Time Stamp Patents (Class 713/178)
-
Patent number: 8775816Abstract: Existing video surveillance security approaches enhanced with suitable functionality of the telecommunications wireless network are provided. Security personnel are equipped with hand-held devices capable of recording video, photos, audio, and text. This data is geo-tagged and time-stamped by the application and uploaded to the telecommunications network and stored in the network. As such, the geo-tagged, time-stamped information is immediately available to other investigators who are in the same geographic vicinity through access controls administered by a secure social network. The information may also be accessible from remote locations via the internet. All wireless and Internet communications may be protected using end-to-end secure transport layer communications protocols.Type: GrantFiled: January 17, 2011Date of Patent: July 8, 2014Assignee: Alcatel LucentInventors: José de Francisco Lopez, David S. Benco, Catriona M. Saunders
-
Patent number: 8768854Abstract: A secure protocol for transactions, such as electronic commerce transactions, is described that provides improved security through exploiting an independent (where this independence is logical and/or physical) communication path (e.g., between a customer and a back-end financial institution), ensuring that key financial information remains within the back-end financial institutions themselves. Hence, this protocol directly reduces cyber-crime risks through improvements to transaction security. In addition, various implementations of the secure protocol provide non-repudiation for one or more of the entities involved in the transaction.Type: GrantFiled: January 12, 2010Date of Patent: July 1, 2014Inventors: Stephen W. Neville, Michael Horie
-
Patent number: 8756427Abstract: The present invention is related to a wireless transmit/receive unit (WTRU) for providing advanced security functions. The WTRU includes trusted platform module (TPM) for performing trusted computing operations; and a secure time component (STC) for providing a secure measurement of a current time. The STC and the TPM are integrated to provide accurate trusted time information to internal and external to the WTRU. The STC may be located on an expanded a subscriber identity module (SIM), on the WTRU platform, or two STCs may be used, one in each location. Similarly, the TPM may be located on an expanded SIM, on the WTRU platform, or two TPMs may be used, one in each location. Preferably, the STC will include a real time clock (RTC); a tamper detection and power failure unit; and a time report and sync controller.Type: GrantFiled: May 8, 2007Date of Patent: June 17, 2014Assignee: InterDigital Technology CorporationInventors: Yogendra C. Shah, Inhyok Cha
-
Patent number: 8756428Abstract: A computerized authentication method of an electronic document, in particular a file designed to be on-board an aircraft. The method includes generating a digital signature of the electronic document using a private key corresponding to a public key certified by a certifying authority, and sending via the Internet a time stamp request of the electronic document to a time stamping authority and receiving in response thereto a time-stamp signed by the certifying authority. The method includes sending via the Internet a request to an Online Certificate Statute Protocol (OCSP) server and receiving in response thereto a statute of the certificate of the public key, and adding to the electronic document of the digital signature, the time-stamp and the statute of the certificate to create an authenticated electronic document.Type: GrantFiled: February 12, 2008Date of Patent: June 17, 2014Assignee: Airbus Operations SASInventors: Julien Touzeau, Olivier Bastien
-
Patent number: 8756666Abstract: Authentication codes associated with an entity are generated. A stored secret associated with an entity is retrieved. At a first point in time, a first dynamic value associated with a first time interval is determined. A first authentication code based on the first dynamic value is determined. At a second point in time, a second dynamic value associated with a second time interval is determined. A second authentication code based on the second dynamic value is determined. The first and second authentication codes are derived from the stored secret and the amount of time between the first and second points in time is different from the length of the first time interval.Type: GrantFiled: September 30, 2008Date of Patent: June 17, 2014Assignee: EMC CorporationInventors: Eric A. Silva, William M. Duane
-
Patent number: 8751792Abstract: A method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party is disclosed. The method includes the following steps: 1) an entity B transmits a message 1 to an entity A; 2) the entity A transmits a message 2 to a credible third party TP after receiving the message 1; 3) the credible third party TP determines the response RepTA after receiving the message 2; 4) the credible third party TP returns a message 3 to the entity A; 5) the entity A returns a message 4 to the entity B after receiving the message 3; 6) the entity B receives the message 4; 7) the entity B transmits a message 5 to the entity A; 8) the entity A receives the message 5.Type: GrantFiled: December 14, 2009Date of Patent: June 10, 2014Assignee: China Iwncomm Co., Ltd.Inventors: Manxia Tie, Jun Cao, Zhenhai Huang, Xiaolong Lai
