Public Key Patents (Class 380/30)
  • Patent number: 9137023
    Abstract: A computer-implemented method for signing computer applications is disclosed. The method includes generating a compiled version of a first software application, signing the first software application with a digital certificate locally to a developer of the first software application without assistance from a central certification authority, and submitting the signed first software application to an on-line application store.
    Type: Grant
    Filed: December 22, 2014
    Date of Patent: September 15, 2015
    Assignee: Google Inc.
    Inventors: Dianne K. Hackborn, David P. Bort, Joseph M. Onorato, Daniel R. Bornstein, Andrew T. McFadden, Brian J. Swetland, Richard G. Cannings
  • Patent number: 9135472
    Abstract: Processor system with a general purpose processor and a cryptographic processor dedicated to performing cryptographic operations and enforcing the security of critical security parameters. The cryptographic processor prevents exposure of critical security parameters outside the cryptographic processor itself, and instead implements a limited scripting engine, which can be used by the general purpose processor to execute operations that require the critical security parameters.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: September 15, 2015
    Assignee: Square, Inc.
    Inventors: Malcolm Ronald Smith, Kshitiz Vadera, Mark Philip Zagrodney, Kevin Ka Wai Ng, Afshin Rezayee
  • Patent number: 9116841
    Abstract: The invention relates to methods and systems for securely transferring embedded code or data to a customer, in particular to methods and systems for securely transferring embedded code, data files or program files designed for a device to a customer in order to prevent the embedded code, data files or program files from being used on unauthorized devices.
    Type: Grant
    Filed: November 28, 2012
    Date of Patent: August 25, 2015
    Assignee: Infineon Technologies AG
    Inventors: Min Wei Ang, Gerd Dirscherl, Arno Rabenstein
  • Patent number: 9118668
    Abstract: This invention provides a simple and secure PIN unblock mechanism for use with a security token. A set of one or more passphrases are stored on a remote server during personalization. Likewise, the answers to the passphrases are hashed and stored inside the security token for future comparison. A local client program provides the user input and display dialogs and ensures a secure communications channel is provided before passphrases are retrieved from the remote server. Retrieval of passphrases and an administrative unblock secret from the remote server are accomplished using a unique identifier associated with the security token, typically the token's serial number. A PIN unblock applet provides the administrative mechanism to unblock the security token upon receipt of an administrative unblock shared secret. The remote server releases the administrative unblock shared secret only after a non-forgeable confirmatory message is received from the security token that the user has been properly authenticated.
    Type: Grant
    Filed: June 20, 2013
    Date of Patent: August 25, 2015
    Assignee: Assa Abloy AB
    Inventor: Mark Herbert Priebatsch
  • Patent number: 9112705
    Abstract: [PROBLEMS] To appropriately authenticate a user, a biometric device, and an authentication timing of a client side and prevent leak or tampering of the biometric information. [MEANS FOR SOLVING PROBLEMS] A server device includes: a unit for encrypting information for requesting biometric authentication and identifying the request by using a public key of the biometric authentication device and transmitting the information; and a unit for authenticating the user according to the authentication information containing the result of the biometric authentication.
    Type: Grant
    Filed: January 30, 2007
    Date of Patent: August 18, 2015
    Assignee: NEC CORPORATION
    Inventor: Akira Monden
  • Patent number: 9111077
    Abstract: The present disclosure provides a method and a device for realizing remote login. The method includes: a terminal server responding to a login request to an internal system from an end user, and recording and saving login information of the end user for logging in to the internal system; and the terminal server judging and analyzing the way the end user logs in to the internal system according to the login information and pre-configured rule, and allowing the end user to log in to and access the internal system if the analyzed result matches the pre-configured rule. The method and device allows for implementations of the SSO authentication and user bind authentication on the aspect of the data flow in the terminal server, simplifies the process of logging in to and accessing the internal system, and improves the information security of the system.
    Type: Grant
    Filed: December 20, 2012
    Date of Patent: August 18, 2015
    Assignee: SANGFOR NETWORKS COMPANY LIMITED
    Inventors: Lijun Hou, Xing Li, Mingming Zhang
  • Patent number: 9104889
    Abstract: A first component of a cryptographic key is received from a user via a user interface of a user computing device. A second component of the cryptographic key is received via a short-range communication interface that communicatively couples the user computing device to a physically separate storage device. The cryptographic key is generated based at least on the first component and the second component. The cryptographic key is then used to encrypt and/or decrypt data.
