Signature Tree Patents (Class 713/177)
-
Patent number: 8285996Abstract: A database management system (1) comprises up to fifty or more workstations (2), each for a user. The environment may, for example, be a hospital and the system manages medical records in a secure manner. Each user has a private key issued by a KGC (5). A database controller (3) updates a secure database (3) with data and associated signatures generated by the user workstations (2). Thus every record of the secure database (3) has a signature to provide full traceability and non-repudiation of data edits/updates. It is important for the system (1) that the signatures are verified on a regular basis, say every hour. Such a task would be extremely processor-intensive if the database (3) is large. However this is performed by a verification processor (4) of the system (1) in a much shorter time than heretofore, t1+n(&Dgr;), where t1 is the time for one verification, n is the number of signatures, and &Dgr; is a time value which is a very small proportion of t1 (less than 1%).Type: GrantFiled: September 28, 2006Date of Patent: October 9, 2012Assignee: Dublin City UniversityInventors: Noel McCullagh, Michael Scott, Neil Costigan
-
Patent number: 8266439Abstract: One or more methods of generating a pseudonymizable document are described. A method comprises receiving a set of subdocuments and generating a first set of random values wherein each subdocument in the document corresponds to a first set random value. A second set of values is generated based on a subdocument and a corresponding value of the first set random value. A set of pseudonyms is generated wherein each subdocument in the document corresponds to at least one pseudonym of the pseudonym set. A third set of values is generated based on the second set of values and the pseudonym set and a summary value is generated based on the third set of values.Type: GrantFiled: September 12, 2007Date of Patent: September 11, 2012Assignee: Hewlett-Packard Development Company, L.P.Inventors: Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao
-
Patent number: 8261346Abstract: Described is a technique for detecting attacks on a data communications network having a plurality of addresses for assignment to data processing systems in the network. The technique involves identifying data traffic on the network originating at any assigned address and addressed to any unassigned address. Any data traffic so identified is inspected for data indicative of an attack. On detection of data indicative of an attack, an alert signal is generated.Type: GrantFiled: May 29, 2008Date of Patent: September 4, 2012Assignee: International Business Machines CorporationInventor: James F. Riordan
-
Patent number: 8261085Abstract: According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security component, the security component adapted to read and verify data within data blocks stored in a L1 instruction cache memory and to allow the execution of data block instructions in the core only upon the instructions being verified by the use of a cryptographic algorithm.Type: GrantFiled: September 26, 2011Date of Patent: September 4, 2012Assignee: Media Patents, S.L.Inventor: Álvaro Fernández Gutiérrez
-
Patent number: 8261084Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.Type: GrantFiled: January 21, 2011Date of Patent: September 4, 2012Assignee: Panasonic CorporationInventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
-
Patent number: 8255335Abstract: Disclosed are systems and methods for establishing a personal identification number (PIN). The systems and methods provide techniques to begin a remote session with a customer, prompt the customer to select a PIN to associate with a financial account card during the remote session, and receive the PIN from the customer during the remote session.Type: GrantFiled: April 11, 2007Date of Patent: August 28, 2012Assignee: United Services Automobile Association (USAA)Inventors: Ryan Ray Barth, Felicia Tavares
-
Patent number: 8225412Abstract: If the signatures of all documents in a binder document are verified when the binder document is verified, some types of documents stored in the binder document may affect the result of the verification of the binder document. When verification of a binder is performed, it is determined, for each document in the binder document, whether the document is a verification target document or not. On the basis of the result of verification of a document determined as a verification target, the result of verification of the binder document is outputted.Type: GrantFiled: May 27, 2008Date of Patent: July 17, 2012Assignee: Canon Kabushiki KaishaInventor: Ryutaro Watanabe
-
Patent number: 8200760Abstract: The various aspects of the present invention are based on four main principles: the provision, protection and validation of audit trails relating to data generated by and communicated between nodes of a network; authentication of communicating parties; enforcement of proof of receipt of data communications; and the detection of compromised user identifiers. The object of these principles being that, should a dispute arise over the substance of an authenticated e-mail or other data item, it would be possible to prove, with mathematical precision, the following features of the communication: the content of the message sent; the e-mail location to which the message was addressed; the fact that the message was despatched; the time and date of despatch; the fact that the message was received; the time and date it was received; and the fact that the content of the message had not been changed since it was sent.Type: GrantFiled: June 19, 2003Date of Patent: June 12, 2012Assignee: The Ascent Group LimitedInventor: Michael Jacobs
