Authentication By Digital Signature Representation Or Digital Watermark Patents (Class 713/176)
-
Publication number: 20140351599Abstract: Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like.Type: ApplicationFiled: August 7, 2014Publication date: November 27, 2014Inventors: Michael Kenneth Brown, Herbert Anthony Little, Michael Stephen Brown
-
Publication number: 20140351600Abstract: A method and apparatus which ensures that static data entered into a communications device or apparatus is accurate, or at least consistent with data provided to an authentication service.Type: ApplicationFiled: August 11, 2014Publication date: November 27, 2014Inventor: Jeffrey M. Robbins
-
Patent number: 8898477Abstract: A system and method of operating a device to securely update the control firmware controlling the device. Downloading a firmware update package to a first microcontroller of the device. Determining a firmware update portion and an encrypted hash portion of the firmware update package wherein the encrypted hash portion is cryptographically signed by a signatory. Confirm that the encrypted hash portion conforms to the firmware update by independently computing the hash of the encrypted firmware update portion on the first microcontroller and comparing that value to the signed hash. Other systems and methods are disclosed.Type: GrantFiled: November 12, 2007Date of Patent: November 25, 2014Assignee: Gemalto Inc.Inventors: Sylvain Prevost, Ksheerabdhi Krishna, Ruchirkumar D Shah, Mehdi Asnaashari
-
Patent number: 8898240Abstract: Example methods and apparatus associated with a messaging policy controlled email deduplication are provided. In one example a messaging policy is accessed. It is determined whether a received message complies with the policy based on rules of the messaging policy. If a message complies with the messaging policy, the message is displayed. If the message does not comply with the messaging policy, it is determined whether the message is duplicative. If the message is deemed duplicative it is not displayed. Conversely, if the message is not deemed duplicative it is displayed.Type: GrantFiled: August 16, 2011Date of Patent: November 25, 2014Inventor: Roderick B. Wideman
-
System and method for compressing secure E-mail for exchange with a mobile data communication device
Patent number: 8898473Abstract: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device: the message is processed so as to modify the message with respect to encryption and/or authentication aspect. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a remote system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the remote system to one or more receivers.Type: GrantFiled: September 12, 2012Date of Patent: November 25, 2014Assignee: BlackBerry LimitedInventors: James A. Godfrey, Herbert A. Little, Michael K. Brown, Neil P. Adams, Carl L. Cherry, Timothy R. Tyhurst, Michael S. Brown -
Patent number: 8898474Abstract: A method of operating an access point (AP) configured to support multiple pre-shared keys at a given time to authenticate its associated client devices. Each client device associated with the AP is provisioned with a key. To authenticate the client device that attempts to connect to the AP, the AP determines which pre-shared key (PSK) of the multiple supported pre-shared keys (PSKs), if any, matches information including the key received from the client device. When the information matches, the client device is allowed to connect to the AP. Provisioning the AP with multiple PSKs allows selectively disconnecting associated client devices from the AP. The AP may be configured to support PSKs of different lifetime and complexity. Removing a PSK of the multiple PSKs supported by the AP and disconnecting a client device that uses this PSK does not disconnect other client devices using different keys to access the AP.Type: GrantFiled: January 26, 2009Date of Patent: November 25, 2014Assignee: Microsoft CorporationInventors: Hui Shen, Xiong Jiang, Anirban Banerjee, Hong Liu, Taroon Mandhana
-
Publication number: 20140344581Abstract: Techniques are provided for securely upgrading a field programmable circuit, e.g., a Field Programmable Gate Array (FPGA), in a device that has been deployed to a customer site. A plurality of keys is stored in the device, e.g., public, private, and/or symmetric keys. The keys are used to authenticate and decrypt a newly received FPGA software image upgrade. The image upgrade is re-encrypted using one of the stored keys and stored in the computing device. The device is booted and the encrypted image upgrade is loaded into the field programmable circuit. The encrypted image upgrade is decrypted to obtain the image upgrade for execution on the field programmable circuit.Type: ApplicationFiled: May 16, 2013Publication date: November 20, 2014Applicant: Cisco Technology, Inc.Inventors: Anthony H. Grieco, Chirag Shroff
-