    Type: Grant
    Filed: May 7, 2014
    Date of Patent: August 11, 2015
    Inventors: Rafiq Kiswani, Sufyan Almajali
  • Patent number: 9106644
    Abstract: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user, the full secret having been divided into at least a first factor and a second factor and the input relating to the second factor of the full secret; reconstructing in the first entity the full secret from at least the first factor and the input; and carrying out a calculation in the first entity using the reconstructed full secret and sending the results of the calculation to the second entity, wherein the results provide an input to a pairing calculation in the second entity. The second entity carries out the pairing calculation to determine whether the client is in possession of the secret. The first entity may be a client and the second entity may be a server.
    Type: Grant
    Filed: January 13, 2015
    Date of Patent: August 11, 2015
    Assignee: CERTIVOX LTD.
    Inventors: Kealan McCusker, Brian Spector, Michael Scott
  • Patent number: 9100827
    Abstract: A method for identification of a physical unit (M) storing a secret identity (SIMEI) and an open identity (IMEI) in memory in a physical unit (M); generating a first parameter (CHv) in the testing device (P); sending an identity request (IR) with the first parameter (CHv) from the testing device (P) to the physical unit (M); generating an electronic signature (SIGt) by use of a first cryptographic function (F3) from the secret identity (SIMEI) and at least the first parameter (CHv) in the physical unit (M), and sending SIGt and the open identity (IMEI) to the testing device (P); and identifying the physical unit (M) by a comparison of the electronic signature (SIGt) sent and a corresponding electronic signature (SIGv) in the generated testing device (P).
    Type: Grant
    Filed: January 22, 2014
    Date of Patent: August 4, 2015
    Assignee: IPCOM GMBH & CO. KG
    Inventor: Wael Adi
  • Patent number: 9098703
    Abstract: A system-on-chip (SOC) for semiconductor intellectual property (IP), a device including the same, and a method of operating the same are provided. The SOC includes: an interface which receives scanning data from a main module in which the SOC is mounted; and an anti-virus engine which determines whether a virus exists in the received scanning data. Accordingly, the security of a device is tightened.
    Type: Grant
    Filed: August 16, 2011
    Date of Patent: August 4, 2015
    Assignee: SAMSUNG SDS CO., LTD.
    Inventor: InSeon Yoo
  • Patent number: 9092283
    Abstract: Methods and systems for producing random numbers include a random number generator with a first port and a second port. The first port is configured to receive a first type of random data request, and the random number generator is configured to generate first random data while the first type of request is asserted on the first port. The second port is configured to receive a second type of random data request, and the random number generator is configured to generate only a specified length of second random data in response to receiving the second type of request on the second port. An embodiment of a system also includes a data structure configured to store multiple random values, which are derived from the first random data generated by the random number generator in response to the first type of random data request.
    Type: Grant
    Filed: March 30, 2012
    Date of Patent: July 28, 2015
    Assignee: Freescale Semiconductor, Inc.
    Inventors: Thomas E. Tkacik, David G. Abdoo, Matthew W. Brocker, Steven D. Millman
  • Patent number: 9088565
    Abstract: A very efficient authentication and authorization check in n:m relationships is possible with a method for checking the entitlement of a user of a telecommunication terminal (1) to a service, whereby an access device (4) on a telecommunication network (3) obtains at least one certificate and a proof of identity (10) from the telecommunication terminal (1), whereupon NMT (5) together with a certification device (7) carries out a check of whether the certificate giving the identity is valid and has a positive status and whether particular authorization may be obtained from complementary certificates. Should the above be the case, a secret (for example a session key) is transmitted (15) to the access device (4) which is also sent (15, 16) to the telecommunication terminal (1, 2), encoded with at least the public key. The access device (4) is then activated with a policy corresponding to the rights of the telecommunication user.
