Including Particular Multiplication Or Exponentiation Circuit Patents (Class 713/174)
-
Patent number: 8560859Abstract: A storage controller and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.Type: GrantFiled: March 15, 2013Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Vincent Boucher, Sebastien Chabrolles, Benoit Granier, Arnaud Mante
-
Patent number: 8555067Abstract: Methods and apparatus enabling programming of electronic identification information of a wireless apparatus. In one embodiment, a previously purchased or deployed wireless apparatus is activated by a cellular network. The wireless apparatus connects to the cellular network using an access module to download operating system components and/or access control client components. The described methods and apparatus enable updates, additions and replacement of various components including Electronic Subscriber Identity Module (eSIM) data, OS components. One exemplary implementation of the invention utilizes a trusted key exchange between the device and the cellular network to maintain security.Type: GrantFiled: May 19, 2011Date of Patent: October 8, 2013Assignee: Apple Inc.Inventors: Stephan V. Schell, Arun G. Mathias, Jerrold Von Hauck, David T. Haggerty, Kevin McLaughlin, Ben-Heng Juang, Li Li
-
Patent number: 8549604Abstract: A user authentication method and system. A computing system receives from a user, a first request for accessing specified functions executed by a specified software application. The computing system enables a security manager software application and connects the specified software application to a computing apparatus. The computing system executes first security functions associated with the computing apparatus. The computing system executes second security functions associated with additional computing apparatuses. The computing system determines if the user may access the specified functions executed by the specified software application based on results of executing the first security functions and the second security functions. The computing system generates and stores a report indicating the results.Type: GrantFiled: March 23, 2009Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Sara H. Basson, Dimitri Kanevsky, Edward Emile Kelley, Irina Rish
-
Patent number: 8533796Abstract: In general, the subject matter described in this specification can be embodied in methods, systems, and program products for providing access to secured resources. A token providing system stores a primary authentication token that is used to obtain temporary authentication tokens. The token providing system provides, to application programs that are unable to access the primary authentication token, the temporary authentication tokens. The token providing system receives, from a first application program of the application programs, a first request to obtain a first temporary authentication token. The first request does not include the primary authentication token. The token providing system transmits a second request to obtain the first temporary authentication token. The second request includes the primary authentication token. The token providing system receives the first temporary authentication token.Type: GrantFiled: April 26, 2011Date of Patent: September 10, 2013Assignee: Google Inc.Inventors: Vittaldas Sachin Shenoy, Pankaj Risbood, Vivek Sahasranaman, Christoph Kern, Evan K. Anderson
-
Patent number: 8522317Abstract: A device for maintaining an address translation table, placed in series between a user terminal and a third-party entity of a telecommunications network, is disclosed. The device is adapted to verify the existence in the address translation table of an entry specific to the exchange of application signaling messages using said protocol between the terminal and the third-party entity and, if there is no entry specific to the exchange of application signaling messages using said protocol between the terminal and the third-party entity, to create a specific entry in the address translation table associating with a private address and a private port of the terminal in a private network connecting it to said device a public address and a public port of the terminal in the telecommunications network and an indication of the validity of the entry, this validity indication taking into account the first reception time.Type: GrantFiled: November 24, 2008Date of Patent: August 27, 2013Assignee: France TelecomInventors: Jean-Claude Le Rouzic, Régis Savoure
-
Patent number: 8498411Abstract: A method, integrated circuit chip, and computer program product for cryptographically processing an input value with Elliptic Curve Cryptography (ECC) using ECC scalar multiplication are provided. The ECC scalar multiplication is performed with the use of an enhanced acceleration table (EAT). The EAT uses multiple running totals with multiples above 2. The EAT, in some embodiments, uses reference values other than 0 and 2^window size.Type: GrantFiled: September 29, 2009Date of Patent: July 30, 2013Assignee: EMC CorporationInventors: Sean Parkinson, Mark Hibberd, Peter Alan Robinson, David Paul Makepeace
-
