Patents Examined by William R. Korzuch
  • Patent number: 7747869
    Abstract: Method of detecting an unauthorized exchange of components in the case of a technical system, where the control unit (1) sends an encoded message (3) to a component (2) to be checked, in a data field of the message (3) a randomly generated or not easily reproducible value (5, 6) being entered, which is used for checking the installed component (2). The component (2) accesses an assignment field (8) and, as a result, assigns an identification (9) to each not easily reproducible or random value (5, 6) transmitted together with the message (3), and the component (2) transmits the identification corresponding to the value (5, 6) back to the control unit (1). The control unit (1) decides on the basis of the identification (9) whether the component (2) is that the component (2) which is authorized for use in the particular technical system.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: June 29, 2010
    Assignee: Daimler AG
    Inventors: Michael-Rainer Busch, Andreas Miksch
  • Patent number: 7742605
    Abstract: A system and method for establishing secure communications between two entities, such as a server and a client, may involve the use of an intermediate gateway. Each party may establish a secure communication link with the gateway, and the gateway may provide signed certificates to each party, each certificate identifying the gateway as the other party for purposes of the communication. The gateway may then facilitate the secure communications between the two parties, and may perform data translation on the communications. The identification information may be contained within the certificates used by the gateway.
    Type: Grant
    Filed: August 6, 2001
    Date of Patent: June 22, 2010
    Assignee: Nokia Corporation
    Inventor: Zoltan Hornak
  • Patent number: 7743405
    Abstract: A method of authentication via a secure wireless communication system; the method comprising sensing that a mobile device has come within range of a secure network; initiating a program within the mobile device offering the user a plurality of authentication options; processing the chosen authentication option and providing requested user data to a service provider for the secure network, only if the chosen authentication option within the mobile device permits provision of the requested user data.
    Type: Grant
    Filed: October 26, 2004
    Date of Patent: June 22, 2010
    Assignee: Siemens Aktiengesellschaft
    Inventors: Robert Hancock, Eleanor Hepworth, Stephen McCann
  • Patent number: 7743426
    Abstract: There is provided an information processing method/apparatus for demultiplexing object streams from a datastream which includes a plurality of object streams each having predetermined information, and decoding, synthesizing, and outputting the object streams, wherein the object streams are authenticated, and whether or not the playback control of a predetermined object stream is done before or after decoding of the predetermined object stream is determined in accordance with the method and result of authentication.
    Type: Grant
    Filed: June 14, 2005
    Date of Patent: June 22, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventor: Toshiyuki Nakagawa
  • Patent number: 7743423
    Abstract: All execution paths of one or more assemblies in managed code are simulated to find the permissions for each execution path. The managed code can correspond to a managed shared library or a managed application. Each call in each execution path has a corresponding permissions set. When the library or application has permissions to execute that are not less than the required permission sets for the execution paths, any dynamic execution of the library or application will not trigger a security exception The simulated execution provides a tool that can be used to ensure that code being written will not exceed a maximum security permission for the code. A permission set can be determined by the tool for each assembly corresponding to an application and for each entry point corresponding to a shared library.
    Type: Grant
    Filed: February 3, 2004
    Date of Patent: June 22, 2010
    Assignee: Microsoft Corporation
    Inventors: Sebastian Lange, Gregory D. Fee, Aaron Goldfeder, Ivan Medvedev, Michael Gashler
  • Patent number: 7739743
    Abstract: Provision of a technology capable of presenting information regarding derivative files secondarily derived and created from a leaked file, by retrieving the first leaked file, and capable of presenting personal information recorded on a computer accessible via a wide area network. There is provided an apparatus including a recording section for recording original data of a leaked file, an extracting section for extracting the original data and representations corresponding to information that should be prevented from being leaked and included in one or more files existing in a recording area to be investigated, an investigating section for investigating a degree of association between the file existing in the recording area to be investigated and the original data based on the extracted representations, and a presenting section for presenting information on a file created based on the leak.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: June 15, 2010
    Assignee: International Business Machines Corporation
    Inventors: Masaharu Itoi, Hiroshi Maruyama, Hiroshi Nomiyama
  • Patent number: 7735132
    Abstract: A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then encrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers.
