Signature Tree Patents (Class 713/177)
  • Patent number: 8285996
    Abstract: A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system manages medical records in a secure manner. Each user has a private key issued by a KGC (5). A database controller (3) updates a secure database (3) with data and associated signatures generated by the user workstations (2). Thus every record of the secure database (3) has a signature to provide full traceability and non-repudiation of data edits/updates. It is important for the system (1) that the signatures are verified on a regular basis, say every hour. Such a task would be extremely processor-intensive if the database (3) is large. However this is performed by a verification processor (4) of the system (1) in a much shorter time than heretofore, t1+n(&Dgr;), where t1 is the time for one verification, n is the number of signatures, and &Dgr; is a time value which is a very small proportion of t1 (less than 1%).
    Type: Grant
    Filed: September 28, 2006
    Date of Patent: October 9, 2012
    Assignee: Dublin City University
    Inventors: Noel McCullagh, Michael Scott, Neil Costigan
  • Patent number: 8266439
    Abstract: One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: September 11, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao
  • Patent number: 8261346
    Abstract: Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.
    Type: Grant
    Filed: May 29, 2008
    Date of Patent: September 4, 2012
    Assignee: International Business Machines Corporation
    Inventor: James F. Riordan
  • Patent number: 8261085
    Abstract: According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security component, the security component adapted to read and verify data within data blocks stored in a L1 instruction cache memory and to allow the execution of data block instructions in the core only upon the instructions being verified by the use of a cryptographic algorithm.
    Type: Grant
    Filed: September 26, 2011
    Date of Patent: September 4, 2012
    Assignee: Media Patents, S.L.
    Inventor: Álvaro Fernández Gutiérrez
  • Patent number: 8261084
    Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: September 4, 2012
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
  • Patent number: 8255335
    Abstract: Disclosed are systems and methods for establishing a personal identification number (PIN). The systems and methods provide techniques to begin a remote session with a customer, prompt the customer to select a PIN to associate with a financial account card during the remote session, and receive the PIN from the customer during the remote session.
    Type: Grant
    Filed: April 11, 2007
    Date of Patent: August 28, 2012
    Assignee: United Services Automobile Association (USAA)
    Inventors: Ryan Ray Barth, Felicia Tavares
  • Patent number: 8225412
    Abstract: If the signatures of all documents in a binder document are verified when the binder document is verified, some types of documents stored in the binder document may affect the result of the verification of the binder document. When verification of a binder is performed, it is determined, for each document in the binder document, whether the document is a verification target document or not. On the basis of the result of verification of a document determined as a verification target, the result of verification of the binder document is outputted.
    Type: Grant
    Filed: May 27, 2008
    Date of Patent: July 17, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Ryutaro Watanabe
  • Patent number: 8200760
    Abstract: The various aspects of the present invention are based on four main principles: the provision, protection and validation of audit trails relating to data generated by and communicated between nodes of a network; authentication of communicating parties; enforcement of proof of receipt of data communications; and the detection of compromised user identifiers. The object of these principles being that, should a dispute arise over the substance of an authenticated e-mail or other data item, it would be possible to prove, with mathematical precision, the following features of the communication: the content of the message sent; the e-mail location to which the message was addressed; the fact that the message was despatched; the time and date of despatch; the fact that the message was received; the time and date it was received; and the fact that the content of the message had not been changed since it was sent.
    Type: Grant
    Filed: June 19, 2003
    Date of Patent: June 12, 2012
    Assignee: The Ascent Group Limited
    Inventor: Michael Jacobs
  • Patent number: 8200959
    Abstract: An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a signature is inserted. The originating endpoint's agent may create the signature over some fields of the message using an enterprise network's private key. The agent may insert the signature into the message and send the message to a recipient endpoint's authentication agent. The recipient agent may verify the signature, receive a certificate including a second public key, and challenge the identity of the originating endpoint in order to confirm that identity. This challenge may request a confirmation that the originating endpoint knows the private key corresponding to the second public key and may occur while running encrypted media at the endpoints. After the originating endpoint is authenticated, the endpoints may exchange encrypted and/or unencrypted media.
