Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
-
Patent number: 9083698Abstract: The present invention relates to a method and a system for operating a device (100).Type: GrantFiled: November 8, 2011Date of Patent: July 14, 2015Assignee: Zablox ABInventors: Lars Tilly, Stefan Gripwall
-
Patent number: 9081791Abstract: A method of reducing duplicates of multimedia data items in a service system includes maintaining service system hash values for the multimedia data items of the service system; receiving a first multimedia data item; and hashing the received multimedia data item to provide a first hash value. The method further includes searching the first hash value from the service system hash values; and approving the received multimedia data item to the service system in response to the first hash value being not found when searching from the service system hash values.Type: GrantFiled: March 18, 2013Date of Patent: July 14, 2015Assignee: P2S MEDIA GROUP OYInventor: Timo Johannes Rinne
-
Patent number: 9077595Abstract: Provided is a sequence allocation method capable of reducing inter-cell interference of a reference signal when a ZC sequence is used as the reference signal in a mobile communication system. In the sequence allocation method, R×M sequences specified by a ZC sequence number r (r=1 to R) and a cyclic shift sequence number m (m=1 to M) are divided into a plurality of sequence groups X (X=1 to R) in accordance with the transmission band width of the reference signal, so that the ZC sequence is allocated to each cell in each sequence group unit. When it is assumed that R=9 and M=6, the number of sequences is 54. Each of the sequence groups is formed by two sequences. Accordingly, the number of sequence groups is 27. The 27 types of sequence groups are allocated to each cell.Type: GrantFiled: December 2, 2014Date of Patent: July 7, 2015Assignee: Panasonic Intellectual Property Corporation of AmericaInventors: Yoshihiko Ogawa, Daichi Imamura, Sadaki Futagi, Tomofumi Takata
-
Patent number: 9076132Abstract: A system and method may respond to a fraudulent attack, such as a Phishing attack. The system and method may send a number of responses to party committing fraud, the responses designed to mimic the responses to a Phishing attack. The responses may include codes or marked information designed to entrap or detect the party committing fraud.Type: GrantFiled: November 8, 2004Date of Patent: July 7, 2015Assignee: EMC CorporationInventors: Lior Golan, Nira Rivner, Michal Tsur, Amir Orad, Naftali Bennett
-
Patent number: 9077714Abstract: A user device transmits a login request. A provider server, receives a random number from and transmits other information to an authentication server. The provider server transmits the random number to the device. The random number is transferred to a second user device, which transmits it to the authentication server. The authentication server transmits provider authentication policy requirements and further transmits the other information to the second device. The second device transmits user validation information to the authentication server. The authentication server determines that the transmitted validation information corresponds to the service provider authentication policy requirements, compares the validation information with stored validation information for the user to authenticate the user. The second device transmits a message, including the random number and the other information, signed with a user credential to the authentication server.Type: GrantFiled: March 28, 2013Date of Patent: July 7, 2015Assignee: AUTHENTIFY, INC.Inventors: Michael Neuman, Diana Neuman
-
Patent number: 9071437Abstract: Third-party applications for platforms are linked to identified individuals that guarantee the security of the applications. The linkage is achieved by acquiring one or more biometric records of the individual guarantor, storing those records as a signature in a database, assigning a unique identifier to the signature, and embedding that unique identifier in the executable file of the application. The signature of the guarantor can be compared to other stored signatures of other guarantors to check for individuals posing under multiple aliases. The signature of a guarantor linked to a malicious application can be flagged so that a subsequent application guaranteed by the same individual can be disapproved.Type: GrantFiled: May 21, 2013Date of Patent: June 30, 2015Assignee: Veritrix, Inc.Inventor: Paul Headley
-
Patent number: 9065593Abstract: Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a network. Decryption of sensitive information, such as medical dictation information, is performed on designated servers to limit the attack surface of unencrypted data. Management of encryption and decryption keys to restrict the storage and/or use of decryption keys on the server side of the client/server speech recognition system, while maintaining encrypted data on the server side is also described.Type: GrantFiled: November 16, 2012Date of Patent: June 23, 2015Assignee: Nuance Communications, Inc.Inventors: William F. Ganong, III, Maximilian Bisani
-