-
Patent number: 8745401Abstract: Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for authorizing actions of a service provider. In one aspect, a method includes providing a user security key to a mobile device of a user. A request is received from a client device distinct from the mobile device to perform an action. A challenge token including a security signature matched to a service security key is generated, and the challenge token is provided to the mobile device. An approval value is received from the client device. The approval value is determined to be valid in reference to the challenge token and the user security key previously provided to the mobile device and to indicate approval to perform the action for the user. The action is performed in response to receiving the approval value.Type: GrantFiled: November 12, 2010Date of Patent: June 3, 2014Assignee: Google Inc.Inventors: Andrew Hintz, Michael Wiacek
-
Patent number: 8745692Abstract: A method for safe data communication via WAN, LAN (e.g. Internet) between at least one external access unit and a field device, or a field bus adapter for determining or monitoring at least one physical or chemical process parameter. According to the method unauthorized accessing of a field device, or a field bus adapter, in the field is blocked in that the operator of the field device or the field bus adapter permits the external access unit to have targeted access to the field device, or the field bus adapter.Type: GrantFiled: September 11, 2002Date of Patent: June 3, 2014Assignee: Endress + Hauser Process Solutions AGInventors: Udo Grittke, Christian Seiler
-
Patent number: 8738539Abstract: Virtual account based digital cash protocols employ two pairs of private and public keys. Each public key is certified separately and the protocols do not use any blind signature schemes. As a result, the virtual account based digital cash protocols provide strong protection of the user privacy by using two certified public keys instead of a blind signature. One pair of certified keys consists of one master user private key and one master user public key. A second pair of certified keys consists of one pseudonym user private key and one pseudonym user public key. The use of a master key pair and a pseudonym key pair circumvents the need for blind signatures. As a result, the proposed protocols do not require blind signatures and do not add additional overhead and security requirements necessitated by conventional blind signature schemes.Type: GrantFiled: March 17, 2011Date of Patent: May 27, 2014Assignee: King Fahd University of Petroleum and MineralsInventors: Ahmed Ibrahim Al-Herz, Mohammad K. Ibrahim
-
Patent number: 8726017Abstract: A system and method for data storage and removal includes providing databases and providing encryption keys. Each database is associated with a database time period and each encryption key is associated with an encryption time period. Data items are received and each data item is encrypted using the encryption key associated with the encryption time period that corresponds to a time associated with the data item. Each encrypted data item is stored in the database associated with the database time period that corresponds to the time associated with the data item. Each encryption key is deactivated at a predetermined time after the associated encryption time period ends. Each database is made irretrievable upon a determination that all of the encryption keys associated with the data items stored in that database have been deactivated.Type: GrantFiled: September 19, 2011Date of Patent: May 13, 2014Assignee: Bright Sun TechnologiesInventor: Harmannus Vandermolen
-
Patent number: 8720600Abstract: A method of detecting a fault attack including generating a first signature of a first group of data values by performing a single commutative non-Boolean arithmetic operation between all the data values of the first group; generating a second set of data values by performing a permutation of the first set of data values; generating a second signature of the second group of data values by performing said single commutative non-Boolean arithmetic operation between all the data values of the second group; and comparing the first and second signatures to detect a fault attack.Type: GrantFiled: November 10, 2010Date of Patent: May 13, 2014Assignee: STMicroelectronics (Rousset) SASInventor: Yannick Teglia
-
Patent number: 8724803Abstract: A method and apparatus for secure generation of a short-term key SK for viewing information content in a Multicast-broadcast-multimedia system are described. A short-term key is generated by a memory module residing in user equipment (UE) only when the source of the information used to generate the short-term key can be validated. A short-term key can be generated by a Broadcast Access Key (BAK) or a derivative of BAK and a changing value with a Message Authentication Code (MAC) appended to the changing value. A short-term key (SK) can also be generated by using a private key and a short-term key (SK) manager with a corresponding public key distributed to the memory module residing in the user equipment (UE), using a digital signature.Type: GrantFiled: September 1, 2004Date of Patent: May 13, 2014Assignee: QUALCOMM IncorporatedInventors: James Semple, Gregory Gordon Rose