Publication number: 20140344582Abstract: The data storage portion stores an encrypted medium device key Enc (Kcu, Kmd_i) generated by encrypting a medium device key (Kmd_i), a medium device key certificate (Certmedia), and encrypted content data generated by encrypting content data, the controller stores a controller key (Kc) and first controller identification information (IDcu), the information recording device being configured to execute, after being connected to an external host device, an one-way function calculation based on the controller key (Kc) and the first controller identification information (IDcu) to generate a controller unique key (Kcu) used when decrypting the encrypted medium device key Enc (Kcu, Kmd_i), and second controller identification information (IDcntr) used when decrypting the encrypted content data.Type: ApplicationFiled: July 30, 2014Publication date: November 20, 2014Inventors: Taku KATO, Yuji NAGAI, Tatsuyuki MATSUSHITA
-
Patent number: 8893187Abstract: A television set is capable of receiving both broadcast program from television station and corresponding digital file of the same contents from a server station through internet. The television set keeps information of time limit for the server station to surely provide the file. The television set automatically downloads the file when the time limit comes close or the time limit information is failed to be kept. The television set keeps URL for the moving image program enjoyed upon turning-off of the television set until the next turning-on for instantly enjoying the moving image content provided at the URL. User who turning-on the television set or changing the channel with any program not in mind to feel interest in the program on display by chance can enjoy the program from the beginning by means of downloading corresponding digital file of the same contents through internet by an automatic link.Type: GrantFiled: March 25, 2014Date of Patent: November 18, 2014Assignee: NL Giken IncorporatedInventor: Masahide Tanaka
-
Patent number: 8892880Abstract: A system and method for obtaining an authorization key to use a product utilizes a secured product identification code, which includes a serial number and at least one code that is generated based on a cryptographic algorithm.Type: GrantFiled: October 28, 2010Date of Patent: November 18, 2014Assignee: NXP B.V.Inventors: Ralf Malzahn, Hauke Meyn
-
Patent number: 8892866Abstract: A secure cloud storage and synchronization system and method is described that provides, among other things: (1) local password recovery, including a mechanism by which the user of the system can recover their password without having stored it on a remote server; (2) secure, private versioning of files, including a mechanism to privately store a version history of files on one or more remote servers in such a way that it is technically infeasible for anyone other than the legitimate owner to access any component of the file history; (3) secure, private de-duplication of files stored on one or more remote servers that reduces storage requirements by allowing for the storage of a single file when there are duplicates, even across users; and (4) secure, private sharing of files between users of the system that allows one user to share a file on the “cloud” with another user without deciphering or transporting the file.Type: GrantFiled: September 17, 2012Date of Patent: November 18, 2014Assignee: Tor Anumana, Inc.Inventors: Troy Schilling, Subhashis Mohanty, Sara Mohanty
-
Patent number: 8893295Abstract: Systems and methods of restricting access to mobile platform location information may involve receiving, via a link, location information for a mobile platform at a processor of the mobile platform, and preventing unauthorized access to the location information by an operating system associated with the mobile platform.Type: GrantFiled: December 21, 2010Date of Patent: November 18, 2014Assignee: Intel CorporationInventors: Paritosh Saxena, Nimrod Diamant, David Gordon, Benny Getz
-
Patent number: 8893242Abstract: A computer-implemented system and method for pool-based identity generation and use for service access is disclosed. The method in an example embodiment includes seeding an identity generator with a private key; retrieving independently verifiable data corresponding to a service consumer; using the independently verifiable data to create signed assertions corresponding to the service consumer; generating a non-portable identity document associated with the service consumer, the identity document including the signed assertions; signing the identity document with the private key; and conveying the signed identity document to the service consumer via a secure link.Type: GrantFiled: April 29, 2008Date of Patent: November 18, 2014Assignee: eBay Inc.Inventors: Raju Venkata Kolluru, Michael Dean Kleinpeter, Liam Sean Lynch, Christopher J. Kasten, Rajesh Kanungo
-
Patent number: 8892894Abstract: A computer-implemented system and method for embedding and authenticating ancillary information in digitally signed content are disclosed.Type: GrantFiled: June 7, 2013Date of Patent: November 18, 2014Assignee: Rovi Solutions CorporationInventors: Andres M Torrubia, Jordi Salvat
-
