Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
  • Patent number: 9083698
    Abstract: The present invention relates to a method and a system for operating a device (100).
    Type: Grant
    Filed: November 8, 2011
    Date of Patent: July 14, 2015
    Assignee: Zablox AB
    Inventors: Lars Tilly, Stefan Gripwall
  • Patent number: 9081791
    Abstract: A method of reducing duplicates of multimedia data items in a service system includes maintaining service system hash values for the multimedia data items of the service system; receiving a first multimedia data item; and hashing the received multimedia data item to provide a first hash value. The method further includes searching the first hash value from the service system hash values; and approving the received multimedia data item to the service system in response to the first hash value being not found when searching from the service system hash values.
    Type: Grant
    Filed: March 18, 2013
    Date of Patent: July 14, 2015
    Assignee: P2S MEDIA GROUP OY
    Inventor: Timo Johannes Rinne
  • Patent number: 9077595
    Abstract: Provided is a sequence allocation method capable of reducing inter-cell interference of a reference signal when a ZC sequence is used as the reference signal in a mobile communication system. In the sequence allocation method, R×M sequences specified by a ZC sequence number r (r=1 to R) and a cyclic shift sequence number m (m=1 to M) are divided into a plurality of sequence groups X (X=1 to R) in accordance with the transmission band width of the reference signal, so that the ZC sequence is allocated to each cell in each sequence group unit. When it is assumed that R=9 and M=6, the number of sequences is 54. Each of the sequence groups is formed by two sequences. Accordingly, the number of sequence groups is 27. The 27 types of sequence groups are allocated to each cell.
    Type: Grant
    Filed: December 2, 2014
    Date of Patent: July 7, 2015
    Assignee: Panasonic Intellectual Property Corporation of America
    Inventors: Yoshihiko Ogawa, Daichi Imamura, Sadaki Futagi, Tomofumi Takata
  • Patent number: 9076132
    Abstract: A system and method may respond to a fraudulent attack, such as a Phishing attack. The system and method may send a number of responses to party committing fraud, the responses designed to mimic the responses to a Phishing attack. The responses may include codes or marked information designed to entrap or detect the party committing fraud.
    Type: Grant
    Filed: November 8, 2004
    Date of Patent: July 7, 2015
    Assignee: EMC Corporation
    Inventors: Lior Golan, Nira Rivner, Michal Tsur, Amir Orad, Naftali Bennett
  • Patent number: 9077714
    Abstract: A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server.
    Type: Grant
    Filed: March 28, 2013
    Date of Patent: July 7, 2015
    Assignee: AUTHENTIFY, INC.
    Inventors: Michael Neuman, Diana Neuman
  • Patent number: 9071437
    Abstract: Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved.
    Type: Grant
    Filed: May 21, 2013
    Date of Patent: June 30, 2015
    Assignee: Veritrix, Inc.
    Inventor: Paul Headley
  • Patent number: 9065593
    Abstract: Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a network. Decryption of sensitive information, such as medical dictation information, is performed on designated servers to limit the attack surface of unencrypted data. Management of encryption and decryption keys to restrict the storage and/or use of decryption keys on the server side of the client/server speech recognition system, while maintaining encrypted data on the server side is also described.
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: June 23, 2015
    Assignee: Nuance Communications, Inc.
    Inventors: William F. Ganong, III, Maximilian Bisani
  • Patent number: 9065823
    Abstract: (EN)A system, method and computer-readable storage medium with instructions for operating a digital signature server and a portable security device to cooperate to provide digital signature services using a private key stored on the portable security device by delegating to a user's smart card the actual task of digitally signing documents. Other systems and methods are disclosed.
