Patents Examined by Matthew B. Smithers
  • Patent number: 7953981
    Abstract: Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing the sample window to provide normalized samples. According to another embodiment, a system for pre-analyzing a digital signal for encoding at least one digital watermark using a digital filter is disclosed.
    Type: Grant
    Filed: August 10, 2009
    Date of Patent: May 31, 2011
    Assignee: Wistaria Trading, Inc.
    Inventor: Scott A. Moskowitz
  • Patent number: 7949132
    Abstract: The present disclosure relates to parsing encrypted content and sending the encrypted content to appropriate stacks of components. Encrypted video content is sent to a video stack and encrypted audio content is sent to an audio stack. Components in either stack may or may not be able to decrypt the encrypted content. A common interface is provided to the components to pass encrypted content and encryption content with one another. Components not able to perform decryption pass on the encrypted content to succeeding components in the stack until a component capable of decrypting the encrypted content receives the encrypted content. Control from a hardware lawyer in a stack may be sent back through the stack using a secure link established by the common interfaces used by the components.
    Type: Grant
    Filed: June 8, 2007
    Date of Patent: May 24, 2011
    Assignee: Microsoft Corporation
    Inventors: Glenn F. Evans, Theodore C. Tanner, Jr.
  • Patent number: 7945053
    Abstract: Embodiments of the present invention provide methods and apparatus for a keying mechanism for end-to-end service control protection within wireless networks. Other embodiments may be described and claimed.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: May 17, 2011
    Assignee: Intel Corporation
    Inventors: Emily H. Qi, Jesse R. Walker, JR-Shian Tsai
  • Patent number: 7945781
    Abstract: The presently claimed invention relates generally to digital watermarking and steganographic encoding. One claim recites a method of encoding a watermark in a digital signal. The method includes generating varying key bits; and encoding the varying watermark key bits in the digital signal as a watermark with reference to at least characteristics of the digital signal. The “digital signal” may represent audio, video or imagery. Another claim recites a system for encoding a watermark in a digital signal. The system includes a processor: i) to map pseudo-random key and processing state information to effect an encode/decode map; and ii) to encode a watermark in a digital signal using the encode/decode map and characteristics of the digital signal. Of course other combinations are provided and claimed as well.
    Type: Grant
    Filed: March 30, 2000
    Date of Patent: May 17, 2011
    Assignee: Digimarc Corporation
    Inventor: Geoffrey B. Rhoads
  • Patent number: 7945955
    Abstract: A virus scanning system which scans a mobile device/mobile device for files containing viruses even if the files are not executable on the mobile device. Corrective actions such as removing the files can be performed once the viruses are detected. As a result, viruses which are not executable (as being designed for other mobile device types) can also be detected and removed from mobile devices. According to another aspect, a common interface is provided when a virus scanning program requests data from mobile devices, and the computer is provided with different remote application programming interfaces suited to retrieve the specified data from the corresponding mobile devices. As a result, the computer can be extended to integrate scanning of new device types easily. According to one more aspect, a scanning program retrieves only data portions required for continuing the scan operation.
    Type: Grant
    Filed: September 11, 2007
    Date of Patent: May 17, 2011
    Assignee: Quick Heal Technologies Private Limited
    Inventor: Sanjay Sahebrao Katkar
  • Patent number: 7941863
    Abstract: To prevent attackers from logging-in with modified passwords, backup copies of passwords are created and stored. At boot time, the stored passwords are compared to the corresponding backup copies to ensure that they have not been modified. This is done during the boot cycle before the attacker is able to login to the computer. If any passwords have been modified, they are replaced with backup copies, thereby preventing the attacker from logging-in with a modified password.
    Type: Grant
    Filed: September 27, 2007
    Date of Patent: May 10, 2011
    Assignee: Symantec Corporation
    Inventor: Mark Kevin Kennedy
  • Patent number: 7937765
    Abstract: Provided are a system and method for checking the security of a personal computer (PC). The system and method automatically check security to protect a PC from computer hacking, viruses, worms, Trojan horses, etc., and inform or cure a vulnerable point. The system and method automatically check and modify all the security check items so that a user who may not have professional computer knowledge can readily cope with a cyber attack, and describe the vulnerable point and the result of the cure to the user with ease. Therefore, the system and method can maintain a PC in its up-to-date state to prevent damage from a cyber attack, and minimize damage from a cyber threat against the main system and service.
