Time Stamp Patents (Class 713/178)
-
Patent number: 7941121Abstract: The invention disclose a method for verifying the validity of a user, making full use of a TID as the bridge for establishing confidence between a NAF and a user equipment, and the BSF assigning a term of validity for the TID, thereby extending the function of the TID, enabling the NAF to verify the term of validity for using the TID, and accordingly, achieving a further verification of the validity to the user. By using the method of the invention, it is possible to avoid the situation in which one TID is permanently valid for one or more NAFs, enhance the system security, decrease the risks caused by the theft of users' TID and corresponding secret keys, and at the same time, implement TID management by the NAF. In addition, a combination of the method with billing system makes it easy to implement the function of charging a user.Type: GrantFiled: April 28, 2006Date of Patent: May 10, 2011Assignee: Huawei Technologies Co., Ltd.Inventor: Yingxin Huang
-
Patent number: 7941668Abstract: A method and system for secure managing transactions between application devices over a network. The present invention provides a method and system for receiving data from an application device, such as computer workstation, ATM, credit card point-of-sale terminal, or application software, and transferring that data securely over a network to a recipient application device. The method and system provide secure cryptographic key and enterprise management of embedded, standalone and tightly coupled information assurance components.Type: GrantFiled: July 10, 2006Date of Patent: May 10, 2011Inventors: Jeff J. Stapleton, Bradley L. Morrison, Arnold G. Werschky
-
Patent number: 7941667Abstract: A need exists for a technology for guaranteeing the authenticity of an electronic document, and an information disclosure system, which can guarantee the authenticity of a disclosed document and delete information regarded as inappropriate for disclosure. An electronic document is divided into components, and a random number generated from a seed value is concatenated to each of the components. A hash value is calculated for each of the components with which the random numbers have been concatenated. The calculated hash values are further concatenated using a hash function to generate data to which an digital signature is applied.Type: GrantFiled: July 7, 2006Date of Patent: May 10, 2011Assignee: Hitachi, Ltd.Inventors: Kunihiko Miyazaki, Yasuo Hatano
-
Patent number: 7934100Abstract: An information processing system includes a unit that selects a time stamp authority to which a request for generation of a time stamp, the time stamp authority to be selected is different from a time stamp authority selected in a last selection process which has been performed; a unit that acquires the time stamp from the selected time stamp authority; a unit that generates link information specifying an order in which time stamps; a controller that causes verification information including the time stamp, identification information of the time stamp authority, the link information, that are associated with each other; a unit that receives a time stamp verification request with regard to digital data; and a unit that compares an invalidated time stamp applied to digital data to be verified with a time stamp to thereby specify a time range in which the invalidated time stamp is applied.Type: GrantFiled: March 19, 2007Date of Patent: April 26, 2011Assignee: Fuji Xerox Co., Ltd.Inventor: Yoshihiro Fujimaki
-
Publication number: 20110093713Abstract: A method for signing a document to be transmitted between two correspondents, i.e. a sender and an addressee, including recording the sender and the addressee of the document for the allocation of a digital identity thereto; authorizing by the addressee a correspondence with the sender; ciphering the document; indicating to the addressee that the document is available; detecting an access to the document by the addressee; generating an electronic report indicating the delivery of the document, the document-delivery electronic report including a set of data associated with the transmission of the document to the addressee, the set including identification of elements concerning the addressee authentication, the sealing of the document, the access to the document by the addressee and the time-stamping of the access to the document by the addressee; and electronically signing, by a reliable third-party using the private key thereof, the document-delivery electronic report.Type: ApplicationFiled: January 5, 2009Publication date: April 21, 2011Applicant: TRUSTSEED SASInventor: Eric Blot-Lefevre
-
Publication number: 20110087887Abstract: Methods and apparatus for providing proof of multiple entities being co-located at a specific time and location. An attestor transmits an attestation message via short range communication; the attestation message includes a time stamp, a location stamp, and a verifiable digital signature. An attestee that stores the attestation message can produce the attestation message at a later time to any interested party, as proof of co-location with the attestor at the specified time and location. In one exemplary embodiment, the methods and apparatus are substantially “open” for public implementation. Such public implementation enables attestors and attestees without prior affiliation, to provide attestation. Furthermore, the device-agnostic methods and apparatus can provide attestation capabilities even in previously deployed systems and devices.Type: ApplicationFiled: October 9, 2009Publication date: April 14, 2011Inventors: Achim Luft, Maik Bienas, Andreas Schmidt
-
Patent number: 7925883Abstract: A phishing detection server component and method is provided. The component can be employed as part of a system to detect/phishing attacks. The phishing detection server component can receive password reuse event report(s), for example, from a protection component of client component(s). Due to the malicious nature of phishing in general, the phishing detection server component can be susceptible to attacks by phishers (e.g., by reverse engineering of the client component). For example, false report(s) of PREs can be received from phisher(s) in an attempt to overwhelm the server component, induce false positives and/or induce false negatives. Upon receipt of a PRE report, the phishing detection server component can first verify that the timestamp(s) are genuine (e.g., previously generated by the phishing detection server component). The report verification component can employ the timestamp(s) to verify veracity of the report (e.g., to minimize attacks by phishers).Type: GrantFiled: February 23, 2006Date of Patent: April 12, 2011Assignee: Microsoft CorporationInventors: Dinei A. Florencio, Cormac E. Herley
-
Patent number: 7923830Abstract: A package-on-package (POP) secure module includes a first ball grid array (BGA) package and a second BGA package. The first BGA includes an array of bond balls that is disposed on a side of a substrate member, and an array of lands that is disposed on the opposite side of the substrate member. Bond balls of the second BGA are fixed to the lands of the first BGA such that the second BGA is piggy-back mounted to the first BGA. Embedded in the substrate member of the second BGA is an anti-tamper security mesh. An integrated circuit in the first BGA is coupled to, drives and monitors the security mesh. When the module is disposed on a printed circuit board within a point of sale (POS) terminal, the integrated circuit is coupled to, also drives and monitors a second security mesh embedded in the printed circuit board underneath the module.Type: GrantFiled: April 13, 2007Date of Patent: April 12, 2011Assignee: Maxim Integrated Products, Inc.Inventors: Steven M. Pope, Ruben C. Zeta
-
Patent number: 7925884Abstract: A method of verifying a carved seal includes detecting a pressure on a carved seal stamp is detected through pins extending from a face of the carved stamp steal. It is determined if the pressure indicates that the seal is being pressed. A fingerprint of a user of the seal is read when it is determined that the seal is being pressed. An image of an object being stamped by the seal is photographed if the pressure indicates that the seal is being pressed. A time that the seal is being pressed is determined if the pressure indicates that the seal is being pressed. A location of the seal is determined if the pressure indicates that the seal is being pressed. An audio note is recorded if the pressure indicates that the seal is being pressed. The fingerprint, time, and location is associated with the photograph of the image of the object being stamped by the seal. The information is encoded into a face of the seal to indicate that the fingerprint was determined to belong to an authorized user.Type: GrantFiled: June 30, 2008Date of Patent: April 12, 2011Assignee: International Business Machines CorporationInventors: Ori Pomerantz, Louis Thomas Fuka
-
Patent number: 7926096Abstract: A system and a method for operating a device that is not capable of independently maintaining a local time clock to enforce a time-based transaction policy that requires a reliable time reference. The device establishes a secure communications channel to one or more network-attached time sources and inquires of each of the network-attached time-sources as to the current time using the secure communications channel. The device receives the current time from the network-attached time-sources and uses the received current times to estimate a current calendar time and to compute a reliability index associated with the estimated current calendar time. The device uses the estimated current calendar time and reliability index to enforce the time-based transaction policy.Type: GrantFiled: August 31, 2005Date of Patent: April 12, 2011Assignee: Gemalto SAInventors: Asad Mahboob Ali, Bertrand du Castel, Apostol Vassilev, Sylvain Prevost, Kapil Sachdeva
-
Patent number: 7917763Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encryptor for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.Type: GrantFiled: May 10, 2007Date of Patent: March 29, 2011Assignee: Fraunhofer-Gesellschaft zur Foerderung der Angewandten Forschung E.V.Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler
-
Patent number: 7904725Abstract: A system verifies an electronic signature. The electronic signature may be associated with timestamps, each including a time value. A timestamp verification module detects invalid certificates in a certificate chain of the electronic signature and records an earliest invalidity time value of the invalid certificates. The verification module also verifies the timestamps associated with the electronic signature and records the time value of the earliest valid timestamp. A declaration module declares the electronic signature as valid if the time value of the earliest valid timestamp is earlier than the earliest invalidity time value of the one or more invalid certificates. The electronic signature may alternatively or additionally be associated with countersignatures. A countersignature verification module verifies the countersignatures associated with the electronic signature, and the declaration module declares the electronic signature as valid if all of the countersignatures are determined to be valid.Type: GrantFiled: March 2, 2006Date of Patent: March 8, 2011Assignee: Microsoft CorporationInventor: Miladin Pavlicic