    Type: Grant
    Filed: November 29, 2001
    Date of Patent: July 21, 2015
    Assignee: SIEMENS AKTIENGESELLSCHAFT
    Inventors: Jorge Cuellar, Michael Marhöfer
  • Patent number: 9087219
    Abstract: A circuit capable of being operated in a first and a second mode of operation comprises a storage location adapted to store at least a first state, a second state and a third state, wherein the circuit is adapted to switch to the first mode of operation when the storage location acquires the first or the third state, and wherein the circuit is adapted to switch to the second mode of operation when the storage location acquires the second state.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: July 21, 2015
    Assignee: Infineon Technologies AG
    Inventor: Franz Klug
  • Patent number: 9083527
    Abstract: A server computer system receives mobile device activity data from a mobile device. The server computer system verifies that the mobile device activity data matches mobile device activity data that is stored at the mobile device and generates a shared secret at the server computer system using the received mobile device activity data. The shared secret at the server computer system matches a shared secret generated at the mobile device.
    Type: Grant
    Filed: August 31, 2012
    Date of Patent: July 14, 2015
    Assignee: Symantec Corporation
    Inventors: Bruce McCorkendale, Shaun P. Cooley
  • Patent number: 9083526
    Abstract: In one exemplary embodiment of the invention, a method and computer program include: receiving first and second ciphertexts having first and second data encrypted per an encryption scheme, the encryption scheme has public/secret keys and encryption, decryption, operation and refresh functions, the encryption function encrypts data, the decryption decrypts ciphertext, the operation receives ciphertexts and performs operation(s) on them, the refresh operates to prevent growth of the magnitude of noise for a ciphertext while reducing the modulus of the ciphertext without using the secret key, utilizing a modulus switching technique that involves transforming a first ciphertext c modulo q into a second ciphertext c? modulo p while preserving correctness, the technique includes scaling by p/q and rounding, p<q; using the operation function(s), performing operation(s) on them to obtain a third ciphertext; and reducing a noise level of the third ciphertext using the refresh function.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: July 14, 2015
    Assignee: International Business Machines Corporation
    Inventor: Craig B. Gentry
  • Patent number: 9077537
    Abstract: A private key is generated for use in a public key communications environment, and the private key includes a partial private key and processed biometric data. The partial private key is known to the user, but the processed biometric data is not. The processed biometric data is generated on the fly and is not provided to the user. This enables a more secure and robust private key to be created and used in encryption/decryption.
    Type: Grant
    Filed: November 13, 2008
    Date of Patent: July 7, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Jaikumar N. Kawale
  • Patent number: 9071426
    Abstract: A symmetric key to be used to secure a communication link between a first device and a second device is generated as follows: a first symmetric key is generated; a second symmetric key is generated; packets communicated between the first device and the second device over communication link are hashed to create a hash result; the first symmetric key, the second symmetric key and the hash result are hashed to generate a third symmetric key to be used to secure the communication link.
    Type: Grant
    Filed: November 29, 2013
    Date of Patent: June 30, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael Kenneth Brown, Herbert Anthony Little, Michael Stephen Brown, Neil Patrick Adams
  • Patent number: 9071408
    Abstract: A system effective to communicate a message between two devices. A first device may include a plaintext to monoid element module effective to receive a plaintext message and apply a first function to the plaintext message to produce a first monoid element. A monoid element evaluator module may be effective to receive and insert submonoid generators into a monoid expression to produce a second monoid element in response. An encryption device module may be effective to apply a second function to the first monoid element, the second monoid element, the monoid expression, and a third monoid element to produce an encrypted plaintext message. Decryption may be performed on the encrypted plaintext message knowing the private key which includes the first function, the second function, the third monoid element and the submonoid generators list.
    Type: Grant
    Filed: February 9, 2012
    Date of Patent: June 30, 2015
    Assignee: SecureRF Corporation
    Inventors: Iris Anshel, Dorian Goldfeld
  • Patent number: 9054879
    Abstract: The present invention discloses an apparatus and method for delivering a revocation list over a one-way broadcast network to receivers with limited memory capabilities. In one example, the revocation list is partitioned to form a first certificate revocation list (CRL) sequence if the number of entries in the revocation list exceeds a predetermined value. Individual identification numbers belonging to a first identification number series are subsequently assigned to partitions of the first CRL sequence. Afterwards, the first CRL sequence is interleaved into a first content transport stream.