    Type: Grant
    Filed: November 8, 2007
    Date of Patent: May 3, 2011
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Kang San Kim, Hyoung Chun Kim, Soon Jwa Hong, Eung Ki Park, Choon Sik Park
  • Patent number: 7936869
    Abstract: A method of verifying a digital signature of a first party that was generated using an elliptic curve digital signature algorithm (ECDSA) includes the steps of receiving a public key from the first party; receiving a digital signature from the first party, the digital signature being for an electronic message; identifying domain parameters of an elliptic curve used in elliptic curve cryptography, including identifying a generating point of the elliptic curve; transforming the identified generating point into a second generating point as a deterministic function of shared knowledge known to and between the first party and a second party; and verifying the received digital signature as a deterministic function of the received public key, the electronic message, and the identified domain parameters, in which the second generating point is substituted for the identified generating point.
    Type: Grant
    Filed: August 8, 2005
    Date of Patent: May 3, 2011
    Assignee: First Data Corporation
    Inventor: Curtis Linn Beeson
  • Patent number: 7936871
    Abstract: In one embodiment, cryptographic transformation of a message is performed by first performing a table initiation phase. Then an exponentiation phase is performed, wherein the exponentiation phase includes two or more parsing steps, wherein each of the parsing steps includes parsing a part of a cryptographic key into a window of size n, wherein n is a difficult to predict number.
    Type: Grant
    Filed: September 4, 2007
    Date of Patent: May 3, 2011
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Onur Aciicmez, Jean-Pierre Seifert, Xinwen Zhang
  • Patent number: 7937594
    Abstract: A digital logic circuit comprises a programmable logic device and a programmable security circuit. The programmable security circuit stores a set of authorized configuration security keys. The programmable security circuit compares the authorized configuration security keys with an incoming configuration request, and selectively enables a new configuration for the programmable logic device in response to the configuration request. In another exemplary embodiment, a programmable security circuit also stores a set of authorized operation security keys. The programmable security circuit compares the authorized operation security keys with an incoming operation request from the programmable logic device, and selectively enables an operation within the programmable logic device in response to the operation request.
    Type: Grant
    Filed: May 16, 2006
    Date of Patent: May 3, 2011
    Assignee: Infineon Technologies AG
    Inventors: Stephen L. Wasson, David K. Varn, John D. Ralston
  • Patent number: 7934104
    Abstract: Systems, methods and media for verifying the existence of a licensed software installation at the time of an update to the software are disclosed. In one embodiment, a package of files for the update is encrypted with a copy of a key file that is contained in the original installation. The encrypted package of files is stored at a remote location that is accessible by way of a website. When a user seeks to download an update, the user must provide a copy of the key file used to encrypt the data. The user-provided key file is then used to decrypt the encrypted package.
    Type: Grant
    Filed: January 25, 2006
    Date of Patent: April 26, 2011
    Assignee: International Business Machines Corporation
    Inventor: Phillip David Jones
  • Patent number: 7930548
    Abstract: To provide an image verification system which verifies whether image data has been altered. The image verification system has an image generation apparatus, a first verification apparatus, a second verification apparatus, etc. The image generation apparatus generates image data, a hash value of the image data, and first verification data for the image data. The first verification apparatus verifies whether the image data has been altered, by using the hash value and first verification data. The first verification apparatus generates second verification data (a digital signature) for the image data if the image data has not been altered. The second verification apparatus verifies whether the image data has been altered, by using the image data and second verification data.
    Type: Grant
    Filed: December 7, 2007
    Date of Patent: April 19, 2011
    Assignee: Canon Kabushiki Kaisha
    Inventor: Satoru Wakao
  • Patent number: 7929694
    Abstract: The present invention relates to a variable length private key generator. According to one embodiment, the variable length private key generator includes a permuter. The permuter is configured to generate a key stream of a desired length by permuting a plurality of shift registers. The permuter includes the plurality of shift registers, a plurality of clocking modules, and/or an output module. Each clocking module corresponds to a different one of the plurality of shift registers and is configured to generate a clocking signal based on selected bits of the corresponding shift register. The output module is configured to output the key stream based on at least one clocking signal and output of at least one of the plurality of shift registers.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: April 19, 2011
    Assignee: Alcatel-Lucent USA Inc.
    Inventor: Nabeel Ahmed
  • Patent number: 7930743
    Abstract: An information processing system includes a monitoring program starting unit and a protection target program monitoring unit. When a protection target program to be protected is started, the monitoring program starting unit starts a monitoring program that monitors the protection target program. The protection target program monitoring unit monitors the protection target program by the monitoring program.