-
Patent number: 7899205Abstract: A method of detecting a version of input data content, there being a plurality of different versions of said data content, in which: said data content is arranged as two or more segments according to a segmentation pattern; and said versions of said data content are identifiable by corresponding identification data patterns by which at least some of said segments have respective identification data; said method comprising the steps of: (i) detecting said identification data in respect of said segments of said input data content; (ii) comparing said detected identification data with said identification data patterns corresponding to said different versions of said data content; and (iii) detecting that said input data content comprises at least a contribution from a certain version of said data content if a sum of matches obtained between said detected identification data and said identification data pattern for said certain version exceeds a threshold number.Type: GrantFiled: July 21, 2004Date of Patent: March 1, 2011Assignee: Sony United Kingdom LimitedInventors: Jason Charles Pelly, Daniel Warren Tapson, Mark Julian Russell
-
Patent number: 7895445Abstract: Data transfer between remote and home locations over a network is effected using an electronic token to facilitate access to the data. According to an example embodiment of the present invention, a network-based server facilitates the generation of a token specifying conditions upon which data access to a registered user's data can be made. When a request for data transfer is received in connection with a token, information in the token is used together with the request to selectively authenticate and serve the request.Type: GrantFiled: March 13, 2006Date of Patent: February 22, 2011Assignee: Nokia CorporationInventors: Michael J. Albanese, James Roland Henderson, Keith Barraclough, David Irvine, Rodrigo Philander
-
Publication number: 20110040976Abstract: A method and memory device for generating a time estimate are provided. In one embodiment, a memory device generates a time estimate from time stamps in file system metadata for a plurality of files stored in the memory device and uses the time estimate to perform a time-based activity in the memory device. In another embodiment, a memory device generates a time estimate from time stamps stored in a plurality of files stored in the memory device and uses the time estimate to perform a time-based activity in the memory device. In yet another embodiment, a memory device obtains a plurality of time stamps, selects one or more of the plurality of time stamps based on validity rankings, generates a time estimate from the selected time stamp(s), and uses the time estimate to perform a time-based activity in the memory device.Type: ApplicationFiled: August 17, 2009Publication date: February 17, 2011Inventors: Rahav Yairi, Itzhak Pomerantz, Itai Dror, Ori Stern
-
Patent number: 7890765Abstract: Methods, apparatus and systems for generating a trusted digital time stamp as well as a public time source. It includes, an apparatus for receiving and recording public time information and a method for verifying a digital time stamp. A method for generating a trusted digital time stamp includes: obtaining a first time information and a corresponding random code from a public time source; and generating a digital time stamp using a first time information and random code. A method for verifying a digital time stamp includes: recording time information and corresponding random codes transmitted by a public time source; retrieving time information and a random code contained in the time stamp; and comparing a retrieved random code from the time stamp with one of the recorded random codes that corresponds to a time information in the time stamp, if they are consistent, the time stamp is determined to be trusted, otherwise the time stamp is determined to be not trusted.Type: GrantFiled: May 20, 2008Date of Patent: February 15, 2011Assignee: International Business Machines CorporationInventors: Jian Zhang, Ling Shao, Dong Xie
-
Patent number: 7890761Abstract: A token value is generated for a user to submit to an authentication service of an electronic system. The token value represents that the user is in possession of an electronic item known to the authentication service, where the electronic item is capable of two-way communications with the authentication service and has thereon an authenticator application transmitted from the authentication service to the electronic item. The authenticator application obtains a current time value from a clock of the electronic item or an authentication value from the authentication service, retrieves predetermined indicia of the electronic item from a location thereon, and combines the obtained value and the retrieved indicia of the electronic item to generate the token value. The authentication service essentially performs the same steps based on information already available at such authentication service to generate a verification token value, and compares the submitted token value to the verification token value.Type: GrantFiled: September 25, 2007Date of Patent: February 15, 2011Assignee: United Services Automobile Association (USAA)Inventor: Michael Frank Morris
-
