Time Stamp Patents (Class 713/178)
-
Method and system for interpreting and displaying time data received from a server management device
Patent number: 7634579Abstract: A method, system, and apparatus are provided for interpreting time data received from a server computer management device. According to the method, the local time at a remote computer may be received and converted to GMT. Once the local time has been converted to GMT, a command may be issued to the remote management device instructing the device to set its real time clock to GMT. The remote management device then maintains its time with reference to GMT. When data is received from the server management device, a determination is made as to whether the received data includes time data. If time data is identified, the time data is converted from GMT to a local time where the remote computer is located. The time data is then replaced with the converted time data in the received data. The received data, including the converted time, may then be displayed at the remote computer.Type: GrantFiled: March 1, 2004Date of Patent: December 15, 2009Assignee: American Megatrends, Inc.Inventor: Subash Kalbarga -
Publication number: 20090307756Abstract: Provided are an electronic document repository system which guarantees authenticity of electronic document and issues certificates and methods of registering, reading, issuing, and transferring electronic documents in the system, and a method of issuing certificates in the system. The electronic document repository system includes an authentication module, a registration module, a reading module, an issuing module, and a certification module.Type: ApplicationFiled: August 8, 2007Publication date: December 10, 2009Applicant: KOREA INSTITUTE FOR ELECTRONIC COMMERCEInventor: Hyun Ku Kang
-
Patent number: 7631189Abstract: An apparatus for recording additional information hard to analyze in an information recording medium, a reproducer, a recording medium, a method, and a computer program for the same are provided. Bit values set at a plurality of DC control bit information setting positions set in a recording frame are decided based on constituent bit information of additional data, and additional data such as key information used for decoding contents is recorded in the information recording medium. In the reproducer, the additional data constituent bit information can be acquired by detecting the bit position set at a selected DC control bit storage position in the additional data-associated recording frame. With the configuration, it is possible to embed additional information such as key information used for decoding contents, key production information, contents reproduction control information, and copying control information with a format hard to analyze and also to accurately read out for data reproduction.Type: GrantFiled: September 1, 2004Date of Patent: December 8, 2009Assignee: Sony CorporationInventors: Tsutomu Ichinose, Yoichiro Sako
-
Publication number: 20090300364Abstract: An apparatus and a method for an authentication protocol. In one embodiment, a client requests for an authentication challenge from a server. The server generates the authentication challenge and sends it to the client. The authentication challenge includes the authentication context identifier, a random string, a timestamp, and a signature value. The client computes a salt value based on a username and the authentication context identifier from the authentication challenge. The signature value is computed based on the authentication context identifier, the random string, and the timestamp. The client computes a hashed password value based on the computed salt value, and a message authentication code based on the hashed password value and the random string. The client sends a response to the server. The response includes the username, the message authentication code, the random string, the timestamp, and the signature value.Type: ApplicationFiled: May 29, 2008Publication date: December 3, 2009Inventor: James Paul Schneider
-
Publication number: 20090300363Abstract: The invention relates generally to a method and arrangement for real-time betting with an off-line terminal, and especially to the technological field of keeping reliable time in the off-line terminal when handling, within a communications system comprising a distributed domain and a central domain, electronic records that contain predictions of the outcome of a certain incident. Within the distributed domain a multitude of electronic records that contain predictions of the outcome of the incident are generated and furnished with a cryptographically protected proof of a certain moment of the distributed domain's local time associated with the generation of the electronic record.Type: ApplicationFiled: December 28, 2004Publication date: December 3, 2009Inventors: Panu Hamalainen, Marko Hännikäinen, Timo D. Hämäläinen
-
Patent number: 7627755Abstract: A method of authenticating candidate members 1 wishing to participate in an IP multicast via a communication network, where data sent as part of the multicast is to be encrypted using a Logical Key Hierarchy based scheme requiring that each candidate member submit a public key to a group controller. The method comprises, at the group controller 1, verifying that the public key received from each candidate member 1 is owned by that member and that it is associated with the IP address of that candidate member 1 by inspecting an interface ID part of the IP address.Type: GrantFiled: September 13, 2002Date of Patent: December 1, 2009Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Pasi Ahonen, Uusitalo Iikka, Mantyla Vesa-Matti