Patent number: 9065823Abstract: (EN)A system, method and computer-readable storage medium with instructions for operating a digital signature server and a portable security device to cooperate to provide digital signature services using a private key stored on the portable security device by delegating to a user's smart card the actual task of digitally signing documents. Other systems and methods are disclosed.Type: GrantFiled: March 8, 2011Date of Patent: June 23, 2015Assignee: GEMALTO SAInventors: HongQian Karen Lu, Kapil Sachdeva
-
Patent number: 9066157Abstract: A dynamic watermark generation method and system in which the dynamic watermark may have a default length or a shorter length, and wherein the dynamic watermark is generated to have the determined length. The dynamic watermark is a locally-unique code that is used as an index to a database entry that identifies the subscriber that requested the media asset. In some instances, the entry may include a timestamp, a subscriber device identifier such as a MAC address or IP address, a subscriber identifier or ID number, and a media asset identifier such as a static ID. The static ID may include a code that indicates whether the dynamic watermark is of a default length or shorter. The length of the dynamic watermark may be partly based upon projected audience size for the requested media asset.Type: GrantFiled: February 28, 2012Date of Patent: June 23, 2015Assignee: Rogers Communications Inc.Inventors: Luojun Jin, Antonio Colantonio, Dominic Anthony Doherty
-
Patent number: 9066404Abstract: Embodiments of the present invention relate to systems and methods for creating, distributing and playing illumination data files. The illumination data files, created using luminaire development systems are uploaded to a luminaire management system, where they are further processed and packaged for sale or license within a luminaire marketplace. Consumers and enterprises using luminaires may establish accounts with the luminaire management system and marketplace to access illumination data files for playback on individual or multiple luminaires. Consumers and enterprises may also create play lists and uniquely configure the luminaires to display various lighting effects based on user preferences, environmental factors or energy efficient settings.Type: GrantFiled: February 19, 2011Date of Patent: June 23, 2015Assignee: TeleLumen LLCInventors: Steven Paolini, John Giddings
-
Patent number: 9059188Abstract: According to an aspect of the present principles, there is provided a method and an authentication apparatus. The method includes arranging a plurality of graphene resistors in parallel or series. The method further includes forming a unique identification code based on respective temperatures emanating from or respective voltages output from the plurality of graphene resistors when the plurality of graphene resistors are in a powered state.Type: GrantFiled: May 1, 2014Date of Patent: June 16, 2015Assignee: International Business Machines CorporationInventors: Christos Dimitrakopoulos, Dirk Pfeiffer, Jean-Olivier Plouchart, Joshua T. Smith
-
Patent number: 9059858Abstract: Methods and computer program products provide digital signatures for documents. An authentication code relating to a document is received. The authentication code is decoded to identify a unique identifier for the document, an identifier for an authentication server, and a user authentication parameter. A user characteristic that is defined by the user authentication parameter is obtained to serve as a digital signature for the document. A digital signature storage request is communicated to the authentication server using the identifier for the authentication server. The digital signature storage request contains the unique identifier for the document and the user characteristic obtained by the mobile terminal, and indicates that the authentication server is to store the user characteristic with an association to the unique identifier for the document.Type: GrantFiled: March 11, 2013Date of Patent: June 16, 2015Assignee: CA, Inc.Inventors: Nathan J. Giardina, David S. Tyree, Beau Croteau, Robert Hucik
-
Patent number: 9059857Abstract: A method and apparatus for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message in a Near Field Communication (NFC) device are provided. The method includes generating a place marker signature record by setting a URI_present field to ‘0’ and setting a signature_type field to a predefined value, wherein a combination of the URI_present field set to ‘0’ and the signature_type field set to the predefined value indicates that a signature Record Type Definition (RTD) is a place marker signature record; and placing the place marker signature record in the NDEF message, wherein a set of records following the place marker signature record are secured.Type: GrantFiled: March 25, 2014Date of Patent: June 16, 2015Assignee: Samsung Electronics Co., LtdInventors: Thenmozhi Arunan, Eun-Tae Won
-