    Type: Grant
    Filed: June 19, 2006
    Date of Patent: June 9, 2015
    Assignee: GOOGLE TECHNOLOGY HOLDINGS LLC
    Inventors: Alexander Medvinsky, Paul Moroney
  • Patent number: 9054877
    Abstract: A method for computation is described, the method including configuring a processor to expand input seed values into respective output data values using an approximated expansion process such that the output data values are not guaranteed to satisfy a required output data criterion, selecting a seed value so that an output data value generated by the processor by application of the approximated expansion process to the selected seed value will yield an output data value that satisfies the required output data criterion, and storing the selected seed value in a non-volatile memory to be accessed by the processor. Related apparatus and systems are also described.
    Type: Grant
    Filed: September 21, 2010
    Date of Patent: June 9, 2015
    Assignee: CISCO TECHNOLOGY, INC.
    Inventor: Yaacov Belenky
  • Patent number: 9049022
    Abstract: Methods, systems, and computer programs for producing hash values are disclosed. A prefix-free value is obtained based on input data. The prefix-free value can be based on an implicit certificate, a message to be signed, a message to be verified, or other suitable information. A hash value is obtained by applying a hash function to the prefix-free value. The hash value is used in a cryptographic scheme. In some instances, a public key or a private key is generated based on the hash value. In some instances, a digital signature is generated based on the hash value, or a digital signature is verified based on the hash value, as appropriate.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: June 2, 2015
    Assignee: Certicom Corp.
    Inventors: Gregory Marc Zaverucha, David William Kravitz
  • Patent number: 9047490
    Abstract: There are provided a method, a system and an initiator server for a secure execution of workflow tasks of a workflow to be executed according to a given execution pattern in a distributed workflow management system within a decentralized network system with a plurality of servers (b0, b1, . . . , bn) including at least an initiator server and at least a number of groups of servers of the plurality of servers. Each group satisfies a policy (poli) of a vertex, and thus, knows a corresponding policy key pair including a policy private key (SKpoli) and a policy public key (PKpoli), respectively. Each vertex denotes a set of workflow tasks to be executed in accord with the execution pattern and is assigned a vertex key pair including a vertex private key and a vertex public key.
    Type: Grant
    Filed: April 4, 2008
    Date of Patent: June 2, 2015
    Assignee: SAP SE
    Inventors: Frederic Montagut, Laurent Gomez, Cedric Hebert, Cedric Ulmer
  • Patent number: 9036818
    Abstract: Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user.
    Type: Grant
    Filed: May 31, 2013
    Date of Patent: May 19, 2015
    Assignees: SAMSUNG SDS CO., LTD., SNU R&DB FOUNDATION
    Inventors: Hyo Jin Yoon, Jung Hee Cheon, Jung Hoon Sohn
  • Patent number: 9031229
    Abstract: A homomorphic encryption algorithm is performed that encrypts at least a portion of a plurality of plaintext data items at a client computing device into homomorphic queries, each query including a cryptographically safe representation of one of the data items. The queries are transmitted to at least one discrete homomorphic encryption (DHE) server. An identifier is received from each query from the DHE server. The identifiers are transmitted to at least one computing server that maintains a database including data structures. The computing server is requested to requesting the computing server to insert the received identifiers into the database. At least one of the identifiers is processed: the computing server is requested to find the identifiers in the data structures that match the at least one identifiers and to perform at least one equality-based operation on the matching identifiers. A result of the at least one operation is received.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 12, 2015
    Assignee: Newline Software, Inc.
    Inventor: Marius D. Nita
  • Patent number: 9032220
    Abstract: Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created.
    Type: Grant
    Filed: February 8, 2013
    Date of Patent: May 12, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael Stephen Brown, Michael Kenneth Brown, Herbert Anthony Little
  • Patent number: 9031230
    Abstract: A reduction in the size of encryption processing configuration applying generalized Feistel structures is achieved. The encryption processing configuration applies a generalized Feistel structure for dividing and inputting data into multiple lines, and repeatedly executing data transformation processing applying a round function on the data transferred to each line, and during the execution cycle of a matrix operation by a matrix operation executing unit for executing linear transformation processing applying a matrix on the data in a first line, an operation is executed on the matrix operation processing data from the initial cycle and data in a second line. This configuration enables a register to be used for both the storage of the data for the second line and the storage of the results of the matrix operation on the first line of data in progress, a reduction in the total number of registers, and thus a reduction in size.
