Including Intelligent Token Patents (Class 713/159)
  • Patent number: 7539648
    Abstract: A system and method include means for processing a cryptographic certificate adapted to provide security functionality. A register means is provided and means for adjusting the register means to account for services when the cryptographic certificate is processed. In accordance with another aspect, a system and method include a register means for storing funds. Means are provided for processing a digital token providing proof of postage payment and means are also provided for processing a cryptographic certificate adapted to provide security functionality. Means debit funds stored in the register means when the digital token is processed and when the cryptographic certificate is processed. Processing the cryptographic certificate may involve many functions such as providing security services and/or certificate management functions (including generating and verifying cryptographic certificates) and/or key management functions and/or access to any needed private keys to perform security services.
    Type: Grant
    Filed: August 29, 2000
    Date of Patent: May 26, 2009
    Assignee: Pitney Bowes Inc.
    Inventors: Robert A. Cordery, David K. Lee, Leon A. Pintsov, Frederick W. Ryan, Jr., Monroe A. Weiant, Jr.
  • Patent number: 7539312
    Abstract: A system including a secure LSI 1 establishes a communication path to/from a server 3 (UD1), and receives a common key-encrypted program generated by encryption with a common key and transmitted from the server 3 (UD6 and UD7). The received common key-encrypted program is decrypted to generate a raw program, and the raw program is re-encrypted with an inherent key to newly generate an inherent key-encrypted program, which is stored in an external memory.
    Type: Grant
    Filed: May 14, 2007
    Date of Patent: May 26, 2009
    Assignee: Panasonic Corporation
    Inventors: Makoto Fujiwara, Yusuke Nemoto, Junichi Yasui, Takuji Maeda, Takayuki Ito, Yasushi Yamada, Shinji Inoue
  • Patent number: 7540024
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Grant
    Filed: November 3, 2004
    Date of Patent: May 26, 2009
    Assignee: Microsoft Corporation
    Inventors: Thomas G Phillips, Christopher A Schoppa, William J Westerinen, Mark A Myers
  • Patent number: 7539863
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Grant
    Filed: November 4, 2004
    Date of Patent: May 26, 2009
    Assignee: Microsoft Corporation
    Inventors: Thomas G Phillips, Christopher A Schoppa, William J Westerinen, Mark A Myers
  • Patent number: 7519816
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Grant
    Filed: November 4, 2004
    Date of Patent: April 14, 2009
    Assignee: Microsoft Corporation
    Inventors: Thomas G Phillips, Christopher A Schoppa, William J Westerinen, Mark A Myers
  • Patent number: 7516321
    Abstract: A trusted authority delegates authority to a device. This delegation of authority is effected by providing a yet-to-be completed chain of public/private cryptographic key pairs linked in a subversion-resistant manner. The chain terminates with a penultimate key pair formed by public/private data, and a link towards an end key pair to be formed by an encryption/decryption key pair of an Identifier-Based Encryption, IBE, scheme. The private data is securely stored in the device for access only by an authorized key-generation process that forms the link to the end key pair and is arranged to provide the IBE decryption key generated using the private data and encryption key. This key generation/provision is normally only effected if at least one condition, for example specified in the encryption key, is satisfied. Such a condition may be one tested against data provided by the trusted authority and stored in the device.
    Type: Grant
    Filed: March 8, 2004
    Date of Patent: April 7, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Stephen James Crane, Cheh Goh
  • Patent number: 7516483
    Abstract: A method of accomplishing two-factor user authentication, comprising providing two separate user authentication methods, enabling a user to communicate authentication data for both authentication methods to a first web site using the internet, and enabling the communication of at least some of the authentication data from the first web site to a second web site also using the internet. Both web sites are thus involved in user authentication using the authentication data.