-
Patent number: 8688588Abstract: A method for improving accuracy of a time estimate used in digital rights management (DRM) license validation is disclosed. In one embodiment, a memory device receives a request to validate a DRM license stored on the memory device, wherein the DRM license is associated with a time stamp update policy (TUP) that specifies when a new time stamp is needed. Before attempting to validate the DRM license, the memory device determines if a new time stamp is needed based on the TUP associated with the DRM license. If a new time stamp is needed, the memory device receives the new time stamp and then attempts to validate the DRM license using a time estimate based on the new time stamp. Other embodiments are disclosed, and each of the embodiments can be used alone or together in combination.Type: GrantFiled: June 8, 2007Date of Patent: April 1, 2014Assignee: SanDisk Technologies Inc.Inventors: Michael Holtzman, Rotem Sela, Ron Barzilai, Fabrice E. Jogand-Coulomb
-
Patent number: 8688995Abstract: The invention concerns a method of detecting a fault attack including providing a plurality of blinding values; generating a first set of data elements including a first group of data elements and at least one additional data element generated by performing the exclusive OR between at least one data element in the first group and at least one of the blinding values; generating a second set of data elements corresponding to the exclusive OR between each data element of the first set and a selected one of the plurality of blinding values; generating a first signature by performing a commutative operation between each of the data elements of the first set; generating a second signature by performing the commutative operation between each of the data elements of the second set; and comparing the first and second signatures to detect a fault attack.Type: GrantFiled: November 10, 2010Date of Patent: April 1, 2014Assignee: STMicroelectronics (Rousset) SASInventor: Yannick Teglia
-
Patent number: 8683605Abstract: Long-Term Validation (LTV) of a digital signature status indicator is disclosed. In some embodiments, the Long-Term Validation of a digital signature status indicator includes automatically determining whether a digital signature of a digitally signed document is LTV enabled based at least in part on LTV information; and generating an LTV status indicator that displays whether the digital signature of the digitally signed document is LTV enabled.Type: GrantFiled: March 27, 2012Date of Patent: March 25, 2014Assignee: Adobe Systems IncorporatedInventors: Isak Tenenboym, Philip Levy, Marc Kaufman, John Landwehr
-
Patent number: 8677130Abstract: The present invention provides for an authenticity marker to be embedded within web page and/or email content which allows a user to validate that the content originates from the true source of the content and is not merely a copy. The method includes a user requesting content in the form of a web page and/or email from a server using a web browser or email client. The server receives the request, retrieves the content and forwards it to an authentication server. The authentication server inserts into the retrieved content a unique fractal icon and/or information only known between the owner of the content and the user.Type: GrantFiled: March 9, 2005Date of Patent: March 18, 2014Assignee: Secure Axcess LLCInventors: Fred Bishop, Danielle R. Domenica, Vicki R. Mendivil, Hermes H. Villalobos
-
Patent number: 8677133Abstract: The present invention validates provenance dates of electronic documents. A document version date may be determined by creating a unique checksum for the document and having the document's owner digitally sign it with a private key. The checksum and digital signature are securely stored by an authorization entity along with a timestamp fixing the date/time. A unique resource identifier is returned to the user. Subsequently, if the document's date needs to be proved to a third party, a verification program is applied to the original document to create a new checksum. The unique resource identifier is used to retrieve the signed checksum from the authorization entity. Upon verification of matching checksums, the timestamp provided by the authorization entity proves the date/time the document existed. In addition, the public key provided by the document owner proves that the checksum was signed by the owner's private key, proving their ownership.Type: GrantFiled: February 10, 2009Date of Patent: March 18, 2014Assignee: Google Inc.Inventor: Gregory Reeves Spencer
-
Patent number: 8677507Abstract: The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node.Type: GrantFiled: February 8, 2011Date of Patent: March 18, 2014Assignee: Intertrust Technologies CorporationInventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie
-
Patent number: 8677134Abstract: A system and method for signing data transferred over a computer network is described. In one aspect, the HTTP header of an HTTP response message is extended to include a content identifier, a content expiration time, and a digital signature. The digital signature may be generated from the content identifier, the content expiration time, and the message body of the HTTP response message.Type: GrantFiled: November 11, 2010Date of Patent: March 18, 2014Assignee: Microsoft CorporationInventors: Felix Livni, Hao Chen