    Type: Grant
    Filed: October 24, 2011
    Date of Patent: May 12, 2015
    Assignee: Sony Corporation
    Inventors: Harunaga Hiwatari, Toru Akishita
  • Patent number: 9026803
    Abstract: Described herein is a computing platform incorporating a trusted entity, which is controllable to perform cryptographic operations using selected ones of a plurality of cryptographic algorithms and associated parameters, the entity being programmed to record mode of operation information, which is characterized by the algorithms and associated parameters that are selected to perform an operation.
    Type: Grant
    Filed: November 30, 2009
    Date of Patent: May 5, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Valiuddin Y. Ali, Graeme John Proudler
  • Patent number: 9025767
    Abstract: An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.
    Type: Grant
    Filed: March 24, 2010
    Date of Patent: May 5, 2015
    Assignee: Nokia Corporation
    Inventors: Sampo Juhani Sovio, Vesa-Veikko Luukkala
  • Patent number: 9021135
    Abstract: An intercepting proxy server processes traffic between an enterprise user and a cloud application. The intercepting proxy server provides interception of real data elements in communications from the enterprise to the cloud and replacing them with obfuscating tokens which are randomly generated. To the cloud application real data are only visible as tokens. Tokens included in results returned from the cloud, are intercepted by the intercepting proxy server, and replaced with the corresponding real data elements. The obfuscating tokens are not computationally related to the original sensitive value. Each intercepted real data element is stored in a local persistent storage layer, and indexed by the corresponding obfuscating token, allowing the real data element to be retrieved when the token is returned from the cloud, for delivery to the user.
    Type: Grant
    Filed: April 19, 2012
    Date of Patent: April 28, 2015
    Assignee: Perspecsys Corp.
    Inventors: George Weilun Ang, Derek Jon Townsend, John Harold Woelfel, Terrence Peter Woloszyn
  • Publication number: 20150110266
    Abstract: The present invention relates to a countermeasure method against side channel analysis for cryptographic algorithm using Boolean operations and arithmetic operation. To protect a cryptographic algorithm combining Boolean and arithmetic instructions against first order side channel analysis, it is necessary to perform conversions between Boolean masking and arithmetic masking. The present invention proposes a new conversion method from arithmetic masking to Boolean masking, using only one precomputed table T. Said table T being configured so that to convert from arithmetic to Boolean masking k-bit nibble by k-bit nibble for integers having a size greater than k bits while adding a masked carry from the modular addition to the nibble.
    Type: Application
    Filed: March 4, 2013
    Publication date: April 23, 2015
    Applicant: GEMALTO SA
    Inventor: Blandine Debraize
  • Patent number: 9009858
    Abstract: A method for operating a distributed data management and control enclave comprises providing a policy that identifies a set of data to be managed and controlled. The policy further identifies devices upon which the data may be transferred and the conditions under which that data may be transferred to the identified devices. A first data management and control system to be used on a first device is then defined in the policy. A second management and control system to be used on a second device is then defined in the policy. The second data management and control system can be distinct from the first data management and control system. The specified data management and control system is then instantiated on a device. The specified data management and control system is then used to manage and control data on the device in accordance with the policy.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: April 14, 2015
    Assignee: Okta, Inc.
    Inventors: Kevin Eugene Sapp, II, Victor Ronin
  • Publication number: 20150092941
    Abstract: A fault tolerant apparatus and method for elliptic curve cryptography. For example, one embodiment of a processor includes one or more cores to execute instructions and process data; and fault attack logic to ensure that the execution of the instructions and processing of the data is not vulnerable to memory safe-error attacks after a fault is injected by hiding any correlation between processor behavior and secret bits in a secret key.
    Type: Application
    Filed: September 27, 2013
    Publication date: April 2, 2015
    Inventor: Santosh Ghosh
  • Patent number: 8997215
    Abstract: The invention provides a method and apparatus for authenticating a user in a touchscreen environment. A first tier may be defined having at least one object, and a destination tier may be defined having at least one bin. An authentication-key may be registered, the authentication-key comprising a length defining a number of nodes and a correct sequence of nodes, each node specifying a movement of one object from the first tier to one bin of the destination tier. A user sequence of at least one touchscreen gestures is received, each gesture specifying that one object from the first tier should be moved to one bin of the destination tier. Access is permitted if the at least one touchscreen gestures corresponds to the length, the correct sequence, and the movement of the authentication-key.