    Type: Grant
    Filed: February 26, 2007
    Date of Patent: April 7, 2009
    Assignee: Secure Computing Corporation
    Inventor: Sean Brennan
  • Patent number: 7512800
    Abstract: A key management technique establishes a secure channel through an indeterminate number of nodes in a network. The technique comprises enrolling a smart card with a unique key per smart card. The unique key is derived from a private key that is assigned and distinctive to systems and a card base of a card issuer. An enrolled smart card contains a stored public entity-identifier and the secret unique key. The technique further comprises transacting at a point of entry to the network. The transaction creates a PIN encryption key derived from the smart card unique key and a transaction identifier that uniquely identifies the point of entry and transaction sequence number. The technique also comprises communicating the PIN encryption key point-to-point in encrypted form through a plurality of nodes in the network, and recovering the PIN at a card issuer server from the PIN encryption key using the card issuer private key.
    Type: Grant
    Filed: February 3, 2004
    Date of Patent: March 31, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: W. Dale Hopkins
  • Patent number: 7511842
    Abstract: An image forming apparatus includes a document control service that generates authentication information corresponding to the request to output a stored document and transmits the authentication information to the network service, and a document output service that receives the authentication information from the network service, obtains the stored document corresponding to the authentication information, and outputs the obtained stored document. After authenticating the stored document, the document control service generates authentication information corresponding to a request to output the stored document from an external network apparatus. The document control service, the external network apparatus, and the document output service can exchange the authentication information instead of the stored document.
    Type: Grant
    Filed: March 19, 2003
    Date of Patent: March 31, 2009
    Assignee: Ricoh Company, Ltd.
    Inventor: Sachiko Mihira
  • Patent number: 7509292
    Abstract: This invention concerns a consumable authentication method for validating the existence of an untrusted chip. A random number is encrypted using a first key and sent to an untrusted chip. In the untrusted chip it is decrypted using a secret key and re-encrypted together with a data message read from the untrusted chip. This is decrypted so that a comparison can be with the generated random number and the read data message.
    Type: Grant
    Filed: August 8, 2003
    Date of Patent: March 24, 2009
    Assignee: Silverbrook Research Pty Ltd
    Inventor: Simon Robert Walmsley
  • Patent number: 7506183
    Abstract: Suppression malfunction of an authentication circuit for authenticating a battery pack. Signal line for applying an intermediate potential between the power supply and ground and for reading the potential of a thermistor for detecting the temperature is used as a transmission path for exchanging data between a battery pack and main device. A master-authentication circuit and slave-authentication circuit comprise level-correction circuits, which are connected to the signal line by way of a voltage-comparator circuit. The level-correction circuits are constructed such that they correct the signal applied to the signal line so that it is greater than or less than the unstable-region voltage, and outputs it to the input end of the authentication circuits, so that unstable-region voltage is not applied to the input end.
    Type: Grant
    Filed: November 22, 2005
    Date of Patent: March 17, 2009
    Assignee: NEC Electronics Corporation
    Inventor: Azuma Araya
  • Patent number: 7500103
    Abstract: Apparatus for parsing and tokenizing a data stream comprises: a storage component to store a history buffer containing an unencoded version of a previously encoded string; a comparison component to compare a string from the input data stream with the unencoded version of at least one previously encoded string; a second storage component store: an indicator that at least two matches were found by the first comparison component, and tokens corresponding to the matches; a summing component to sum potential token lengths to provide total potential token lengths; a second comparison component to compare total potential token lengths; a selection component to select a match corresponding to a shortest total token length to represent the string from said input data stream; and an emitting component for emitting tokens representing the match corresponding to the shortest total token length. The tokens may be used in, for example, compression or encryption.
    Type: Grant
    Filed: March 23, 2004
    Date of Patent: March 3, 2009
    Assignee: International Business Machines Corporation
    Inventors: Gordon J Cockburn, Adrian John Hawes
  • Patent number: 7493487
    Abstract: The described systems, methods and data structures are directed to a portable computing environment. A communication link is established between a portable device and a host device. The portable device is equipped with a processing unit and is configured to execute a process that is accessible by the host device. The host device includes an application configured to interact with the process on the portable device. The process on the portable device provides data to the application on the host device using the communication link. The application uses the data to provide a computing environment.
