Patents Examined by William R. Korzuch
-
Patent number: 7747869Abstract: Method of detecting an unauthorized exchange of components in the case of a technical system, where the control unit (1) sends an encoded message (3) to a component (2) to be checked, in a data field of the message (3) a randomly generated or not easily reproducible value (5, 6) being entered, which is used for checking the installed component (2). The component (2) accesses an assignment field (8) and, as a result, assigns an identification (9) to each not easily reproducible or random value (5, 6) transmitted together with the message (3), and the component (2) transmits the identification corresponding to the value (5, 6) back to the control unit (1). The control unit (1) decides on the basis of the identification (9) whether the component (2) is that the component (2) which is authorized for use in the particular technical system.Type: GrantFiled: November 5, 2004Date of Patent: June 29, 2010Assignee: Daimler AGInventors: Michael-Rainer Busch, Andreas Miksch
-
Patent number: 7742605Abstract: A system and method for establishing secure communications between two entities, such as a server and a client, may involve the use of an intermediate gateway. Each party may establish a secure communication link with the gateway, and the gateway may provide signed certificates to each party, each certificate identifying the gateway as the other party for purposes of the communication. The gateway may then facilitate the secure communications between the two parties, and may perform data translation on the communications. The identification information may be contained within the certificates used by the gateway.Type: GrantFiled: August 6, 2001Date of Patent: June 22, 2010Assignee: Nokia CorporationInventor: Zoltan Hornak
-
Patent number: 7743405Abstract: A method of authentication via a secure wireless communication system; the method comprising sensing that a mobile device has come within range of a secure network; initiating a program within the mobile device offering the user a plurality of authentication options; processing the chosen authentication option and providing requested user data to a service provider for the secure network, only if the chosen authentication option within the mobile device permits provision of the requested user data.Type: GrantFiled: October 26, 2004Date of Patent: June 22, 2010Assignee: Siemens AktiengesellschaftInventors: Robert Hancock, Eleanor Hepworth, Stephen McCann
-
Patent number: 7743426Abstract: There is provided an information processing method/apparatus for demultiplexing object streams from a datastream which includes a plurality of object streams each having predetermined information, and decoding, synthesizing, and outputting the object streams, wherein the object streams are authenticated, and whether or not the playback control of a predetermined object stream is done before or after decoding of the predetermined object stream is determined in accordance with the method and result of authentication.Type: GrantFiled: June 14, 2005Date of Patent: June 22, 2010Assignee: Canon Kabushiki KaishaInventor: Toshiyuki Nakagawa
-
Patent number: 7743423Abstract: All execution paths of one or more assemblies in managed code are simulated to find the permissions for each execution path. The managed code can correspond to a managed shared library or a managed application. Each call in each execution path has a corresponding permissions set. When the library or application has permissions to execute that are not less than the required permission sets for the execution paths, any dynamic execution of the library or application will not trigger a security exception The simulated execution provides a tool that can be used to ensure that code being written will not exceed a maximum security permission for the code. A permission set can be determined by the tool for each assembly corresponding to an application and for each entry point corresponding to a shared library.Type: GrantFiled: February 3, 2004Date of Patent: June 22, 2010Assignee: Microsoft CorporationInventors: Sebastian Lange, Gregory D. Fee, Aaron Goldfeder, Ivan Medvedev, Michael Gashler
-
Patent number: 7739743Abstract: Provision of a technology capable of presenting information regarding derivative files secondarily derived and created from a leaked file, by retrieving the first leaked file, and capable of presenting personal information recorded on a computer accessible via a wide area network. There is provided an apparatus including a recording section for recording original data of a leaked file, an extracting section for extracting the original data and representations corresponding to information that should be prevented from being leaked and included in one or more files existing in a recording area to be investigated, an investigating section for investigating a degree of association between the file existing in the recording area to be investigated and the original data based on the extracted representations, and a presenting section for presenting information on a file created based on the leak.Type: GrantFiled: February 28, 2006Date of Patent: June 15, 2010Assignee: International Business Machines CorporationInventors: Masaharu Itoi, Hiroshi Maruyama, Hiroshi Nomiyama
-
Patent number: 7735132Abstract: A smart card, system, and method for securely authorizing a user or user device using the smart card is provided. The smart card is configured to provide, upon initialization or a request for authentication, a public key to the user input device such that the PIN or password entered by the user is encrypted before transmission to the smart card via a smart card reader. The smart card then decrypts the PIN or password to authorize the user. Preferably, the smart card is configured to provide both a public key and a nonce to the user input device, which then encrypts a concatenation or other combination of the nonce and the user-input PIN or password before transmission to the smart card. The smart card reader thus never receives a copy of the PIN or password in the clear, allowing the smart card to be used with untrusted smart card readers.Type: GrantFiled: August 4, 2005Date of Patent: June 8, 2010Assignee: Research in Motion LimitedInventors: Michael K. Brown, Neil P. Adams, Herbert A. Little