    Type: Grant
    Filed: March 8, 2011
    Date of Patent: June 23, 2015
    Assignee: GEMALTO SA
    Inventors: HongQian Karen Lu, Kapil Sachdeva
  • Patent number: 9066157
    Abstract: A dynamic watermark generation method and system in which the dynamic watermark may have a default length or a shorter length, and wherein the dynamic watermark is generated to have the determined length. The dynamic watermark is a locally-unique code that is used as an index to a database entry that identifies the subscriber that requested the media asset. In some instances, the entry may include a timestamp, a subscriber device identifier such as a MAC address or IP address, a subscriber identifier or ID number, and a media asset identifier such as a static ID. The static ID may include a code that indicates whether the dynamic watermark is of a default length or shorter. The length of the dynamic watermark may be partly based upon projected audience size for the requested media asset.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: June 23, 2015
    Assignee: Rogers Communications Inc.
    Inventors: Luojun Jin, Antonio Colantonio, Dominic Anthony Doherty
  • Patent number: 9066404
    Abstract: Embodiments of the present invention relate to systems and methods for creating, distributing and playing illumination data files. The illumination data files, created using luminaire development systems are uploaded to a luminaire management system, where they are further processed and packaged for sale or license within a luminaire marketplace. Consumers and enterprises using luminaires may establish accounts with the luminaire management system and marketplace to access illumination data files for playback on individual or multiple luminaires. Consumers and enterprises may also create play lists and uniquely configure the luminaires to display various lighting effects based on user preferences, environmental factors or energy efficient settings.
    Type: Grant
    Filed: February 19, 2011
    Date of Patent: June 23, 2015
    Assignee: TeleLumen LLC
    Inventors: Steven Paolini, John Giddings
  • Patent number: 9059188
    Abstract: According to an aspect of the present principles, there is provided a method and an authentication apparatus. The method includes arranging a plurality of graphene resistors in parallel or series. The method further includes forming a unique identification code based on respective temperatures emanating from or respective voltages output from the plurality of graphene resistors when the plurality of graphene resistors are in a powered state.
    Type: Grant
    Filed: May 1, 2014
    Date of Patent: June 16, 2015
    Assignee: International Business Machines Corporation
    Inventors: Christos Dimitrakopoulos, Dirk Pfeiffer, Jean-Olivier Plouchart, Joshua T. Smith
  • Patent number: 9059858
    Abstract: Methods and computer program products provide digital signatures for documents. An authentication code relating to a document is received. The authentication code is decoded to identify a unique identifier for the document, an identifier for an authentication server, and a user authentication parameter. A user characteristic that is defined by the user authentication parameter is obtained to serve as a digital signature for the document. A digital signature storage request is communicated to the authentication server using the identifier for the authentication server. The digital signature storage request contains the unique identifier for the document and the user characteristic obtained by the mobile terminal, and indicates that the authentication server is to store the user characteristic with an association to the unique identifier for the document.
    Type: Grant
    Filed: March 11, 2013
    Date of Patent: June 16, 2015
    Assignee: CA, Inc.
    Inventors: Nathan J. Giardina, David S. Tyree, Beau Croteau, Robert Hucik
  • Patent number: 9059857
    Abstract: A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC) device are provided. The method includes generating a place marker signature record by setting a URI_present field to ‘0’ and setting a signature_type field to a predefined value, wherein a combination of the URI_present field set to ‘0’ and the signature_type field set to the predefined value indicates that a signature Record Type Definition (RTD) is a place marker signature record; and placing the place marker signature record in the NDEF message, wherein a set of records following the place marker signature record are secured.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: June 16, 2015
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Thenmozhi Arunan, Eun-Tae Won
  • Patent number: 9055353
    Abstract: A content transmission device for transmitting content, whose copying is controlled, includes an authentication section for performing an authentication procedure between the content transmission device and a content receiving device, a first copy-control-information processing section for processing first copy control information describing copy control information concerning the content, a second copy-control-information processing section for processing second copy control information including content information different from the first copy control information, and a content transmission section for generating and transmitting, to the content receiving device, a packet including a header including the first copy control information and the second copy control information, and a payload obtained by encrypting the content with a predetermined content key.