    Type: Grant
    Filed: October 15, 2004
    Date of Patent: February 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Thomas G Phillips, Christopher A Schoppa, William J Westerinen, Mark A Myers
  • Patent number: 7490333
    Abstract: The invention relieves an application programmer of the responsibility for managing access rights, by providing application code that is independent of the protection in a chip card. When an application, for example in a docking station, is given access to an object pertaining to another application in a chip card, two capabilities are created respectively in the applications, as objects, to protect all subsequent accesses to the object by filtering them through the two capabilities. On accessing an object pertaining to an application, if a second object pertaining to the other application is passed on to the latter, two other capabilities are added in the applications to protect access to the second object.
    Type: Grant
    Filed: December 8, 2000
    Date of Patent: February 10, 2009
    Assignee: Gemalto SA
    Inventors: Gilles Grimaud, Daniel Hagimont, Jean-Jacques Vandewalle
  • Publication number: 20090037730
    Abstract: A security and protection device (1) for protection of the data and executable codes of any fixed or portable computer system and that has a memory medium to be protected. The security and protection device (1) is located physically between the computer system (2) and the memory medium (MP) to be protected, in order to allow the computer system (2) access to the data and codes to be protected after execution of the protection functions independently of the machine code executed by the computer system (2) and requires no interaction with the processor of the system for the execution of these functions.
    Type: Application
    Filed: July 31, 2007
    Publication date: February 5, 2009
    Inventors: Rene Martin, Alain Filee
  • Publication number: 20090006846
    Abstract: This application is directed to a system for remotely directing a host device to perform an operation using a key. The key may include a communications circuitry for transmitting data, for example a key identifier or an instruction to perform an operation, within a personal area network created by the communications circuitry. When a host device is within the personal area network, the key may transmit data received by a transceiver on the host device. In response to receiving the data, the host device may perform an operation (e.g., an authentication operation). In some embodiments, the key may transmit data identifying an operation for the host device to perform. In some embodiments, the host device may store in memory key identification information and an associated operation which may be retrieved when the key is brought in proximity of the host device.
    Type: Application
    Filed: June 27, 2007
    Publication date: January 1, 2009
    Inventor: Michael Rosenblatt
  • Publication number: 20080313457
    Abstract: The present invention discloses a system and method of leveraging mobile telephone provider assets and distribution network to securely deliver security tokens, such as PKI certificates. The invention is not limited to using a mobile telephony infrastructure and other pre-existing distributions can also be used. In the invention, a user requested security token can be delivered to a storefront associated with a mobile telephone provider. The storefront can be one proximate to a requesting user. An optional activation key can also be conveyed to the requesting user. The requesting user can be required to physically travel to the storefront to receive the security token. At the storefront, an identity of the requesting user can be verified, such as through photo identification. The security token can be provided when the requesting user has been successfully verified. Use of the security token can still require activation involving the activation key.
    Type: Application
    Filed: June 18, 2007
    Publication date: December 18, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: PAUL ILECHKO
  • Patent number: 7454784
    Abstract: A system and method to verify a user's identity in an Internet-related transaction. One system and method use a personal computer having identification information, a card reader, and a personal identification card having access information, to verify a user's identity using the access information and the identification information. Another system and method use a personal computer, a card reader, and a personal identification card having access information, wherein the card reader is included as part of a mouse coupled to the personal computer and wherein a user's identity is verified using the access information. Another system and method use a personal computer, a fingerprint reader, a card reader, and a personal identification card having access information to verify a user's identity using the access information and the data of the fingerprint reader.
    Type: Grant
    Filed: July 9, 2002
    Date of Patent: November 18, 2008
    Inventors: Harvinder Sahota, Neil Sahota
  • Publication number: 20080270791
    Abstract: Techniques are disclosed for performing operations in an authentication token or other cryptographic device in a system comprising an authentication server. In one aspect, a code generated by the authentication server is received in the cryptographic device. The code may have associated therewith information specifying at least one operation to be performed by the cryptographic device. The cryptographic device authenticates the code, and responsive to authentication of the code, performs the specified operation. If the code is not authenticated, the operation is not performed. The code may be determined as a function of a one-time password generated by the authentication server. The function may also take as an input an identifier of the operation to be performed.