Patent number: 8489886Abstract: A method, data processing system and program product is provided for performing double authentication for controlling disruptive operations on storage resources generated by a system administrator. A first request is received from a first user for generation of a first key. A first key is generated, provided to the first user and associated with the storage resource. An input is received from the administrator, the input comprises a second key and a command for performing the disruptive operation. The second key and the first key are compared. It is verified that the administrator is authorized as an administrator of the storage resource. The disruptive operation is performed on the storage resource if the second key and the first key match and the administrator is authorized. Otherwise, the performance of the disruptive operation is denied.Type: GrantFiled: September 26, 2008Date of Patent: July 16, 2013Assignee: International Business Machines CorporationInventors: Vincent Boucher, Sebastien Chabrolles, Benoit Granier, Arnaud Mante
-
Patent number: 8490161Abstract: Provisioning VLAN services in a network patching system includes receiving a request to provide a VLAN service to an individual communication channel, determining whether a switch connector port connected to the individual communication channel via a patch cord is configured to provide the requested VLAN service, and initiating the requested VLAN service to the individual communication channel in response to determining that the switch connector port is configured to provide the requested VLAN service. Verification that a user associated with the individual communication channel is authorized to access the requested VLAN service may be performed prior to initiating the requested VLAN service. An administrator may be notified that a VLAN service has been requested and/or initiated. The user associated with the communication channel may be notified when the requested VLAN service has been initiated.Type: GrantFiled: January 7, 2008Date of Patent: July 16, 2013Assignee: CommScope Inc., of North CarolinaInventor: Daniel Warren Macauley
-
Patent number: 8484707Abstract: A method for granting secure network access comprising requesting, by a mobile device, access to a network via an access point; receiving a passcode from the access point; sending a message including the passcode and an indicia back to the access point; and generating, by the access point, a secure key based on the indicia, the secure key providing network access to the mobile device.Type: GrantFiled: June 9, 2011Date of Patent: July 9, 2013Assignee: Spring Communications Company L.P.Inventors: Lyle T. Bertz, Robert H. Burcham, Jason R. Delker
-
Patent number: 8474028Abstract: A method for using multiple channels to access a resource, wherein a first user requests a resource that requires an indication of approval from a second user, a token value is transmitted to the first user on the first channel, and the second user transmits the token value and a second authentication parameter over a second channel. The token value is used to associate the first authentication parameter to the second authentication parameter, whereby the first user is allowed access to the resource on the first. The first and second user may be independently authenticated in some implementations and not independently authenticated in other implementations.Type: GrantFiled: May 22, 2007Date of Patent: June 25, 2013Assignee: FMR LLCInventors: Rajandra Laxman Kulkarni, Adam Greenberg, Anthony M. Marotto, William A. Thornton, III
-
Patent number: 8468351Abstract: A method for protecting a digital document and user data typed into a digital document is presented. The method comprises computation of an authentication tag when the document is sent from a server. A similar authentication tag is computed when the document is shown on a client. When another document referenced in the document is requested by the client from the server, the authentication tag computed by the client is attached to the request for that other document. The server receiving the request compares the authentication tag it computed with the one it received to verify if the request came from an authentic copy of the document. The method is suitable for protection of online banking, online investment, online shopping, and other electronic applications.Type: GrantFiled: December 14, 2007Date of Patent: June 18, 2013Assignee: Codesealer APSInventor: Hans Martin Boesgaard Sørensen
-
Patent number: 8458781Abstract: According to one embodiment, an apparatus may store a plurality of tokens. The apparatus may receive a subject token indicating an attempt to authenticate a user. The apparatus may determine at least one token-based rule based at least in part upon a token in the plurality of tokens and the subject token. The at least one token-based rule may indicate a plurality of attributes required to access a resource. The apparatus may determine a second plurality of attributes represented by the plurality of tokens and the subject token. The apparatus may determine at least one missing attribute, which may be in the plurality of attributes but not in the second plurality of attributes. The apparatus may then request the at least one missing attribute, and in response, receive at least one token representing the at least one missing attribute.Type: GrantFiled: August 15, 2011Date of Patent: June 4, 2013Assignee: Bank of America CorporationInventor: Rakesh Radhakrishnan
-