Patent number: 8893308Abstract: A method and system are provided for counterfeit prevention for optical media. In one example, a system is provided for verifying authenticity information on an optical medium. The system receives the optical medium including a fingerprint having at least one probabilistic feature. A probabilistic feature is a physical feature having both a substantial chance to be read as a first value and a substantial chance to be read as a second value. The system receives an o-DNA signature-at-issuance. The system calculates an o-DNA signature-at-verification by reading each probabilistic feature plural times. The system calculates a vector-of-differences between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences includes a maximum distance metric between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences indicates the optical medium is authentic if the maximum distance metric is less than a threshold.Type: GrantFiled: December 14, 2012Date of Patent: November 18, 2014Assignee: Microsoft CorporationInventors: Vicky Svidenko, Darko Kirovski
-
Patent number: 8892893Abstract: Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. Systems and methods are also disclosed for protecting, detecting, removing, and decoding information embedded in electronic content, and for using the embedded information to protect software or other media from unauthorized analysis, attack, and/or modification.Type: GrantFiled: January 10, 2013Date of Patent: November 18, 2014Assignee: Intertrust Technologies CorporationInventors: William G. Horne, Umesh Maheshwari, Robert E. Tarjan, James J. Horning, W. Olin Sibert, Lesley R. Matheson, Andrew K. Wright, Susan S. Owicki
-
Patent number: 8892900Abstract: Systems, apparatus and methods for privacy-protecting integrity attestation of a computing platform. An example method for privacy-protecting integrity attestation of a computing platform (P) has a trusted platform module (TPM}, and comprises the following steps. First, the computing platform (P) receives configuration values (PCRI . . . PCRn). Then, by means of the trusted platform module (TPM}, a configuration value (PCRp) is determined which depends on the configuration of the computing platform (P). In a further step the configuration value (PCRp) is signed by means of the trusted platform module. Finally, in the event that the configuration value (PCRp) is one of the received configuration values (PCRI . . . PCRn), the computing platform (P) proves to a verifier (V) that it knows the signature (sign(PCRp}} on one of the received configuration values (PCRI . . . PCRn).Type: GrantFiled: September 2, 2012Date of Patent: November 18, 2014Assignee: International Business Machines CorporationInventors: Endre-Feliz F. Bangerter, Matthias Schunter, Michael P. Waidner, Jan L. Camenisch
-
Patent number: 8893241Abstract: Systems and methods are provided for controlling access via a computer network to a subscriber server. A log-in server receives a query to connect through the computer network to the subscriber server, and the log-in server receives registrant identification data, A first session is established between the log-in server and the subscriber server to validate the registrant identification data, and to generate a session password. A second session is established between the log-in server and the subscriber server. The second session is configured to authorize, based in part on the registrant identification data, access to at least a portion of a website associated with the subscriber server.Type: GrantFiled: March 11, 2013Date of Patent: November 18, 2014Assignee: Albright AssociatesInventor: Teresa C. Piliouras
-
Publication number: 20140337630Abstract: A method and apparatus for verifying data for use on an aircraft. A plurality of digital certificates associated with the data is received by a processor unit. The processor unit verifies the data for use on the aircraft using a selected number of the plurality of digital certificates.Type: ApplicationFiled: May 7, 2013Publication date: November 13, 2014Applicant: The Boeing CompanyInventors: Greg A. Kimberly, Ian Gareth Angus
-
Publication number: 20140337632Abstract: Distribution of a certificate and a private key via a network includes a certificate/private key storage unit by which a certificate and a private key prepared for distribution to one or more devices are stored; a security level storage unit by which a security level for each device belonging to a device group is stored; and a display/instruction unit by which a selection screen prompting a user to select one or more devices from the device group is displayed. An instruction for the selection made by the user is received; and a certificate/private key distribution unit by which, via the network, the certificate and the private key for each device are distributed to the one or multiple devices for which the instruction for selection was made. For each device, the selection screen displays the device security level.Type: ApplicationFiled: August 8, 2012Publication date: November 13, 2014Applicant: ALAXALA NETWORKS CORPORATIONInventor: Hiroyasu Kimura
-
Publication number: 20140337631Abstract: A method for storing digital data information on a data carrier and for reading the information therefrom uses a disk having an individual digital identifier. A signature is formed, and the information includes information items, which can be processed by a first electronic data processing device only if the identifier and the signature are in a predefined relation to one another. To supply a household appliance operated by an electric motor with process control data, while ensuring that only original data are used, the information components can be processed by a second electronic data processing device even if the signature and the identifier are not in the predefined relation to one another. Also, a household appliance operable by an electric motor, in particular a food processor, has an electronic data processing device. A system and an integrated semiconductor circuit also realize the features for storing digital data information.Type: ApplicationFiled: May 7, 2014Publication date: November 13, 2014Applicant: Vorwerk & Co. Interholding GmbHInventor: Volker GREIVE