    Type: Application
    Filed: June 28, 2007
    Publication date: October 30, 2008
    Inventors: Magnus Nystrom, William M. Duane, James Townsend
  • Patent number: 7441266
    Abstract: An electronic system is disclosed. In one embodiment, the electronic system comprises a wireless communication adapter that includes an antenna for transmitting and/or receiving information and a connector configured to enable selective mating engagement of the connector with a connection port of an electronic device. In one embodiment, the wireless communication adapter is configured to communicate information between first and second electronic devices via the antenna. Other electronic systems, devices, and methods are also disclosed.
    Type: Grant
    Filed: October 31, 2006
    Date of Patent: October 21, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ligy Kurian, James A. Jensen, Paul L. Drew
  • Patent number: 7434070
    Abstract: Access control to data processing means, such as a smart card, is made secure by simulating a comparison block by block of part of a secret code with part of a presented code through a block-by-block comparison of part of the presented code and part of a determined number when the presented code is found to be erroneous. Each time the card is used, a constant number of operations are applied to the presented code and at least for part of the secret code, and at most for a complementary part to the determined number, thus avoiding different signatures of power consumption for different presented codes.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: October 7, 2008
    Assignee: Gemplus
    Inventors: Pascal Moitrel, Johan Pascal
  • Publication number: 20080215879
    Abstract: A system and computer implemented method for providing a widget are described. The widget is portable, embeddable and for dynamically displaying multimedia content. The method and system include receiving a request corresponding to the widget and performing an authentication corresponding to the request. The method and system also include fulfilling the request if the authentication is successful.
    Type: Application
    Filed: October 23, 2007
    Publication date: September 4, 2008
    Inventors: Carnet Williams, Olin Lagon, Kevin Hughes
  • Patent number: 7418500
    Abstract: A mechanism for controlled sharing of files by clustered applications is provided. The mechanism expands a distributed file access protocol, such as the direct access file system protocol, by including an open with share token command and an open_downgrade operation to adjust the access and deny levels for a given resource.
    Type: Grant
    Filed: March 25, 2002
    Date of Patent: August 26, 2008
    Assignee: Network Appliance, Inc.
    Inventors: Don Bolinger, Arthur Lent, Jeffrey Silberman
  • Patent number: 7412601
    Abstract: An illegal data use prevention system includes a registrar which issues first authentication information for a game machine reproducing data and second authentication information for a user-identifying IC card. The data is identified by the first authentication information and the second authentication information. The game machine contains the first authentication information and, for example, executes a game program in accordance with a result of determination as to whether the IC card contains the second authentication information. Thus, illegal use of data is effectively prevented.
    Type: Grant
    Filed: May 19, 2004
    Date of Patent: August 12, 2008
    Assignee: Sharp Kabushiki Kaisha
    Inventors: Yoshiki Shibata, Kunio Sensui, Kazuhiro Yamamoto
  • Patent number: 7409554
    Abstract: To provide an improved management structure of memory devices storing service-use applications. A card for a memory device applied to use various services is provided as one child card or more corresponding to each of the services, a parent card-stores data for child-card issue management, and the child-card issue processing is executed based on the parent card, such as parent card authentication. An issue certificate having a parent-card digital signature is stored in the child card, the issue certificate contains a service code and a child-card identification, and thus it becomes possible to confirm a service set in the child card based on the issue certificate as the parent-card signature data.
    Type: Grant
    Filed: April 17, 2002
    Date of Patent: August 5, 2008
    Assignee: Sony Corporation
    Inventors: Yoshihito Ishibashi, Susumu Kusakabe, Hideaki Watanabe
  • Patent number: 7409704
    Abstract: A telecommunications system and method is disclosed for implementing a Policy Enforcement Point (PEP) for an Internet Service Provider (ISP) at the subscriber premises. This PEP enforces policies with respect to authentication of subscribers, authorization to access and services, accounting and mobility of the subscribers. These policies are defined by the ISP operator in a Policy Decision Point (PDP), which is a server connected to the Internet that communicates with the PEP. In addition, the ISP can supply an encryption key for the PEP and an encryption key for a particular subscriber. Thus, all communications between the subscriber and the PEP, as well as between the PEP and the PDP can be encrypted.