Patent number: 8458487Abstract: Systems and methods for secure access and utilization of sensitive data such as credit card numbers, Social Security Numbers, personal identifying information, etc. A tokenizing strategy component provides for creating, managing, and storing tokenization strategies on behalf of a plurality of users. A data tokenizing component is operative to (a) receive an input data string of sensitive data from a user, (b) apply a selected tokenization strategy to the input data string to generate a tokenized data string, and (c) provide the tokenized data string for storage in association with the input data string. A secure server including a secure database stores the tokenized data string and the input data string in a corresponding mapped relationship. A security component controls access to and retrieval of the tokenized data string and to the input data string in accordance with predetermined security requirements of the users.Type: GrantFiled: March 3, 2011Date of Patent: June 4, 2013Assignee: Liaison Technologies, Inc.Inventors: Gary Palgon, Jason Chambers, Dan Konisky
-
Patent number: 8443448Abstract: A system and method for performing a security check may include using at least one processor to periodically check a status of a flag, generate and store a baseline representation of modules stored on the device where the flag is determined to be set to a first state, and, where the flag is determined to be set to a second state, generate an active representation of modules stored on the first device, compare the active representation of modules to the baseline representation of modules, and, responsive to a determination in the comparing step of a difference between the baseline and active representations of modules, output an alert. The flag status may depend on an association of the device with one of a plurality of authorization policies, each mapped to one of the two states. Results of the comparison may be appended to an activity log of the device.Type: GrantFiled: August 20, 2009Date of Patent: May 14, 2013Assignee: Federal Reserve Bank of New YorkInventors: Danny Brando, Joonho Lee, Jia Ye
-
Patent number: 8438621Abstract: A method, device and system for securely managing debugging processes within a communication device, such as a set top box or other multimedia processing device. For example, a security processor (SP) within the communication device manages the lifetime (LT) of any access token issued for use in activating debugging privileges within the communication device. The security processor authenticates an issued access token and securely delivers appropriate debug authorization information to the device controller. The security processor uses its secure, internal timer to count down the lifetime and update the remaining lifetime of the issued access token during the processing of each command by the security processor. In addition to securely managing the issuance of the access token and it's remaining lifetime, the updating process reduces any impact on the normal communications within the device. The method overcomes the issue of the communication device not having a secure internal clock.Type: GrantFiled: December 21, 2007Date of Patent: May 7, 2013Assignee: General Instrument CorporationInventors: Jiang Zhang, Peter Chen, Bill Franks, Alexander Medvinsky
-
Patent number: 8438623Abstract: This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a security token. The administrative security features provide the user the ability to unlock a locked security token, diagnose a security token, activate and deactivate a security token, request a replacement security token or temporary password or report the loss of a security token. The invention comprises a client application which integrates into the standard user login dialog associated with an operating system. A portion of the user dialog is linked to a remote server to access the administrative services.Type: GrantFiled: October 18, 2011Date of Patent: May 7, 2013Assignee: ActivCardInventor: Jamie Angus Band
-
Patent number: 8438632Abstract: A low-cost Multi Function Peripheral (MFP) prevents a user from forgetting to cancel an authenticated state. The MFP includes a scanner unit, a printer unit, a touch screen, and a reset key for initializing various settings. When the user is authenticated, the MFP accepts various operations. Under a state in which the user is authenticated, when the reset key is operated, a control unit executes a logout process.Type: GrantFiled: May 28, 2010Date of Patent: May 7, 2013Assignee: Murata Kikai Kabushiki KaishaInventors: Masayuki Kanou, Kenji Dokuni
-
Patent number: 8424080Abstract: An authentication method of an electronic device is disclosed. A plurality of key inputs is received from a user via activation of input keys. At least one key input from the key inputs is validated based on a predefined criterion to obtain a password. The password is compared to a registered password to obtain an authenticated password.Type: GrantFiled: September 28, 2010Date of Patent: April 16, 2013Assignee: KYOCERA CorporationInventor: Norihiro Takimoto
-
Patent number: 8416951Abstract: The invention relates to a method of generating a pseudorandom string of terms belonging to a finite body K of cardinal q?2 intended to be used in a cryptography procedure, said method comprising the iterative calculation of a system (?) of m polynomials with n variables belonging to the finite body K. According to the invention, the coefficients of these m polynomials are regenerated at each iteration. The invention also relates to pseudorandom string generator intended to implement this method.Type: GrantFiled: April 2, 2007Date of Patent: April 9, 2013Assignee: France TelecomInventors: Olivier Billet, Henri Gilbert, Côme Berbain