-
Patent number: 7617540Abstract: A method for managing downloads of contents. This method provides for a replay memory that stores a globally unique right object identifier (GUID) and a right issuer timestamp (RITS). A duplication memory is used to store a right object (RO) in downloading a duplicate of content that is already stored in the replay memory. When a right issuer timestamp (RITS) included in the right object (RO) of the currently received content is less than the current time plus the set threshold value, and the globally unique right object identifier (GUID) and the right issuer timestamp (RITS) of the received right object (RO) are already stored in the replay memory, the received right object (RO) is separately stored in the duplication memory in association with the globally unique right object identifier (GUID).Type: GrantFiled: December 21, 2005Date of Patent: November 10, 2009Assignee: Samsung Electronics Co., Ltd.Inventors: Jin-Gu Kim, Seong-Joon Jeon
-
Patent number: 7617526Abstract: A method of blocking spam at a firewall involves applying blocking measures for an adaptively determined duration. The blocking measure is then suspended while determining whether the spam has ended. If so, the method resets to an initial state. Otherwise, the blocking measure is re-applied for a second duration.Type: GrantFiled: October 6, 2005Date of Patent: November 10, 2009Assignee: International Business Machines CorporationInventors: John Fred Davis, Kevin David Himberger, Clark Debs Jeffries, Garreth Joseph Jeremiah
-
Publication number: 20090276361Abstract: Transaction systems and methods for advancing a committed time in the future are described herein. In the present transaction systems and methods, the first end can be permitted to pre-hatch a time capsule signature before the committed time. The time capsule signature scheme here is conducted based on an identity-based trapdoor relation (IDTR). Moreover, an extended time capsule signature scheme is conducted based on an extended identity-based trapdoor relation (IDTR). By using an extended IDTR primitive, the present transaction systems and methods can distinguish the time capsule signature is validated before or after the committed time t.Type: ApplicationFiled: April 22, 2009Publication date: November 5, 2009Inventors: Chunyan Hu, Shek Duncan Wong, Xiaotie Deng, Qiong Huang, Guomin Yang
-
Patent number: 7614047Abstract: Illustrative embodiments provide a computer-implemented method for indicating a change in a service offering. The computer-implemented method generates a token representative of a state of the service offering, and determines whether the service offering has been modified to form a modified service. Responsive to a determination that the service offering has been modified, generates a token representative of the state of the modified service, and determines whether the service offering has been restarted to form a restarted service. Responsive to a determination that the offered service has been restarted, generates a token representative of the state of the restarted service, and provides the token to a requester.Type: GrantFiled: August 21, 2008Date of Patent: November 3, 2009Assignee: International Business Machines CorporationInventor: Wei-Lung Wang
-
Publication number: 20090262685Abstract: The current application concerns a method, mobile node, home agent and system for route optimisation between a mobile node and at least one correspondent node in a packet switched network, wherein a route via a first home agent is redirected via a second home agent. The mobile node sends an extended home test initiation message comprising following information: authentication data, an address of the correspondent node, a first home address and a second home address. The first home agent receives the extended home test initiation message and sends an extended home test message to the second home agent, the extended home test message comprising the information from the extended home test initiation message. The second home agent receives the extended home test message and a communication is routed between the mobile node and the at least one correspondent node via the second home agent.Type: ApplicationFiled: October 1, 2007Publication date: October 22, 2009Applicant: PANASONIC CORPORATIONInventors: Jon Schuringa, Jens Bachmann, Genadi Velev, Killan Weniger
-
Patent number: 7606795Abstract: A correctness verification system receives a query, executes the query using a query logic, and produces a query result. The query result comprises data records that satisfy the query, data verification objects associated with the data records, index segments accessed during the execution of the query, index verification objects associated with the index segments, and the query. The system transfers the query result to a verification system. The verification system verifies correctness of the query result by executing the query using the query logic. The verification system uses the data verification objects to verify integrity of the data objects, uses the index verification objects to verify the integrity of the index segments, and uses the index verification objects and the data verification objects to verify the completeness of the query result.Type: GrantFiled: February 8, 2007Date of Patent: October 20, 2009Assignee: International Business Machines CorporationInventors: Windsor Wee Sun Hsu, Xiaonan Ma