-
Patent number: 8200959Abstract: An authentication agent may cryptographically identify a remote endpoint that sent a media initialization message even though intermediate devices may modify certain fields in the message after a signature is inserted. The originating endpoint's agent may create the signature over some fields of the message using an enterprise network's private key. The agent may insert the signature into the message and send the message to a recipient endpoint's authentication agent. The recipient agent may verify the signature, receive a certificate including a second public key, and challenge the identity of the originating endpoint in order to confirm that identity. This challenge may request a confirmation that the originating endpoint knows the private key corresponding to the second public key and may occur while running encrypted media at the endpoints. After the originating endpoint is authenticated, the endpoints may exchange encrypted and/or unencrypted media.Type: GrantFiled: June 28, 2007Date of Patent: June 12, 2012Assignee: Cisco Technology, Inc.Inventors: Daniel G. Wing, Cullen F. Jennings
-
Patent number: 8185745Abstract: A scalable method and apparatus that detects frequent and dispersed invariants is disclosed. More particularly, the application discloses a system that can simultaneously track frequency rates and dispersion criteria of unknown invariants. In other words, the application discloses an invariant detection system implemented in hardware (and/or software) that allows detection of invariants (e.g., byte sequences) that are highly prevalent (e.g., repeating with a high frequency) and dispersed (e.g., originating from many sources and destined to many destinations).Type: GrantFiled: November 30, 2010Date of Patent: May 22, 2012Assignee: Cisco Technology, Inc.Inventors: Sumeet Singh, John David Huber, Flavio Giovanni Bonomi
-
Patent number: 8180049Abstract: Methods and systems are provided for generating and verifying signatures of digital messages communicated between signers and verifiers. Using bilinear mappings, such as Weil or Tate pairings, these methods and systems enable generation and verification of efficient multisignatures, identity-based ring signatures, hierarchical proxy signatures, and hierarchical online/offline signatures.Type: GrantFiled: February 24, 2010Date of Patent: May 15, 2012Assignee: NTT DoCoMo, Inc.Inventor: Craig B. Gentry
-
Patent number: 8176544Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: February 3, 2011Date of Patent: May 8, 2012Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 8166307Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures.Type: GrantFiled: August 31, 2010Date of Patent: April 24, 2012Assignee: McAffee, Inc.Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
-
Patent number: 8144875Abstract: A system and method comprising a computer useable medium having computer readable program code embodied therein for authenticating and encrypting and decrypting information transferred over a public network between a client application program running in a client computer and a server application program running in a server computer and a directory service application program running in a server computer. A method for secure communication by a processor with a server includes generating a message to the server by employing a one pass key generation probabilistic authentication process using a predetermined session master key and sending the message to the server. A method for secure communication between an application executable on a computer and a web server coupled to the computer includes participating by the application in an initial authentication process with the server and wrapping every GET and POST request message to the server in an SSLX-EA exchange after the initial authentication process.Type: GrantFiled: September 6, 2007Date of Patent: March 27, 2012Inventor: R. Paul McGough
-
Patent number: 8144874Abstract: A system and method comprising a computer useable medium having computer readable program code means embodied therein for authenticating and encrypting and decrypting information transferred over a public network between a client application program running in a client computer and a server application program running in a server computer and a directory service application program running in a server computer. A method for obtaining a session master key by an application from a server includes sending an open request to the server for the session master key and receiving a first reply by the application from the server with a first portion of the session master key. The first reply identifies a directory server from which a second portion of the session master key may be obtained. The application sends an open request to the directory server specified by the server in the first reply for the second portion of the session master key and receives it from the directory server.Type: GrantFiled: September 6, 2007Date of Patent: March 27, 2012Inventor: R. Paul McGough
-