-
Patent number: 8417953Abstract: A method and system for restricted service access is described. To access adult content, the user has to enter an administrator personal identification number into a mobile device. Upon receipt of the administrator personal identification number, an access code is generated, which is provided to a content provider. The content provider can calculate a valid time window and/or request an acknowledge message from a central server. If the current usage is within the valid time window or otherwise verified, access to the content is allowed. Thus, children are prevented from accessing adult content, while adult access is permitted.Type: GrantFiled: December 8, 2005Date of Patent: April 9, 2013Assignee: Koninklijke KPN N.V.Inventor: Andreas Schröter
-
Patent number: 8413220Abstract: A method for user authentication involves initiating an authentication process, receiving images associated with the authentication process, selecting an image from the images to generate a selection; and obtaining authentication based on the selection, where the image is associated with the authentication process and sent prior to initiating the authentication process.Type: GrantFiled: July 30, 2007Date of Patent: April 2, 2013Assignee: Intuit Inc.Inventors: Chris Quinn, Anthony Creed, Kenichi Mori, Bennett R. Blank
-
Patent number: 8396211Abstract: A system and method for dynamically and automatically updating the appropriate fields on the message application screen of an electronic message to show which of the appropriate service book, security encoding or security properties are acceptable or allowed for the message being composed. This updating occurs automatically based on the contents of the fields that are modified during composition of the message, such as, for example, modifications to classification of the message, recipients, keywords, or the like. Thus, the properties in place for a given message is reflected in a dynamic options list provided to the user based on the contents of various fields of the electronic message and the system policies resident on the system. The dynamic updating may provide an updated list of options to the user, or may optionally automatically apply minimum level settings based on security policy and contents of the message.Type: GrantFiled: July 11, 2006Date of Patent: March 12, 2013Assignee: Research In Motion LimitedInventors: Michael K. Brown, Michael S. Brown, Michael G. Kirkup
-
Patent number: 8370641Abstract: An apparatus including a microprocessor and a secure non-volatile memory. The microprocessor executes non-secure application programs and a secure application program. The microprocessor has secure execution mode initialization logic and an authorized public key. The secure execution mode initialization logic provides for initialization of a secure execution mode within the microprocessor. The secure execution mode initialization logic employs an asymmetric key algorithm to decrypt an enable parameter directing entry into the secure execution mode. The authorized public key is used to decrypt the enable parameter, the enable parameter having been encrypted according to the asymmetric key algorithm using an authorized private key that corresponds to the authorized public key.Type: GrantFiled: October 31, 2008Date of Patent: February 5, 2013Assignee: VIA Technologies, Inc.Inventors: G. Glenn Henry, Terry Parks
-
Patent number: 8345864Abstract: An improved technique involves dynamic generation of at least a portion of an acceleration table for use in elliptic curve cryptography. Such dynamic generation is capable of providing savings with regard to carrying out elliptic curve cryptography without an acceleration table. Furthermore, once the portion of the acceleration table is dynamically generated and stored (e.g., in a high speed cache), the portion of the acceleration table is capable of being used on subsequent elliptic curve cryptography operations as well thus enabling the cost of dynamically generating the acceleration table to be amortized across multiple elliptic curve cryptography operations.Type: GrantFiled: September 29, 2009Date of Patent: January 1, 2013Assignee: EMC CorporationInventors: Peter Alan Robinson, David Paul Makepeace, Jaimee Brown
-
Patent number: 8341714Abstract: A security token includes (a) a personal data memory configured to store digital identity credentials related to personal data of a user; (b) an input appliance configured to check said personal data; (c) a key record data memory configured to store at least one identity credential of an authentication server or of an application operator; (d) a transmitter and receiver unit configured to create a secure channel directly or indirectly to said authentication server or application operator to handle said key record relating to said authentication server or application operator, respectively; (e) a control unit configured to control the transmitter and receiver unit and the key record data memory in view of said handling, wherein the control unit is configured to perform one of: interpreting, deciphering, creating, checking, renewing, withdrawing and further key record handling actions. A method for authentication of a user using the security token is also disclosed.Type: GrantFiled: December 20, 2006Date of Patent: December 25, 2012Assignee: AXSionics AGInventors: Lorenz Müller, Marcel Jacomet, Roger Cattin-Liebl, Alain Rollier
-