-
Patent number: 8886948Abstract: A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP) associated with the wireless device. The local web server and/or local OP may be implemented on a security module, such as a smartcard or a trusted execution environment for example. The local OP and/or local web server may be used to implement a provisioning phase to derive a session key, associated with a service provider, from an authentication between the wireless device and the network. The session key may be reusable for subsequent local authentications to locally authenticate a user of the wireless device to the service provider.Type: GrantFiled: August 12, 2013Date of Patent: November 11, 2014Assignee: InterDigital Patent Holdings, Inc.Inventors: Andreas U. Schmidt, Michael V. Meyerstein, Andreas Leicher, Yogendra C. Shah, Louis J. Guccione, Inhyok Cha
-
Patent number: 8887254Abstract: A database system comprising: a memory containing multiple data records, wherein each of the data records has a data record asymmetric key pair for cryptographic encryption and decryption, wherein each data record asymmetric key pair comprises a data record public key and a data record private key, wherein the data contained in each of the multiple data records is encrypted by the data record public key, wherein the data record private key of each data record asymmetric key pair is encrypted with the public key of another asymmetric key pair; a set of user accounts, wherein each of the user accounts has a user asymmetric key pair for encryption and decryption, wherein each user asymmetric key pair has a user public key and a user private key; wherein data is added to a data record by encrypting it with the data record public key; wherein access to the data record is granted to a user account by encrypting the data record private key with the public key of an asymmetric cryptographic key pair whose encrypted pType: GrantFiled: December 15, 2010Date of Patent: November 11, 2014Assignee: Compugroup Medical AGInventors: Adrian Spalka, Jan Lehnhardt
-
Patent number: 8886943Abstract: A method for authenticating a vehicle-external device in a bus system of a motor vehicle comprising control units is provided. In order to effectively and inexpensively prevent a sequence control system that is stored in a control unit from being manipulated, an authentication device is provided in the bus system. The authentication device transmits an authentication request to the vehicle-external device. The vehicle-external device signs the authentication request with a secret key of an asymmetric pair of keys, such as a pair of public keys, and transmits the signed authentication request or exclusively the signature to the authentication device. The authentication device determines a signature of the authentication request using the same algorithm as the vehicle-external device, and decodes the signature transmitted by the vehicle-external device using the public key which is complementary to the secret key, and compares the determined signature with the transmitted signature.Type: GrantFiled: October 27, 2006Date of Patent: November 11, 2014Assignee: Bayerische Motoren Werke AktiengesellschaftInventors: Horst Kiessling, Burkhard Kuhls
-
Patent number: 8887307Abstract: Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device. The password may be unique per chip location, per challenge and/or per chip. The location of the chip may be determined based on GPS information and securely stored and securely communicated to an external entity. Two or more of the chip location, a generated random number sample and a key from a table of keys may be passed to a hash function that may generate a password. An external entity attempting access may be challenged to respond with a password that matches the password generated by the hash function. The response may be compared with the password generated by the hash function and access to one or more secure functions may be granted based on the comparison.Type: GrantFiled: October 12, 2007Date of Patent: November 11, 2014Assignee: Broadcom CorporationInventor: Xuemin (Sherman) Chen
-
Patent number: 8886945Abstract: Methods for providing content session information using a content manager, streaming server, and one or more watermarking devices are disclosed. A content asset is also disclosed. The content asset may include content. In addition, the content asset may include a content data field having forensic watermark information, e.g. session or identifying information. In one aspect, the content asset is compressed and the compressed content asset has one or more pre-processed candidate watermark locations. In this aspect, the forensic watermark information may be extracted, e.g. by a watermarking device, from the content data field and included in the one or more pre-processed candidate watermark locations.Type: GrantFiled: December 17, 2010Date of Patent: November 11, 2014Assignee: Motorola Mobility LLCInventor: Mark E. Gregotski
-
Patent number: 8887287Abstract: A method and apparatus are disclosed for evaluating the security of at least one client. An executable program is executed by the client being evaluated. A result is received from the executable program, and an evaluation of the result indicates whether the client has been corrupted. The executable program is one of a plurality of possible programs. The result may be evaluated based on an elapsed time between when the executable program is provided to the client and when the result is received. The executable program may include at least one function that writes to a memory of the client. A program blinding technique is also disclosed to generate executable programs.Type: GrantFiled: October 27, 2004Date of Patent: November 11, 2014Assignee: Alcatel LucentInventors: Juan A. Garay, Lorenz Francis Huelsbergen
-
Patent number: 8886944Abstract: Watermarks may be used to deter certain types of information leaks. In one example, leaks occur in the form of posting, in public forums, screen shots of private pages. To deter this example kind of leak, private web pages within an organization may be watermarked with an experience identifier that identifies the session in which the screen shot is captured. Other information may also be included in the watermark. The watermark may be designed to survive image compression, so that it can be recovered from either a compressed or uncompressed image of the web page. By using an experience identifier recovered from the watermark, and logs that describe activity associated with that experience identifier, it may be possible to identify the source of the information leak.Type: GrantFiled: June 22, 2010Date of Patent: November 11, 2014Assignee: Microsoft CorporationInventors: Michael P. Mastrangelo, Jose Emmanuel Miranda-Steiner
-
Patent number: 8887297Abstract: Aspects of the subject matter described herein relate to creating and validating cryptographically secured documents. In aspects, documents are encrypted to protect them from unauthorized access. An entity having namespace ownership rights may create a document in an authorized namespace and sign the document with a private key. Other entities may validate that the document was created by an authorized namespace owner by using a public key available in security data associated with a parent document of the document. For a root document, the public key may be available from a directory service. A namespace owner may change the namespace owner(s) that are allowed to create children of a document.Type: GrantFiled: July 13, 2007Date of Patent: November 11, 2014Assignee: Microsoft CorporationInventor: Colin Wilson Reid
-
Patent number: 8885921Abstract: Anti-piracy measures for stereoscopic 3D content media displayed in dual lens projection systems are achieved by the forensic marking of each image in a stereoscopic image pair with separate component forensic marks or dots associated with each image of an image pair. In one example, the component mark used for marking one image of the pair is identical to the component forensic mark used for marking the other image of the pair. In another example, the component marks are different from each other. When superimposed over each other in proper alignment, the two component marks form a composite forensic mark. In this latter example, they each lack one or more of the forensic dots or shapes existing in the composite mark, and the component marks may or may not have one or more corresponding forensic dots or shapes in common.Type: GrantFiled: February 7, 2011Date of Patent: November 11, 2014Assignee: Thomson LicensingInventors: Chris Scott Kutcka, Micah Robert Littleton
-
Patent number: 8886947Abstract: Some embodiments of the invention provide a method of verifying the integrity of digital content. At a source of the digital content, the method generates a signature for the digital content by applying a hashing function to a particular portion of the digital content, where the particular portion is less than the entire digital content. The method supplies the signature and the digital content to a device. At the device, the method applies the hashing function to the particular portion of the digital content in order to verify the supplied signature, and thereby verifies the integrity of the supplied digital content.Type: GrantFiled: December 20, 2012Date of Patent: November 11, 2014Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Melanie Riendeau
-
Patent number: 8886940Abstract: In the computer data security field, a cryptographic hash function process embodied in a computer system and which is typically keyless, but is highly secure. The process is based on the type of chaos introduction exhibited by a game process such as the well known shuffling of a deck of playing cards. Computation of the hash value (digest) is the result of executing in a model (such as computer code or logic circuitry) a game algorithm that models the actual game such as a playing card shuffling algorithm using the message as an input to the algorithm, then executing the card shuffling algorithm on the input. A state (order) of the modeled deck of cards after a shuffle (or multiple shuffles) gives the hash digest value.Type: GrantFiled: May 29, 2009Date of Patent: November 11, 2014Assignee: Apple Inc.Inventors: Benoit Chevallier-Mames, Mathieu Ciet, Augustin J. Farrugia
-
Patent number: 8886946Abstract: The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides a system and method for providing a dynamically reconfigurable watermark, and the use of the watermark to encode a stochastically variable property of the carrier medium for self-authentication purposes.Type: GrantFiled: April 30, 2012Date of Patent: November 11, 2014Assignee: Copilot Ventures Fund III LLCInventors: Jay Fraser, Larry Weber
-
Publication number: 20140331056Abstract: An information processing system comprising interface circuitry configured to receive message-independent information, the message-independent information having been generated by another apparatus and transferred to the interface in advance of a digital signature being generated, send message-dependent information to an external device, and receive a digital signature from the external device; and processing circuitry configured to generate the message-dependent information from a message and at least a part of the message-independent information, and associate the digital signature with the message.Type: ApplicationFiled: August 22, 2013Publication date: November 6, 2014Applicant: SONY CORPORATIONInventors: Yohei Kawamoto, Yu Tanaka
-
Publication number: 20140331054Abstract: In particular embodiments, a method includes receiving a request for a signature verification. In response to the request, signature data is encrypted. A first data size associated with the signature data is determined. A second data size associated with data of a data packet is determined. The method includes comparing the sum of the first data size and the second data size to a pre-determined data size. When the sum is less than or equal to the pre-determined data size, the encrypted signature data is included in the data packet; and the data packet is transmitted over a network.Type: ApplicationFiled: September 13, 2013Publication date: November 6, 2014Inventors: RAGHUNANDAN HANUMANTHARAYAPPA, KHADER BASHA P.R., SANTHOSH KRISHNAMURTHY
-
Publication number: 20140331055Abstract: A first executable program on a computer system is enabled to exchange communications with a second executable program on the computer system by determining that the first executable program requests to exchange information with the second executable program, using the second executable program to challenge the first executable program for a digital certificate, and using the second executable program to exchange information with the first executable program when the digital certificate is verified.Type: ApplicationFiled: July 21, 2014Publication date: November 6, 2014Inventor: Terry N. HAYES
-
Patent number: 8880633Abstract: According to this disclosure, a proxy server is enhanced to be able to interpret instructions that specify how to modify an input object to create an output object to serve to a requesting client. Typically the instructions operate on binary data. For example, the instructions can be interpreted in a byte-based interpreter that directs the proxy as to what order, and from which source, to fill an output buffer that is served to the client. The instructions specify what changes to make to a generic input file. This functionality extends the capability of the proxy server in an open-ended fashion and enables it to efficiently create a wide variety of outputs for a given generic input file. The generic input file and/or the instructions may be cached at the proxy. The teachings hereof have applications in, among other things, the delivery of web content, streaming media, and the like.Type: GrantFiled: December 16, 2011Date of Patent: November 4, 2014Assignee: Akamai Technologies, Inc.Inventors: Nicholas S. Brookins, Akinwale O. Olugbile, Ronnie So, Stephen L. Ludin
-
Patent number: 8880889Abstract: The invention relates to systems and methods for secure, remote, wireless submission of financial transactions. Authentication and authorization functionality are provided through use of proof of possession tests, a token service that provides a user device with a token that includes user entitlement data, and high assurance digital certificates.Type: GrantFiled: March 3, 2008Date of Patent: November 4, 2014Assignee: Citigroup Global Markets, Inc.Inventors: Hilary Ward, Gary E. Greenwald, Francis A. Shanahan
-
Patent number: 8880891Abstract: A method, a system, and an apparatus for establishing communication are disclosed. The method is invented to establish communication between at least two communication parties including a first communication party and a second communication party. The method includes: sending a Cryptographically Generated Address (CGA) request to the first communication party; receiving CGA parameters and a CGA signature returned by the first communication party; and authenticating the CGA parameters and the CGA signature, and establishing communication with the first communication party if the authentication succeeds. By using the method disclosed herein, in the process of establishing communication, the communication party authenticates the CGA parameters and CGA signature carried in the CGA extension header to determine authenticity of the CGA, thus preventing the IP address spoofing and preventing or mitigating the network security problems caused by the IP address spoofing.Type: GrantFiled: December 22, 2010Date of Patent: November 4, 2014Assignee: Chengdu Huawei Symantec Technologies Co., Ltd.Inventors: Lifeng Liu, Dong Zhang