Patent number: 8145899Abstract: A method for creating a digital certificate for a user issued by a reliant party, where the reliant party relies on an established cryptographic infrastructure by a registration or certificate authority is described. The registration authority, typically a large financial or credit institution, has already performed the initial overhead steps necessary for a digital authentication system using a chip card. These steps include minting and distributing the chip card, establishing that the key pair and card are given to the right person, and creating the certificate library. The reliant party leverages this cryptographic infrastructure to issue its own digital certificate and certificate chain to a user already having a chip card from the registration authority. Consequently, a user can have additional digital certificates issued to him without having his chip card modified in any way. All additional digital certificates created for a user are stored at a user-specific memory are in a remote certificate library.Type: GrantFiled: May 23, 2009Date of Patent: March 27, 2012Assignee: Visa International Service AssociationInventor: Terence V. Trench
-
Patent number: 8145909Abstract: In one example embodiment, a method is illustrated that includes parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, transmitting content information relating to the digital content to the signing entity, and receiving digitally signed content information relating to the digital content, the digitally signed content information signed by the signing entity. In another example embodiment, a method is illustrated as including parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, receiving a credential from the signing entity, the credential used to sign the digital content, and signing the digital content using the credential.Type: GrantFiled: May 16, 2007Date of Patent: March 27, 2012Assignee: Adobe Systems IncorporatedInventors: Sunil Agrawal, Andrei Sheretov, John Landwehr
-
Patent number: 8135955Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encrypter for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.Type: GrantFiled: December 1, 2010Date of Patent: March 13, 2012Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler
-
Patent number: 8122253Abstract: Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process.Type: GrantFiled: January 23, 2009Date of Patent: February 21, 2012Assignee: Microsoft CorporationInventors: Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Deuane J. Martin, Pankaj K. Singh
-
Patent number: 8122252Abstract: Embodiments of the present invention provide methods and systems for methods and apparatuses for generating digital signatures of digital contracts, such as digital health care contracts. More specifically, embodiments of the present invention provide methods and systems for generating and using cascading digital signatures to identify a digital contract, enabling the digital contract's integrity to be assured, and rendering the digital contract non-repudiative.Type: GrantFiled: February 28, 2006Date of Patent: February 21, 2012Assignee: Kryptiq CorporationInventors: Murali M. Karamchedu, Jeffrey B. Sponaugle
-
Patent number: 8117456Abstract: A method, apparatus and system to ensure the security in the information exchange and to provide list matching with higher efficiency and practicality. In a particular embodiment, each of lists to be subject to list matching is represented as a polynomial having roots equivalent to the items of the list. Then, polynomials generated for the lists to be subject to list matching are added according to a distributed secret computation. A list containing an item equivalent to a root of a polynomial resulting from the addition is created and output as the list of a common item.Type: GrantFiled: August 5, 2009Date of Patent: February 14, 2012Assignee: International Business Machines CorporationInventors: Masayuki Numao, Yuji Watanabe
-
Patent number: 8112818Abstract: A system for identifying a work represented by digital data. This system detects events in data of the content of an unknown work and measures a metric between the events. The system then compares the detected events and metrics from an unknown work with the events and metrics of a known work. If the events and metrics match, the unknown work is identified as a copy of the known work.Type: GrantFiled: October 24, 2007Date of Patent: February 7, 2012Assignee: Audible Magic CorporationInventor: Erling Wold
-
Patent number: 8098823Abstract: A method for generating a network address, called a multi-key cryptographically generated address (MCGA), enables the network address to be claimed and defended by multiple network devices. The network address can be generated by (a) obtaining a cryptographically generated identifier using public keys corresponding to the network devices, and (b) applying an address generation function to the cryptographically generated identifier. The address generation function may be a one-way coding function or cryptographic hash of the public keys from all hosts that will advertise or claim the right to use the address. A message that claims authority over the MCGA may include an encrypted digest of the message which is encrypted using the private key of the sender. Authentication of the sender may be achieved by obtaining a test digest from the message using the digest function, decrypting the encrypted digest, and comparing the decrypted digest to the test digest.Type: GrantFiled: March 16, 2006Date of Patent: January 17, 2012Assignee: NTT DoCoMo, Inc.Inventors: James Kempf, Craig B. Gentry
-
Patent number: 8099594Abstract: Embodiments of methods, apparatuses, systems and/or devices for processing a certificate are disclosed.Type: GrantFiled: October 12, 2010Date of Patent: January 17, 2012Assignee: Adobe Systems IncorporatedInventors: Andrei Sheretov, Sunil C. Agrawal
-