-
Patent number: 7602744Abstract: The invention relates to a detection of a simultaneous occurrence of an event of a predetermined kind at a plurality of electronic devices. At least two devices detect the event and record at their end the time elapsing after this detection. Then, a communication channel is established between the devices. Once the communication channel has been established, an indication of the recorded elapsed times can be exchanged. At least one of the devices compares a recorded elapsed time with an indicated elapsed time received from another device. If both elapsed times are similar to each other, it can be assumed that the event occurred simultaneously at both devices. The invention relates equally to corresponding devices, to a corresponding data transfer system and to corresponding software program products.Type: GrantFiled: September 9, 2004Date of Patent: October 13, 2009Assignee: Nokia CorporationInventors: Terho Kaikuranta, Jakke Mäkelä
-
Patent number: 7600129Abstract: Determining access includes determining if particular credentials/proofs indicate that access is allowed, determining if there is additional data associated with the credentials/proofs, wherein the additional data is separate from the credentials/proofs, and, if the particular credentials/proofs indicate that access is allowed and if there is additional data associated with the particular credentials/proofs, then deciding whether to deny access according to information provided by the additional data. The credentials/proofs may be in one part or in separate parts. There may be a first administration entity that generates the credentials and other administration entities that generate proofs. The first administration entity may also generate proofs or may not generate proofs. The credentials may correspond to a digital certificate that includes a final value that is a result of applying a one way function to a first one of the proofs.Type: GrantFiled: July 16, 2004Date of Patent: October 6, 2009Assignee: CoreStreet, Ltd.Inventors: Phil Libin, Silvio Micali, David Engberg, Alex Sinelnikov
-
Patent number: 7596669Abstract: The present invention is related to a method and apparatus for managing memory in a network switch, wherein the memory includes the steps of providing a memory, wherein the memory includes a plurality of memory locations configured to store data therein and providing a memory address pool having a plurality of available memory addresses arranged therein, wherein each of the plurality of memory addresses corresponds to a specific memory location. The method further includes the steps of providing a memory address pointer, wherein the memory address pointer indicates a next available memory address in the memory address pool, and reading available memory addresses from the memory address pool using a last in first out operation. The method also includes writing released memory addresses into the memory address pool, adjusting a position of the memory address pointer upon a read or a write operation from the memory address pool.Type: GrantFiled: May 17, 2005Date of Patent: September 29, 2009Assignee: Broadcom CorporationInventor: Joseph Herbst
-
Patent number: 7596689Abstract: An operations center (OC) (200) acts as an intermediary for securely and reliably transmitting a document (3) from a sender (100) to a next recipient (300) on a routing list. The OC (200) identifies (464) a recipient (300) from the next stage of the routing list and provides either the recipient's public key (404) or an escrow encryption key (406). The OC (200) optionally can authenticate the sender (100) and/or the recipient (300), thus increasing security.Type: GrantFiled: July 30, 2007Date of Patent: September 29, 2009Assignee: Perimeter eSecurityInventors: Eng-Whatt Toh, Kok-Hoon Teo
-
Publication number: 20090240948Abstract: Methods and arrangements are provided for handling, within a communications system comprising a distributed domain (301) and a central domain (303), electronic records that contain predictions of the outcome of a certain incident. Within the distributed domain (301) there is generated (304), before the outcome of the incident is known, a multitude of electronic records that contain predictions of the outcome of the incident. The electronic records are conveyed (305) from the distributed domain (301) to the central domain (303). After the outcome of the incident is known, the central domain (303) finds out (306) which of the electronic records, if any, contain correct predictions of the outcome of the incident. Each of the electronic records is furnished (304, 401, 502, 902, 1202, 1911), within the distributed domain (301), with a cryptographically protected proof of a certain moment of time associated with the generation of the electronic record.Type: ApplicationFiled: June 1, 2009Publication date: September 24, 2009Applicant: INNOKA OYInventors: Timo HAMALAINEN, Risto RAUTEE, Marko HANNIKAINEN, Janne REKONIUS
-
Publication number: 20090235083Abstract: An authentication system protects a hardware cryptographic chip from being commanded to decrypt or sign data by someone other than the legitimate owner(s) of the certificate residing on the chip. Openness of present cryptographic hardware systems are limited by imposing a condition that the cryptographic chip will only perform critical cryptographic tasks if the task is accompanied by a signed time-stamped transaction identifier which only the legitimate owner of the chip can provide.Type: ApplicationFiled: February 20, 2009Publication date: September 17, 2009Inventor: Micheal Bleahen
-
Publication number: 20090235082Abstract: A system for rendering a secure digital signature includes a computerized signature tool for rendering a signature, an identity verification program accessible to the computerized signature tool, and a biometric scanner coupled to or integrated with the computerized signature tool. A signatory uses the computerized signature tool to render a signature, the user authenticated as a signatory by retrieving a biometric identifier from the user via the biometric scanner and matching the retrieved biometric identifier to a pre-stored biometric identifier via the identity verification program.Type: ApplicationFiled: March 12, 2008Publication date: September 17, 2009Inventor: Peter Garrett
-
Patent number: 7584351Abstract: A method of transferring digital certificates from a digital-certificate transferring apparatus to a communications counterpart. The method includes authenticating the communications counterpart using a common certificate and transferring a normal certificate to the communications counterpart when the authenticating succeeds. The method further includes receiving a first normal certificate at an address from said communications counterpart, and when, it is determined to be necessary, transferring to the communications counterpart a second normal certificate along with the information identifying the communications counterpart and an address corresponding to a second normal certificate. The second normal certificate is of a different type than the first normal certificate.Type: GrantFiled: January 7, 2005Date of Patent: September 1, 2009Assignee: Ricoh Company, Ltd.Inventor: Hiroshi Kakii
-
Publication number: 20090217052Abstract: The invention relates to a method for watermarking at least one timestamp in a set of support data, comprising the following steps for each timestamp: association with the timestamp of the value at a given time of a reference timestamp signal, that is a determinist signal varying over time in a given temporal reference and being written as s(t), wherein t is incremented according to an incrementing step equal to one predetermined time unit; and watermarking of the value in the set of support data.Type: ApplicationFiled: July 21, 2006Publication date: August 27, 2009Applicant: THOMSON LICENSINGInventors: Severine Baudry, Philippe Nguyen
-
Patent number: 7581108Abstract: Methods and systems for generating time-based identifiers that are used for identifying items is described. In one embodiment, a master key is assigned to an electronic tag. Time-based other keys are generated based on the master key. Time-based identifiers are generated based on the time-based other keys. The time-based identifiers are useful only for a period of time to a holder of the time-based other keys.Type: GrantFiled: April 21, 2004Date of Patent: August 25, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Denis Bohm, Michael G. Lamming, Robert N. Mayo, Jeffrey A. Morgan, Kan Zhang
-
Publication number: 20090204811Abstract: There is described a method for transmitting synchronization messages, for example PTP messages of the IEEE 1588 standard, the PTP message being inserted into a data packet in line with the Internet Protocol, the data packet having an IP header, and the data packet having a UDP header. In this case, for the encrypted transmission on the PTP message, the data packet is addressed to a UDP port that is reserved for encrypted PTP messages, the data packet is provided with an additional S-PTP header that is provided for encryption, the PTP message is extended with a pseudo random number, and the PTP message is encrypted together with the pseudo random number.Type: ApplicationFiled: March 24, 2006Publication date: August 13, 2009Applicant: SIEMENS AKTIENGESELLSCHAFTInventors: Steffen Fries, Jean Georgiades, Stephan Schüler
-
Patent number: 7570759Abstract: A method for encrypting a message containing a plurality of message segments is described. First, a key is input into a SHA function to generate a first hash value. Then, a first message segment is encrypted into a first cipher segment by use of a part of the first hash value. Next, the first message segment and the first hash value are input into the SHA function to generate a second hash value. Following that, the second message segment is encrypted into a second cipher segment by use of a part of the second hash value. Subsequently, next message segment is repeatedly encrypted and input into the SHA function to generate a next cipher segment and a next hash value, respectively, until the last message segment is encrypted and the last hash value is generated.Type: GrantFiled: August 13, 2004Date of Patent: August 4, 2009Inventor: Yen-Fu Liu
-
Patent number: 7568113Abstract: A method of and device (110) for granting access to content on a storage medium (101), comprising obtaining cryptographic data (Y) from a property (102), such as a wobble, of the storage medium (101), reading helper data (W) from the storage medium (101), and granting the access based on an application of a delta-contracting function to the cryptographic data (Y) and the helper data (W). The delta-contracting function allows the choice of an appropriate value of the helper data (W), such that any value of the cryptographic data (Y) which sufficiently resembles said original primary input value leads to the same output value. Substantially different values of the cryptographic data (Y) lead to different values of the output.Type: GrantFiled: December 24, 2003Date of Patent: July 28, 2009Inventor: Johan Paul Marie Gerard Linnartz
-
Patent number: 7562225Abstract: A method and system for timecode generation including: receiving an encryption key and an implemented encryption method, for each one of a plurality of frames, receiving a timecode and an associated presentation time stamp (PTS) associated with the one frame, for each one of the plurality of frames, encrypting the timecode associated with the one frame using the encryption key and the implemented encryption method, thereby producing a plurality of encrypted timecodes, and at a time associated with the associated PTS associated with the one frame, outputting a packetized elementary stream (PES) including the plurality of encrypted timecodes. Related systems and methods are also described.Type: GrantFiled: December 21, 2004Date of Patent: July 14, 2009Assignee: NDS LimitedInventor: David White
-
Patent number: 7555651Abstract: It is an object of the present invention to provide a time management apparatus and a time management method for reducing the opportunity for a third party to intentionally tamper with time. In order to achieve this object, the present invention is provided with time management apparatus including an external time fetching part for fetching an external time within a predetermined time span, a local clock part for outputting a self-advance time, and a time difference judgment part for calculating a difference between the external time fetched by the external time fetching part and the self-advance time output by the local clock part, setting the external time to the local clock part in a case where the difference is less than a predetermined value, and not setting the external time to the local clock part in a case where the difference is equal to or more than a predetermined value.Type: GrantFiled: February 22, 2005Date of Patent: June 30, 2009Assignee: Fujitsu LimitedInventors: Ryota Akiyama, Masamichi Ishibashi
-
Publication number: 20090157886Abstract: A dynamic user interface (UI) system and method is provided for remote controlling of a legacy device, which is not compatible with a peer-to-peer (P2P) middleware, through a P2P network. The dynamic UI system of the present includes at least one legacy device, a proxy for registering and managing the at least one legacy device and supporting a dynamic remote control user interface using a multi legacy device control protocol, and an edge peer for downloading the dynamic remote control user interface from the proxy and requesting control of the at least one legacy device to the proxy.Type: ApplicationFiled: August 6, 2008Publication date: June 18, 2009Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTEInventors: Sang-Bong Lee, Moon-Ok Choi, Tae-in Hwang, Byeong-Thaek Oh, Shin-Yuk Kang, Ho-Jin Park, Hae-Ryong Lee
-
Patent number: 7549051Abstract: A digital certificate is employed to produce a digital signature for a digital construct. In the digital certificate is set forth a certificate validity period defining for the digital certificate a time period during which the digital certificate is to be honored as valid for producing digital signatures, and a signature validity period defining for each digital signature produced based on the digital certificate a time period during which the digital signature is to be honored as valid.Type: GrantFiled: March 10, 2005Date of Patent: June 16, 2009Assignee: Microsoft CorporationInventors: Blair Brewster Dillaway, Brian LaMacchia, John Manferdelli, Muthukrishnan Paramasivam
-
Publication number: 20090144552Abstract: The invention relates to a method of electronic archiving, in particular remote archiving, of at least one document or object. The method is characterized in that it comprises the operations of creating a digital document of the document or object to be archived, of electronically signing the document and of sealing the document, with date-stamping, of creating a sealed envelope containing the document with the certificate of signing, of drawing up a certificate for the operation of creating the envelope and of transporting the envelope with its certificate to the place of archiving, of opening the envelope at this place, while checking the integrity of the envelope and the document and of archiving the latter on a long-duration medium for use with the elements proving the integrity of the document.Type: ApplicationFiled: February 6, 2007Publication date: June 4, 2009Inventor: Pierre Fort
-
Patent number: 7543173Abstract: A method of generating a timestamp includes measuring a time period between two events, automatically determining a precision for an indication of the time period, and storing the timestamp. The precision for the indication of the time period is decreased as the time period increases. The timestamp includes an indication of the precision and the indication of the time period, wherein the indication of the time period in the timestamp is stored according to the automatically determined precision.Type: GrantFiled: August 2, 2005Date of Patent: June 2, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventor: Richard Adkisson
-
Patent number: 7543152Abstract: Methods and arrangements are provided for handling, within a communications system comprising a distributed domain (301) and a central domain (303), electronic records that contain predictions of the outcome of a certain incident. Within the distributed domain (301), a multitude of electronic records are generated that contain predictions of the outcome of the incident and are conveyed (305) from the distributed domain (301) to the central domain (303). Each of the electronic records is furnished (304, 401, 502, 902, 1202, 1911), within the distributed domain (301), with a cryptographically protected proof of a certain moment of time associated with the generation of the electronic record.Type: GrantFiled: September 28, 2001Date of Patent: June 2, 2009Assignee: Innoka OyInventors: Timo Hämäläinen, Risto Rautee, Marko Hännikäinen, Janne Rekonius
-
Patent number: 7539890Abstract: A clock object is provides, which includes a clock time and a monotonic time that are readable by the electronic device. The monotonic time is incremented every read of the monotonic time from the clock object. The clock object can also include an indication of a level of trust of the clock time.Type: GrantFiled: April 25, 2006Date of Patent: May 26, 2009Assignee: Seagate Technology LLCInventor: Robert H. Thibadeau
-
Patent number: 7529942Abstract: A time certification server includes a receiving section that receives an issue request for a time certification code and terminal information; a temporal change information input section that inputs temporal change information; a first code generating section that generates a first code based on the temporal change information and outputs the first code; a second code generating section that generates a second code based on the terminal information and the first code and outputs the second code; a transmitting section that transmits the second code to the terminal apparatus as a time certification code; a time certification code memory section that stores the time certification code in correlation with time; and a certification processing section that searches the time certification code memory section by using the time certification code received, thereby obtaining time, and outputs certification information based on the time obtained to the terminal apparatus.Type: GrantFiled: October 27, 2004Date of Patent: May 5, 2009Assignee: Mitsubishi Denki Kabushiki KaishaInventors: Masataka Togashi, Kazuya Miyazaki, Tsugihiko Ono
-
Patent number: 7523303Abstract: An editing apparatus generates a capsular work with usage conditions for each of plural usages and usage secret information. A ticket server apparatus issues a ticket containing a ticket key in the case of allowing a user to practice the usage requested by the user. A distribution center apparatus distributes the capsular work in accordance with the user's request. An audiovisual apparatus acquires the capsular work from the distribution center apparatus and requests the ticket necessary to make use of the capsular work from the ticket server apparatus, and then decrypts the encrypted work data contained in the capsular work and reproduces the work data only in the case where the audiovisual apparatus has acquired the ticket.Type: GrantFiled: April 30, 2004Date of Patent: April 21, 2009Assignee: NEC CorporationInventor: Masayuki Nakae
-
Patent number: 7519824Abstract: A method for time stamping a digital document employs a two-part time stamp receipt. The first part of the time stamp receipt includes identifying data associated with a document and a nonce. The second part of the time stamp receipt includes a time indication and the nonce. The nonce serves as a link between the first and second parts.Type: GrantFiled: December 10, 1999Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7519825Abstract: The invention is an automated system that works in the data center of certification offices connected to the internet which enables a member of the any of the certification offices to certify his document electronically from a distance using a computer connected to the internet, digital pad, an electronic pen and a printer.Type: GrantFiled: January 17, 2005Date of Patent: April 14, 2009Assignee: House of Development LLCInventor: Mohammed Alawi Geoffrey
-
Patent number: 7519666Abstract: A data transmission and reception system for exchanging data such as e-mail by using accurate time information over a network. An authorizing office authorizes an authorization mail server to issue electronic postmarks including highly accurate time information. Then, the authorization mail server stamps an electronic postmark with the highly accurate time information embedded in it on e-mail being sent by a sender. Here, the electronic postmark data, to which the time information has been attached in the authorization mail server, is made tamperproof by a predetermined electronic postmark issue program and further encrypted to be transferred to a receiver mail server.Type: GrantFiled: October 3, 2001Date of Patent: April 14, 2009Assignee: International Business Machines CorporationInventors: Yohichi Katoh, Yohichiro Sumito
-
Publication number: 20090094459Abstract: A method and system for associating one or more pestware-related indications with a file on a computer-readable storage medium of a computer is described. One embodiment acquires pestware-related information about the file and alters an existing value of at least one attribute stored in association with the file on the computer-readable storage medium and generated by an operating system of the computer so as to provide at least one pestware-related indication about the file based on the acquired pestware-related information, the at least one pestware-related indication being usable by an anti-pestware application in determining whether subsequently to scan the file for pestware.Type: ApplicationFiled: October 9, 2007Publication date: April 9, 2009Inventor: Jerome L. Schneider
-
Patent number: 7512637Abstract: A storage system and an undo processing method that can facilitate undo processing for configuration change operations that have been performed for storage apparatuses by different administrators. A management server manages the history of configuration change operations it performs for storage apparatuses while a storage apparatus manages the history of configuration changes it makes in itself in accordance with the configuration change operations performed by the management server.Type: GrantFiled: January 24, 2006Date of Patent: March 31, 2009Assignee: Hitachi, Ltd.Inventor: Takeshi Saito
-
Patent number: 7506162Abstract: In accordance with one embodiment of the present invention, there is provided a mechanism for implementing navigation seamlessly between sites in a computing environment in order to access resources without having to require users or user agents to re-authenticate. In one embodiment, there is provided the ability to determine different attribute sets for use with different resources on a target site for a user or user agent authenticated with a first site seeking to access one or more resources of the second site without re-authenticating. In one embodiment, there is provided the ability to map accounts on a first site to accounts on the second site using a set of attributes selected from among attributes provided by an application on the first site. With this mechanism, it is possible for applications or other resources to share information about a user or a user agent across disparate web sites seamlessly.Type: GrantFiled: April 27, 2004Date of Patent: March 17, 2009Assignee: Sun Microsystems, Inc.Inventors: Heng-Ming Hsu, Qingwen Cheng, Ping Luo, Bhavna Bhatnagar
-
Publication number: 20090070589Abstract: A method and apparatus for authenticity and origin of Digital data such as recorded voice samples, video clips or still picture images etc. is provided. The method makes uses of the Trusted Computing principles to provide a secure, tamper detectable solution comprising of both software and hardware such that it can be verified without debate on its authenticity. The method comprises extracting reproduction avoidance key information and log information for captured data from stored information when verification of the captured data is requested, calculating reproduction avoidance key information using the extracted log information, comparing the extracted reproduction avoidance key information with the calculated reproduction avoidance key information and determining that the captured data has not been tampered, if the reproduction avoidance key informations are matched.Type: ApplicationFiled: September 11, 2008Publication date: March 12, 2009Inventors: Mithun Manjnath NAYAK, Chunduri Bhanu Teja
-
Patent number: 7496754Abstract: An improved system, apparatus, and method for securing a network using MAC address filtering is provided. Advantageously, the present invention does not require that a client computer be powered on, and instead provides an efficient user interface for displaying a requestor's MAC address and for allowing or denying the device with an associated MAC address access to the network. Parameters per allowed MAC address may also be provided.Type: GrantFiled: April 1, 2005Date of Patent: February 24, 2009Assignee: Cisco Technology, Inc.Inventors: Calvin Y. Liu, Sheng-Chiao Chang
-
Publication number: 20090044021Abstract: A tamper-resistant certification device receives a certified digital time stamp from a trusted third party, resets a time function and produces a time stamp receipt in an on-line mode; The tamper-resistant certification device receives a digital file from a mobile computing device, and produces a certified digitally signed digital file including a copy of the digital file, time stamp receipt and temporal offset in an off-line mode to evidence the content of the digital file within a defined tolerance of a day and/or time. A processor may be portioned into tamper and non-tamper resistant portions.Type: ApplicationFiled: October 10, 2008Publication date: February 12, 2009Applicant: INTERMEC IP CORP.Inventor: Robert D. Buck
-
Publication number: 20090044010Abstract: A system and method for storing data in a virtual file system using write once read many (WORM) protection includes a WORM server in communication with one or more storage devices and a controller in communication with the WORM server. A first time stamping process for creating a first time stamp for a data object based on instructions applied by the controller for storage on the WORM server. A second time stamping process for creating a second time stamp for the data object for storage on the WORM server. The second time stamping process creates the second time stamp for the data object and first time stamp to ensure the integrity of the data object stored on the system.Type: ApplicationFiled: August 8, 2007Publication date: February 12, 2009Applicant: SUN MICROSYSTEMS, INC.Inventor: James P. Hughes
-
Patent number: 7490241Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt using the document and the current time. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority validates the time stamp receipt by comparing the time value specified in the time stamp receipt to the current time. If the time value specified in the time stamp receipt is within a predetermined time window, the time stamping authority cryptographically binds the time value and document, or the time value and some representation of the document, e.g., by signing the time stamp receipt with its private signature key.Type: GrantFiled: December 10, 1999Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7487359Abstract: A time stamping protocol has two stages referred to as the ticketing stage and the certification stage. During the ticketing stage, the document or other identifying data is sent to the TSA. The TSA generates a “ticket” based on the document or other identifying data and a time indication derived from a trusted clock. The ticket, which serves as an unsigned time stamp receipt, is transmitted back to the document originator. During the certification stage, the holder of the ticket requests a certified time stamp receipt by presenting the ticket to the TSA. The TSA verifies the ticket and generates a signed time stamp receipt, called the ticket stub, which is then transmitted back to the document originator. The ticket stub serves as a “universal time-stamp” that the holder of the ticket stub can use to prove the date of the document.Type: GrantFiled: August 29, 2007Date of Patent: February 3, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7484097Abstract: A method and system for transmitting data from a computer network security device for monitoring at least one computer network node to an operations center for monitoring at least the computer network security device and to the computer network security device from the operations center in a managed computer network security system including at least the computer network security device and operations center, including establishing security information associated with the at least one computer network security device. The established security information is used to authenticate data transmissions from the computer network security device to the operations center. The established security information is used to authenticate data transmission to the computer network security device from the operations center.Type: GrantFiled: March 24, 2003Date of Patent: January 27, 2009Assignee: Symantec CorporationInventors: John Thomas Steiger, Robert Edward Schafrik, Jr., Amir Hirsh, Kristine Dejoras Mendoza
-
Patent number: 7480803Abstract: A system is provided for securely downloading content to a mobile telecommunications device. The system includes a mobile application to enable the mobile telecommunications device to send a request for content identified on a telecommunication provider system. The system includes a content application maintained by the content provider to retrieve content and promote delivery of the content to the mobile telecommunications device. The system also includes a challenge component and a response component, the response component communicates with the mobile application and encodes a challenge data. The challenge component communicates with the content application. The challenge component sends the challenge data to the mobile application and decodes the challenge data received from the mobile application to validate the response for delivery of the content to the mobile application.Type: GrantFiled: July 23, 2004Date of Patent: January 20, 2009Assignee: Sprint Communications Company L.P.Inventor: Gaurav K. Marballi
-
Publication number: 20090006854Abstract: Various embodiments utilize hardware-enforced boundaries to provide various aspects of digital rights management or DRM in an open computing environment. Against the backdrop of these hardware-enforced boundaries, DRM provisioning techniques are employed to provision such things as keys and DRM software code in a secure and robust way. Further, at least some embodiments utilize secure time provisioning techniques to provision time to the computing environment, as well as techniques that provide for robustly secure storage.Type: ApplicationFiled: June 28, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: James M. Alkove, Alexandre V. Grigorovitch, Patrik Schnell