    Type: Grant
    Filed: August 4, 2005
    Date of Patent: June 8, 2010
    Assignee: Research in Motion Limited
    Inventors: Michael K. Brown, Neil P. Adams, Herbert A. Little
  • Patent number: 7734047
    Abstract: There are provided an information recording medium, an information processing apparatus, an information processing method, and a computer program, which can realize users' convenience for using content in accordance with a license and copyright protection. An information recording medium stores an encrypted content file including encrypted content, usage right information of the encrypted content, and encryption key information necessary for a decrypting process for the encrypted content. Thus, a user can acquire a license (usage right information) and key information necessary for decryption of the content, together with the content, from the information recording medium, without acquiring the license (usage rights) by connection to a license provider.
    Type: Grant
    Filed: March 5, 2004
    Date of Patent: June 8, 2010
    Assignee: Sony Corporation
    Inventors: Tsuyoshi Nakayama, Chikako Mori, Yoshimichi Kitaya, Yoshikazu Kouno
  • Patent number: 7730184
    Abstract: The present invention discloses a digital rights management (DRM) system and method based on device proximity for controlling what devices can utilize DRM protected content. DRM data and DRM protected content are copied from a first device to a second device such that the DRM protected content on the first device becomes locked out and the copied DRM protected content is not locked out on the second device. The first device periodically performs a proximity check between the first and second devices such that if the first and second devices are determined to be within a short range of one another the DRM lockout of the first device is disabled.
    Type: Grant
    Filed: November 17, 2005
    Date of Patent: June 1, 2010
    Assignee: Sony Ericsson Mobile Communications AB
    Inventor: William O. Camp, Jr.
  • Patent number: 7725715
    Abstract: The present invention is directed to a three-phase encryption method and a three-phase decryption method, and an apparatus implementing the three-phase encryption method and/or the three-phase decryption method. To encrypt a message according to the three-phase encryption method, a content of a message is converted from a first form M to a second form M?; the content of the message is separated according to a spacing pattern; and the content of the message is scrambled according to a scrambling pattern. To decrypt the message encrypted using the three-phase encryption method, the scrambling and spacing patterns are reversed, and the content of the message is converted from the second form M? to the first form M.
    Type: Grant
    Filed: February 24, 2005
    Date of Patent: May 25, 2010
    Assignee: Access Business Group International LLC
    Inventors: Nima Veiseh, David W. Baarman, Thomas Jay Leppien
  • Patent number: 7721108
    Abstract: To check a digital signature, using a microcircuit card, the microcircuit being designed to receive and to process requests to check digital signatures, the process comprises storing in a memory in the microcircuit a certificates table containing digest forms of authorized public keys, and a phase of checking a digital signature consisting of: receiving by the microcircuit the digital signature to be checked and a public key corresponding to a private key that was used to generate the digital signature to be checked; calculating a digest form of the received public key, searching for the calculated digest form of the public key in the certificates table, and decrypting the digital signature using the received public key if the calculated digest form of the public key is located in the certificates table.
    Type: Grant
    Filed: May 21, 2003
    Date of Patent: May 18, 2010
    Assignee: France Telecom
    Inventors: Jean-Claude Pailles, Vincent Boutroux
  • Patent number: 7716485
    Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.
    Type: Grant
    Filed: February 5, 2004
    Date of Patent: May 11, 2010
    Assignee: SCA IPLA Holdings Inc.
    Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. LeVine
  • Patent number: 7716477
    Abstract: Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective.
    Type: Grant
    Filed: September 17, 2003
    Date of Patent: May 11, 2010
    Assignee: Sony Corporation
    Inventors: Kazuo Omori, Akira Honjo, Masahiro Sueyoshi, Naofumi Hanaki, Kei Tateno
  • Patent number: 7712129
    Abstract: Method and system for user authentication in a federated computing environment. The method includes a first method for recording server authentication information, including: establishing a trusting relationship between a first and second server, obtaining an authentication policy of the second server, and registering the authentication policy of the second server within the first server. The method includes a second method for registering new user authentication information of a new user, including: verifying that the new user authentication information conforms to an authentication policy of the first server, and registering the new user authentication information in the first server.