    Type: Grant
    Filed: November 7, 2012
    Date of Patent: June 9, 2015
    Assignee: Sony Corporation
    Inventors: Hiroyuki Suzuki, Takehiko Nakano, Hisato Shima
  • Patent number: 9053041
    Abstract: A system, method, and computer program product are provided for categorizing a plurality of vertices of a graph into independent sets. A random number is assigned to each vertex in the graph and the assigned number of each vertex is compared to the assigned numbers each of the neighbors of the vertex, where all vertices in the graph that have an assigned number greater than the assigned numbers of each of their neighbors are added to a first independent set, and all vertices in the graph that have an assigned number less than the assigned numbers of each of their neighbors are added to a second independent set separate from the first independent set.
    Type: Grant
    Filed: May 1, 2012
    Date of Patent: June 9, 2015
    Assignee: NVIDIA Corporation
    Inventors: Jonathan Michael Cohen, William N. Bell, Michael J. Garland
  • Patent number: 9053386
    Abstract: A user may submit an image and request from a server one or more images that are similar to the submitted image. The server may generate an image signature based on the content of the submitted image. The server may conduct a Hash operation to the image signature to generate one or more Hash values. These Hash values may be used to identify one or more candidate images similar to the image in a Hash table. These candidate images may be sorted and outputted to the user based on similarity. The similarity between each of the candidate images and the image may be determined using at least one of Hamming distance or Euclidean distance.
    Type: Grant
    Filed: January 18, 2012
    Date of Patent: June 9, 2015
    Assignee: Alibaba Group Holding Limited
    Inventor: Hui Xue
  • Patent number: 9049027
    Abstract: A digital signature is applied to digital documents/information. In certain instances, juridically strong digital signatures are achieved. Cloud computing technologies may be used to aid in the production of the cryptographically secure, authenticated digital signatures. Digital signatures may be produced with a digital notarization. The techniques of generating a digital signature may not require the use of traditional public key infrastructure (PKI).
    Type: Grant
    Filed: May 17, 2012
    Date of Patent: June 2, 2015
    Assignee: ZENERJI LLC
    Inventor: Young H. Etheridge
  • Patent number: 9047482
    Abstract: Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may receive a media request in response to selection of a link to a media stream. The link may include a first token that is generated based on a private key and an encryption algorithm, and the media request may include the first token. The computing device may grant or deny the media request based on a comparison of the first token and a second token that is generated based on the private key and the encryption algorithm.
    Type: Grant
    Filed: July 24, 2014
    Date of Patent: June 2, 2015
    Assignee: WOWZA MEDIA SYSTEMS, LLC
    Inventors: Brian M. Riegel, James S. Sherry
  • Patent number: 9049241
    Abstract: A system discovers peer nodes in a failover system, establishes a secure channel between at least two of the peer nodes, and exchanges state information over the secure channel.
    Type: Grant
    Filed: April 2, 2013
    Date of Patent: June 2, 2015
    Assignee: Juniper Networks, Inc.
    Inventors: Atul Narendra Trivedi, Steven A Malmskog
  • Publication number: 20150149784
    Abstract: A communication method utilizing fingerprint information authentication comprises the following steps: (a) extracting fingerprint information of first, and sending a request instruction to second user via the fingerprint information by a first user on an information exchange platform, and extracting fingerprint information of second user after receiving the request by the second user, and storing the fingerprint information in the information exchange platform and exchanging it with first user by the second user to confirm their identity; (b) inputting a message to be sent in an encrypting unit to obtain encrypted message by the first user after passing authentication, and transmitting the encrypted message to a communication application unit and sending it to second user, and receiving the encrypted message via the communication application unit by the second user; (c) decrypting the encrypted message by means of the decrypting unit by the second user after passing authentication.
    Type: Application
    Filed: November 10, 2012
    Publication date: May 28, 2015
    Applicant: WWTT TECHNOLOGY CHINA
    Inventors: Kwok fong Wong, Pui yi Ching
  • Publication number: 20150149781
    Abstract: Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include receiving a request to begin a new communication session, determining one or more desired parameters of the session, and determining whether the desired parameters of the message match proposed parameters provided by the entity requesting the new communication session. When the one or more proposed parameters match the one or more desired parameters, a secure communication session is established between the entities.