    Type: Grant
    Filed: September 10, 2013
    Date of Patent: March 31, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Badrinath Guriappa Srinivas, Shashi Bhanwar, Shefali Singhal, Debi Prosad Dogra, Saurabh Tyagi
  • Patent number: 8995651
    Abstract: A system includes an interface module, an addressing module, and a multiplier module. The interface module is configured to (i) receive operands and configuration data for a Rivest-Shamir-Adleman (RSA) operation or an Elliptic Curve Cryptography (ECC) operation, and (ii) control access to a random access memory (RAM). The addressing module is configured to allocate memory space within the RAM for storage of the operands. The multiplier module includes a Montgomery multiplier configured to perform Montgomery multiplication operation for both the RSA operation and the ECC operation.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: March 31, 2015
    Assignee: Marvell International Ltd.
    Inventors: Sean Lee, Chang Shu, Fei Sun
  • Patent number: 8997239
    Abstract: Code injection is detected based on code digests associated with hashes of selected portions of content supplied to clients by a server. A client receives the content and generates a corresponding code digest, and based upon a comparison with the code digest received from the server, determines if the received content has been corrupted. The code digest can be signed or supplied with a digital certification for verification that the code digest originated from the server providing the content.
    Type: Grant
    Filed: May 17, 2011
    Date of Patent: March 31, 2015
    Assignee: Infosys Limited
    Inventors: Prashant Venkatesh Kanakapura, Arjun Govindaraju, Abishek C
  • Patent number: 8988713
    Abstract: The embodiments provide a printing system including an application manager, implemented at a cloud print server, configured to receive a print job including encrypted content to be printed by a designated cloud-aware printer, over a network, from an application associated with a device, a print job router, implemented at the cloud print server, configured to route the print job including the encrypted content, over the network, to the designated cloud-aware printer to be decrypted, and a secure format converter configured to receive the print job including decrypted content from the designated cloud-aware printer, convert the print job from a printer-independent format to a printer-specific format associated with the designated cloud-aware printer, and provide the print job having the printer-specific format to the designated cloud-aware printer for printing.
    Type: Grant
    Filed: June 28, 2012
    Date of Patent: March 24, 2015
    Assignee: Google Inc.
    Inventors: Yevgeniy Gutnik, Kelly Lucas
  • Patent number: 8983071
    Abstract: A key management, user registration and deregistration for a digital rights management (DRM) system in a home network, using a hierarchical node topology. In the key management, node information is generated by allocating a pair of keys (a public key and a private key) to each node. A node tree is made by generating link information using the pair of keys and a content key. The link information is delivered from an upper node to a lower node using the node tree. The link information is obtained by encrypting a private key of a ‘TO’ node using a public key of a ‘FROM’ node. Accordingly, it is possible to realize a DRM system that protects content and easily accomplishes a binding mechanism and a revocation mechanism.
    Type: Grant
    Filed: February 7, 2006
    Date of Patent: March 17, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Sung-hyu Han, Bong-seon Kim, Myung-sun Kim, Young-sun Yoon, Sun-nam Lee, Jae-heung Lee
  • Patent number: 8983064
    Abstract: A method of determining the integrity of a message exchanged between a pair of correspondents. The message is secured by embodying the message in a function of a public key derived from a private key selected by one of the correspondents. The method comprises first obtaining the public key. The public key is then subjected to at least one mathematical test to determine whether the public key satisfies predefined mathematical characteristics. Messages utilizing the public key are accepted if the public key satisfies the predefined mathematical characteristics.
    Type: Grant
    Filed: September 15, 2012
    Date of Patent: March 17, 2015
    Assignee: Certicom Corp.
    Inventors: Scott A. Vanstone, Alfred John Menezes, Minghua Qu, Donald B. Johnson
  • Publication number: 20150071434
    Abstract: An encryption circuit for receiving an input of a first digital key and plaintext data, the encryption circuit for mathematically manipulating the digital key and the plaintext data to encrypt the plaintext data into encrypted data, wherein at least a portion of the encryption circuit comprises IBG circuitry.
    Type: Application
    Filed: March 15, 2013
    Publication date: March 12, 2015
    Applicant: STATIC CONTROL COMPONENTS, INC.