-
Patent number: 8676998Abstract: A client-server communication protocol permits the server to authenticate the client without requiring the client to authenticate the server. After establishing the half-authenticated connection, the client transmits a request and the server performs or responds accordingly. A network management system and environment where this protocol can be used is also described and claimed.Type: GrantFiled: November 29, 2007Date of Patent: March 18, 2014Assignee: Red Hat, Inc.Inventor: James P. Schneider
-
Patent number: 8667288Abstract: In a network device, a method for verified communication includes generating a network communication message using a selection of predetermined message elements having digital signatures generated with a private key. The network device generates a signature for the message by applying a homomorphic operation to the digital signatures of the selected predetermined message elements and to a one-time signature corresponding to a random number. The network device transmits the message in association with the signature for the message and the random number to at least one other network device.Type: GrantFiled: May 29, 2012Date of Patent: March 4, 2014Assignee: Robert Bosch GmbHInventor: Attila Altay Yavuz
-
Patent number: 8656175Abstract: When performing secure processing using confidential information that needs to be confidential, the secure processing device according to the present invention prevents the confidential information from being exposed by an unauthorized analysis such as a memory dump.Type: GrantFiled: October 24, 2006Date of Patent: February 18, 2014Assignee: Panasonic CorporationInventors: Tomoyuki Haga, Taichi Sato, Rieko Asai
-
Patent number: 8655318Abstract: A mobile node and its home system generate synchronized time-based codes at periodic time intervals. Each time-based code is valid for a predetermined time period. To facilitate anonymous operation when roaming, the mobile node identifies itself with a coded identifier instead of a public identifier. The coded identifier used at a given time includes the time-based code that is valid for that given time. To authenticate the mobile node, a serving system receives authentication information from the mobile node and forwards the authentication information to a home system. The authentication information includes the current time-based code and a timestamp. The home system identifies the mobile node from the current time-based code and the timestamp. The home system then uses the authentication information to authenticate the mobile node.Type: GrantFiled: March 27, 2013Date of Patent: February 18, 2014Assignee: Sprint Spectrum L.P.Inventors: Tong Zhou, George Jason Schnellbacher
-
Publication number: 20140040624Abstract: A method for securely publishing an access control list begins with a DS managing unit generating an authentic and time-stamped access control list from the access control list, wherein the access control list provides a list of authorized accesses to the DSN. The method continues with the DS managing unit sending the authentic and time-stamped access control list to a publisher unit. The method continues with the publishing unit sending the authentic and time-stamped access control list to a plurality of DS units.Type: ApplicationFiled: October 11, 2013Publication date: February 6, 2014Applicant: CLEVERSAFE, INC.Inventor: Jason K. Resch
-
Patent number: 8645703Abstract: Execution of the ECMQV key agreement algorithm requires determination of an implicit signature, which determination involves arithmetic operations. Some of the arithmetic operations employ a long-term cryptographic key. It is the execution of these arithmetic operations that can make the execution of the ECMQV key agreement algorithm vulnerable to a power analysis attack. In particular, an attacker using a power analysis attack may determine the long-term cryptographic key. By modifying the sequence of operations involved in the determination of the implicit signature and the inputs to those operations, power analysis attacks may no longer be applied to determine the long-term cryptographic key.Type: GrantFiled: June 6, 2012Date of Patent: February 4, 2014Assignee: Blackberry LimitedInventor: Nevine Maurice Nassif Ebeid
-
Patent number: 8639933Abstract: An image reading apparatus which reads an original document and generates a digitized scanned document, and which includes a document storage section that stores the scanned document, a document bundling section that identifies one or more scanned documents stored by the document storage section, and bundles the identified documents into one document, and a time stamp affixing section that creates a digital signature of the document bundled by the document bundling section, and affixes a time stamp.Type: GrantFiled: June 12, 2006Date of Patent: January 28, 2014Assignee: Fuji Xeroc Co., Ltd.Inventor: Takanori Masui
-
Patent number: 8631235Abstract: A system and method for storing data in a virtual file system using write once read many (WORM) protection includes a WORM server in communication with one or more storage devices and a controller in communication with the WORM server. A first time stamping process for creating a first time stamp for a data object based on instructions applied by the controller for storage on the WORM server. A second time stamping process for creating a second time stamp for the data object for storage on the WORM server. The second time stamping process creates the second time stamp for the data object and first time stamp to ensure the integrity of the data object stored on the system.Type: GrantFiled: August 8, 2007Date of Patent: January 14, 2014Assignee: Oracle America, Inc.Inventor: James P. Hughes