    Type: Grant
    Filed: June 28, 2007
    Date of Patent: June 12, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Daniel G. Wing, Cullen F. Jennings
  • Patent number: 8185745
    Abstract: A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations).
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: May 22, 2012
    Assignee: Cisco Technology, Inc.
    Inventors: Sumeet Singh, John David Huber, Flavio Giovanni Bonomi
  • Patent number: 8180049
    Abstract: Methods and systems are provided for generating and verifying signatures of digital messages communicated between signers and verifiers. Using bilinear mappings, such as Weil or Tate pairings, these methods and systems enable generation and verification of efficient multisignatures, identity-based ring signatures, hierarchical proxy signatures, and hierarchical online/offline signatures.
    Type: Grant
    Filed: February 24, 2010
    Date of Patent: May 15, 2012
    Assignee: NTT DoCoMo, Inc.
    Inventor: Craig B. Gentry
  • Patent number: 8176544
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: February 3, 2011
    Date of Patent: May 8, 2012
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 8166307
    Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures.
    Type: Grant
    Filed: August 31, 2010
    Date of Patent: April 24, 2012
    Assignee: McAffee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
  • Patent number: 8144875
    Abstract: A system and method comprising a computer useable medium having computer readable program code embodied therein for authenticating and encrypting and decrypting information transferred over a public network between a client application program running in a client computer and a server application program running in a server computer and a directory service application program running in a server computer. A method for secure communication by a processor with a server includes generating a message to the server by employing a one pass key generation probabilistic authentication process using a predetermined session master key and sending the message to the server. A method for secure communication between an application executable on a computer and a web server coupled to the computer includes participating by the application in an initial authentication process with the server and wrapping every GET and POST request message to the server in an SSLX-EA exchange after the initial authentication process.
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: March 27, 2012
    Inventor: R. Paul McGough
  • Patent number: 8144874
    Abstract: A system and method comprising a computer useable medium having computer readable program code means embodied therein for authenticating and encrypting and decrypting information transferred over a public network between a client application program running in a client computer and a server application program running in a server computer and a directory service application program running in a server computer. A method for obtaining a session master key by an application from a server includes sending an open request to the server for the session master key and receiving a first reply by the application from the server with a first portion of the session master key. The first reply identifies a directory server from which a second portion of the session master key may be obtained. The application sends an open request to the directory server specified by the server in the first reply for the second portion of the session master key and receives it from the directory server.
    Type: Grant
    Filed: September 6, 2007
    Date of Patent: March 27, 2012
    Inventor: R. Paul McGough
  • Patent number: 8145899
    Abstract: A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate authority is described. The registration authority, typically a large financial or credit institution, has already performed the initial overhead steps necessary for a digital authentication system using a chip card. These steps include minting and distributing the chip card, establishing that the key pair and card are given to the right person, and creating the certificate library. The reliant party leverages this cryptographic infrastructure to issue its own digital certificate and certificate chain to a user already having a chip card from the registration authority. Consequently, a user can have additional digital certificates issued to him without having his chip card modified in any way. All additional digital certificates created for a user are stored at a user-specific memory are in a remote certificate library.
    Type: Grant
    Filed: May 23, 2009
    Date of Patent: March 27, 2012
    Assignee: Visa International Service Association
    Inventor: Terence V. Trench
  • Patent number: 8145909
    Abstract: In one example embodiment, a method is illustrated that includes parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, transmitting content information relating to the digital content to the signing entity, and receiving digitally signed content information relating to the digital content, the digitally signed content information signed by the signing entity. In another example embodiment, a method is illustrated as including parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, receiving a credential from the signing entity, the credential used to sign the digital content, and signing the digital content using the credential.
    Type: Grant
    Filed: May 16, 2007
    Date of Patent: March 27, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Sunil Agrawal, Andrei Sheretov, John Landwehr
  • Patent number: 8135955
    Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encrypter for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: March 13, 2012
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler
  • Patent number: 8122253
    Abstract: Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process.