Patent number: 8086859Abstract: A generator uses a robust programming framework to create an electronic signature in association with a data item, wherein the electronic signature includes time stamps and/or countersignatures. The generator can create a signature object that computes a signature value of the electronic signature based on the data item. The generator also creates a signature timestamp object to obtain a timestamp of the signature value, wherein the timestamp is associated with the electronic signature. The generator can also invoke a countersignature service on the signature object to obtain a countersignature based on the signature value of the signature object, wherein the countersignature is associated with the electronic signature.Type: GrantFiled: March 2, 2006Date of Patent: December 27, 2011Assignee: Microsoft CorporationInventor: Miladin Pavlicic
-
Patent number: 8078877Abstract: A fast batch verification method and apparatus are provided. In the method of batch-verifying a plurality of exponentiations, (a) a predetermined bit value t is set to an integer equal to or greater than 1; (b) a maximum Hamming weight k is set to an integer equal to or greater than 0 and less than or equal than the predetermined bit value t; (c) n verification exponents si are randomly selected from a set of verification exponents S (n is an integer greater than 1, i is an integer such that 1?i?n), where the set of verification exponents S include elements whose bit values are less than or equal to the predetermined bit value t and to which a Hamming weight less than or equal to the maximum Hamming weight k is allocated; (d) a value of verification result is computed by a predetermined verification formula; and (e) the verification of the signatures is determined to be passed when the value of verification result satisfies a pre-determined pass condition.Type: GrantFiled: March 31, 2006Date of Patent: December 13, 2011Assignee: Seoul National University Industry FoundationInventor: Jung hee Cheon
-
Patent number: 8078875Abstract: An article identification method can comprise: determining a signature from an article based upon an intrinsic characteristic of the article; and comparing the determined signature to a stored signature. The method can also comprise splitting the determined signature into blocks of contiguous data, performing a comparison operation between each block and respective blocks of the stored signature, and comparing an attribute of a comparison result from each block comparison to an expected attribute of the block comparison to determine a compensation value for use in determining a comparison result. The method can also comprise determining a similarity result between the determined signature and the stored signature, using the compensation value to adjust the determined signature. Thus an article damaged by stretching or shrinking can be successfully identified. Also, a non-linear signature determination can be accommodated without losing identification accuracy.Type: GrantFiled: July 27, 2006Date of Patent: December 13, 2011Assignee: Ingenia Holdings LimitedInventors: Russell Paul Cowburn, James David Ralph Buchanan
-
Patent number: 8065533Abstract: A method of and device for granting access to content on a storage medium, including obtaining cryptographic data from a property, such as a wobble, of the storage medium, reading helper data from the storage medium, and granting the access based on an application of a delta-contracting function to the cryptographic data and the helper data. The delta-contracting function allows the choice of an appropriate value of the helper data, such that any value of the cryptographic data which sufficiently resembles the original primary input value leads to the same output value. Substantially different values of the cryptographic data lead to different values of the output.Type: GrantFiled: June 19, 2009Date of Patent: November 22, 2011Assignee: Intrinsic ID B.V.Inventor: Johan Paul Maria Gerard Linnartz
-
Patent number: 8051288Abstract: Architecture that facilitates validation of a data mapping of data from a data source to a data target. There is included a signature generation component that generates a source signature of all or a portion of the data source and a target signature of all or a corresponding portion of the data target, and a sampling component that obtains a sample of the source data a corresponding sample of the target data. The data signatures and data samples are compared respectively and processed with a processing component to determine the status of the validation process.Type: GrantFiled: January 23, 2009Date of Patent: November 1, 2011Assignee: Microsoft CorporationInventors: Neeraj Garg, Cale D. Carter, Kulothungan Rajasekaran, Deuane J. Martin, Pankaj K. Singh
-
Patent number: 8037312Abstract: An apparatus for digital signature authentication includes a dividing unit that divides streaming data into plural pieces of partial data in a predetermined unit; a first creating unit that creates a hash value string including plural hash values corresponding to the pieces of partial data; a second creating unit that creates a first binary tree using the hash value string; and a third creating unit that creates a digital signature of a signer using a root value of the first binary tree.Type: GrantFiled: November 15, 2007Date of Patent: October 11, 2011Assignee: Fujitsu LimitedInventors: Masahiko Takenaka, Tetsuya Izu, Takashi Yoshioka
-