    Type: Application
    Filed: February 3, 2015
    Publication date: May 28, 2015
    Inventor: Jay D. Logue
  • Patent number: 9043898
    Abstract: An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is maintained. The mobile device is provided with a rights adjustment module which modifies the access rights for locally stored corporate data in dependence on the connectivity of the mobile device with a corporate server.
    Type: Grant
    Filed: April 18, 2011
    Date of Patent: May 26, 2015
    Assignee: LENOVO INNOVATIONS LIMITED (HONG KONG)
    Inventors: Frederic Fok Ah Chuen, Benoit Lecroart, Olivier Perron
  • Patent number: 9042555
    Abstract: A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.
    Type: Grant
    Filed: February 10, 2011
    Date of Patent: May 26, 2015
    Assignee: Sony Corporation
    Inventors: Brant L. Candelore, Stephane Lejeune
  • Patent number: 9043601
    Abstract: This disclosure relates to message encoding. One claim recites a digital watermark key generation method in which the key providing security for a plural-bit message. The method comprises: providing a plural-bit seed; randomizing the plural-bit seed; using a programmed electronic processor for encoding the randomized plural-bit seed with convolutional encoding, the encoded seed comprising a key; and transforming an independent message with the key, the independent message to be used in a digital watermark encoding process. Of course, other claims and combinations are provided too.
    Type: Grant
    Filed: March 20, 2012
    Date of Patent: May 26, 2015
    Assignee: Digimarc Corporation
    Inventors: Trent J. Brundage, Hugh L. Brunk
  • Patent number: 9042598
    Abstract: Methods and apparatus to generate and use content-aware watermarks are disclosed herein. In a disclosed example method, media composition data is received and at least one word present in an audio track of the media composition data is selected. The word is then located in a watermark.
    Type: Grant
    Filed: July 7, 2014
    Date of Patent: May 26, 2015
    Assignee: THE NIELSEN COMPANY (US), LLC
    Inventors: Arun Ramaswamy, Robert A. Luff
  • Patent number: 9037862
    Abstract: Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.
    Type: Grant
    Filed: June 4, 2013
    Date of Patent: May 19, 2015
    Assignee: AT&T Intellectual Property I, L.P.
    Inventors: Larry G. Kent, Jr., W. Todd Daniell, Joel A. Davis, Brian K. Daigle
  • Patent number: 9037453
    Abstract: An embedder for embedding a watermark to be embedded into an input information representation comprises an embedding parameter determiner that is implemented to apply a derivation function once or several times to an initial value to obtain an embedding parameter for embedding the watermark into the input information representation. Further, the embedder comprises a watermark adder that is implemented to provide the input information representation with the watermark using the embedding parameter. The embedder is implemented to select how many times the derivation function is to be applied to the initial value.
    Type: Grant
    Filed: March 3, 2009
    Date of Patent: May 19, 2015
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventors: Bernhard Grill, Ernst Eberlein, Stefan Kraegeloh, Joerg Pickel, Juliane Borsum
  • Patent number: 9036891
    Abstract: A system and method of generating and comparing a fingerprint for an integrated circuit is provided. A sensor module captures electromagnetic emissions from the integrated circuit. A feature extraction module extracts discriminating features from the captured electromagnetic emissions. A classifier training module generates a plurality of authentication fingerprints of the integrated circuit from the extracted discriminating features creating a reference fingerprint template for the integrated circuit. The reference template for the integrated circuit is stored in a database. For authentication, the reference fingerprint template from the database is compared to the generated authentication fingerprint.
    Type: Grant
    Filed: October 29, 2012
    Date of Patent: May 19, 2015
    Assignee: The United States of America as represented by the Secretary of the Air Force
    Inventors: William E Cobb, Michael A. Temple, Rusty O. Baldwin, Eric W Garcia, Eric D. Laspe
  • Patent number: 9037847
    Abstract: A method for enforcing digital rights management (DRM) rules in a first device is disclosed. In the method the first device receives a message that includes a rights object (RO) having a digital signature, directly from a source device. The first device determines an identity of a signing entity from the message including the RO having the digital signature. The signing entity is an entity that digitally signed the RO. The first device processes the message including the RO having the digital signature using the identity of the signing entity and an information state to enforce DRM rules in the first device.