-
Patent number: 7734047Abstract: There are provided an information recording medium, an information processing apparatus, an information processing method, and a computer program, which can realize users' convenience for using content in accordance with a license and copyright protection. An information recording medium stores an encrypted content file including encrypted content, usage right information of the encrypted content, and encryption key information necessary for a decrypting process for the encrypted content. Thus, a user can acquire a license (usage right information) and key information necessary for decryption of the content, together with the content, from the information recording medium, without acquiring the license (usage rights) by connection to a license provider.Type: GrantFiled: March 5, 2004Date of Patent: June 8, 2010Assignee: Sony CorporationInventors: Tsuyoshi Nakayama, Chikako Mori, Yoshimichi Kitaya, Yoshikazu Kouno
-
Patent number: 7730184Abstract: The present invention discloses a digital rights management (DRM) system and method based on device proximity for controlling what devices can utilize DRM protected content. DRM data and DRM protected content are copied from a first device to a second device such that the DRM protected content on the first device becomes locked out and the copied DRM protected content is not locked out on the second device. The first device periodically performs a proximity check between the first and second devices such that if the first and second devices are determined to be within a short range of one another the DRM lockout of the first device is disabled.Type: GrantFiled: November 17, 2005Date of Patent: June 1, 2010Assignee: Sony Ericsson Mobile Communications ABInventor: William O. Camp, Jr.
-
Patent number: 7725715Abstract: The present invention is directed to a three-phase encryption method and a three-phase decryption method, and an apparatus implementing the three-phase encryption method and/or the three-phase decryption method. To encrypt a message according to the three-phase encryption method, a content of a message is converted from a first form M to a second form M?; the content of the message is separated according to a spacing pattern; and the content of the message is scrambled according to a scrambling pattern. To decrypt the message encrypted using the three-phase encryption method, the scrambling and spacing patterns are reversed, and the content of the message is converted from the second form M? to the first form M.Type: GrantFiled: February 24, 2005Date of Patent: May 25, 2010Assignee: Access Business Group International LLCInventors: Nima Veiseh, David W. Baarman, Thomas Jay Leppien
-
Patent number: 7721108Abstract: To check a digital signature, using a microcircuit card, the microcircuit being designed to receive and to process requests to check digital signatures, the process comprises storing in a memory in the microcircuit a certificates table containing digest forms of authorized public keys, and a phase of checking a digital signature consisting of: receiving by the microcircuit the digital signature to be checked and a public key corresponding to a private key that was used to generate the digital signature to be checked; calculating a digest form of the received public key, searching for the calculated digest form of the public key in the certificates table, and decrypting the digital signature using the received public key if the calculated digest form of the public key is located in the certificates table.Type: GrantFiled: May 21, 2003Date of Patent: May 18, 2010Assignee: France TelecomInventors: Jean-Claude Pailles, Vincent Boutroux
-
Patent number: 7716485Abstract: A method and system for authenticating a digital optical medium, such as a CD-ROM, determine whether the medium is an unauthorized copy, or the original. The original media is created, or altered, so as to contain anomalous locations from which the transfer of data is accomplished at different rates than a standard digital copy would exhibit. One implementation of the process involves timing analysis of the differences in data transfer rates. Another implementation involves the determination of digital signatures during multiple read operations performed on a data segment. The process can be employed in systems that control access to unauthorized copies, or may be used for other informative purposes.Type: GrantFiled: February 5, 2004Date of Patent: May 11, 2010Assignee: SCA IPLA Holdings Inc.Inventors: Daniel G. Howard, Jeffrey A. Pagliarulo, John R. Crowley, Andrew R. Lee, John J. Hart, III, James A. Merkle, Jr., Richard B. LeVine
-
Patent number: 7716477Abstract: Mutual authentication is performed by using first and second authentication key data between a first data processing device and a second data processing device. When the mutual authentication is succeeded, the first data processing device uses encryption key data for encrypting predetermined data and outputs the data to the second data processing device. The second data processing device decrypts the encrypted data by using decryption key data and judges whether the data is adequate or not for making the data to effective.Type: GrantFiled: September 17, 2003Date of Patent: May 11, 2010Assignee: Sony CorporationInventors: Kazuo Omori, Akira Honjo, Masahiro Sueyoshi, Naofumi Hanaki, Kei Tateno
-