Patent number: 8336100Abstract: A computer-implemented method for using reputation data to detect packed malware may include: 1) identifying a file downloaded from a portal, 2) determining that the file has been packed, 3) obtaining community-based reputation data for the file, 4) determining, by analyzing the reputation data, that instances of the file have been encountered infrequently (or have never been encountered) within the community, and then 5) performing a security operation on the file (by, for example, quarantining or deleting the file).Type: GrantFiled: August 21, 2009Date of Patent: December 18, 2012Assignee: Symantec CorporationInventors: Adam Glick, Nicholas Graf, Spencer Smith
-
Patent number: 8321680Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.Type: GrantFiled: December 9, 2010Date of Patent: November 27, 2012Assignee: QUALCOMM IncorporatedInventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
-
Patent number: 8307406Abstract: A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user's credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database.Type: GrantFiled: December 28, 2005Date of Patent: November 6, 2012Assignee: AT&T Intellectual Property II, L.P.Inventors: Roger Aboujaoude, Hossein Eslambolchi, John McCanuel, Michael Morris, Saeid Shariati
-
Patent number: 8296567Abstract: A communication system exchanges key generation parameters for secure communications. An internet service and communications device of a user are in communication with each other. The internet service includes an account authentication mechanism for a user and includes a database having stored cryptographic keys and key generation parameters. A device client operates on the communications device and initiates a request to the internet service that authenticates the user and establishes a secure communications channel between the internet service and communications device and determine key generation parameters based on an authenticated user identifier and transmits the key generation parameters for initiating key generation and securely establishing a cryptographic key between the internet service and communications device.Type: GrantFiled: July 15, 2009Date of Patent: October 23, 2012Assignee: Research In Motion LimitedInventors: Edward Dean, Roberto Diaz, James Godfrey
-
Patent number: 8291223Abstract: An arithmetic circuit capable of Montgomery multiplication using only a one-port RAM is disclosed. In a first read process, b[i] is read from a memory M2 of a sync one-port RAM for storing a[s?1: 0] and b[s?1: 0] and stored in a register R1. In a second read process, a[j] is read from the memory M2, t[j] from a memory M1 of a sync one-port RAM for storing t[s?1: 0], b[i] from the register R1, and a value RC from a register R2, and input to a sum-of-products calculation circuit for calculating t[j]+a[j]*b[i]+RC. In a write process, the calculation result data FH is written in the register R2, and the calculation result data FL in the memory M1 as t[j]. A first subloop process for repeating the second read process, the sum-of-products calculation process and the write process is executed after the first read process.Type: GrantFiled: January 12, 2010Date of Patent: October 16, 2012Assignee: Sharp Kabushiki KaishaInventor: Shigeo Ohyama
-
Patent number: 8280904Abstract: The invention described herein is generally directed to a method and apparatus for creating and retrieving audio data. In one implementation the invention comprises an annotation system configured to record, store, and retrieve media. The annotation system contains a set of client-processing devices configured to capture media for subsequent playback. Each client-processing device typically contains a record button to initiate the capture and is configured upon performing the capture operation to trigger an association of a unique ID with the media. The client-processing devices are further configured to upload the media and a unique ID to a server for purposes of storage. The server obtains the media and unique ID for subsequent retrieval and provides the media and the unique ID to at least one client-processing device from the set of client processing devices.Type: GrantFiled: June 16, 2011Date of Patent: October 2, 2012Assignee: Trio Systems, LLCInventor: Alan Bartholomew
-
Patent number: 8281131Abstract: Method and apparatus for generating cryptographic credentials certifying user attributes and making cryptographic proofs about attributes encoded in such credentials. Attributes are encoded as prime numbers E in accordance with a predetermined mapping and a cryptographic credential is generated encoding E. To prove that an attribute encoded in a cryptographic credential associated with a proving module of the system is a member of a predetermined set of user attributes, without revealing the attribute in question, the proving module determines the product Q of respective prime numbers corresponding to the attributes in the set in accordance with the predetermined mapping of attributes to prime numbers. The proving module demonstrates to the receiving module possession of a cryptographic credential encoding a secret value that is the prime number E, and then whether this secret value divides the product value Q.Type: GrantFiled: August 27, 2009Date of Patent: October 2, 2012Assignee: International Business Machines CorporationInventors: Jan Leonhard Camenisch, Thomas R. Gross
-