-
Patent number: 8626647Abstract: Electronic documents corresponding to executed paper documents are certified. A certifying agent receives an electronic document and a corresponding paper document that had been executed pursuant to some transaction. The certifying agent compares the information contained in the paper to that in the electronic mortgage document. If the paper adequately corresponds to the electronic document and is otherwise sufficient, then the certifying agent certifies the electronic document so that other parties can reliably engage in transactions involving the electronic document without having to possess or otherwise inspect the executed paper document. Certification involves application of some form of indicia of certification to the electronic document, such as updating the value of a field corresponding to certification in the electronic document and/or applying a digital or electronic signature corresponding to the certifying agent to the electronic document.Type: GrantFiled: October 9, 2012Date of Patent: January 7, 2014Assignee: Fannie MaeInventors: J. Harvey Trimble, Jr., Cynthia H. Keith, Charlotte Haberaecker, N. Grande Bucca
-
Patent number: 8620825Abstract: Disclosed are systems and methods for establishing a personal identification number (PIN). The systems and methods provide techniques to begin a remote session with a customer, prompt the customer to select a PIN to associate with a financial account card during the remote session, and receive the PIN from the customer during the remote session.Type: GrantFiled: August 28, 2012Date of Patent: December 31, 2013Assignee: United Services Automobile Association (USAA)Inventors: Ryan R. Barth, Felicia Tavares
-
Patent number: 8621222Abstract: In various embodiments, a computerized method includes receiving electronic content to be archived. The electronic content comprises a digital signature. The method also includes archiving the digital signature, wherein archiving of the digital signature comprises determining a validity status of the digital signature and storing the validity status in the electronic content. The method includes archiving the electronic content after the validity status has been stored in the electronic content. The method includes storing the archived electronic content and the attestation signature into a machine-readable medium.Type: GrantFiled: May 30, 2008Date of Patent: December 31, 2013Assignee: Adobe Systems IncorporatedInventor: Sujata Das
-
Patent number: 8621653Abstract: A location collection system is described herein that provides a uniform facility for reporting location data to a cloud-based service from a variety of devices, and that provides a uniform facility for accessing aggregated location data collected by the cloud-based service. The system collects location information related to a user and reports the location information to a central service to provide a variety of useful services to the user. By providing a big, secure location vault in the cloud, the system enables big data analytics to be used to allow current and future questions to be asked of this data and to correlate this with other data to enable new scenarios not yet enabled. Thus, the location collection system provides a model to report, gather, and analyze location data across devices and users.Type: GrantFiled: December 12, 2011Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: Moe Khosravy, Christian Liensberger
-
Patent number: 8615265Abstract: A coded system for radio-frequency communication (RFC); the system comprising at least one base station (20) and a plurality of mobile devices (10); the base station and mobile devices are individually provided with running time information synchronized inter se; the mobile device is adapted for transmitting an identifying signal to the base station device; the base station is adapted for receiving the signal; wherein the signal further comprises a preamble including a miming-time-dependent code generated according to a predetermined algorithm (220); the base station is adapted for comparing the code with a reference code generated by the base station according to the algorithm (260), authorizing the RFC in response to coincidence of the running-time-dependent codes generated by the base station and the mobile (270).Type: GrantFiled: August 14, 2009Date of Patent: December 24, 2013Assignee: Precyse Technologies, Inc.Inventor: Michael Braiman
-
Patent number: 8600380Abstract: A system of Wi-Fi terminals and a channel operation method for the same are provided. The method includes selecting a user function of a sending terminal including a Wi-Fi module, determining whether the selected user function is a Wi-Fi related function, performing, when the selected user function is the Wi-Fi related function, by the sending terminal, a search for a terminal capable of handling the user function, selecting, by the sending terminal, a found terminal as a receiving terminal, automatically establishing, by the sending terminal, a Wi-Fi channel to the receiving terminal by automatically sending a Probe Request message containing a Personal Identification Number (PIN) code, sending, by the sending terminal, data generated by the user function to the receiving terminal through the Wi-Fi channel, and outputting, by the receiving terminal, the received data.Type: GrantFiled: May 13, 2011Date of Patent: December 3, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Jong Mu Choi, You Na Lee, Jhong Il Kim, Jun Ho Lee, Jung Hun Lee