Patent number: 7891009Abstract: A first time indication which can be changed by a user and stored in a first memory. Furthermore, in the case of a change in the first time indication which is performed externally to the checking device, the difference between the stored first time indication and the changed first time indication is determined. Furthermore, it is checked whether a predetermined criterion is met by using a trustworthy second time indication, the first time indication and the difference.Type: GrantFiled: October 20, 2006Date of Patent: February 15, 2011Assignee: Infineon Technologies AGInventors: Gerard David Jennings, Eckhard Delfs, Uma Ranjan, Andreas Siggelkow
-
Patent number: 7890764Abstract: A time stamp obtaining apparatus for maintaining the certificate of the existence of electronic filing document including: a receiving unit 12 receiving hash value of the document data; a transmitting section 15c transmitting the hash value to time stamp providing apparatus 30a; a storing processing section 15d inserting the time stamp encoded with private key in unupdated data 16b concerning time stamp received since point to which private key is updated and storing; an update detecting section 11 detecting the update of private key; a calculation section 13b calculating hash value for all time stamps included in the unupdated data 16b; a transmitting section 13c transmitting the hash value; a storing processing section 13d moving the unupdated data 16b to past data 16c concerning time stamp received before point to which private key is updated last time when time stamp is received, storing it, and storing the time stamp newly received as new unupdated data 16b; is provided.Type: GrantFiled: September 22, 2006Date of Patent: February 15, 2011Assignees: Kabushiki Kaisha Toshiba, Toshiba Solutions CorporationInventor: Tomonari Tanaka
-
Patent number: 7882349Abstract: Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.Type: GrantFiled: December 6, 2005Date of Patent: February 1, 2011Assignee: Cisco Technology, Inc.Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, Jr.
-
Patent number: 7882363Abstract: There is described an authentication system in which during an enrolment process a distinctive characteristic of a subject being enrolled is measured to generate a reference number representative of the subject. Authentication data is then generated using the reference number, and the authentication data is stored for use in a subsequent verification process. During verification, the representative characteristic of the subject being verified is re-measured to generate a test number representative of the subject being verified and the authentication data during enrolment is retrieved. The authentication system then checks for equality between the test number and the reference number using the retrieved authentication data. If the test number and the reference number are equal, then the authenticity of the subject is verified, otherwise the authenticity is denied.Type: GrantFiled: June 2, 2003Date of Patent: February 1, 2011Assignee: Fountain Venture ASInventors: Dominic Gavan Duffy, Aled Wynne Jones
-
Patent number: 7877787Abstract: An apparatus and method for sharing data in a communications system include a bootstrapping server function (BSF) configured to transmit a first message. The first message includes a timestamp parameter corresponding to a generic bootstrapping architecture user security settings (GUSS) stored in the BSF. A home subscriber server (HSS) is configured to receive the first message, to compare the timestamp parameter corresponding to the GUSS stored in the BSF with a timestamp parameter corresponding to a GUSS stored in the HSS, and to transmit a second message back to the BSF excluding the GUSS when the timestamp parameters of the GUSS of the BSF and the HSS are equal.Type: GrantFiled: December 16, 2005Date of Patent: January 25, 2011Assignee: Nokia CorporationInventors: Pekka Laitinen, Philip Ginzboorg
-
Patent number: 7873835Abstract: Restricting access to a device includes obtaining a passphrase for a user, obtaining access credentials for the user, obtaining a PIN value for the user, one-way encrypting at least the access credentials and the PIN using a secret key provided with the device. The user is allowed access to the device if the result of one-way encrypting equals the passphrase. The user is denied access to the device if the result of one-way encrypting does not equal the passphrase. The device may be a storage device. The access credentials may include a username that identifies the user and may include a role for the user. The access credentials may include a time period for which access is allowed. Access may be subsequently revoked in response to the current date and time being greater than the time period for which access is allowed.Type: GrantFiled: March 31, 2006Date of Patent: January 18, 2011Assignee: EMC CorporationInventors: Yedidia Atzmony, David J. Allen, Dennis Flanagan, Hagit Brit-Artzi, Ron Arnan
-
Patent number: 7873834Abstract: An image forming apparatus having a network communication function, includes a data input unit which inputs digital data; a data transmission unit which transmits the input digital data to a data management server for management of data; a digest generation unit which generates a digest of the input digital data; a digest storage unit which stores the digest generated by the digest generation unit; a time stamp acquisition unit which acquires a time stamp for authentication of an input time of the digital data from a time stamp station by issuing a time stamp request including the stored digest at a scheduled time; and a data management directive unit which transmits the acquired time stamp to the data management server for management of the time stamp and the transmitted digital data, associated with each other.Type: GrantFiled: February 17, 2006Date of Patent: January 18, 2011Assignee: Fuji Xerox Co., Ltd.Inventor: Shunichi Kojima
-