Patent number: 9055353Abstract: A content transmission device for transmitting content, whose copying is controlled, includes an authentication section for performing an authentication procedure between the content transmission device and a content receiving device, a first copy-control-information processing section for processing first copy control information describing copy control information concerning the content, a second copy-control-information processing section for processing second copy control information including content information different from the first copy control information, and a content transmission section for generating and transmitting, to the content receiving device, a packet including a header including the first copy control information and the second copy control information, and a payload obtained by encrypting the content with a predetermined content key.Type: GrantFiled: November 7, 2012Date of Patent: June 9, 2015Assignee: Sony CorporationInventors: Hiroyuki Suzuki, Takehiko Nakano, Hisato Shima
-
Patent number: 9053041Abstract: A system, method, and computer program product are provided for categorizing a plurality of vertices of a graph into independent sets. A random number is assigned to each vertex in the graph and the assigned number of each vertex is compared to the assigned numbers each of the neighbors of the vertex, where all vertices in the graph that have an assigned number greater than the assigned numbers of each of their neighbors are added to a first independent set, and all vertices in the graph that have an assigned number less than the assigned numbers of each of their neighbors are added to a second independent set separate from the first independent set.Type: GrantFiled: May 1, 2012Date of Patent: June 9, 2015Assignee: NVIDIA CorporationInventors: Jonathan Michael Cohen, William N. Bell, Michael J. Garland
-
Patent number: 9053386Abstract: A user may submit an image and request from a server one or more images that are similar to the submitted image. The server may generate an image signature based on the content of the submitted image. The server may conduct a Hash operation to the image signature to generate one or more Hash values. These Hash values may be used to identify one or more candidate images similar to the image in a Hash table. These candidate images may be sorted and outputted to the user based on similarity. The similarity between each of the candidate images and the image may be determined using at least one of Hamming distance or Euclidean distance.Type: GrantFiled: January 18, 2012Date of Patent: June 9, 2015Assignee: Alibaba Group Holding LimitedInventor: Hui Xue
-
Patent number: 9049027Abstract: A digital signature is applied to digital documents/information. In certain instances, juridically strong digital signatures are achieved. Cloud computing technologies may be used to aid in the production of the cryptographically secure, authenticated digital signatures. Digital signatures may be produced with a digital notarization. The techniques of generating a digital signature may not require the use of traditional public key infrastructure (PKI).Type: GrantFiled: May 17, 2012Date of Patent: June 2, 2015Assignee: ZENERJI LLCInventor: Young H. Etheridge
-
Patent number: 9047482Abstract: Systems and methods of token-based protection for links to media streams are disclosed. For example, a computing device may receive a media request in response to selection of a link to a media stream. The link may include a first token that is generated based on a private key and an encryption algorithm, and the media request may include the first token. The computing device may grant or deny the media request based on a comparison of the first token and a second token that is generated based on the private key and the encryption algorithm.Type: GrantFiled: July 24, 2014Date of Patent: June 2, 2015Assignee: WOWZA MEDIA SYSTEMS, LLCInventors: Brian M. Riegel, James S. Sherry
-
Patent number: 9049241Abstract: A system discovers peer nodes in a failover system, establishes a secure channel between at least two of the peer nodes, and exchanges state information over the secure channel.Type: GrantFiled: April 2, 2013Date of Patent: June 2, 2015Assignee: Juniper Networks, Inc.Inventors: Atul Narendra Trivedi, Steven A Malmskog
-
Publication number: 20150149784Abstract: A communication method utilizing fingerprint information authentication comprises the following steps: (a) extracting fingerprint information of first, and sending a request instruction to second user via the fingerprint information by a first user on an information exchange platform, and extracting fingerprint information of second user after receiving the request by the second user, and storing the fingerprint information in the information exchange platform and exchanging it with first user by the second user to confirm their identity; (b) inputting a message to be sent in an encrypting unit to obtain encrypted message by the first user after passing authentication, and transmitting the encrypted message to a communication application unit and sending it to second user, and receiving the encrypted message via the communication application unit by the second user; (c) decrypting the encrypted message by means of the decrypting unit by the second user after passing authentication.Type: ApplicationFiled: November 10, 2012Publication date: May 28, 2015Applicant: WWTT TECHNOLOGY CHINAInventors: Kwok fong Wong, Pui yi Ching
-
Publication number: 20150149781Abstract: Methods, devices, and machine-readable media are provided to provide secure communications between entities. As provided in this disclosure, this may include receiving a request to begin a new communication session, determining one or more desired parameters of the session, and determining whether the desired parameters of the message match proposed parameters provided by the entity requesting the new communication session. When the one or more proposed parameters match the one or more desired parameters, a secure communication session is established between the entities.Type: ApplicationFiled: February 3, 2015Publication date: May 28, 2015Inventor: Jay D. Logue
-
Patent number: 9043898Abstract: An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is maintained. The mobile device is provided with a rights adjustment module which modifies the access rights for locally stored corporate data in dependence on the connectivity of the mobile device with a corporate server.Type: GrantFiled: April 18, 2011Date of Patent: May 26, 2015Assignee: LENOVO INNOVATIONS LIMITED (HONG KONG)Inventors: Frederic Fok Ah Chuen, Benoit Lecroart, Olivier Perron
-
Patent number: 9042555Abstract: A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.Type: GrantFiled: February 10, 2011Date of Patent: May 26, 2015Assignee: Sony CorporationInventors: Brant L. Candelore, Stephane Lejeune
-
Patent number: 9043601Abstract: This disclosure relates to message encoding. One claim recites a digital watermark key generation method in which the key providing security for a plural-bit message. The method comprises: providing a plural-bit seed; randomizing the plural-bit seed; using a programmed electronic processor for encoding the randomized plural-bit seed with convolutional encoding, the encoded seed comprising a key; and transforming an independent message with the key, the independent message to be used in a digital watermark encoding process. Of course, other claims and combinations are provided too.Type: GrantFiled: March 20, 2012Date of Patent: May 26, 2015Assignee: Digimarc CorporationInventors: Trent J. Brundage, Hugh L. Brunk
-
Patent number: 9042598Abstract: Methods and apparatus to generate and use content-aware watermarks are disclosed herein. In a disclosed example method, media composition data is received and at least one word present in an audio track of the media composition data is selected. The word is then located in a watermark.Type: GrantFiled: July 7, 2014Date of Patent: May 26, 2015Assignee: THE NIELSEN COMPANY (US), LLCInventors: Arun Ramaswamy, Robert A. Luff
-
Patent number: 9037862Abstract: Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.Type: GrantFiled: June 4, 2013Date of Patent: May 19, 2015Assignee: AT&T Intellectual Property I, L.P.Inventors: Larry G. Kent, Jr., W. Todd Daniell, Joel A. Davis, Brian K. Daigle
-
Patent number: 9037453Abstract: An embedder for embedding a watermark to be embedded into an input information representation comprises an embedding parameter determiner that is implemented to apply a derivation function once or several times to an initial value to obtain an embedding parameter for embedding the watermark into the input information representation. Further, the embedder comprises a watermark adder that is implemented to provide the input information representation with the watermark using the embedding parameter. The embedder is implemented to select how many times the derivation function is to be applied to the initial value.Type: GrantFiled: March 3, 2009Date of Patent: May 19, 2015Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.Inventors: Bernhard Grill, Ernst Eberlein, Stefan Kraegeloh, Joerg Pickel, Juliane Borsum
-
Patent number: 9036891Abstract: A system and method of generating and comparing a fingerprint for an integrated circuit is provided. A sensor module captures electromagnetic emissions from the integrated circuit. A feature extraction module extracts discriminating features from the captured electromagnetic emissions. A classifier training module generates a plurality of authentication fingerprints of the integrated circuit from the extracted discriminating features creating a reference fingerprint template for the integrated circuit. The reference template for the integrated circuit is stored in a database. For authentication, the reference fingerprint template from the database is compared to the generated authentication fingerprint.Type: GrantFiled: October 29, 2012Date of Patent: May 19, 2015Assignee: The United States of America as represented by the Secretary of the Air ForceInventors: William E Cobb, Michael A. Temple, Rusty O. Baldwin, Eric W Garcia, Eric D. Laspe
-
Patent number: 9037847Abstract: A method for enforcing digital rights management (DRM) rules in a first device is disclosed. In the method the first device receives a message that includes a rights object (RO) having a digital signature, directly from a source device. The first device determines an identity of a signing entity from the message including the RO having the digital signature. The signing entity is an entity that digitally signed the RO. The first device processes the message including the RO having the digital signature using the identity of the signing entity and an information state to enforce DRM rules in the first device.Type: GrantFiled: October 6, 2009Date of Patent: May 19, 2015Assignee: Google Technology Holdings LLCInventor: David W. Kravitz
-
Patent number: 9037863Abstract: A terminal device recording content onto a recording medium device, a permission to record the content onto the recording medium device being granted by a server device, the terminal device comprising: a generation unit generating a value calculated so as to represent subject content for which permission to record is requested; an information transmission unit requesting the permission from the server device by transmitting information indicating the value generated by the generation unit to the server device; a signature reception unit receiving subject content signature data from the server device, the subject content signature data being transmitted by the server device upon granting the permission; and a recording unit recording the subject content onto the recording medium device as one of plain-text data and encrypted data, as well as the subject content signature data received by the signature reception unit.Type: GrantFiled: March 25, 2014Date of Patent: May 19, 2015Assignee: Panasonic CorporationInventors: Takahiro Yamaguchi, Yuichi Futa
-
Patent number: 9037845Abstract: Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced.Type: GrantFiled: April 19, 2013Date of Patent: May 19, 2015Assignee: BlackBerry LimitedInventors: Michael Kenneth Brown, Michael Grant Kirkup, Herbert Anthony Little
-
Publication number: 20150134970Abstract: A method of updating firmware of a near field communication (NFC) device includes copying metadata, which is included in a firmware image file, from an application processor to the NFC device. One of a certification success signal and a certification fail signal is provided from the NFC device to the application processor after the NFC device verifies an integrity of the metadata. Firmware data, which is included in the firmware image file, is copied from the application processor to the NFC device when the application processor receives the certification success signal from the NFC device.Type: ApplicationFiled: July 14, 2014Publication date: May 14, 2015Inventors: Won-Churl Jang, Jeong-Yeop Kim, Woon-Ki Lee
-
Publication number: 20150134969Abstract: There are provided a method and device for providing a security assistant service. In an embodiment of the invention, there is provided a device for providing a security assistant service in which a first terminal and a second terminal are included.Type: ApplicationFiled: April 2, 2014Publication date: May 14, 2015Applicant: Electronics and Telecommunications Research InstituteInventors: Soo-Hyung KIM, Young-Seob Cho, Jong-Hyouk Noh, Sang-Rae Cho, Dae-Seon Choi, Seung-Hyun Kim, Seok-Hyun Kim, Jin-Man Cho, Seung-Hun Jin, Hyun-Sook Cho
-
Patent number: 9032212Abstract: In one embodiment, a set of servers generates at least one challenge that is sent to a client. The servers receive from the client a response that includes a message generated as a function of the challenge. The response also includes a digital signature computed on the message using a secret key of a key pair generated for a current epoch. The client is authenticated based on indications from respective ones of the servers as to whether or not the received response is accepted as valid by that server. Other embodiments involve interaction between a set of servers and a relying party in authenticating a passcode, password or other information received from a client. The client in some embodiments may comprise a connected authentication token or other type of hardware or software authentication token.Type: GrantFiled: March 15, 2013Date of Patent: May 12, 2015Assignee: EMC CorporationInventor: Ari Juels
-
Patent number: 9032207Abstract: A method of processing content according to a workflow, where a digital content is processed on one of a plurality of processing devices according to process definition associated to the content, includes the steps, iterated at the processing device, of: a) receiving from a server a signed workflow information, a workflow information comprising a status of the content processing, a signature of the process definition and a hash of the content; b) verifying the workflow information; c) when the workflow information is verified, processing the content according to the process definition and according to status of the content processing; d) updating and signing the workflow information; e) sending to the server the signed workflow information; and the steps iterated at the server of: f) receiving from a processing device a signed workflow information; g) publishing the signed workflow information received from the processing device. A system for performing the method is also provided.Type: GrantFiled: February 28, 2012Date of Patent: May 12, 2015Assignee: Thomson LicensingInventor: Stephane Onno
-
Patent number: 9032510Abstract: A user can define a gesture-based input mode with respective input value to establish an authentication protocol to unlock a computer or govern other computer behavior. As an alternative or in addition, the user can define a second input mode based on face recognition plus IR sensing satisfying a threshold to ensure a live person is being imaged for authentication, and/or face recognition plus a particular facial expression such as a smile and wink.Type: GrantFiled: September 11, 2012Date of Patent: May 12, 2015Assignee: Sony CorporationInventors: Sriram Sampathkumaran, Eric Yam, Helmut Neumann, Seungwook Hong
-
Patent number: 9031233Abstract: A method for protecting content of a storage device including a memory for storing data and a controller for managing data input and output of the memory is provided, in which a Data Encryption Key (DEK) for encrypting the data stored in the memory is generated, an IDentifier (ID) of the memory is acquired, the DEK is encrypted using user secret information and the ID of the memory, and the encrypted DEK is stored in the memory.Type: GrantFiled: November 14, 2012Date of Patent: May 12, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Bo-Gyeong Kang, Ji-Soo Kim
-
Patent number: 9032219Abstract: Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a network. Decryption of sensitive information, such as medical dictation information, is performed on designated servers to limit the attack surface of unencrypted data. Management of encryption and decryption keys to restrict the storage and/or use of decryption keys on the server side of the client/server speech recognition system, while maintaining encrypted data on the server side is also described.Type: GrantFiled: November 16, 2012Date of Patent: May 12, 2015Assignee: Nuance Communications, Inc.Inventors: William F. Ganong, III, Maximilian Bisani
-
Patent number: 9032213Abstract: A method may include receiving data and first path-metadata. The first path-metadata may include a first entity identifier. The first entity identifier may be associated with a first receiving entity that receives the data and the first path-metadata from an originating entity. The first path-metadata may also include a first digital signature associated with the originating entity. The method may further include receiving second path-metadata that may include the first path-metadata and a second entity identifier associated with a second receiving entity. The second path-metadata may also include a second digital signature associated with the first receiving entity. The method may additionally include verifying that the data was communicated by the originating entity to the first receiving entity and from the first receiving entity to the second receiving entity based on the first path-metadata, the second path-metadata, the first digital signature, and the second digital signature.Type: GrantFiled: July 25, 2013Date of Patent: May 12, 2015Assignee: Fujitsu LimitedInventors: Daisuke Mashima, Ulrich Herberg, Wei-Peng Chen
-
Patent number: 9032211Abstract: Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place marker signature record is a modified signature Record Type Definition (RTD). A first set of records preceding the place marker signature record in the NDEF message is unsecured. The method also includes securing a second set of records following the place marker signature record. Another method includes placing a secured bytes field in the signature RTD. The secured byte field indicates a number of bytes of data to be secured preceding this field. The method also includes securing data in records preceding this field in the signature RTD, based on a value of the secured bytes field.Type: GrantFiled: July 9, 2009Date of Patent: May 12, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Thenmozhi Arunan, Eun-Tae Won
-
Publication number: 20150127948Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.Type: ApplicationFiled: January 13, 2015Publication date: May 7, 2015Inventors: Masao NONAKA, Yuichi FUTA, Toshihisa NAKANO, Kaoru YOKOTA, Motoji OHMORI, Masaya MIYAZAKI, Masaya YAMAMOTO, Kaoru MURASE, Senichi ONODA
-
Patent number: 9026784Abstract: An example method includes identifying a transport layer security (TLS) session between a client and a server, parsing one or more TLS messages to identify a session ticket associated with the session, transforming the session ticket into a fixed size session token, and managing the session using the session token to identify the session. The transforming may include computing a hash value of the session ticket using a hashing algorithm. If any of the TLS messages is spread across more than one TLS protocol record, the method can include computing a hash value of a portion of the session ticket encountered in a TLS protocol record using a hashing algorithm, incrementally computing another hash value of another portion of the session ticket encountered in a subsequent TLS protocol record from the previously computed hash value, and repeating the incremental computing until portions of the session ticket have been processed.Type: GrantFiled: January 26, 2012Date of Patent: May 5, 2015Assignee: McAfee, Inc.Inventors: Shivakumar Buruganahalli, Venu Vissamsetty
-