-
Patent number: 8880890Abstract: A system and method to control the writing on electronic paper (e-paper). An e-paper device may incorporate authentication indicia as part of informational data written on e-paper material. The informational data is protected by a security methodology that is accessible to authorized entities. A reader device may be used to help make a verification determination of whether encrypted or encoded data has been altered. In some instances an output alert operably coupled to the reader device serves as a verification status indicator.Type: GrantFiled: December 21, 2010Date of Patent: November 4, 2014Assignee: The Invention Science Fund I, LLCInventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
-
Patent number: 8881272Abstract: A system for controlling selection of filters for protecting against vulnerabilities of a computer network includes a vulnerability management system analyzes the computer network and determines network vulnerabilities for the computer network. The vulnerability management system is configured to receive real-time data on a status of filters protecting against vulnerabilities of the computer network. A database contains a pre-generated mapping of network vulnerabilities to filters for protecting against the network vulnerabilities. The vulnerability management system enables user control of filters for protecting against vulnerabilities of the computer network based upon the determined network vulnerabilities of the computer network, the pre-generated mapping of network vulnerabilities to the filters for protecting against the network vulnerabilities and the real-time data on the status of the filters.Type: GrantFiled: March 18, 2010Date of Patent: November 4, 2014Assignee: Achilles Guard, Inc.Inventors: Eva Bunker, Nelson Bunker, Kevin Mitchell, David Harris
-
Patent number: 8880897Abstract: The present invention discloses a method for quickly and easily authenticating large computer program. The system operates by first sealing the computer program with digital signature in an incremental manner. Specifically, the computer program is divided into a set of pages and a hash value is calculated for each page. The set of hash values is formed into a hash value array and then the hash value array is then sealed with a digital signature. The computer program is then distributed along with the hash value array and the digital signature. To authenticate the computer program, a recipient first verifies the authenticity of the hash value array with the digital signature and a public key. Once the hash value array has been authenticated, the recipient can then verify the authenticity of each page of the computer program by calculating a hash of a page to be loaded and then comparing with an associated hash value in the authenticated hash value array.Type: GrantFiled: December 21, 2012Date of Patent: November 4, 2014Assignee: Apple Inc.Inventors: Peter Kiehtreiber, Michael Brouwer
-
Patent number: 8881242Abstract: A node apparatus of an information communication system in which a content is distributed and stored by an overlay network configured by a plurality of node apparatuses and which has a center server that manages the content to be submitted to the overlay network, the node apparatus includes: a first creation unit configured to create meta-information that is used in submitting the content to the overlay network; a transmission unit configured to transmit the meta-information created by the first creation unit to the center server; a first reception unit configured to receive the meta-information and an electronic signature verifying the meta-information, which is determined to be proper by the center server, from the center server, and a permission unit configured to permit the meta-information received by the first reception unit to be acquired on the overlay network.Type: GrantFiled: January 30, 2012Date of Patent: November 4, 2014Assignee: Brother Kogyo Kabushiki KaishaInventor: Kentaro Ushiyama
-
Publication number: 20140325233Abstract: A system and method for embedding a watermark into a data file and communicating the data file to a particular node from a source component is described. The system includes a particular node, a source component, a node identifier request, a query, a watermark, a permutation key, an encrypted data file, and a node decryption key. The node identifier request is communicated from the source component to the particular node. The watermark is then embedded into the data file by the source component. The permutation key is configured to permute the watermark and the permutation key is changed so the location of the watermark changes. The encrypted data is decrypted at the particular node with the node decryption key that corresponds to the particular node. The particular node recovers the watermark from the data file with the permutation key.Type: ApplicationFiled: July 12, 2013Publication date: October 30, 2014Applicant: XSETTE TECHNOLOGY, INC.Inventors: Albert Carlson, Steven B. Cohen, Lawrence duBoef, H. Stan Johnson