    Type: Grant
    Filed: October 6, 2009
    Date of Patent: May 19, 2015
    Assignee: Google Technology Holdings LLC
    Inventor: David W. Kravitz
  • Patent number: 9037863
    Abstract: A terminal device recording content onto a recording medium device, a permission to record the content onto the recording medium device being granted by a server device, the terminal device comprising: a generation unit generating a value calculated so as to represent subject content for which permission to record is requested; an information transmission unit requesting the permission from the server device by transmitting information indicating the value generated by the generation unit to the server device; a signature reception unit receiving subject content signature data from the server device, the subject content signature data being transmitted by the server device upon granting the permission; and a recording unit recording the subject content onto the recording medium device as one of plain-text data and encrypted data, as well as the subject content signature data received by the signature reception unit.
    Type: Grant
    Filed: March 25, 2014
    Date of Patent: May 19, 2015
    Assignee: Panasonic Corporation
    Inventors: Takahiro Yamaguchi, Yuichi Futa
  • Patent number: 9037845
    Abstract: Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced.
    Type: Grant
    Filed: April 19, 2013
    Date of Patent: May 19, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael Kenneth Brown, Michael Grant Kirkup, Herbert Anthony Little
  • Publication number: 20150134970
    Abstract: A method of updating firmware of a near field communication (NFC) device includes copying metadata, which is included in a firmware image file, from an application processor to the NFC device. One of a certification success signal and a certification fail signal is provided from the NFC device to the application processor after the NFC device verifies an integrity of the metadata. Firmware data, which is included in the firmware image file, is copied from the application processor to the NFC device when the application processor receives the certification success signal from the NFC device.
    Type: Application
    Filed: July 14, 2014
    Publication date: May 14, 2015
    Inventors: Won-Churl Jang, Jeong-Yeop Kim, Woon-Ki Lee
  • Publication number: 20150134969
    Abstract: There are provided a method and device for providing a security assistant service. In an embodiment of the invention, there is provided a device for providing a security assistant service in which a first terminal and a second terminal are included.
    Type: Application
    Filed: April 2, 2014
    Publication date: May 14, 2015
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Soo-Hyung KIM, Young-Seob Cho, Jong-Hyouk Noh, Sang-Rae Cho, Dae-Seon Choi, Seung-Hyun Kim, Seok-Hyun Kim, Jin-Man Cho, Seung-Hun Jin, Hyun-Sook Cho
  • Patent number: 9032212
    Abstract: In one embodiment, a set of servers generates at least one challenge that is sent to a client. The servers receive from the client a response that includes a message generated as a function of the challenge. The response also includes a digital signature computed on the message using a secret key of a key pair generated for a current epoch. The client is authenticated based on indications from respective ones of the servers as to whether or not the received response is accepted as valid by that server. Other embodiments involve interaction between a set of servers and a relying party in authenticating a passcode, password or other information received from a client. The client in some embodiments may comprise a connected authentication token or other type of hardware or software authentication token.
    Type: Grant
    Filed: March 15, 2013
    Date of Patent: May 12, 2015
    Assignee: EMC Corporation
    Inventor: Ari Juels
  • Patent number: 9032207
    Abstract: A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content, includes the steps, iterated at the processing device, of: a) receiving from a server a signed workflow information, a workflow information comprising a status of the content processing, a signature of the process definition and a hash of the content; b) verifying the workflow information; c) when the workflow information is verified, processing the content according to the process definition and according to status of the content processing; d) updating and signing the workflow information; e) sending to the server the signed workflow information; and the steps iterated at the server of: f) receiving from a processing device a signed workflow information; g) publishing the signed workflow information received from the processing device. A system for performing the method is also provided.