Patent number: 8244211Abstract: A mobile electronic security device may include a biometric sensor to measure a physical characteristic of a user, an interface component to operatively couple the electronic security device with another device, and a control circuit that are assembled as a single portable unit. Other components, such as a battery, a display, and a memory may be included in the security device. The security device authenticates the identity of a user using output data from the biometric sensor and, in some embodiments, using data from an environmental sensor. Once validated, an encrypted authentication certificate may be output to another device. The security device provides a trusted platform that enables a user to verify his or her identity, show proof of presence of the user, control access to data, etc., and may operate in a standalone manner and/or in conjunction with another device.Type: GrantFiled: February 5, 2009Date of Patent: August 14, 2012Assignee: Inflexis LLCInventor: Garrett Clark
-
Patent number: 8230480Abstract: A method and apparatus are provided for network security based on a security status of a device. A security update status of a device is evaluated; and one or more of a plurality of security policies are selected to apply to the device based on the security update status. The available security philosophies may include, for example, a “protect the good” philosophy, an “encourage the busy” philosophy and a “shut off the non-compliant” philosophy. The security update status can evaluate, for example, a version level of one or more security features installed on the device or can be based on a flag indicating whether the device satisfies predefined criteria for maintaining one or more computer security protection features up-to-date.Type: GrantFiled: April 26, 2004Date of Patent: July 24, 2012Assignee: Avaya Inc.Inventors: Lookman Y. Fazal, Martin Kappes, Anjur S. Krishnakumar, Parameshwaran Krishnan
-
Patent number: 8229790Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) (127) at a first mobile device (125), sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stored AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: GrantFiled: May 20, 2009Date of Patent: July 24, 2012Assignee: NDS LimitedInventors: Stephanie Wald, Yossi Tsuria, David Richardson, Eliphaz Hibshoosh, Joseph Deutsch, Shabtai Atlow
-
Patent number: 8225092Abstract: An access authentication method includes pre-establishing a security channel between the authentication server of the access point and the authentication server of the user terminal and performing the authentication process at user terminal and access point. The authentication process includes 1) the access point sending the authentication_activating message; 2) the user terminal sending the authentication server of user terminal request message; 3) the authentication server of the user terminal sending to the user terminal response message; and 4) completing the authentication.Type: GrantFiled: February 21, 2006Date of Patent: July 17, 2012Assignee: China Iwncomm Co., Ltd.Inventors: Xiaolong Lal, Jun Cao, Hong Guo, Zhenhai Huang, Bianling Zhang
-
Patent number: 8224699Abstract: An advertising control method is described. The method includes receiving an advertisement identification message (AIM) at a first mobile device, sending the AIM from the first mobile device to a content display unit (CDU) and storing the AIM in the CDU, selecting at least one content item from among a plurality of content items based, at least in part, on at least one stored AIM, the stoned AIM being stored in the CDU, and displaying the selected content item on the CDU. Related apparatus and methods are also described.Type: GrantFiled: September 7, 2003Date of Patent: July 17, 2012Assignee: NDS LimitedInventors: Stephanie Wald, Yossi Tsuria, David Richardson, Eliphaz Hibshoosh, Joseph Deutsch, Shabtai Atlow
-
Patent number: 8209542Abstract: When a processing system boots, it may retrieve an encrypted version of a cryptographic key from nonvolatile memory to a processing unit, which may decrypt the cryptographic key. The processing system may also retrieve a predetermined authentication code for software of the processing system, and the processing system may use the cryptographic key to compute a current authentication code for the software. The processing system may then determine whether the software should be trusted, by comparing the predetermined authentication code with the current authentication code. In various embodiments, the processing unit may use a key stored in nonvolatile storage of the processing unit to decrypt the encrypted version of the cryptographic key, a hashed message authentication code (HMAC) may be used as the authentication code, and/or the software to be authenticated may be boot firmware, a virtual machine monitor (VMM), or other software. Other embodiments are described and claimed.Type: GrantFiled: December 29, 2006Date of Patent: June 26, 2012Assignee: Intel CorporationInventors: Mohan J. Kumar, Shay Gueron
-