    Type: Grant
    Filed: July 15, 1999
    Date of Patent: August 5, 2008
    Assignee: Telefonaktiebolaget L M Ericsson (PUBL)
    Inventor: Philippe Charas
  • Patent number: 7406598
    Abstract: A system on a chip (SOC) device is disclosed comprising external outputs, and external inputs. A first secure storage location is operably decoupled from all of the external outputs of the SOC device during a normal mode of operation. By being decoupled from all external outputs, representations of the data stored at the first secure device are prevented from being provided to the external outputs. The decryption engine is also included on the system on a chip, comprising a first data input, and a private key input coupled to a first portion of the first secure storage location, and an output coupled to a second secure location. The decryption engine is operable to determine decrypted data from data received at the first data input based upon a private key received at the private key input. The decryption engine is further operable to write the decrypted data only to the first secure memory location and the second secure location.
    Type: Grant
    Filed: April 22, 2004
    Date of Patent: July 29, 2008
    Assignee: ViXS Systems Inc.
    Inventor: Paul Ducharme
  • Patent number: 7404085
    Abstract: The present invention provides a method and system for communicating via a handheld device to Internet applications such as customer relationship management applications. Automatically generated user information, such as an electronic mail (e-mail) address, containing a certification key is used to authenticate a mobile user's access to Internet applications. Access from mobile devices, such as personal data assistants, is possible because no password is required to log in. Other security measures may be used in conjunction with providing user information to ensure access only to authorized users.
    Type: Grant
    Filed: September 3, 2004
    Date of Patent: July 22, 2008
    Assignee: SAP AG
    Inventors: Martin Lacasse, Jean-Francois Leblay
  • Patent number: 7401223
    Abstract: A trusted authentication chip for use in authenticating an untrusted authentication chip; the trusted authentication chip including a random number generator, a symmetric encryption function and two secret keys for the function, a signature function and a test function; wherein the trusted authentication chip generates test data including a random number and its signature, encrypted using a first of said secret keys and transmits the test data to the untrusted authentication chip, wherein the trusted authentication chip receives a data message and an encrypted version of the data message in combination with the random number from the untrusted authentication chip, the data message being encrypted using a second of said secret keys, wherein the test function operates to encrypt the random number together with the data message by the symmetric encryption function using the second secret key, compare the two versions of the random number encrypted together with the data message using the second key, and in the e
    Type: Grant
    Filed: August 2, 2004
    Date of Patent: July 15, 2008
    Assignee: Silverbrook Research Pty Ltd
    Inventor: Simon Robert Walmsley
  • Publication number: 20080159541
    Abstract: An augmented boot code module includes instructions to be executed by a processing unit during a boot process. The augmented boot code module also includes an encrypted version of a cryptographic key that can be decrypted with a cryptographic key that remains in the processing unit despite a reset of the processing unit. In one embodiment, the processing unit may decrypt the encrypted version of the cryptographic key and then use the decrypted key to establish a protected communication channel with a security processor, such as a trusted platform module (TPM). Other embodiments are described and claimed.
    Type: Application
    Filed: December 29, 2006
    Publication date: July 3, 2008
    Inventors: Mohan J. Kumar, Shay Gueron
  • Patent number: 7392393
    Abstract: A system that allows secure processing in a case where a download-requesting terminal and a download-destination terminal are different devices is implemented. A content distribution server receives a ticket carrying a signature of a download destination from a terminal requesting downloading of content, and verifies the ticket to verify that a device serving as the download destination is a device authorized by the download-requesting terminal, thereby verifying the authenticity of the device serving as the download destination without directly authenticating the device serving as the download destination. Furthermore, a content-signing key [Ksig] or a hash value is exchanged as data that can be cryptographically processed only at the download-requesting device and the download-destination device, so that, for example, checking of the integrity of the content is allowed only at a legitimate download-destination device.