    Type: Grant
    Filed: January 23, 2009
    Date of Patent: February 21, 2012
    Assignee: Microsoft Corporation
    Inventors: Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Deuane J. Martin, Pankaj K. Singh
  • Patent number: 8122252
    Abstract: Embodiments of the present invention provide methods and systems for methods and apparatuses for generating digital signatures of digital contracts, such as digital health care contracts. More specifically, embodiments of the present invention provide methods and systems for generating and using cascading digital signatures to identify a digital contract, enabling the digital contract's integrity to be assured, and rendering the digital contract non-repudiative.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: February 21, 2012
    Assignee: Kryptiq Corporation
    Inventors: Murali M. Karamchedu, Jeffrey B. Sponaugle
  • Patent number: 8117456
    Abstract: A method, apparatus and system to ensure the security in the information exchange and to provide list matching with higher efficiency and practicality. In a particular embodiment, each of lists to be subject to list matching is represented as a polynomial having roots equivalent to the items of the list. Then, polynomials generated for the lists to be subject to list matching are added according to a distributed secret computation. A list containing an item equivalent to a root of a polynomial resulting from the addition is created and output as the list of a common item.
    Type: Grant
    Filed: August 5, 2009
    Date of Patent: February 14, 2012
    Assignee: International Business Machines Corporation
    Inventors: Masayuki Numao, Yuji Watanabe
  • Patent number: 8112818
    Abstract: A system for identifying a work represented by digital data. This system detects events in data of the content of an unknown work and measures a metric between the events. The system then compares the detected events and metrics from an unknown work with the events and metrics of a known work. If the events and metrics match, the unknown work is identified as a copy of the known work.
    Type: Grant
    Filed: October 24, 2007
    Date of Patent: February 7, 2012
    Assignee: Audible Magic Corporation
    Inventor: Erling Wold
  • Patent number: 8098823
    Abstract: A method for generating a network address, called a multi-key cryptographically generated address (MCGA), enables the network address to be claimed and defended by multiple network devices. The network address can be generated by (a) obtaining a cryptographically generated identifier using public keys corresponding to the network devices, and (b) applying an address generation function to the cryptographically generated identifier. The address generation function may be a one-way coding function or cryptographic hash of the public keys from all hosts that will advertise or claim the right to use the address. A message that claims authority over the MCGA may include an encrypted digest of the message which is encrypted using the private key of the sender. Authentication of the sender may be achieved by obtaining a test digest from the message using the digest function, decrypting the encrypted digest, and comparing the decrypted digest to the test digest.
    Type: Grant
    Filed: March 16, 2006
    Date of Patent: January 17, 2012
    Assignee: NTT DoCoMo, Inc.
    Inventors: James Kempf, Craig B. Gentry
  • Patent number: 8099594
    Abstract: Embodiments of methods, apparatuses, systems and/or devices for processing a certificate are disclosed.
    Type: Grant
    Filed: October 12, 2010
    Date of Patent: January 17, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Andrei Sheretov, Sunil C. Agrawal
  • Patent number: 8086859
    Abstract: A generator uses a robust programming framework to create an electronic signature in association with a data item, wherein the electronic signature includes time stamps and/or countersignatures. The generator can create a signature object that computes a signature value of the electronic signature based on the data item. The generator also creates a signature timestamp object to obtain a timestamp of the signature value, wherein the timestamp is associated with the electronic signature. The generator can also invoke a countersignature service on the signature object to obtain a countersignature based on the signature value of the signature object, wherein the countersignature is associated with the electronic signature.