-
Patent number: 8595495Abstract: A method for secure data communications in fax transmissions and computer network communications comprising a. Allowing the sender to receive confirmation that the receiver received the message without having to rely on the receiver accessing a web site; b. Enabling the sender to prove a message was sent to the intended receiver at the specified time/date; c. Enabling the sender to prove the content of the sent message; d. Enabling the receiver to know that the message originates from the purported sender without need to rely on encryption and digital signatures; e. Preventing the theft of digital signatures based on hardware that contains encryption keys and a surrounding processing in isolation so that malicious software cannot cheat the users by accessing said hardware; f. Preventing forgeries of source addresses of the senders which is applied to the sender's phone number, the sender's email addresses, and/or the sender's IP addresses.Type: GrantFiled: April 12, 2005Date of Patent: November 26, 2013Inventor: Yaron Mayer
-
Patent number: 8595492Abstract: On-demand protection and authorization of playback of media assets includes receiving digital media at a server computer, storing intermediary data in a data store, and receiving a request from a client for the digital media. The method also includes generating a protected copy of the digital media from the digital media and the intermediary data. The method also includes storing a description of the protected copy in a database and sending the protected copy to the client. The method also includes receiving a request from the client to access the digital media and reading the description from the database based on information in the request. The method also includes sending a response to the client, the response indicating whether the client is authorized to access the digital media, and the response including cryptographic data to decrypt the protected digital media if the client is authorized to access the digital media.Type: GrantFiled: August 19, 2009Date of Patent: November 26, 2013Assignee: Pix System, LLCInventors: Paul McReynolds, Eric B. Dachs, Erik Bielefeldt, Craig Wood
-
Patent number: 8584200Abstract: A method for revoking access to a mobile device includes providing a plurality of authenticated applications accessible by the mobile device, and providing a plurality of revocation timeout intervals for revoking access by the mobile device to the plurality of authenticated applications. Access to a first authenticated application is revoked after a first timeout interval and access to a second authenticated application is revoked after a second timeout interval.Type: GrantFiled: September 29, 2005Date of Patent: November 12, 2013Assignee: Broadcom CorporationInventor: Edward H. Frank
-
Publication number: 20130297943Abstract: A dynamic notary system having one or more processors, and one or more non-transitory computer readable medium coupled to the one or more processors with at least one of the computer readable medium being local to the one or more processors. The one or more non-transitory computer readable medium stores computer executable instructions, that when executed by the one or more processors cause the one or more processors to: (1) verify a notary with user identification information stored on the at least one computer readable medium local to the one or more processors, (2) retrieve a document to be notarized from the one or more non-transitory computer readable medium, (3) receive a signatory's electronic signature, (4) receive the notary's electronic signature, (5) apply a notary seal to the document, and (6) lock the document in an unchangeable format.Type: ApplicationFiled: May 4, 2012Publication date: November 7, 2013Inventors: David C. Hackler, Kenneth M. Stoner
-
Patent number: 8577022Abstract: To improve encryption technology for a data processing apparatus in order to reduce a possibility of having communication broken by a third party. The data processing apparatus encrypts subject data and renders it as encrypted data to record it on a predetermined recording medium, and decrypts the encrypted data recorded on the recording medium to change it back to the subject data. The encryption is performed in units of plain text cut data generated by cutting the subject data by a predetermined number of bits, where the number of bits of the plain text cut data is varied and dummy data of a size having the number of bits matching with a piece of the plain text cut data of the largest number of bits is mixed with pieces of the plain text cut data other than that of the largest number of bits out of the plain text cut data.Type: GrantFiled: March 7, 2006Date of Patent: November 5, 2013Assignee: NTI, Inc.Inventor: Takatoshi Nakamura
-
Patent number: 8566922Abstract: A system for isolating a data communication network has been developed. The system includes an internal computer system with an internal computer that is in data communication with the internal computer system, and an external computer system with an external computer that is in data communication with the external computer system. The internal and external computers are connected with an ethernet adapter that only allows transmission of data from the internal computer system and prohibits the receipt of data by the internal computer system.Type: GrantFiled: May 25, 2011Date of Patent: October 22, 2013Inventor: Barry W. Hargis
-
Patent number: 8566597Abstract: When input data (f0) is read into a digital signature generating apparatus, a hash value (h0) is calculated. The hash value (h0) is stored to a storage area (M1), which has the highest priority rank among 5 storage areas. Subsequently, when input data (f1) is read in, a hash value (h1) is calculated. Since the storage area (M1) is already occupied by the hash value (h0), the hash value (h0) is read out from storage area (M1), emptying the storage area (M1). The read hash value (h0) and the hash value (h1) are concatenated, forming a concatenated hash value (h0|h1) and a hash value (h0,1) is calculated. The hash value (h0,1) is stored to a storage area (M2), which has the highest priority rank after the storage area (M1). When input data (f2) is read in, a hash value (h2) is calculated and stored to the storage area (M1).Type: GrantFiled: August 24, 2011Date of Patent: October 22, 2013Assignees: Fujitsu Limited, Fujitsu Advanced Engineering LimitedInventors: Masahiko Takenaka, Takashi Yoshioka, Fumitsugu Matsuo, Fumiaki Chiba
-
Patent number: 8561175Abstract: A prevention-based network auditing system includes a central compliance server providing a user interface allowing a user to schedule and configure a network audit. The configured audit is stored in an audit repository until its scheduled time. At such a time, the compliance server automatically invokes one or more audit servers to gather information about the network. The compliance server receives the gathered information and electronically applies a network policy to the information for determining compliance with the policy. A remediation task may be generated if the policy has been violated, and the task monitored until its completion.Type: GrantFiled: February 13, 2004Date of Patent: October 15, 2013Assignee: Preventsys, Inc.Inventors: John Leslie Williams, Brian Costello, John Patrick Ravenel, Stephen J. Ritter, John Pelly, M. Celeste Rutherford, John Payne
-
Patent number: 8560838Abstract: A document disposal certification apparatus is installed in a document generation apparatus for generating a document, a document disposal apparatus for disposing of the document, or a server that are used with being connected to the document generation apparatus and the document disposal apparatus. The document disposal certification apparatus includes a generation information acquisition section, a disposal information acquisition section and an information management section. The generation information acquisition section acquires information concerning document generation in the document generation apparatus, as document presence certification information. The disposal information acquisition section acquires information concerning document disposal in the document disposal apparatus, as document disposal certification information.Type: GrantFiled: July 24, 2007Date of Patent: October 15, 2013Assignee: Fuji Xerox Co., Ltd.Inventors: Hiroyuki Eguchi, Ryu Inada
-
Publication number: 20130268764Abstract: An authentication system for authentication and verification of data provides verification that stored data has not been tampered with or otherwise altered. The authentication system may be configured to interoperate with a variety of other systems, such as various data storage and retrieval systems. In this manner, the authentication and verification services can be used to enhance various systems with data verification capabilities. The authentication system may sign and verify signatures for data. In addition, the authentication system may be configured to verify the time of a data event, the timeliness of the data event, or both.Type: ApplicationFiled: April 9, 2012Publication date: October 10, 2013Inventors: Juan Valdes, Brian Parvin, Steve Tulk
-
Patent number: 8555074Abstract: A data acquiring unit acquires electronic data. A tamper-resistant chip includes a storing unit that stores a confidential key specific to a device, and a collecting unit that collects device information that is internal information of the device. An attaching unit attaches collected device information to acquired electronic data. An encrypting unit encrypts the electronic data with the device information attached, using the confidential key stored in the storing unit.Type: GrantFiled: January 17, 2007Date of Patent: October 8, 2013Assignees: PFU Limited, Fujitsu LimitedInventors: Kouichi Minami, Seigo Kotani
-