    Type: Grant
    Filed: January 9, 2003
    Date of Patent: June 24, 2008
    Assignee: Sony Corporation
    Inventor: Ryuta Taki
  • Patent number: 7380138
    Abstract: First data to be sent by a first party to a second party is encrypted using an encryption key that is formed using at least a hash value generated by a keyed hash of at least one condition that typically serves as an identifier of an intended recipient of the first data. The encrypted first data is provided to a data recipient who requests a decryption key from the trusted party. The trusted party is responsible for verifying that the recipient meets the specified conditions before providing the decryption key. A valid decryption key is only provided if the correct conditions have been supplied to the trusted party.
    Type: Grant
    Filed: April 22, 2004
    Date of Patent: May 27, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Keith Alexander Harrison
  • Patent number: 7376845
    Abstract: A method for calculating hashing of a message in a device communicating with a smart card involves storing a same hash function in said device and said smart card, wherein the message includes-data blocks including secret data and other public data, and wherein secret data is only known by the smart card, performing a calculation of the hash function of the secret data in the smart card, and performing the calculation of the hash function of all or part of other public data in the device.
    Type: Grant
    Filed: August 28, 2003
    Date of Patent: May 20, 2008
    Assignee: Axalto S.A.
    Inventor: Ilan Mahalal
  • Patent number: 7373656
    Abstract: The present invention relates to a portable device configured to interact with any number of host computing devices. In operation, the portable device will initially appear to a host computing device as a known device type. The host computing device will be configured to interact with the portable device as the known device type. Upon such interaction, the host computing device will access indicia sufficient to identify the portable device as a second device type and instruct the host computing device to configure itself to interact with the portable device as the second device type.
    Type: Grant
    Filed: May 11, 2001
    Date of Patent: May 13, 2008
    Assignee: Sandisk IL Ltd.
    Inventors: Alex Lang, Shimon S. Shmueli, David W. Sharp, Brian J. Adkins
  • Publication number: 20080091942
    Abstract: Production of a two dimensional technical data package is automated by a computer that receives and stores one or more customer defined data submittal rules for formatting a technical data package. The computer then executes one or more of the rules to create a linked set of output data files that comprises the technical data package. The computer creates a hierarchical product data tree structure comprising one or more nodes and one or more product attribute data fields for each node. The computer creates the technical data package file by linking parts files together in accordance with the product data tree structure. The technical data package created by the computer may be compressed and sent electronically to the customer avoiding the requirement of using cumbersome technology such as aperture cards.
    Type: Application
    Filed: September 29, 2006
    Publication date: April 17, 2008
    Applicant: The BOEING CO.
    Inventors: John W. Glatfelter, Larry M. Cox, Gregory J. Gilpin
  • Patent number: 7356694
    Abstract: Sharing of data between one domain and at least one other domain over a network is facilitated by the use of tokens. A user token set in a cookie stored on the user's system at log-on to a first domain is used to create, or is associated with, a secure token passed by a first domain to a second domain when the user, in a session with the second domain, requests resources, access to which includes authorization by a first domain. The secure token facilitates various actions pertinent to a user in a session with said second domain, including, for example, the maintenance of an active, concurrent session between a user and a first domain, and authentication and authorization without log-on at a second domain or other domains.
    Type: Grant
    Filed: March 10, 2004
    Date of Patent: April 8, 2008
    Assignee: American Express Travel Related Services Company, Inc.
    Inventors: Mary Ann Mayo, Trey Neemann, Harry Pearson, Chandra C. Sekhar, Dan Toraason
  • Patent number: 7353385
    Abstract: An information holding medium stores the common key of the user used in the common-key encryption method. In response to a user authentication request sent from an information processing apparatus, the user is authenticated by the common-key encryption method by using the common key stored in the information holding medium of the user. Only when the user has been authenticated, predetermined processing for making the information processing apparatus authenticate the user by the public-key encryption method is performed.