Patent number: 8195943Abstract: Techniques for deriving temporary identifiers (IDs) used to address specific user equipments (UEs) in a wireless communication network are described. At a network entity, a first ID assigned to a UE and additional information such as, e.g., a salt value and/or shared secret data for the UE, are transformed to obtain a second ID for the UE. The first ID and/or the shared secret data may be updated, e.g., whenever a signaling message is sent to the UE. A signaling message directed to the UE is generated based on the second ID and sent via a common channel. At the UE, a message is received via the common channel. The first ID and additional information such as, e.g., a salt value obtained from the received message and/or shared secret data for the UE, are transformed to obtain the second ID, which is used to determine whether the received message is intended for the UE.Type: GrantFiled: February 9, 2007Date of Patent: June 5, 2012Assignee: Qualcomm IncorporatedInventor: Nathan Edward Tenny
-
Patent number: 8150029Abstract: A method for detecting a disturbance of a calculation, by an electronic circuit, of a result of an integral number of applications of an internal composition law on elements of an abelian group, by successive iterations of different steps according to the even or odd character of a current coefficient of a polynomial representation of said integral number, the degree of which determines the number of iterations, each iteration including: in case of an odd current coefficient, updating at least one first variable intended to contain the result at the end of the calculation; and in case of an even current coefficient, of updating a second variable and a comparison of this second variable with an expected value.Type: GrantFiled: December 28, 2006Date of Patent: April 3, 2012Assignee: Proton World International N.V.Inventors: Thierry Huque, Jean-Louis Modave
-
Patent number: 8144864Abstract: In some embodiments, an apparatus and method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems are described. In one embodiment, a multiplication routine may be pre-computed using a one iteration graph-based multiplication according to an input operand length. Once pre-computed, the multiplication routine may be followed to compute the products of the coefficients of the polynomials representing a carry-less product of two input operands using a carry-less multiplication instruction. In one embodiment, the pre-computed multiplication routines may be used to extend a carry-less multiplication instruction available from an architecture according to an input operand length of the two input operands. Once computed, the carry-less product polynomial produces a remainder when the product is computed modulo a programmable polynomial that defines the elliptic cryptographic system to form a cryptographic key. Other embodiments are described and claimed.Type: GrantFiled: December 28, 2007Date of Patent: March 27, 2012Assignee: Intel CorporationInventors: Shay Gueron, Michael Kounavis
-
Patent number: 8112793Abstract: An image forming system includes a client apparatus and an image forming apparatus. The client apparatus includes an authentication data storing area defining section that produces an authentication data storing area in an external storage medium; a writing section that writes authentication data into the authentication data storing area; and an image data storing section that stores image data into the external storage medium. The image forming apparatus includes a searching section, an input section, an authenticating section, and an image processing section. The searching section reads authentication data from the external storage medium. Identification information is received from a user through the input section. The authenticating section performs authentication based on the identification information and the authentication data. The image processing section processes the image data. When the authentication has been established, the searching section reads image data from the external storage medium.Type: GrantFiled: February 10, 2006Date of Patent: February 7, 2012Assignee: Oki Data CorporationInventor: Nobuhiro Kuribara
-
Patent number: 8108941Abstract: A processor, connected to a non-volatile memory storing first memory authentication information for authentication of the non-volatile memory, the processor includes an operation unit configured to perform an operation utilizing information stored in the non-volatile memory; an authentication memory formed integrally with the operation unit, and storing second memory authentication information for authentication of the non-volatile memory; an authentication information acquiring unit configured to acquire the first memory authentication information from the non-volatile memory; a memory authenticating unit configured to compare the first memory authentication information and the second memory authentication information to authenticate the non-volatile memory; and a memory access controlling unit configured to permit an access to the non-volatile memory when the memory authenticating unit succeeds in authentication.Type: GrantFiled: February 10, 2006Date of Patent: January 31, 2012Assignee: Kabushiki Kaisha ToshibaInventor: Tatsunori Kanai
-
Patent number: 8091121Abstract: Techniques for supporting concurrent data services with different credentials are described. A wireless communication network authenticates a user/device whenever new credentials are used. An access terminal sends first credentials via a Point-to-Point Protocol (PPP) link to a Packet Data Serving Node (PDSN) and receives an indication of successful authentication for a first data service based on the first credentials. The access terminal may receive a request for a second data service and second credentials from an internal application or a terminal device coupled to the access terminal. The access terminal then sends the second credentials via the PPP link to the PDSN while the first data service is ongoing. The access terminal receives from the PDSN an indication of successful authentication for the second data service based on the second credentials.Type: GrantFiled: December 1, 2006Date of Patent: January 3, 2012Assignee: QUALCOMM IncorporatedInventor: Marcello Lioy
