypts, using meta data, encrypted data obtained by encrypting stream data including successive frames according to an encryption method in which, when the stream data is sequentially encrypted on a frame-by-frame basis, a key used for encrypting each frame is updated according to a predetermined rule. The meta data includes the plurality of keys used for encrypting the stream data and update information for identifying update timings of the keys. The apparatus includes a decrypter for acquiring the encrypted data and decrypting each frame using the key used for encrypting the frame and a meta data acquirer for acquiring the meta data and delivering one of the keys corresponding to the frame to the decrypter in accordance with the update information. The meta data acquirer includes a corrector for detecting an error in the update information and correcting the update information if an error has occurred.
    Type: Grant
    Filed: July 25, 2006
    Date of Patent: October 26, 2010
    Assignee: Sony Corporation
    Inventor: Atsumu Soda
  • Patent number: 7797738
    Abstract: Described is a system and method for receiving a data packet including a destination address and a source address, the data packet corresponding to a port number, assigning an address risk value for the data packet based on the source address and a port risk value for the data packet based on the port number. The data packet is categorized into a community based on the source address, wherein the community is predefined by a user corresponding to the destination address, the community includes a utility value. The address risk value and the port risk value are compared to the utility value to yield a benefit coefficient and the data packet is treated based on the benefit coefficient.
    Type: Grant
    Filed: December 14, 2005
    Date of Patent: September 14, 2010
    Assignee: AT&T Corp.
    Inventors: Oliver Spatscheck, Jacobus Van der Merwe
  • Patent number: 7770032
    Abstract: A method for protecting sensitive data in an entry of a log file for later audit, which includes encrypting the sensitive data in the log entry by using a random cryptographic key for each auditor authorized to access the log entry, encrypting the random cryptographic key by using an auditor's personal cryptographic key, and for each auditor not authorized to access the log entry, encrypting a fake cryptographic key having the same properties as the random cryptographic key by using an auditor's personal cryptographic key.
    Type: Grant
    Filed: April 6, 2004
    Date of Patent: August 3, 2010
    Assignee: Telecom Italia S.p.A.
    Inventors: Pasquale Andrea Nesta, Luigi Nesta, legal representative, Miranda Aurigemma, legal representative, Giovanna Patrizia Nesta, legal representative, Pier Luigi Zaccone, Paolo Dal Checco, Davide Cavagnino, Francesco Bergadano, Michele Miraglia
  • Patent number: 7739504
    Abstract: A signature generation apparatus and a signature verification apparatus which can prevent the occurrence of norm zero vector forgery attack. The signature generation apparatus (110) includes a signature generation unit (114) which generates signature data (S) for a message (m) using a private key stored in a private key storage unit (112), and converts the format of the signature data (S) so that the first sub-element of the N sub-elements in the signature data (S) indicates 0 without changing the norm of the signature data (S). The signature verification apparatus (120) includes a signature verification unit (124) which judges whether or not the first sub-element of the N sub-elements included in the signature data (S) indicates 0, and determines the signature data (S) as unauthorized data when judging that it is not 0.
    Type: Grant
    Filed: March 14, 2006
    Date of Patent: June 15, 2010
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Shingo Hasegawa, Shuji Isobe, Motoji Ohmori, Hiroki Shizuya
  • Patent number: 7730316
    Abstract: Methods and computer program products for creating sketches of a document, which are compared with sketches of other documents, in order to determine the documents' degree of similarity. A sketch is a digest of information from random locations within a document. A document is divided into a set of shingles. Each shingle is converted into a set of fingerprints. A sketch is determined based on one bit fingerprints thus created. In order to create additional sketches of the document, a new set of fingerprints are created by randomization techniques.
    Type: Grant
    Filed: September 22, 2006
    Date of Patent: June 1, 2010
    Assignee: Fatlens, Inc.
    Inventor: Jonathan Baccash
  • Patent number: 7724904
    Abstract: An authentication method and system in a communication system are provided. An MS, a BS and an AAA server acquire a first MSK by a first EAP authentication for the MS in an EAP-in-EAP scheme. After the first EAP authentication, they acquire a second MSK by a second EAP authentication for the MS in the EAP-in-EAP scheme.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: May 25, 2010
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Ji-Cheol Lee, Jun-Hyuk Song
  • Patent number: 7694147
    Abstract: A hashing method and system. The method comprises receiving by a computing system, a user password. The computing system generates a first hash for the user password. The computing system generates a second hash for a system parameter and performs an operation relating the first hash to the second hash to generate a first combination value. The computing system generates a third hash for the first combination value. The computing system receives a specific password for requesting access to the computing system. The computing system generates a fourth hash for said specific password and performs an operation relating the fourth hash to the second hash to generate a second combination value. The computing system generates a fifth hash for the second combination value. The third hash is compared to the fifth hash to determine that the third hash matches the fifth hash. Access is enabled to the computing system.
    Type: Grant
    Filed: January 3, 2006
    Date of Patent: April 6, 2010
    Assignee: International Business Machines Corporation
    Inventor: David Robert Lott
  • Patent number: 7664259
    Abstract: A method and device for using a partial public key in a cryptosystem. The cryptosystem may be based on a group, such as an elliptic curve over a finite field. The device includes a first memory for storing system parameters of the cryptosystem and a second memory for storing a portion of a public key of the cryptosystem. The device receives the complete public key, or the remainder of the public key, via communication with another device. The received portion of the public key is used to form a validated public key. A processor of the device uses the validated public key for encrypting messages and/or verifying signatures. The size of the second memory is reduced since only part of the public key is stored.
    Type: Grant
    Filed: March 9, 2006
    Date of Patent: February 16, 2010
    Assignee: Motorola, Inc.
    Inventors: Barbara Frosik, Ronald Buskey, Douglas Kuhlman