Patent number: 8555089Abstract: Information processing apparatus (100) ensures confidentiality of encryption and reduces overhead associated with processing not directly related to the encryption. The information processing apparatus (100) includes: application program (A158) that includes an instruction for encryption which uses a key; tampering detection unit (135x) that detects tampering of the program; CPU (141) that operates according to instructions and outputs a direction for encryption upon detecting the instruction for encryption; data encryption/decryption function unit (160) that controls switching to the protective mode according to the direction; and protected data operation unit (155) that stores a key in correspondence with the program, outputs the key in the protective mode, and controls switching to the normal mode, and the data encryption/decryption function unit (160) executes the encryption in the normal mode using the received key.Type: GrantFiled: January 5, 2010Date of Patent: October 8, 2013Assignee: Panasonic CorporationInventors: Takayuki Ito, Manabu Maeda, Tomoyuki Haga, Hideki Matsushima, Yuichi Futa, Kouji Kobayashi
-
Patent number: 8549284Abstract: A method and system is provide for performing a certificate validity check between a vehicle receiving a message and an entity transmitting the message in a vehicle-to-entity communication system. The message includes a digital certificate. A determination is made whether the digital certificate is expired. A determination is made whether the digital certificate is listed in a local certificate revocation list stored in a memory of the vehicle in response to a determination that the digital certificate is not expired, otherwise, disregarding the message. An elapsed time is determined since a last freshness check in response the digital certificate not listed in the local certificate revocation list. The elapsed time is compared to a threshold requirement. The digital message is accepted for additional processing in response to the freshness check meeting the threshold requirement, otherwise, the message is disregarded.Type: GrantFiled: May 9, 2012Date of Patent: October 1, 2013Assignee: GM Global Technology Operations LLCInventor: Arzad A. Kherani
-
Patent number: 8547199Abstract: A computer-implemented, transaction-making, municipal bond trading system having a capability to conduct a private electronic auction of bid wanteds between a central brokers' broker and multiple prospective remote bidders and to maintain a reference database of accurate individual bond lot descriptions and identifications, including CUSIP (trademark) numbers.Type: GrantFiled: February 26, 2007Date of Patent: October 1, 2013Assignee: BGC Partners, Inc.Inventor: David Lawrence
-
Patent number: 8549310Abstract: The invention relates to methods and apparatuses for acquiring a physical measurement, and for creating a cryptographic certification of that measurement, such that its value and time can be verified by a party that was not necessarily present at the measurement. The certified measurement may also include corroborative information for associating the actual physical measurement process with the certified measurement. Such corroborative information may reflect the internal or external state of the measurement certification device, as well as witness identifiers of any persons that may have been present at the measurement acquisition and certification. The certification may include a signal receiver to receive timing signals from a satellite or other external source. The external timing signals may be used to generate the time included in the certified measurement, or could be used to determine the location of the measurement certification device for inclusion in the certified measurement.Type: GrantFiled: June 24, 2009Date of Patent: October 1, 2013Assignee: Walker Digital, LLCInventors: Jay S. Walker, Bruce Schneier, James A. Jorasch
-
Patent number: 8543091Abstract: Embodiments of the present disclosure provide systems and methods for secure Short Message Service (SMS) communications. According to an embodiment, a method of providing secure Short Message Service (SMS) communications comprises requesting that SMS data to be sent from a client device to a remote location be encrypted. The method also comprises encrypting the SMS data by processing the SMS data with a Message Authentication Code (MAC) and a timestamp and/or counter along with second factor authentication information. The method further comprises sending the encrypted SMS data to the remote location by a secure SMS application via a regular SMS channel of the client device.Type: GrantFiled: December 22, 2008Date of Patent: September 24, 2013Assignee: eBay Inc.Inventor: Upendra Mardikar
-
Patent number: 8543828Abstract: Systems and methods for authenticating a user of a service are disclosed. A Personal Identification Number (PIN) is generated using a plurality of variables, and a user is authenticated by comparing the PIN generated at the user's mobile device with a PIN generated on an authentication server. The authentication enables the user to access a service or resource hosted on a host server. When requesting access to the resource, the user generates a device PIN and transmits the device PIN along with their unique key into the host server. The host server forwards the device PIN and the key to the authentication server. The authentication server generates a server PIN and compares the server PIN to the device PIN. If the two PINS match, the authentication server transmits a successful authentication response to the host server.Type: GrantFiled: December 6, 2010Date of Patent: September 24, 2013Assignee: AT&T Intellectual Property I , L.P.Inventor: Luis F. Albisu