    Type: Grant
    Filed: March 2, 2006
    Date of Patent: December 27, 2011
    Assignee: Microsoft Corporation
    Inventor: Miladin Pavlicic
  • Patent number: 8078877
    Abstract: A fast batch verification method and apparatus are provided. In the method of batch-verifying a plurality of exponentiations, (a) a predetermined bit value t is set to an integer equal to or greater than 1; (b) a maximum Hamming weight k is set to an integer equal to or greater than 0 and less than or equal than the predetermined bit value t; (c) n verification exponents si are randomly selected from a set of verification exponents S (n is an integer greater than 1, i is an integer such that 1?i?n), where the set of verification exponents S include elements whose bit values are less than or equal to the predetermined bit value t and to which a Hamming weight less than or equal to the maximum Hamming weight k is allocated; (d) a value of verification result is computed by a predetermined verification formula; and (e) the verification of the signatures is determined to be passed when the value of verification result satisfies a pre-determined pass condition.
    Type: Grant
    Filed: March 31, 2006
    Date of Patent: December 13, 2011
    Assignee: Seoul National University Industry Foundation
    Inventor: Jung hee Cheon
  • Patent number: 8078875
    Abstract: An article identification method can comprise: determining a signature from an article based upon an intrinsic characteristic of the article; and comparing the determined signature to a stored signature. The method can also comprise splitting the determined signature into blocks of contiguous data, performing a comparison operation between each block and respective blocks of the stored signature, and comparing an attribute of a comparison result from each block comparison to an expected attribute of the block comparison to determine a compensation value for use in determining a comparison result. The method can also comprise determining a similarity result between the determined signature and the stored signature, using the compensation value to adjust the determined signature. Thus an article damaged by stretching or shrinking can be successfully identified. Also, a non-linear signature determination can be accommodated without losing identification accuracy.
    Type: Grant
    Filed: July 27, 2006
    Date of Patent: December 13, 2011
    Assignee: Ingenia Holdings Limited
    Inventors: Russell Paul Cowburn, James David Ralph Buchanan
  • Patent number: 8065533
    Abstract: A method of and device for granting access to content on a storage medium, including obtaining cryptographic data from a property, such as a wobble, of the storage medium, reading helper data from the storage medium, and granting the access based on an application of a delta-contracting function to the cryptographic data and the helper data. The delta-contracting function allows the choice of an appropriate value of the helper data, such that any value of the cryptographic data which sufficiently resembles the original primary input value leads to the same output value. Substantially different values of the cryptographic data lead to different values of the output.
    Type: Grant
    Filed: June 19, 2009
    Date of Patent: November 22, 2011
    Assignee: Intrinsic ID B.V.
    Inventor: Johan Paul Maria Gerard Linnartz
  • Patent number: 8051288
    Abstract: Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process.
    Type: Grant
    Filed: January 23, 2009
    Date of Patent: November 1, 2011
    Assignee: Microsoft Corporation
    Inventors: Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Deuane J. Martin, Pankaj K. Singh
  • Patent number: 8037312
    Abstract: An apparatus for digital signature authentication includes a dividing unit that divides streaming data into plural pieces of partial data in a predetermined unit; a first creating unit that creates a hash value string including plural hash values corresponding to the pieces of partial data; a second creating unit that creates a first binary tree using the hash value string; and a third creating unit that creates a digital signature of a signer using a root value of the first binary tree.
    Type: Grant
    Filed: November 15, 2007
    Date of Patent: October 11, 2011
    Assignee: Fujitsu Limited
    Inventors: Masahiko Takenaka, Tetsuya Izu, Takashi Yoshioka
  • Patent number: 8032759
    Abstract: Signatures for multiple encodings is disclosed. In some embodiments, signatures for multiple encodings includes receiving a first signature of digitally signed data included in a first document having a first document encoding; receiving a second signature of digitally signed data included in the first document having a second document encoding; receiving a third signature of digitally signed data included in a canonicalized version of the first document having a canonical encoding, in which canonicalizing the first document includes providing a different order of data within the first document based on a canonical ordering; selecting a signature from the received first signature, the received second signature, and the received third signature, in which the first signature, the second signature, and the third signature are associated with the first document to provide a digitally signed first document; and verifying the digitally signed data using the selected signature.
    Type: Grant
    Filed: June 18, 2010
    Date of Patent: October 4, 2011
    Assignee: Adobe Systems Incorporated
    Inventors: Oliver Goldman, Jeff Young
  • Patent number: 8028170
    Abstract: A method of using a mobile telephone to authenticate a print medium, the mobile telephone being configured for printing on print media predetermined as authentic. The print media has coded data in the form of a plurality of coded data portions, each coded data portion encoding a signature fragment. The mobile telephone has a printhead, a processing means, a print path extending past the printhead and a sensor adjacent the print path. The method comprising steps of using the sensor to sense the coded data provided on a surface of the substrate whilst the print medium is moving along the print path, using the processing means to interpret the plurality of coded data portions and determine the signature fragments from each of the coded data portions, determining a signature from the signature fragments, using the signature to assess the print medium authenticity, and using the printhead to print onto the print medium in the event that it is authentic.
    Type: Grant
    Filed: November 11, 2008
    Date of Patent: September 27, 2011
    Assignee: Silverbrook Research Pty Ltd
    Inventors: Kia Silverbrook, Paul Lapstun
  • Patent number: 8024296
    Abstract: A method and apparatus for agent-less auditing of a server, wherein the apparatus processes data for auditing a server. One or more portions of audit information (e.g., transaction log, trace log, or both) are coupled from a target server to an information server. The one or more portions of the audit information are processed at the information server to create audit data. The audit data is stored in an audit data repository.
    Type: Grant
    Filed: June 15, 2007
    Date of Patent: September 20, 2011
    Assignee: Symantec Corporation
    Inventors: Madhu Gopinathan, Pushkar Raj Tiwari
  • Patent number: 8020211
    Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.
    Type: Grant
    Filed: September 1, 2009
    Date of Patent: September 13, 2011
    Assignee: nCircle Network Security, Inc.
    Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
  • Patent number: 8020002
    Abstract: A method of using a mobile device to authenticate a print medium offline before completing printing onto the print medium, the mobile device including processing means, a printhead and a sensor, the print medium comprising a laminar substrate, the method comprising the steps of: using the sensor to sense coded data provided on a surface of the substrate; using the processing means: determining, from the sensed coded data: an identity of the print medium; and at least part of a signature, the signature being a digital signature of at least part of the identity; determining, using the at least part of the signature, a determined signature; generating, using the determined signature and a public key stored in the mobile device, a generated identity; comparing the identity to the generated identity; and authenticating the print medium using the results of the comparison; and in the event the authentication step is successful, using the printhead to print onto the print medium.
    Type: Grant
    Filed: September 8, 2008
    Date of Patent: September 13, 2011
    Assignee: Silverbrook Research Pty Ltd
    Inventors: Paul Lapstun, Kia Silverbrook
  • Publication number: 20110219237
    Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures.
    Type: Application
    Filed: August 31, 2010
    Publication date: September 8, 2011
    Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
  • Patent number: 8015399
    Abstract: A communication apparatus includes an authentication part for authenticating another communication apparatus with a first digital certificate, and a certificate transmission part for transmitting a second digital certificate when the authentication part succeeds in authenticating the other communication apparatus with the first digital certificate.
    Type: Grant
    Filed: September 29, 2004
    Date of Patent: September 6, 2011
    Assignee: Ricoh Company, Ltd.
    Inventor: Tatsuya Imai
  • Patent number: 8015411
    Abstract: Techniques for protecting the security of digital representations and of analog forms made from them, including a technique for authenticating an analog form produced from the digital representation, an active watermark that contains program code that may be executed when the watermark is read, and a watermark agent that reads watermarks and sends messages with information concerning the digital representations that contain the watermarks. A watermark agent may be a permanent resident of a node in a network or of a device or it may move from one network node to another. The watermark agent executes code which examines digital representations residing in the node or device for watermarked digital representations that are of interest to the watermark agent. The watermark agent then sends messages which report the results of its examination of the digital representations. If the watermarks are active, the agent and the active watermark may cooperate.