Patent number: 8032759Abstract: Signatures for multiple encodings is disclosed. In some embodiments, signatures for multiple encodings includes receiving a first signature of digitally signed data included in a first document having a first document encoding; receiving a second signature of digitally signed data included in the first document having a second document encoding; receiving a third signature of digitally signed data included in a canonicalized version of the first document having a canonical encoding, in which canonicalizing the first document includes providing a different order of data within the first document based on a canonical ordering; selecting a signature from the received first signature, the received second signature, and the received third signature, in which the first signature, the second signature, and the third signature are associated with the first document to provide a digitally signed first document; and verifying the digitally signed data using the selected signature.Type: GrantFiled: June 18, 2010Date of Patent: October 4, 2011Assignee: Adobe Systems IncorporatedInventors: Oliver Goldman, Jeff Young
-
Patent number: 8028170Abstract: A method of using a mobile telephone to authenticate a print medium, the mobile telephone being configured for printing on print media predetermined as authentic. The print media has coded data in the form of a plurality of coded data portions, each coded data portion encoding a signature fragment. The mobile telephone has a printhead, a processing means, a print path extending past the printhead and a sensor adjacent the print path. The method comprising steps of using the sensor to sense the coded data provided on a surface of the substrate whilst the print medium is moving along the print path, using the processing means to interpret the plurality of coded data portions and determine the signature fragments from each of the coded data portions, determining a signature from the signature fragments, using the signature to assess the print medium authenticity, and using the printhead to print onto the print medium in the event that it is authentic.Type: GrantFiled: November 11, 2008Date of Patent: September 27, 2011Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 8024296Abstract: A method and apparatus for agent-less auditing of a server, wherein the apparatus processes data for auditing a server. One or more portions of audit information (e.g., transaction log, trace log, or both) are coupled from a target server to an information server. The one or more portions of the audit information are processed at the information server to create audit data. The audit data is stored in an audit data repository.Type: GrantFiled: June 15, 2007Date of Patent: September 20, 2011Assignee: Symantec CorporationInventors: Madhu Gopinathan, Pushkar Raj Tiwari
-
Patent number: 8020211Abstract: A system and method for providing distributed security of a network. Several device profilers are placed at different locations of a network to assess vulnerabilities from different perspectives. The device profiler identifies the hosts on the network, and characteristics such as operating system and applications running on the hosts. The device profiler traverses a vulnerability tree having nodes representative of characteristics of the hosts, each node having an associated set of potential vulnerabilities. Verification rules can verify the potential vulnerabilities. A centralized correlation server, at a centrally accessible location in the network, stores the determined vulnerabilities of the network and associates the determined vulnerabilities with attack signatures. Traffic monitors access the attack signatures and monitor network traffic for attacks against the determined vulnerabilities.Type: GrantFiled: September 1, 2009Date of Patent: September 13, 2011Assignee: nCircle Network Security, Inc.Inventors: Timothy D. Keanini, Martin A. Quiroga, Brian W. Buchanan, John S. Flowers
-
Patent number: 8020002Abstract: A method of using a mobile device to authenticate a print medium offline before completing printing onto the print medium, the mobile device including processing means, a printhead and a sensor, the print medium comprising a laminar substrate, the method comprising the steps of: using the sensor to sense coded data provided on a surface of the substrate; using the processing means: determining, from the sensed coded data: an identity of the print medium; and at least part of a signature, the signature being a digital signature of at least part of the identity; determining, using the at least part of the signature, a determined signature; generating, using the determined signature and a public key stored in the mobile device, a generated identity; comparing the identity to the generated identity; and authenticating the print medium using the results of the comparison; and in the event the authentication step is successful, using the printhead to print onto the print medium.Type: GrantFiled: September 8, 2008Date of Patent: September 13, 2011Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Publication number: 20110219237Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures.Type: ApplicationFiled: August 31, 2010Publication date: September 8, 2011Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
-
Patent number: 8015399Abstract: A communication apparatus includes an authentication part for authenticating another communication apparatus with a first digital certificate, and a certificate transmission part for transmitting a second digital certificate when the authentication part succeeds in authenticating the other communication apparatus with the first digital certificate.Type: GrantFiled: September 29, 2004Date of Patent: September 6, 2011Assignee: Ricoh Company, Ltd.Inventor: Tatsuya Imai
-
Patent number: 8015411Abstract: Techniques for protecting the security of digital representations and of analog forms made from them, including a technique for authenticating an analog form produced from the digital representation, an active watermark that contains program code that may be executed when the watermark is read, and a watermark agent that reads watermarks and sends messages with information concerning the digital representations that contain the watermarks. A watermark agent may be a permanent resident of a node in a network or of a device or it may move from one network node to another. The watermark agent executes code which examines digital representations residing in the node or device for watermarked digital representations that are of interest to the watermark agent. The watermark agent then sends messages which report the results of its examination of the digital representations. If the watermarks are active, the agent and the active watermark may cooperate.Type: GrantFiled: October 29, 2007Date of Patent: September 6, 2011Assignee: Thomson LicensingInventor: Jian Zhao
-
Patent number: 8015412Abstract: A method of authenticating an object is disclosed. Coded data portions are provided on a surface of the object. Each coded data portion encodes a position of coded data portion on the surface, an identity associated with the object and a signature fragment. The signature fragment is a fragment of a digital signature of at least part of the identity associated with the object. Next, indicating data is received from a sensing device in response to the sensing device sensing coded data portions. The indicating data is representative of the data encoded in the coded data portions sensed by the sensing device. From the indicating data the identity associate with the object, a plurality of signature fragments encoded in respective coded data portions, and the position of respective coded data portions are determined. A signature fragment identifier for respective signature fragments is determined from the respective positions.Type: GrantFiled: November 17, 2008Date of Patent: September 6, 2011Assignee: Silverbrook Research Pty LtdInventors: Paul Lapstun, Kia Silverbrook
-
Patent number: 8014524Abstract: A robust technique to prevent illicit copying of video information notwithstanding the use of image scaling. A watermark is embedded into the video signal (e.g., DVD's content or other video sources) at different scales (i.e., sizes). The watermark is maintained at each scale for a predetermined time duration that is sufficient to allow the detector circuit in a DVD-recorder, DVHS recorder, DVCR, or any other digital format recorder to detect, extract, and process information contained in the watermark. At the end of the predetermined time duration, the watermark is changed to a different scale preferably on a pseudo-random basis to ensure that each one of all the scales in a predetermined scaling range is achieved a predetermined number of times. Thereby the recorder shuts off a number of times during play of the content, each time the detector circuit senses the watermark.Type: GrantFiled: June 14, 2010Date of Patent: September 6, 2011Assignee: Rovi Solutions CorporationInventor: John O. Ryan
-
Patent number: 8006314Abstract: A system for identifying a work represented by digital data. This system detects events in data of the content of an unknown work and measures a metric between the events. The system then compares the detected events and metrics from an unknown work with the events and metrics of a known work. If the events and metrics match, the unknown work is identified as a copy of the known work.Type: GrantFiled: July 27, 2007Date of Patent: August 23, 2011Assignee: Audible Magic CorporationInventor: Erling Wold
-
Patent number: 7987365Abstract: A subscription-based computing device has hardware and a subscription enforcer implemented in the hardware. The enforcer has an accumulator that accumulates a usage value as the computing device is being used and an expiration value register that stores an expiration value. The enforcer allows the computing device to operate in a subscription mode without hindrance and with full use when the usage value is less than the stored expiration value, and allows the computing device to operate in an expiration mode with hindrance and without full use when the usage value reaches the stored expiration value to signal that the subscription for the computing device has expired.Type: GrantFiled: March 24, 2006Date of Patent: July 26, 2011Assignee: Microsoft CorporationInventors: Andrew David Birrell, Charles P. Thacker, Michael Isard
-
Patent number: 7984302Abstract: An apparatus includes a digital signature verification data embedding unit and a signing unit. The digital signature verification data embedding unit is configured to embed digital signature verification data for use in verification of a digital signature for an electronic document into the electronic document. The signing unit is configured to sign the electronic document with a digital signature whose validity can be verified using digital signature verification data embedded in the electronic document.Type: GrantFiled: May 1, 2007Date of Patent: July 19, 2011Assignee: Canon Kabushiki KaishaInventor: Yusuke Fukasawa
-
Patent number: 7979712Abstract: A method, apparatus and system to ensure the security in the information exchange and to provide list matching with higher efficiency and practicality. In a particular embodiment, each of lists to be subject to list matching is represented as a polynomial having roots equivalent to the items of the list. Then, polynomials generated for the lists to be subject to list matching are added according to a distributed secret computation. A list containing an item equivalent to a root of a polynomial resulting from the addition is created and output as the list of a common item.Type: GrantFiled: October 3, 2002Date of Patent: July 12, 2011Assignee: International Business Machines CorporationInventors: Masayuki Numao, Yuji Watanabe
-
Patent number: 7970821Abstract: The invention is directed to a method for a software provider to enable a software-acquiring entity to arrive from an existent first signed piece of code at a second signed piece of code. Both pieces of code were generated at the software provider by use of a first software archive generator under use of generation instructions. The software provider provides to the software-acquiring entity a difference code that comprises the steps necessary to arrive from the first signed piece of code at the second signed piece of code. The difference code is combinable at the software-acquiring entity with the first signed piece of code by a second software archive generator to generate the second signed piece of code. The second software archive generator is therefor to be fed with those generation instructions that were used by the first software archive generator for the generation of both pieces of code.Type: GrantFiled: June 25, 2008Date of Patent: June 28, 2011Assignee: International Business Machines CorporationInventors: Michael Baentsch, Peter Buhler, Thomas Eirich, Frank Hoering, Thomas D. Weigold
-
Patent number: 7958364Abstract: A system for digitally signing electronic documents is disclosed. The system includes a mobile device, an application server and a database, the mobile device includes a requesting module and a digest encrypting module, the application server includes an obtaining module, a digest generating module and a merging module. The requesting module is configured for sending a request for a digital signature of an electronic document to the application server; the obtaining module is configured for obtaining the electronic document from the database; the digest generating module is configured for generating a digest of the electronic document, and sending the digest to the mobile device; the digest encrypting module is configured for encrypting the digest, generating an encrypted value, and sending the encrypted value to the application server; the merging module is configured for merging the encrypted value and the electronic document. A related computer-based method is also disclosed.Type: GrantFiled: November 15, 2007Date of Patent: June 7, 2011Assignees: Hong Fu Jin Precision Industry (ShenZhen) Co., Ltd., Hon Hai Precision Industry Co., Ltd.Inventors: Chung-I Lee, Chien-Fa Yeh, Chiu-Hua Lu, Xiao-Di Fan, Guo-Ling Ou-Yang
-
Patent number: 7921295Abstract: A system for managing service mobility using an extensible Markup Language (XML) electronic signature. A mobility interface stops and stores the operation of a service being currently performed. Before the service is moved, a service serializer serializes service state information and converts it into an XML form which is attachable to an electronic signature. An XML security manager creates an XML electronic signature for the Manifest file of the Java ARchive (JAR) file of a service bundle, attaches the serialized service state information to the XML electronic signature, and records it. A service installer transmits the signed JAR file to an Open Service Gateway initiative (OSGi) framework that has requested that the service be moved.Type: GrantFiled: December 31, 2007Date of Patent: April 5, 2011Assignee: Inha-Industry Partnership InstituteInventors: Kyungsup Kwak, TaeKyung Sung, Sangkyoon Nam
-
Patent number: 7917763Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encryptor for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.Type: GrantFiled: May 10, 2007Date of Patent: March 29, 2011Assignee: Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschung E.V.Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler
-
Patent number: 7913292Abstract: A unique system and method that facilitates visually identifying authentic UI objects, bundles, or windows is provided. A detection component can detect when user-based input has activated a verification mode with respect to one or more trusted UI objects rendered on-screen. A verification component can verify at least one of a source and identity associated with one or more UI objects in order to ensure the integrity related therewith. A verification rendering engine can re-render the one or more trusted UI objects in a manner that is based at least upon whether the one or more trusted UI objects are verified, thus improving visual recognition of verified trusted UI objects over non-verified UI objects.Type: GrantFiled: October 18, 2006Date of Patent: March 22, 2011Assignee: Microsoft CorporationInventors: Gregory D. Hartrell, David J. Steeves
-
Patent number: 7913305Abstract: A malware detection system that determines whether an executable code module is malware according to behaviors exhibited while executing is presented. The malware detection system determines the type of code module and executes the code module in a behavior evaluation module for evaluating code corresponding to the code module's type. Some behaviors exhibited by the code module, while executing in the behavior evaluation module, are recorded as the code module's behavior signature. After the code module has completed its execution, the code module's behavior signature is compared against known malware behavior signatures stored in a malware behavior signature store. A determination as to whether the code module is malware is based on the results of the comparison.Type: GrantFiled: January 30, 2004Date of Patent: March 22, 2011Assignee: Microsoft CorporationInventors: Daniel M. Bodorin, Adrian M. Marinescu