    Type: Grant
    Filed: April 30, 2001
    Date of Patent: April 1, 2008
    Assignee: Sony Corporation
    Inventors: Tomoyuki Nakano, Tatsuo Itabashi
  • Patent number: 7346586
    Abstract: This invention concerns a validation protocol for determining whether an untrusted authentication chip is valid, or not. The protocol may be used to determine the physical presence of a valid authentication chip and from that determine whether a consumable containing the chip is valid. In another aspect the invention also concerns a system for validating the chip. A random number is generated and encrypted with an asymmetric encryption function. It is then passed to an untrusted authentication chip where it is decrypted. The decrypted random number is then compared with the original random number, and in the event of a match the untrusted chip is considered to be valid.
    Type: Grant
    Filed: March 2, 2000
    Date of Patent: March 18, 2008
    Assignee: Silverbrook Research Pty Ltd
    Inventor: Simon Robert Walmsley
  • Patent number: 7343489
    Abstract: A technique to transmit data from a sender to a receiver via a network, preferably a LAN and/or the Internet etc., where the sender transmits the data to a base station, and where the sender is verified by a server, in particular a AAA-server etc. In order to prevent the transmission of data from an illegitimate sender at the expense of a legitimate sender to the greatest extent possible, the server transmits verification data from the server to the sender and/or base station.
    Type: Grant
    Filed: October 25, 2002
    Date of Patent: March 11, 2008
    Assignee: NEC Corporation
    Inventors: Dirk Westhoff, Bernd Lamparter
  • Patent number: 7337315
    Abstract: A method and system for overcoming the problems associated with certificate revocation lists (CRL's), for example, in a public key infrastructure. The invention uses a tree-based scheme to replace the CRL.
    Type: Grant
    Filed: March 21, 2003
    Date of Patent: February 26, 2008
    Assignee: Corestreet, Ltd.
    Inventor: Silvio Micali
  • Publication number: 20080046723
    Abstract: Methods and devices are provided for two-way authentication. In one example, a method prompts a user for an account number and a PIN. Upon authentication of the account number and the PIN, an e-mail having a link to a new session is sent to the user. If the account number and the PIN were authenticated, a custom background preselected by the user is presented in the new session and a password is requested. Use of the custom background preselected by the user may help the user authenticate the computer system to which he is attempting to gain entry. Upon authentication of the password, entry to a computer system is permitted. To provide optional, enhanced anti-phishing capability, if the account number and the PIN were not authenticated, the an indication may be made that the e-mail message is being sent.
    Type: Application
    Filed: August 17, 2006
    Publication date: February 21, 2008
    Inventor: Frank A. Weber
  • Patent number: 7328187
    Abstract: A system for issuing cyber payment means (cyber notes, cyber checks, cyber payment certificates, etc.) marked with business identification information, on a computer network, and a method thereof are provided.
    Type: Grant
    Filed: February 16, 2001
    Date of Patent: February 5, 2008
    Assignee: Star Bank Co., Ltd.
    Inventor: Hoon Suhmoon
  • Patent number: 7328338
    Abstract: A protocol appropriate for smartcard purchase applications such as those that might be completed between a terminal or ATM and a users personal card is disclosed. The protocol provides a signature scheme which allows the card to authenticate the terminal without unnecessary signature verification which is an computationally intense operation for the smart card. The only signature verification required is that of the terminal identification (as signed by the certifying authority, or CA, which is essential to any such protocol). In the preferred embodiment, the protocol provides the card and terminal from fraudulent attacks from impostor devices, either a card or terminal.
    Type: Grant
    Filed: July 26, 1999
    Date of Patent: February 5, 2008
    Assignee: Certicom Corp.
    Inventor: Scott A. Vanstone
  • Patent number: 7325142
    Abstract: The access network manager terminal 5 makes a communication quality agreement with the core network manager terminal 3, the core network manager terminal 3 conducts resource assignment of the core network 100 based on the communication agreement, notifies the access network manager terminal 5 of password information of the assigned resource and notifies the edge router 1a of password authentication information. The user terminal 4a communicates a password sent from the access network manager terminal 5 in response to a resource use permission request as being contained in a header of a packet and the edge router 1a authenticates the password of the packet based on the password authentication information.