    Type: Grant
    Filed: August 29, 2007
    Date of Patent: April 19, 2011
    Assignee: Fuji Xerox Co., Ltd.
    Inventors: Kazuo Saito, Mitsuhisa Kamei, Hiroyuki Ishima
  • Patent number: 7929691
    Abstract: Cryptographic methods are known that involve the computation of a non-degenerate bilinear mapping of first and second elements one of which comprises a secret of a first entity. For a mapping implemented as, for example, a Tate pairing, the mapping is computable by applying a predetermined function to the first and second elements and then exponentiating the result with a known exponent. Improvements in respect of computational loading, size of output, and security are enabled for the first party by arranging for the first entity to carry out only part of the mapping, a second entity being used to complete computation of the mapping. Cryptographic applications using these improvements are also disclosed.
    Type: Grant
    Filed: December 21, 2005
    Date of Patent: April 19, 2011
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Alexander Harrison, Liqun Chen, Guido Marco Bertoni, Pasqualina Fragneto, Gerardo Pelosi
  • Patent number: 7930545
    Abstract: Disclosed herein are methods and systems for encoding digital watermarks into content signals. Also disclosed are systems and methods for detecting and/or verifying digital watermarks in content signals. According to one embodiment, a system for encoding of digital watermark information includes: a window identifier for identifying a sample window in the signal; an interval calculator for determining a quantization interval of the sample window; and a sampler for normalizing the sample window to provide normalized samples. According to another embodiment, a system for pre-analyzing a digital signal for encoding at least one digital watermark using a digital filter is disclosed.
    Type: Grant
    Filed: November 15, 2006
    Date of Patent: April 19, 2011
    Assignee: Wistaria Trading, Inc.
    Inventor: Scott A. Moskowitz
  • Patent number: 7926091
    Abstract: A method and system are provided for secure over-the-air modification of vehicular options by a vehicle user. The system includes a vehicle and a secure server. The vehicle includes receiver circuitry for receiving and demodulating wireless signals and a controller coupled to the receiver. The secure server is accessible by the vehicle user and generates a vehicular option modification package for provision to the vehicle by generating option parameter modification instructions in response to user parameter modification requests from the vehicle owner and generating authentication information in response to unique server authentication information associated with the secure server.
    Type: Grant
    Filed: November 27, 2007
    Date of Patent: April 12, 2011
    Assignee: GM Global Technology Operations LLC
    Inventors: Ansaf I. Alrabady, Howard J. Carver, Salvatore G. Trupiano
  • Patent number: 7925009
    Abstract: A method and apparatus for encrypting and decrypting data. A first block cipher encrypts data to generate a first cipher output. A first double irregular columnar transposition cipher encrypts the first cipher output to generate a second cipher output. A second block cipher encrypts the second cipher output to generate a third cipher output.
    Type: Grant
    Filed: May 25, 2007
    Date of Patent: April 12, 2011
    Assignee: Red Hat, Inc.
    Inventor: James P. Schneider
  • Patent number: 7920701
    Abstract: A digital content system is disclosed. A security engine disposed in a bridge provides cryptographic services. Clear text digital data received from a central processing unit is encrypted and transferred via the bridge over unsecured data paths as cipher text.
    Type: Grant
    Filed: December 14, 2005
    Date of Patent: April 5, 2011
    Assignee: Nvidia Corporation
    Inventors: Michael Brian Cox, Henry Packard Moreton, Brian Keith Langendorf, David G. Reed
  • Patent number: 7921284
    Abstract: Even with proper access privilege, when a secured file is classified, at least security clearance (e.g. a clearance key) is needed to ensure those who have the right security clearance can ultimately access the contents in the classified secured file. According to one embodiment, referred to as a two-pronged access scheme, a security clearance key is generated and assigned in accordance with a user's security access level. A security clearance key may range from most classified to non-classified. Depending on implementation, a security clearance key with a security level may be so configured that the key can be used to access secured files classified at or lower than the security level or multiple auxiliary keys are provided when a corresponding security clearance key is being requested. The auxiliary keys are those keys generated to facilitate access to secured files classified respectively less than the corresponding security or confidentiality level.
    Type: Grant
    Filed: May 31, 2002
    Date of Patent: April 5, 2011
    Inventors: Gary Mark Kinghorn, Denis Jacques Paul Garcia