    Inventors: William Eli Thacker, III, Robert Francis Tenczar, Michael Clinton Hoke
  • Publication number: 20150071435
    Abstract: Method and system for identity based encryption are described. The method comprises obtaining public parameters and a public key set from a central server, where the public parameters include a friendly prime, a torsion group prime order, an super-singular elliptic curve, a first torsion group, a pre-computed Tate pairing value, a first elliptic curve point and a second elliptic curve point, and a distortion map, and where the pre-computed Tate pairing value is generated by the central server. Further, a receiver key set of elliptic curve points based on a receiver identity of a receiver is determined, where the receiver key set is a subset of the public key set. Further a receiver public key based on the receiver key set is computed. Further, the data is encrypted using the Tate pairing value and an encryption component, wherein the encryption component is computed based on the receiver public key set.
    Type: Application
    Filed: September 4, 2014
    Publication date: March 12, 2015
    Inventors: Rajan Mindigal Alasingara BHATTACHAR, Barkur Suryanarayana ADIGA, Shivraj Vijayshankar LOKAMATHE, Ravishankara SHASTRY, Balamuralidhar PURUSHOTHAMAN
  • Patent number: 8976008
    Abstract: The present disclosure relates to systems and methods for secure and authentic electronic cross domain collaboration between a plurality of users using a combination of biometric security, a separate and secure network infrastructure, management processes, encrypted electronic storage, and collaborative templates. In an exemplary embodiment, an cross domain collaboration system includes a server including a network interface connected to the Internet, a data store including electronic data storage, and a processor, wherein each of the network interface, the data store and the processor are communicatively coupled, and wherein the network interface, the data store and the processor are collectively configured to: biometrically authenticate a plurality of users, wherein each of the plurality of users comprises a security level and a domain; and enable cross domain collaboration between the plurality of users based on the security level of each of the plurality of users.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: March 10, 2015
    Assignee: PrivacyDataSystems, LLC
    Inventor: Stephen Errico
  • Publication number: 20150063563
    Abstract: A product of prime numbers and a quadratic non-residue of one of the prime numbers are received as a public key from a first party. The product of prime numbers comprises a first group and the prime numbers respectively comprise a first sub-group and a second sub-group of the first group. Data of the first party is automatically encrypted bit-wise using a computerized device by encrypting first bit values of the data of the first party as quadratic residue and encrypting second bit values of the data of the first party as quadratic non-residue to produce a first intermediate number. The first intermediate number is automatically multiplied by the quadratic non-residue of the public key using the computerized device to complete encryption of the data of the first party. A square root of a value is received from a second party. The second party does not have the quadratic residue and the quadratic non-residue.
    Type: Application
    Filed: September 5, 2013
    Publication date: March 5, 2015
    Applicant: Xerox Corporation
    Inventor: Shailesh Vaya
  • Publication number: 20150063564
    Abstract: In one embodiment, it is proposed a method for ciphering a plaintext M belonging to a group of prime order p, such method being performed by an electronic device. The method is remarkable in that it comprises: encrypting said plaintext M in function of a public vector Z=(Z1, . . . , Zl)?l of l elements of said group , where l?2 log2(p), and a one-time private vector K comprising l binary elements (K[1], . . . , K[l])?{0,1}l, said encrypting delivering a first ciphertext belonging to a group k1 for an integer k1?1; encrypting said l binary elements delivering a second ciphertext in a group k2, for an integer k2>1.
    Type: Application
    Filed: September 3, 2014
    Publication date: March 5, 2015
    Inventors: Marc JOYE, Benoit Libert
  • Patent number: 8972300
    Abstract: A transmission device including: copy unit that extracts part or all of partial contents, as tracking information, from a content, and copies the extracted tracking information, thereby generating pieces of tracking information; candidate information obtaining unit that obtains pieces of candidate information respectively corresponding to the pieces of tracking information; evidence information obtaining unit that obtains evidence information generated dependently on a piece of candidate information selected by the reception device from among the pieces of candidate information; hash generating unit that generates hash values respectively in accordance with the pieces of candidate information; embed unit that embeds the hash values respectively into the pieces of tracking information, and embeds the evidence information into each piece of tracking information; and transmit unit that transmits each piece of tracking information in which a hash value and the evidence information have been embedded.