    Type: Grant
    Filed: February 14, 2005
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventor: Masahiro Takehi
  • Patent number: 7706531
    Abstract: An encryptor is provided for encrypting AV data sent from an interface. A controller controls recording of the encrypted AV data by controlling a recorder for recording the encrypted AV data in a magnetic disk. The recorder is controlled by the controller so as to reproduce the data recorded on the disk. A decrypter decrypts the reproduced data that is sent to the interface.
    Type: Grant
    Filed: December 26, 2000
    Date of Patent: April 27, 2010
    Assignee: Panasonic Corporation
    Inventors: Shuichi Yoshida, Takanori Okada, Yoshiki Kuno, Jyun-ichi Komeno, Toshikazu Koudo, Ryosuke Shimizu, Noriaki Kubo
  • Patent number: 7707628
    Abstract: A network system has a firewall that connects an external network and an internal network. A terminal device is provided on the external network. An application server is provided on the internal network and provides data to the terminal device based on a request from the terminal device. An external server is provided on a DMZ of the firewall or on the external network, and relays communication between the terminal device and the application server based on the request from the terminal device through an internal server. The internal server is provided on the internal network, and relays communication between the external server and the application server. The internal server has an encrypting unit that encrypts the packet in such a manner that an encrypted packet is able to be decrypted only by the terminal device.
    Type: Grant
    Filed: January 24, 2005
    Date of Patent: April 27, 2010
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Kazuo Saito
  • Patent number: 7702898
    Abstract: A method for operating a first computational device to facilitate the secure transfer of a message between the first computation device and a second computational device is described. The method comprises operating the first computational device according to the following steps: forming an encrypted message from the message on the basis of a key derived from one or more codes associated with the second computational device; transmitting the encrypted message to the second computational device; purging the message and the encrypted message from the first computational device; receiving the encrypted message and said one or more codes from the second computational device; upon decrypting the message on the basis of the one or more codes transmitting the decrypted message to the second computational device.
    Type: Grant
    Filed: May 7, 2003
    Date of Patent: April 20, 2010
    Assignee: Wireless Applications Pty Ltd.
    Inventor: Clarence Nyap Tan
  • Patent number: 7702109
    Abstract: A content recording/reproducing system, which records and reproduces a sub-content relating to a main content, includes a distribution device, first and second recording media, a recording device and a reproducing device. The first recording medium that is non-rewritable prestores key data based on which a public key is derivable, and the main content. The distribution device outputs verification information that includes the sub-content and is generated by applying a digital signature to relative information relating to the sub-content based on a secret key corresponding to the public key. The recording device acquires and records the verification information on the second recording medium that is rewritable.
    Type: Grant
    Filed: March 11, 2004
    Date of Patent: April 20, 2010
    Assignee: Panasonic Corporation
    Inventors: Yuichi Futa, Masato Yamamichi, Masami Yamamichi, legal representative, Satomi Yamamichi, legal representative, Keiko Yamamichi, legal representative, Motoji Ohmori, Masaya Yamamoto, Makoto Tatebayashi
  • Patent number: 7698571
    Abstract: A system includes of a main device and a recording medium device. The main device includes a reception unit that receives a digital work from an external distribution server, an internal storage area for storing the digital work, a playback unit that plays back the digital work, and a unique information storage area for storing information that is unique to the main device. The main device also includes an encryption unit that encrypts the digital work using the unique information, a decryption unit that decrypts, using the unique information, the encrypted digital work having been read from the recording medium device, a write unit that writes the encrypted digital work into the recording medium device which is portable, and a read unit that reads the encrypted digital work from the recording medium device.
    Type: Grant
    Filed: June 27, 2002
    Date of Patent: April 13, 2010
    Assignee: Panasonic Corporation
    Inventors: Shunji Harada, Masaya Miyazaki, Shinichi Matsui, Shinji Inoue, Natsume Matsuzaki, Naohiko Noguchi
  • Patent number: 7697691
    Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-liner server accessible by the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the protected on-line server using a secure protocol.
    Type: Grant
    Filed: July 14, 2004
    Date of Patent: April 13, 2010
    Assignee: Intel Corporation
    Inventors: James A. Sutton, II, Ernie F. Brickell, Clifford D. Hall, David W. Grawrock