Patent number: 7712129Abstract: Method and system for user authentication in a federated computing environment. The method includes a first method for recording server authentication information, including: establishing a trusting relationship between a first and second server, obtaining an authentication policy of the second server, and registering the authentication policy of the second server within the first server. The method includes a second method for registering new user authentication information of a new user, including: verifying that the new user authentication information conforms to an authentication policy of the first server, and registering the new user authentication information in the first server.Type: GrantFiled: February 14, 2005Date of Patent: May 4, 2010Assignee: International Business Machines CorporationInventor: Masahiro Takehi
-
Patent number: 7706531Abstract: An encryptor is provided for encrypting AV data sent from an interface. A controller controls recording of the encrypted AV data by controlling a recorder for recording the encrypted AV data in a magnetic disk. The recorder is controlled by the controller so as to reproduce the data recorded on the disk. A decrypter decrypts the reproduced data that is sent to the interface.Type: GrantFiled: December 26, 2000Date of Patent: April 27, 2010Assignee: Panasonic CorporationInventors: Shuichi Yoshida, Takanori Okada, Yoshiki Kuno, Jyun-ichi Komeno, Toshikazu Koudo, Ryosuke Shimizu, Noriaki Kubo
-
Patent number: 7707628Abstract: A network system has a firewall that connects an external network and an internal network. A terminal device is provided on the external network. An application server is provided on the internal network and provides data to the terminal device based on a request from the terminal device. An external server is provided on a DMZ of the firewall or on the external network, and relays communication between the terminal device and the application server based on the request from the terminal device through an internal server. The internal server is provided on the internal network, and relays communication between the external server and the application server. The internal server has an encrypting unit that encrypts the packet in such a manner that an encrypted packet is able to be decrypted only by the terminal device.Type: GrantFiled: January 24, 2005Date of Patent: April 27, 2010Assignee: Fuji Xerox Co., Ltd.Inventor: Kazuo Saito
-
Patent number: 7702898Abstract: A method for operating a first computational device to facilitate the secure transfer of a message between the first computation device and a second computational device is described. The method comprises operating the first computational device according to the following steps: forming an encrypted message from the message on the basis of a key derived from one or more codes associated with the second computational device; transmitting the encrypted message to the second computational device; purging the message and the encrypted message from the first computational device; receiving the encrypted message and said one or more codes from the second computational device; upon decrypting the message on the basis of the one or more codes transmitting the decrypted message to the second computational device.Type: GrantFiled: May 7, 2003Date of Patent: April 20, 2010Assignee: Wireless Applications Pty Ltd.Inventor: Clarence Nyap Tan
-
Patent number: 7702109Abstract: A content recording/reproducing system, which records and reproduces a sub-content relating to a main content, includes a distribution device, first and second recording media, a recording device and a reproducing device. The first recording medium that is non-rewritable prestores key data based on which a public key is derivable, and the main content. The distribution device outputs verification information that includes the sub-content and is generated by applying a digital signature to relative information relating to the sub-content based on a secret key corresponding to the public key. The recording device acquires and records the verification information on the second recording medium that is rewritable.Type: GrantFiled: March 11, 2004Date of Patent: April 20, 2010Assignee: Panasonic CorporationInventors: Yuichi Futa, Masato Yamamichi, Masami Yamamichi, legal representative, Satomi Yamamichi, legal representative, Keiko Yamamichi, legal representative, Motoji Ohmori, Masaya Yamamoto, Makoto Tatebayashi
-
Patent number: 7698571Abstract: A system includes of a main device and a recording medium device. The main device includes a reception unit that receives a digital work from an external distribution server, an internal storage area for storing the digital work, a playback unit that plays back the digital work, and a unique information storage area for storing information that is unique to the main device. The main device also includes an encryption unit that encrypts the digital work using the unique information, a decryption unit that decrypts, using the unique information, the encrypted digital work having been read from the recording medium device, a write unit that writes the encrypted digital work into the recording medium device which is portable, and a read unit that reads the encrypted digital work from the recording medium device.Type: GrantFiled: June 27, 2002Date of Patent: April 13, 2010Assignee: Panasonic CorporationInventors: Shunji Harada, Masaya Miyazaki, Shinichi Matsui, Shinji Inoue, Natsume Matsuzaki, Naohiko Noguchi
-
Patent number: 7697691Abstract: Delivering a Direct Proof private key to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored on a protected on-liner server accessible by the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system. If not, the system obtains the associated encrypted data structure from the protected on-line server using a secure protocol.Type: GrantFiled: July 14, 2004Date of Patent: April 13, 2010Assignee: Intel CorporationInventors: James A. Sutton, II, Ernie F. Brickell, Clifford D. Hall, David W. Grawrock