    Type: Grant
    Filed: February 28, 2012
    Date of Patent: May 12, 2015
    Assignee: Thomson Licensing
    Inventor: Stephane Onno
  • Patent number: 9032510
    Abstract: A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in addition, the user can define a second input mode based on face recognition plus IR sensing satisfying a threshold to ensure a live person is being imaged for authentication, and/or face recognition plus a particular facial expression such as a smile and wink.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: May 12, 2015
    Assignee: Sony Corporation
    Inventors: Sriram Sampathkumaran, Eric Yam, Helmut Neumann, Seungwook Hong
  • Patent number: 9031233
    Abstract: A method for protecting content of a storage device including a memory for storing data and a controller for managing data input and output of the memory is provided, in which a Data Encryption Key (DEK) for encrypting the data stored in the memory is generated, an IDentifier (ID) of the memory is acquired, the DEK is encrypted using user secret information and the ID of the memory, and the encrypted DEK is stored in the memory.
    Type: Grant
    Filed: November 14, 2012
    Date of Patent: May 12, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Bo-Gyeong Kang, Ji-Soo Kim
  • Patent number: 9032219
    Abstract: Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a network. Decryption of sensitive information, such as medical dictation information, is performed on designated servers to limit the attack surface of unencrypted data. Management of encryption and decryption keys to restrict the storage and/or use of decryption keys on the server side of the client/server speech recognition system, while maintaining encrypted data on the server side is also described.
    Type: Grant
    Filed: November 16, 2012
    Date of Patent: May 12, 2015
    Assignee: Nuance Communications, Inc.
    Inventors: William F. Ganong, III, Maximilian Bisani
  • Patent number: 9032213
    Abstract: A method may include receiving data and first path-metadata. The first path-metadata may include a first entity identifier. The first entity identifier may be associated with a first receiving entity that receives the data and the first path-metadata from an originating entity. The first path-metadata may also include a first digital signature associated with the originating entity. The method may further include receiving second path-metadata that may include the first path-metadata and a second entity identifier associated with a second receiving entity. The second path-metadata may also include a second digital signature associated with the first receiving entity. The method may additionally include verifying that the data was communicated by the originating entity to the first receiving entity and from the first receiving entity to the second receiving entity based on the first path-metadata, the second path-metadata, the first digital signature, and the second digital signature.
    Type: Grant
    Filed: July 25, 2013
    Date of Patent: May 12, 2015
    Assignee: Fujitsu Limited
    Inventors: Daisuke Mashima, Ulrich Herberg, Wei-Peng Chen
  • Patent number: 9032211
    Abstract: Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place marker signature record is a modified signature Record Type Definition (RTD). A first set of records preceding the place marker signature record in the NDEF message is unsecured. The method also includes securing a second set of records following the place marker signature record. Another method includes placing a secured bytes field in the signature RTD. The secured byte field indicates a number of bytes of data to be secured preceding this field. The method also includes securing data in records preceding this field in the signature RTD, based on a value of the secured bytes field.
    Type: Grant
    Filed: July 9, 2009
    Date of Patent: May 12, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Thenmozhi Arunan, Eun-Tae Won
  • Publication number: 20150127948
    Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
    Type: Application
    Filed: January 13, 2015
    Publication date: May 7, 2015
    Inventors: Masao NONAKA, Yuichi FUTA, Toshihisa NAKANO, Kaoru YOKOTA, Motoji OHMORI, Masaya MIYAZAKI, Masaya YAMAMOTO, Kaoru MURASE, Senichi ONODA
  • Patent number: 9026784
    Abstract: An example method includes identifying a transport layer security (TLS) session between a client and a server, parsing one or more TLS messages to identify a session ticket associated with the session, transforming the session ticket into a fixed size session token, and managing the session using the session token to identify the session. The transforming may include computing a hash value of the session ticket using a hashing algorithm. If any of the TLS messages is spread across more than one TLS protocol record, the method can include computing a hash value of a portion of the session ticket encountered in a TLS protocol record using a hashing algorithm, incrementally computing another hash value of another portion of the session ticket encountered in a subsequent TLS protocol record from the previously computed hash value, and repeating the incremental computing until portions of the session ticket have been processed.
    Type: Grant
    Filed: January 26, 2012
    Date of Patent: May 5, 2015
    Assignee: McAfee, Inc.