-
Patent number: 8874924Abstract: Methods and apparatus for identifying media are described. An example method includes determining application identification information for a media presentation application executing on a media device, determining a first watermark for the application identification information from a lookup table, requesting media identification information for media from the media presentation application, determining a second watermark for the media identification information from the lookup table, inserting the first watermark in the media prior to output of the media by the media device, and inserting the second watermark in the media prior to the output of the media by the media device.Type: GrantFiled: November 7, 2012Date of Patent: October 28, 2014Assignee: The Nielsen Company (US), LLCInventor: Gavin McMillan
-
Patent number: 8872636Abstract: In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which the tag is attached is associated with the facility and not foreign. At checkout or point-of-sale an authorization reader or mobile device writes a computed code and/or a ticket into the tag indicating that the tagged item is allowed to leave the facility. At point-of-exit an exit reader determines if the tagged item is allowed to leave the facility by verifying the ownership code and the code or ticket. The loss-prevention system may issue an alert or sound an alarm if a facility-associated item is leaving the facility without a proper code or ticket indicating that the item is approved to leave.Type: GrantFiled: August 16, 2013Date of Patent: October 28, 2014Assignee: Impinj, Inc.Inventors: Christopher J. Diorio, Scott A. Cooper
-
Patent number: 8874921Abstract: A method of generating a keyless digital multi-signature is provided. The method includes receiving multiple signature generation requests from one or more client computers, building subtrees based on the signature generation requests, and constructing a search tree including the subtrees. The method also includes assigning explicit length tags to leaf nodes of the search tree to balance the search tree and applying a hash function to each of the search tree nodes. The root hash value and the height of the search tree make up a generated aggregate signature request, followed by receiving an aggregate signature based on the aggregate signature request. The keyless digital multi-signature is generated based on the aggregate signature and contains an implicit length tag to verify that the number of signature generation requests is limited. The aggregate signature is generated if the height of the search tree does not exceed a predetermined height limitation.Type: GrantFiled: June 20, 2011Date of Patent: October 28, 2014Assignee: Guardtime IP Holdings, Ltd.Inventors: Ahto Buldas, Andres Kroonmaa, Märt Saarepera
-
Patent number: 8874900Abstract: A Direct Anonymous Attestation (DAA) scheme using elliptic curve cryptography (ECC) and bilinear maps. A trusted platform module (TPM) may maintain privacy of a portion of a private membership key from an issuer while joining a group. Moreover, the TPM can outsource most of the computation involved in generating a signature to a host computer.Type: GrantFiled: February 16, 2012Date of Patent: October 28, 2014Assignee: Intel CorporationInventors: Ernie Brickell, Jiangtao Li
-
Patent number: 8874923Abstract: In various example embodiments, a system and method for providing policy-based authentication is provided. In example embodiments, a request to access and sign a document is received from a device of an intended signer. A policy assigned to the intended signer is determined. Based on the policy, a determination is made whether an authentication mechanism is applicable to the intended signer. In response to the determining that the authentication mechanism is applicable to the intended signer, the intended user is required to perform the authentication mechanism. The intended user is provided access to view and sign the document based on the intended user satisfying the authentication mechanism.Type: GrantFiled: July 24, 2012Date of Patent: October 28, 2014Assignee: Adobe Systems IncorporatedInventor: Dan Foygel
-
Patent number: 8875247Abstract: A method and system for instant personalization security are provided. The system includes a platform for a user to open applications and/or access web sites. When an application is integrated with the platform, the identification of the application can be combined with the ID of the user and encrypted into a hashed ID. The application does not have access to the user's fully identifying profile (e.g., UID or other public information). Instead, the application only has access to a pseudonymous profile (e.g., the hashed ID, first name, last initial, small profile pictures, and/or other non-fully identifying profile information) of the user. One or more options are then provided for the user to authorize or reject the application to access the user's fully identifying profile. Upon the user's authorization, an access token is provided to the application to access a subset of the user's fully identifying profile.Type: GrantFiled: March 14, 2013Date of Patent: October 28, 2014Assignee: Facebook, Inc.Inventors: Ling Bao, Andrew Chi-An Yang, Pratap Prabhu, Alex Rice, Joey Tyson, Naitik Shah