-
Patent number: 8090945Abstract: A multi-factor remote user authentication card-device has innovative features that enable this one card-device itself to function and accomplish a multi-factor remote user authentication of “what you know”, “what you have”, “where you are” and “what you are”, to a network. In one embodiments of the card-device, one card-device enables two-factor authentication of “what you have” and “what you are”. In another embodiment, one card-device enables two-factor authentication of “what you know” and “what you have”. In yet another embodiment, one card-device enables three-factor authentication of “what you know”, “what you have”, and “what you are”. In yet another embodiment, one card-device enables four-factor authentication of “what you know”, “what you have”, “where you are”, and “what you are”.Type: GrantFiled: September 13, 2006Date of Patent: January 3, 2012Inventor: Tara Chand Singhal
-
Patent number: 8085931Abstract: The computing device calculates an equivalence H0?2m*k+1 (mod n) relating to a divisor n of 2m*k+1 (step A), computes an equivalence H?2E(p, m, k) (mod n) of 2E(p, m, k) (mod n) from H0 by an REDC operation (step B), and performs a correction operation by H=REDC (H, G)n for g=2k*G(p, m, k) when 2p>m×k (step C).Type: GrantFiled: July 29, 2005Date of Patent: December 27, 2011Assignee: Fujitsu LimitedInventors: Kouichi Itoh, Kenji Mukaida
-
Patent number: 8081961Abstract: A network management apparatus inputs a plurality of work dates and time periods to update software in a base station. The apparatus obtains an n-week average of the numbers of connection calls during each of the input time periods for each day of the week, based on statistical information about connection with a wireless terminal in each base station. The apparatus obtains an m-month average of the numbers of connection calls during each of the input time periods for each date, based on the statistical information. The apparatus calculates, for each of the time periods for a work date, an average or a weighted average of the n-week average and the m-month average to obtain a degree of impact upon a communication service. A processing section selects a work date and a time period having the minimum degree of impact and updates the software.Type: GrantFiled: April 14, 2008Date of Patent: December 20, 2011Assignee: Hitachi, Ltd.Inventors: Koichi Okita, Ryosuke Kurata
-
Patent number: 8065717Abstract: This invention provides a system, method and computer program product to allow a user to access administrative security features associated with the use of a security token. The administrative security features provide the user the ability to unlock a locked security token, diagnose a security token, activate and deactivate a security token, request a replacement security token or temporary password or report the loss of a security token. The invention comprises a client application which integrates into the standard user login dialog associated with an operating system. A portion of the user dialog is linked to a remote server to access the administrative services.Type: GrantFiled: November 27, 2002Date of Patent: November 22, 2011Assignee: ActivcardInventor: Jamie Angus Band
-
Patent number: 8059818Abstract: The present invention relates to a method and a system of securely storing data on a network (100) for access by an authorized domain (101, 102, 103), which authorized domain includes at least two devices that share a confidential domain key (K), and an authorized domain management system for securely storing data on a network for access by an authorized domain. The present invention enables any member device to store protected data on the network such that any other member device can access the data in plaintext without having to communicate with the device that actually stored the data.Type: GrantFiled: February 11, 2005Date of Patent: November 15, 2011Assignee: Nokia CorporationInventors: Nadarajah Asokan, Philip Ginsboorg, Seamus Moloney, Tapio Suihko
-
Patent number: 8060925Abstract: A processor communicating with a first memory configured to store first information and first data, and communicating with a second memory configured to store second information and second data, includes a computing unit configured to perform computation using the first data and the second data; an storing unit configured integrally with the computing unit to store first authentication information and second authentication information; a reading unit configured to read out the first information and the second information; an authenticating unit configured to authenticate the first memory by comparing the first information and the first authentication information, and to authenticate the second memory by comparing the second information and the second authentication information; and an controlling unit configured to control an access of the computing unit to the first memory and the second memory based on a result of the authentications.Type: GrantFiled: August 24, 2006Date of Patent: November 15, 2011Assignee: Kabushiki Kaisha ToshibaInventors: Kenichiro Yoshii, Tatsunori Kanai