    Type: Grant
    Filed: December 3, 2002
    Date of Patent: January 29, 2008
    Assignee: NEC Corporation
    Inventor: Kazuhiko Isoyama
  • Publication number: 20080010453
    Abstract: A method is disclosed wherein a user is provided with a replacement one-time password or secure transfer key for re-establishing secure access to information contained within at least one of peripheral memory storage device, a system to which the peripheral memory storage device is connected, or a system to which the peripheral memory storage device is remotely connected. The peripheral memory storage device containing the necessary additional security keys and processes to establish the new access rights in response to the one-time password or transfer key presented. No digital transmission from the peripheral memory storage device is undertaken thereby providing a self-contained security process without interception, decryption, re-working or hacking of remotely stored password information.
    Type: Application
    Filed: July 6, 2006
    Publication date: January 10, 2008
    Inventor: Laurence Hamid
  • Patent number: 7318235
    Abstract: Methods, apparatus and machine readable medium are described for creating and using protected key blobs that require a particular portable token be present before use of the key or keys of the protected key blob is granted. Such protected key blobs may be used to establish a level of trust between a local user and the computing device.
    Type: Grant
    Filed: December 16, 2002
    Date of Patent: January 8, 2008
    Assignee: Intel Corporation
    Inventor: David W. Grawrock
  • Publication number: 20080005558
    Abstract: Computer-processable communication authentication and validation methods and apparatuses are described according to various embodiments. In one embodiment, an authentication and validation method comprises encapsulating an untrusted payload with a header and an authenticator. The header can comprise a unique identifier and the authenticator can comprise at least a portion of a keyed-hash message authentication (HMAC) value based on the content of the header, the content of the payload, and a unique key maintained for each of one or more receiving devices.
    Type: Application
    Filed: June 29, 2006
    Publication date: January 3, 2008
    Applicant: Battelle Memorial Institute
    Inventors: Mark D. Hadley, Craig A. Goranson, Kristy A. Huston, Ross T. Guttromson
  • Publication number: 20070294527
    Abstract: There is provided a portable digital device including: a display; a processor for rotating content shown on the display from a first orientation to a second orientation; a connector for connection of the portable digital device to a peripheral device; and at least two control devices for controlling at least two operational functions of the portable digital device. It is advantageous that the content shown on the display is automatically rotated from a first orientation to a second orientation by the processor when a functional connection to the peripheral device is made using the connector. The content may be rotated as a single entity or it may be rotated pixel-by-pixel. Depending on the peripheral device, the rotation may be either 90° or 180°. The functional connection may preferably be detected by the processor using a mechanical switch, an impedence meter and a combination of the aforementioned. There is also provided a method for automatically reconfiguring a setup of a portable digital device.
    Type: Application
    Filed: June 15, 2006
    Publication date: December 20, 2007
    Inventors: Yew Teng Too, Wong Hoo Sim
  • Patent number: 7305497
    Abstract: A method of performing resource analysis on one or more cards of a computer system is described and disclosed. In an embodiment, the method includes identifying one or more affected hardware identifiers. Each affected hardware identifier corresponds to any of the cards. Configuration information of the computer system is gathered. Moreover, the configuration information is used to analyze the affected hardware identifiers to identify any affected resource of the computer system. The identification of any affected resource is independent of a system-wide hardware scan of the computer system. Furthermore, one of a plurality of severity levels is assigned to each identified affected resource based on predetermined criteria. The severity levels include a low severity level, a medium severity level, and a high severity level. Each severity level represents degree of impact to the computer system if functionality of the identified affected resource became unavailable.
    Type: Grant
    Filed: May 24, 2004
    Date of Patent: December 4, 2007
    Assignee: Hewlett-Packard Development, L.P.
    Inventors: Ryan Ray Houdek, Toran Kent Kopren, Wade James Satterfield
  • Publication number: 20070277032
    Abstract: An embodiment generally relates to a method of accessing a secure computer. The method includes capturing an authentication state of a security token in response to a verification of user authentication information. The method also includes providing the authentication state to at least one application requiring authentication with the security token and accessing the at least one application.
    Type: Application
    Filed: May 24, 2006
    Publication date: November 29, 2007
    Inventor: Robert Relyea