    Type: Grant
    Filed: October 29, 2007
    Date of Patent: September 6, 2011
    Assignee: Thomson Licensing
    Inventor: Jian Zhao
  • Patent number: 8015412
    Abstract: A method of authenticating an object is disclosed. Coded data portions are provided on a surface of the object. Each coded data portion encodes a position of coded data portion on the surface, an identity associated with the object and a signature fragment. The signature fragment is a fragment of a digital signature of at least part of the identity associated with the object. Next, indicating data is received from a sensing device in response to the sensing device sensing coded data portions. The indicating data is representative of the data encoded in the coded data portions sensed by the sensing device. From the indicating data the identity associate with the object, a plurality of signature fragments encoded in respective coded data portions, and the position of respective coded data portions are determined. A signature fragment identifier for respective signature fragments is determined from the respective positions.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: September 6, 2011
    Assignee: Silverbrook Research Pty Ltd
    Inventors: Paul Lapstun, Kia Silverbrook
  • Patent number: 8014524
    Abstract: A robust technique to prevent illicit copying of video information notwithstanding the use of image scaling. A watermark is embedded into the video signal (e.g., DVD's content or other video sources) at different scales (i.e., sizes). The watermark is maintained at each scale for a predetermined time duration that is sufficient to allow the detector circuit in a DVD-recorder, DVHS recorder, DVCR, or any other digital format recorder to detect, extract, and process information contained in the watermark. At the end of the predetermined time duration, the watermark is changed to a different scale preferably on a pseudo-random basis to ensure that each one of all the scales in a predetermined scaling range is achieved a predetermined number of times. Thereby the recorder shuts off a number of times during play of the content, each time the detector circuit senses the watermark.
    Type: Grant
    Filed: June 14, 2010
    Date of Patent: September 6, 2011
    Assignee: Rovi Solutions Corporation
    Inventor: John O. Ryan
  • Patent number: 8006314
    Abstract: A system for identifying a work represented by digital data. This system detects events in data of the content of an unknown work and measures a metric between the events. The system then compares the detected events and metrics from an unknown work with the events and metrics of a known work. If the events and metrics match, the unknown work is identified as a copy of the known work.
    Type: Grant
    Filed: July 27, 2007
    Date of Patent: August 23, 2011
    Assignee: Audible Magic Corporation
    Inventor: Erling Wold
  • Patent number: 7987365
    Abstract: A subscription-based computing device has hardware and a subscription enforcer implemented in the hardware. The enforcer has an accumulator that accumulates a usage value as the computing device is being used and an expiration value register that stores an expiration value. The enforcer allows the computing device to operate in a subscription mode without hindrance and with full use when the usage value is less than the stored expiration value, and allows the computing device to operate in an expiration mode with hindrance and without full use when the usage value reaches the stored expiration value to signal that the subscription for the computing device has expired.
    Type: Grant
    Filed: March 24, 2006
    Date of Patent: July 26, 2011
    Assignee: Microsoft Corporation
    Inventors: Andrew David Birrell, Charles P. Thacker, Michael Isard
  • Patent number: 7984302
    Abstract: An apparatus includes a digital signature verification data embedding unit and a signing unit. The digital signature verification data embedding unit is configured to embed digital signature verification data for use in verification of a digital signature for an electronic document into the electronic document. The signing unit is configured to sign the electronic document with a digital signature whose validity can be verified using digital signature verification data embedded in the electronic document.
    Type: Grant
    Filed: May 1, 2007
    Date of Patent: July 19, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yusuke Fukasawa
  • Patent number: 7979712
    Abstract: A method, apparatus and system to ensure the security in the information exchange and to provide list matching with higher efficiency and practicality. In a particular embodiment, each of lists to be subject to list matching is represented as a polynomial having roots equivalent to the items of the list. Then, polynomials generated for the lists to be subject to list matching are added according to a distributed secret computation. A list containing an item equivalent to a root of a polynomial resulting from the addition is created and output as the list of a common item.
    Type: Grant
    Filed: October 3, 2002
    Date of Patent: July 12, 2011
    Assignee: International Business Machines Corporation
    Inventors: Masayuki Numao, Yuji Watanabe
  • Patent number: 7970821
    Abstract: The invention is directed to a method for a software provider to enable a software-acquiring entity to arrive from an existent first signed piece of code at a second signed piece of code. Both pieces of code were generated at the software provider by use of a first software archive generator under use of generation instructions. The software provider provides to the software-acquiring entity a difference code that comprises the steps necessary to arrive from the first signed piece of code at the second signed piece of code. The difference code is combinable at the software-acquiring entity with the first signed piece of code by a second software archive generator to generate the second signed piece of code. The second software archive generator is therefor to be fed with those generation instructions that were used by the first software archive generator for the generation of both pieces of code.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: June 28, 2011
    Assignee: International Business Machines Corporation
    Inventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thomas D. Weigold
  • Patent number: 7958364
    Abstract: A system for digitally signing electronic documents is disclosed. The system includes a mobile device, an application server and a database, the mobile device includes a requesting module and a digest encrypting module, the application server includes an obtaining module, a digest generating module and a merging module. The requesting module is configured for sending a request for a digital signature of an electronic document to the application server; the obtaining module is configured for obtaining the electronic document from the database; the digest generating module is configured for generating a digest of the electronic document, and sending the digest to the mobile device; the digest encrypting module is configured for encrypting the digest, generating an encrypted value, and sending the encrypted value to the application server; the merging module is configured for merging the encrypted value and the electronic document. A related computer-based method is also disclosed.
    Type: Grant
    Filed: November 15, 2007
    Date of Patent: June 7, 2011
    Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.
    Inventors: Chung-I Lee, Chien-Fa Yeh, Chiu-Hua Lu, Xiao-Di Fan, Guo-Ling Ou-Yang
  • Patent number: 7921295
    Abstract: A system for managing service mobility using an extensible Markup Language (XML) electronic signature. A mobility interface stops and stores the operation of a service being currently performed. Before the service is moved, a service serializer serializes service state information and converts it into an XML form which is attachable to an electronic signature. An XML security manager creates an XML electronic signature for the Manifest file of the Java ARchive (JAR) file of a service bundle, attaches the serialized service state information to the XML electronic signature, and records it. A service installer transmits the signed JAR file to an Open Service Gateway initiative (OSGi) framework that has requested that the service be moved.
    Type: Grant
    Filed: December 31, 2007
    Date of Patent: April 5, 2011
    Assignee: Inha-Industry Partnership Institute
    Inventors: Kyungsup Kwak, TaeKyung Sung, Sangkyoon Nam
  • Patent number: 7917763
    Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encryptor for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: March 29, 2011
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschung E.V.
    Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler
  • Patent number: 7913292
    Abstract: A unique system and method that facilitates visually identifying authentic UI objects, bundles, or windows is provided. A detection component can detect when user-based input has activated a verification mode with respect to one or more trusted UI objects rendered on-screen. A verification component can verify at least one of a source and identity associated with one or more UI objects in order to ensure the integrity related therewith. A verification rendering engine can re-render the one or more trusted UI objects in a manner that is based at least upon whether the one or more trusted UI objects are verified, thus improving visual recognition of verified trusted UI objects over non-verified UI objects.
    Type: Grant
    Filed: October 18, 2006
    Date of Patent: March 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Gregory D. Hartrell, David J. Steeves
  • Patent number: 7913305
    Abstract: A malware detection system that determines whether an executable code module is malware according to behaviors exhibited while executing is presented. The malware detection system determines the type of code module and executes the code module in a behavior evaluation module for evaluating code corresponding to the code module's type. Some behaviors exhibited by the code module, while executing in the behavior evaluation module, are recorded as the code module's behavior signature. After the code module has completed its execution, the code module's behavior signature is compared against known malware behavior signatures stored in a malware behavior signature store. A determination as to whether the code module is malware is based on the results of the comparison.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: March 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Daniel M. Bodorin, Adrian M. Marinescu