    Inventors: Shivakumar Buruganahalli, Venu Vissamsetty
  • Patent number: 9027110
    Abstract: The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly.
    Type: Grant
    Filed: August 28, 2012
    Date of Patent: May 5, 2015
    Assignee: Feitian Technologies Co., Ltd.
    Inventors: Zhou Lu, Huazhang Yu
  • Patent number: 9026795
    Abstract: When a signature apparatus cooperating with a market server receives signature request information for an optional application from the market server to sign an application, the signature apparatus determines whether an authentication note has been issued corresponding to application identification information included in the signature request information based on the application identification information. When the authentication note has not been issued; the signature apparatus issues the authentication note using the application identification information, generates signature information for the to application using the application identification information, and signs the application including the authentication note and the signature information.
    Type: Grant
    Filed: June 1, 2012
    Date of Patent: May 5, 2015
    Assignee: KT Corporation
    Inventors: Ji-Hoon Ha, Min Kim, Seog-Cheon Jeon
  • Patent number: 9026796
    Abstract: A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.
    Type: Grant
    Filed: June 11, 2013
    Date of Patent: May 5, 2015
    Assignee: International Business Machines Corporation
    Inventors: Richard Dean Dettinger, Lydia M. Do, Frederick A. Kulack, Kevin G. Paterson
  • Patent number: 9026794
    Abstract: An information processing system including a medium where a content to be played is stored; and a playing apparatus for playing a content stored in the medium; with the playing apparatus being configured to selectively activate a playing program according to a content type to be played, to obtain a device certificate correlated with the playing program from storage by executing the playing program, and to transmit the obtained device certificate to the medium; with the device certificate being a device certificate for content types in which content type information where the device certificate is available is recorded; and with the medium determining whether or not an encryption key with reading being requested from the playing apparatus is an encryption key for decrypting an encrypted content matching an available content type recorded in the device certificate, and permitting readout of the encryption key only in the case of matching.
    Type: Grant
    Filed: July 11, 2012
    Date of Patent: May 5, 2015
    Assignee: Sony Corporation
    Inventors: Kenjiro Ueda, Hiroshi Kuno, Takamichi Hayashi
  • Publication number: 20150121068
    Abstract: A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.
    Type: Application
    Filed: October 29, 2013
    Publication date: April 30, 2015
    Inventors: Rolf Lindemann, Davit Baghdasaryan
  • Publication number: 20150121082
    Abstract: Systems and methods for watermarking content and authenticating watermarked content are provided. Content is rendered on a display while watermarking information embedded in portions of the content are obtained. The watermarking information is verified to authenticate the content. If the content is not authentic, or is not authenticated within a period of time, the content can be terminated or otherwise blocked from rendering on the display.
    Type: Application
    Filed: October 30, 2014
    Publication date: April 30, 2015
    Inventors: Giovanni Carapelli, Bruce Welch
  • Publication number: 20150121083
    Abstract: The present invention relates to mobile terminals and provides a method, device, and terminal for installing a browser plug-in. The method includes: receiving an instruction of installing a browser plug-in which is applied in a designated browser; and judging whether the browser plug-in is legal according to digital signature information of the browser plug-in and browser information of the designated browser, if yes, installing the browser plug-in, otherwise, rejecting the installation of the browser plug-in. At the beginning of the installation of the browser plug-in, the browser plug-in is verified according to the digital signature information of the browser plug-in and the browser information of the designated browser corresponding to the browser plug-in, thus, the legality and traceability of the browser plug-in can be determined to prevent the harmful browser plug-in from calling API of the mobile terminal at random and further to improve the safety of the mobile terminal.
    Type: Application
    Filed: December 25, 2014
    Publication date: April 30, 2015
    Inventor: Baohua Zhang
  • Publication number: 20150121081
    Abstract: A method for generating a digital signature includes grouping, with a processing device, a first record with a second record, and generating a first digital signature based at least in part on the first record and the second record.
    Type: Application
    Filed: September 29, 2014
    Publication date: April 30, 2015
    Inventors: John C. Dayka, Anthony T. Sofia