    Type: Grant
    Filed: April 26, 2007
    Date of Patent: March 3, 2015
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Toshihisa Nakano, Yuichi Futa, Motoji Ohmori, Kazukuni Kobara, Ryo Nojima, Hideki Imai
  • Patent number: 8971528
    Abstract: A modified Chinese State Encryption Management Bureau's SM2 Elliptic Curve Signature Algorithm that offers partial message recovery and lowers the signature size for a given cryptographic strength. The modified SM2 Elliptic Curve Signature Algorithm includes a signature and verification algorithm that modifies a signature generation primitive to compute a key derived from the ephemeral signing key, and a multiple of the signer's public key.
    Type: Grant
    Filed: January 29, 2013
    Date of Patent: March 3, 2015
    Assignee: Certicom Corp.
    Inventor: Matthew John Campagna
  • Publication number: 20150055777
    Abstract: The present invention relates to information security and discloses a method of establishing public key cryptographic protocols against the quantum computational attack. The method includes the following steps: definition of an infinite non-abelian group G; choosing two private keys in G by two entities; a second entity computing y, and sending y to a first entity; the first entity computing x and z, and sending (x, z) to the second entity; the second entity computing w and v, and sending (w, v) to the first entity; the first entity computing u, and sending u to the second entity; and the first entity computing KA, and the second entity computing KB, thereby reaching a shared key K=KA=KB. The security guarantee of a public key cryptographic algorithm created by the present invention relies on unsolvability of a problem, and has an advantage of free of the quantum computational attack.
    Type: Application
    Filed: August 4, 2014
    Publication date: February 26, 2015
    Inventors: Weijian Wang, Xiaofeng Wang
  • Patent number: 8958563
    Abstract: A method for generating a public key for an electronic device is provided, wherein the method comprises generating a public key 103 based on a private key and a unique identifier associated with the electronic device 200.
    Type: Grant
    Filed: April 28, 2008
    Date of Patent: February 17, 2015
    Assignee: NXP B.V.
    Inventors: Heike Neumann, Paul Hubmer
  • Patent number: 8958551
    Abstract: An algorithm is provided having a matrix phase and point addition phase that permits computation of the combination of more than two point multiples. The algorithm has particular utility in elliptic curve cryptography (ECC) such as for computing scalar multiplications in, e.g. batch ECC operations, accelerating Lenstra's ECM factoring algorithm, exploiting expanded ECC certificates (which contain pre-computed multiples of a party's public key), incremental hashing based on elliptic curves, accelerating verification of ECDSA signatures, etc.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: February 17, 2015
    Assignee: Certicom Corp.
    Inventor: Daniel R. Brown
  • Patent number: 8958552
    Abstract: A certification device 101 encrypts a feature vector for registration by using a random number and a public key which is set to correspond to a secret key in a decryption device 103. The encrypted feature vector for registration is registered in an authentication device 102. In authentication, the certification device encrypts a feature vector for authentication by using the public key and a random number. With the two encrypted feature vectors being kept encrypted, the authentication device generates encrypted similarity degree information from which the decryption device can derive the similarity degree between the two feature vectors by a decryption process using the secret key. The decryption device 103 decrypts the encrypted similarity degree information to derive the similarity degree of the plaintext. The authentication device 102, if the similarity degree is equal to or larger than a threshold, determines that the user is the correct user.
    Type: Grant
    Filed: October 29, 2009
    Date of Patent: February 17, 2015
    Assignee: Mitsubishi Electric Corporation
    Inventors: Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda
  • Patent number: 8959355
    Abstract: Provided is an authentication device including a key setting unit for setting s?Kn to a secret key and setting a multi-order polynomial fi(xl, . . . , xn) (i=1 to m) on a ring K and yi=fi(s) to a public key, a message transmission unit for transmitting a message c to a verifier, a verification pattern reception unit for receiving information on one verification pattern selected by the verifier from k (k?3) verification patterns for one message c, and a response transmission unit for transmitting, to the verifier, response information, among k types of response information, corresponding to the information on the verification pattern received by the verification pattern reception unit, where the response information is information that enables calculation of the secret key s in a case all of the k verification patterns for the message c performed by using the k types of response information have been successful.
    Type: Grant
    Filed: July 3, 2013
    Date of Patent: February 17, 2015
    Assignee: Sony Corporation
    Inventors: Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari