Patents Examined by David Jung
  • Patent number: 7502937
    Abstract: A variety of systems responsive to watermarked documents are detailed. In one, watermarking is employed to facilitate system access. In another, security is provided through analyzing digitally watermarked documents. In yet another, a digital watermark-based combination lock is adapted to analyze a sequence (and perhaps an orientation) of presented digitally watermarked cards.
    Type: Grant
    Filed: March 4, 2003
    Date of Patent: March 10, 2009
    Assignee: Digimarc Corporation
    Inventors: Tyler J. McKinley, Matthew M. Weaver, Tony F. Rodriguez, Ravi K. Sharma, Marc D. Miller
  • Patent number: 7487363
    Abstract: A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.
    Type: Grant
    Filed: October 18, 2001
    Date of Patent: February 3, 2009
    Assignee: Nokia Corporation
    Inventors: Jukka Alve, Peter K. Chiu, Zheng Yan, Juha Hietasarka
  • Patent number: 7454796
    Abstract: Obtaining exclusive control of a printing device by deferring printing of print data in a print queue. To obtain control, the recipient performs a process which may include authentication of the recipient. Control may be obtained either before the recipient is authenticated or after a successful authentication process. After the recipient has obtained control, print data in the print queue is temporarily deferred from being printed. The recipient may then select a print job to print, including selecting a print job from among the print jobs deferred in the print queue, or selecting a file to print over a network, including the Internet or an intranet. Further, printing device resources utilized in printing data during the period of exclusive control may be tracked and correlated to the recipient who has control.
    Type: Grant
    Filed: December 22, 2000
    Date of Patent: November 18, 2008
    Assignee: Canon Kabushiki Kaisha
    Inventors: Craig Mazzagatte, Don Hideyasu Matsubayashi, Royce E. Slick
  • Patent number: 7447673
    Abstract: A scalable enterprise computer system having the capability to provide transaction security as well as providing subscription filtering is described. As a method of transacting an event in the enterprise computer system a connection with an information broker by the publishe established after which it is determined if the event registered with the information broker. Next, a subscription corresponding to the registered event by a subscriber is accepted by the information broker, after which a platform neutral event is created that is then populated with event content which is then published to and received by the information broker.
    Type: Grant
    Filed: May 3, 2006
    Date of Patent: November 4, 2008
    Assignee: Software AG
    Inventors: Rafael Bracho, Steven M. Jankowski
  • Patent number: 7448070
    Abstract: A network fingerprinting component for a computerized system issues network identifiers (NID) for computer networks. Identity confidences may be determined for each issued network identifier with respect to current computer networks. Computer network attributes may include passive network attributes and active network attributes. Retrieving values for active network attributes involves generating network traffic. As a result passive network attributes may be available to the network fingerprinting component before active network attributes. Learned identity confidence modifiers may be applied to identity confidences determined independent of active network attributes to achieve more accurate identity confidence sooner.
    Type: Grant
    Filed: October 17, 2003
    Date of Patent: November 4, 2008
    Assignee: Microsoft Corporation
    Inventors: Warren V. Barkley, Vivek Bhanu, Sean Lyndersay, Timothy M. Moore, Yinghua Yao
  • Patent number: 7426752
    Abstract: A system, method, and computer program product to automatically eliminate the distribution information available for reconstruction from a disguised dataset. The invention flattens input numerical values into a substantially uniformly distributed dataset, then maps the uniformly distributed dataset into equivalent data in a target distribution. The invention allows the incremental encryption of new values in an encrypted database while leaving existing encrypted values unchanged. The flattening comprises (1) partitioning, (2) mapping, and (3) saving auxiliary information about the data processing, which is encrypted and not updated. The partitioning is MDL based, and includes a growth phase for dividing a space into fine partitions and a prune phase for merging some partitions together.
    Type: Grant
    Filed: January 5, 2004
    Date of Patent: September 16, 2008
    Assignee: International Business Machines Corporation
    Inventors: Rakesh Agrawal, Gerald George Kiernan, Ramakrishnan Srikant, Yirong Xu
  • Patent number: 7424614
    Abstract: A system is provided that uses identity-based encryption to support secure communications. Messages from a sender to a receiver may be encrypted using the receiver's identity and public parameters that have been generated by a private key generator associated with the receiver. The private key generator associated with the receiver generates a private key for the receiver. The encrypted message may be decrypted by the receiver using the receiver's private key. The system may have multiple private key generators, each with a separate set of public parameters. Directory services may be used to provide a sender that is associated with one private key generator with appropriate public parameters to use when encrypting messages for a receiver that is associated with a different private key generator. A certification authority may be used to sign directory entries for the directory service. A clearinghouse may be used to avoid duplicative directory entries.
    Type: Grant
    Filed: January 25, 2005
    Date of Patent: September 9, 2008
    Assignee: Voltage Security, Inc.
    Inventors: Guido Appenzeller, Matthew J. Pauker, Rishi R. Kacker
  • Patent number: 7421582
    Abstract: A method for mutual authentication in a mobile wireless communication network (100) that includes the steps of: verifying a second authenticating device (20) by a mobile node (30) based on a first authentication between the mobile node and a first authenticating device (10); and verifying the mobile node by the second authenticating device based on the first authentication, whereby the mobile node and the second authenticating device perform a second authentication.
    Type: Grant
    Filed: May 28, 2004
    Date of Patent: September 2, 2008
    Assignee: Motorola, Inc.
    Inventors: Zhi Fu, Gregory W. Cox, Aaron M. Smith
  • Patent number: 7418593
    Abstract: The present invention relates to a method and a system for performing testing in a device (1), in which at least one program (110, 112) is loaded and at least one item of mode data relating to the program is determined. Furthermore, at least one key (111) is generated for use in said program. In the method, at least two different security levels are determined for the keys to be used in the device (1). In the method, said security level determined for the key and at least one mode data relating to the program are examined, and on the basis of the examination, it is decided if said key is available for use in the mode indicated in the mode data of the program. The invention also relates to a device, a mobile communication device and a storage medium.
    Type: Grant
    Filed: February 3, 2004
    Date of Patent: August 26, 2008
    Assignee: Nokia Corporation
    Inventors: Lauri Paatero, Antti Kiiveri
  • Patent number: 7415450
    Abstract: A centralized personal data base is disclosed that is accessible through the Internet and secured by a combination of identification numbers, including a basic, a primary and a secondary number. The secure personal data base is accessible to the user by the combination of the basic and a primary number. The secure personal data base is accessible to others who have been supplied with a primary and a secondary number.
    Type: Grant
    Filed: June 25, 2001
    Date of Patent: August 19, 2008
    Assignee: International Business Machines Corporation
    Inventor: Prabhakar Gopalan
  • Patent number: 7412601
    Abstract: An illegal data use prevention system includes a registrar which issues first authentication information for a game machine reproducing data and second authentication information for a user-identifying IC card. The data is identified by the first authentication information and the second authentication information. The game machine contains the first authentication information and, for example, executes a game program in accordance with a result of determination as to whether the IC card contains the second authentication information. Thus, illegal use of data is effectively prevented.
    Type: Grant
    Filed: May 19, 2004
    Date of Patent: August 12, 2008
    Assignee: Sharp Kabushiki Kaisha
    Inventors: Yoshiki Shibata, Kunio Sensui, Kazuhiro Yamamoto
  • Patent number: 7404209
    Abstract: A content scanner for electronic documents such as email scans objects which are the target of hyperlinks within the document. If they are determined to be acceptable, a copy of the object is attached to the document and the link is replaced by one pointing to the copied object.
    Type: Grant
    Filed: August 11, 2003
    Date of Patent: July 22, 2008
    Assignee: Messagelabs Limited
    Inventor: Alexander Shipp
  • Patent number: 7401362
    Abstract: Systems and/or methods that edit an image having an operating system to alter a security setting and securely deploy the edited image to a bare computer over a network susceptible to malicious communication are described. The systems and/or methods may also enable secure deployment and/or receipt of an operating system and updates for the operating system.
    Type: Grant
    Filed: October 15, 2004
    Date of Patent: July 15, 2008
    Assignee: Microsoft Corporation
    Inventors: Martin L. Holladay, Mukesh Karki, Parthasarathy Narayanan
  • Patent number: 7398547
    Abstract: A method and apparatus are disclosed for providing High-Bandwidth Digital Content Protection during a channel change process. The method and apparatus include detection of High-Bandwidth Digital Content Protection capability on a receiver during an interface event. High-Bandwidth Digital Content Protection authentication is delayed for a predetermined time period to allow the channel change process to stabilize. The invention reduces a performance penalty associated with the channel change process.
    Type: Grant
    Filed: May 19, 2004
    Date of Patent: July 8, 2008
    Assignee: Pace plc.
    Inventor: Linden deCarmo
  • Patent number: 7398551
    Abstract: Enrolling devices with a clearinghouse server for Internet telephony and multimedia communications. Enrollment can be the process of taking a network device (such as a router, gateway, gatekeeper, etc.) and exchanging encrypted information with the clearinghouse server, so that later communications with that device can be secured. The enrollment is done with levels of security and verification that ensures the devices and clearinghouse server is legitimate.
    Type: Grant
    Filed: August 14, 2006
    Date of Patent: July 8, 2008
    Assignee: TransNexus, Inc.
    Inventors: Stephen Thomas, Rodney Scott McManus, Rick Vaughn
  • Patent number: 7391867
    Abstract: Systems and methods for graphically displaying statistical information relating to the operation of a quantum key distribution (QKD) system. The method includes exchanging quantum photons between first and second QKD stations for each combination of modulator states, collecting data on the number of quantum photon counts obtained in each of two detectors for each modulator state combination, defining a statistical region for each modulator state combination based on the collected data, and displaying the statistical regions on a graph having indicia indicating ideal locations for the statistical regions. The method also optionally includes adjusting the QKD system based on the graphically displayed information to optimize system performance.
    Type: Grant
    Filed: April 22, 2004
    Date of Patent: June 24, 2008
    Assignee: MagiQ Technologies, Inc.
    Inventor: Harry Vig
  • Patent number: 7392400
    Abstract: The present invention provides an apparatus and method for performing cryptographic operations on a plurality of input data blocks within a processor. In one embodiment, an apparatus for performing cryptographic operations is provided. The apparatus includes a cryptographic instruction and translation logic. The cryptographic instruction is received by fetch logic in a microprocessor as part of an instruction flow. The cryptographic instruction prescribes one of the cryptographic operations. The translation logic translates the cryptographic instruction into micro instructions. The micro instructions are ordered to direct the microprocessor to load a second input text block and to execute the one of the cryptographic operations on the second input text block prior to directing the microprocessor to store an output text block corresponding to a first input text block. Consequently, the output text block is stored during execution of the one of the cryptographic operations on the second input text block.
    Type: Grant
    Filed: March 15, 2004
    Date of Patent: June 24, 2008
    Assignee: Via Technologies, Inc.
    Inventors: G. Glenn Henry, Thomas A. Crispin, Terry Parks
  • Patent number: 7388957
    Abstract: Provided is an elliptic curve exponentiation apparatus that can counter the DFA when an elliptic curve exponentiation technique is used. A computation result verification unit 127 receives, as a computation result, an exponentiation-result-point (X, Y) from an elliptic curve computation unit 124. The computation result verification unit 127 computes X3+a×X+b, and computes Y2, and outputs the received exponentiation-result-point when judging that Y2=X3+a×X+b, and does not output the received exponentiation-result-point when not judging that Y2=X3+a×X+b.
    Type: Grant
    Filed: January 23, 2004
    Date of Patent: June 17, 2008
    Assignee: Matsushita Electric Industrial Co., Ltd.
    Inventors: Takatoshi Ono, Natsume Matsuzaki
  • Patent number: 7386736
    Abstract: A data processing system accepts a removable storage media, which becomes electrically engaged with a system unit within the data processing system, after which the removable storage media and the hardware security unit mutually authenticate themselves. The removable storage media stores a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair that is associated with the hardware security unit, and the hardware security unit stores a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair that is associated with the removable storage media. In response to successfully performing the mutual authentication operation between the removable storage media and the hardware security unit, the system unit is enabled to invoke cryptographic functions on the hardware security unit while the removable storage media remains engaged with the system unit.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Ching-Yun Chao
  • Patent number: 7376968
    Abstract: A system and method for facilitating BIOS integrated encryption is provided. An interface is defined between the operating system and the BIOS. The operating system employs this interface to provide BIOS code information to facilitate decryption of data that is encrypted on the system. In the pre-operating system boot phase, the BIOS employs the decryption information provided from this interface in order to decrypt the data. The decrypted information can be employed to facilitate secure rebooting of a computer system from hibernate mode and/or secure access to device(s).
    Type: Grant
    Filed: November 20, 2003
    Date of Patent: May 20, 2008
    Assignee: Microsoft Corporation
    Inventors: Andrew J. Ritz, David B. Cross, Duncan Bryce, James A. Schwartz, Jr., Jianrong Gu, Scott A. Field