Patent number: 9027110Abstract: The present invention relates to the field of information security. Disclosed are a system and method for communication between a dynamic token and a tool, the system comprising a tool part and a dynamic token part; the tool part comprises a control module and a tool radio frequency communication module; the dynamic token part comprises an MCU and liquid crystal module and an OTP radio frequency communication module. The method comprises: the tool part transmits a modulated wake-up command signal to the dynamic token part in the form of an electromagnetic wave; when a wake-up response command signal returned by the dynamic token part is correctly received, the tool part transmits the modulated command signal to the dynamic token part in the form of an electromagnetic wave; and the tool part detects the amplitude variation of the generated carrier signal, judges whether the response signal is correctly received, and operates correspondingly.Type: GrantFiled: August 28, 2012Date of Patent: May 5, 2015Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 9026795Abstract: When a signature apparatus cooperating with a market server receives signature request information for an optional application from the market server to sign an application, the signature apparatus determines whether an authentication note has been issued corresponding to application identification information included in the signature request information based on the application identification information. When the authentication note has not been issued; the signature apparatus issues the authentication note using the application identification information, generates signature information for the to application using the application identification information, and signs the application including the authentication note and the signature information.Type: GrantFiled: June 1, 2012Date of Patent: May 5, 2015Assignee: KT CorporationInventors: Ji-Hoon Ha, Min Kim, Seog-Cheon Jeon
-
Patent number: 9026796Abstract: A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.Type: GrantFiled: June 11, 2013Date of Patent: May 5, 2015Assignee: International Business Machines CorporationInventors: Richard Dean Dettinger, Lydia M. Do, Frederick A. Kulack, Kevin G. Paterson
-
Patent number: 9026794Abstract: An information processing system including a medium where a content to be played is stored; and a playing apparatus for playing a content stored in the medium; with the playing apparatus being configured to selectively activate a playing program according to a content type to be played, to obtain a device certificate correlated with the playing program from storage by executing the playing program, and to transmit the obtained device certificate to the medium; with the device certificate being a device certificate for content types in which content type information where the device certificate is available is recorded; and with the medium determining whether or not an encryption key with reading being requested from the playing apparatus is an encryption key for decrypting an encrypted content matching an available content type recorded in the device certificate, and permitting readout of the encryption key only in the case of matching.Type: GrantFiled: July 11, 2012Date of Patent: May 5, 2015Assignee: Sony CorporationInventors: Kenjiro Ueda, Hiroshi Kuno, Takamichi Hayashi
-
Publication number: 20150121068Abstract: A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.Type: ApplicationFiled: October 29, 2013Publication date: April 30, 2015Inventors: Rolf Lindemann, Davit Baghdasaryan
-
Publication number: 20150121082Abstract: Systems and methods for watermarking content and authenticating watermarked content are provided. Content is rendered on a display while watermarking information embedded in portions of the content are obtained. The watermarking information is verified to authenticate the content. If the content is not authentic, or is not authenticated within a period of time, the content can be terminated or otherwise blocked from rendering on the display.Type: ApplicationFiled: October 30, 2014Publication date: April 30, 2015Inventors: Giovanni Carapelli, Bruce Welch
-
Publication number: 20150121083Abstract: The present invention relates to mobile terminals and provides a method, device, and terminal for installing a browser plug-in. The method includes: receiving an instruction of installing a browser plug-in which is applied in a designated browser; and judging whether the browser plug-in is legal according to digital signature information of the browser plug-in and browser information of the designated browser, if yes, installing the browser plug-in, otherwise, rejecting the installation of the browser plug-in. At the beginning of the installation of the browser plug-in, the browser plug-in is verified according to the digital signature information of the browser plug-in and the browser information of the designated browser corresponding to the browser plug-in, thus, the legality and traceability of the browser plug-in can be determined to prevent the harmful browser plug-in from calling API of the mobile terminal at random and further to improve the safety of the mobile terminal.Type: ApplicationFiled: December 25, 2014Publication date: April 30, 2015Inventor: Baohua Zhang
-
Publication number: 20150121081Abstract: A method for generating a digital signature includes grouping, with a processing device, a first record with a second record, and generating a first digital signature based at least in part on the first record and the second record.Type: ApplicationFiled: September 29, 2014Publication date: April 30, 2015Inventors: John C. Dayka, Anthony T. Sofia