Publication number: 20110004767Abstract: A bidirectional entity authentication method based on the credible third party includes the steps that: entity A receives message 1 sent from entity B including the authentication parameters of said entity B, and sends message 2 to the credible third party TP, said message 2 including the authentication parameters of entity B and the authentication parameters of entity A; entity A receives message 3 sent from said credible third party TP, said message 3 including the checking result after checking that whether said entity A and entity B are legal based on said message 2 by said credible third party TP; entity A gets the authentication result of entity B after authenticating said message 3, and sends message 4 to said entity B to make entity B authenticating based on said message 4 and getting the authentication result of entity A.Type: ApplicationFiled: March 4, 2009Publication date: January 6, 2011Inventors: Manxia Tie, Jun Cao, Xiaolong Lai, Zhenhai Huang
-
Patent number: 7861308Abstract: A method for monitoring time so that the use of protected content can be controlled includes receiving a trusted time value from a trusted authority external to a client device. When the client is no longer in communication with the trusted authority, the previously-received trusted time value is updated by use of the client's operating system counter so that a calculated trusted time value is derived for content license evaluation purposes.Type: GrantFiled: November 28, 2005Date of Patent: December 28, 2010Assignees: Sony Corporation, Sony Electronics Inc.Inventors: Marc E. Strohwig, Yoji Kawamoto, Motohiko Nagano, Pierre Chavanne, Norifumi Goto, Oscar H. Steele, III, Eric John Swenson
-
Patent number: 7861088Abstract: A system and method can verifiably record a voice communication between participants of the voice communication by connecting a first participant to a verifying service provider, connecting between the verifying service and at least one additional participant, recording the voice communication between the first participant and the at least one additional participant to provide a recorded voice communication and secure time-stamping the recorded voice communication to provide a verifiable recorded voice communication. Switch data, such as telephone numbers for the participants and date and time information for the voice communication, can be appended to the recorded voice communication. The participants may input identification data, such as digital signatures, that can be associated with the recorded voice communication and the recorded voice communication can be digitally signed using the digital signatures input by the participants.Type: GrantFiled: December 10, 2002Date of Patent: December 28, 2010Assignee: Verizon Laboratories Inc.Inventor: Laurence Raphael Brothers
-
Patent number: 7853795Abstract: A system, method and computer program product for guaranteeing a data transaction over a network are disclosed. When a data transaction between at least a server and a client is detected on a network, data transmitted via the network between the server and client during the data transaction is captured. At least one identifier is associated with the captured data. A timestamp is also generated for the captured data. The timestamp includes information therein identifying at least a portion of the identifier(s). The captured data, the identifier(s) and the timestamp are stored in one or more data stores. The identifier(s) associated with the stored captured data is also mapped to an entry in an index to permit retrieval of the stored data from the data store via the index.Type: GrantFiled: October 28, 2004Date of Patent: December 14, 2010Assignee: Network Resonance, Inc.Inventors: Kevin Stewart Dick, Eric Kenneth Rescorla
-
Patent number: 7848746Abstract: A first processing device, which may be, for example, a wireless authentication token or an RFID tag, comprises a memory, a processor coupled to the memory, and interface circuitry coupled to the processor. The processor is operative to control the output of authentication information via the interface circuitry, where the authentication information comprises a sequence of values corresponding to images of a hash chain. A given one of the values of the sequence is utilized by a second processing device to generate a modified value suitable for providing joint authentication of the first and second processing devices.Type: GrantFiled: June 26, 2007Date of Patent: December 7, 2010Assignee: EMC CorporationInventor: Ari Juels
-
Publication number: 20100306547Abstract: A gateway server interoperates with client and remote server systems to provide stateless security management for a distributed Web application. A Web client application on the client system initiates a WebSocket connection directed to a remote Web service by performing an authentication challenge directed to a user of the Web-browser client where a secure token is not present in a local store instance corresponding to the client application. The authentication challenge obtains the user credentials and then exchanges the user credentials with the gateway server for a secure token. The secure token is then sent in a protocol specific connect message to the gateway server.Type: ApplicationFiled: May 27, 2010Publication date: December 2, 2010Inventors: John R. Fallows, Frank J. Salim
-
Patent number: 7822690Abstract: According to the present invention, there is provided an electronic document processing system and method including an electronic document generation mechanism, an encrypted digital certificate generator, a tool for coordinating the processing of electronic documents, a packaging mechanism for finalizing and authenticating electronic documents, a tracking log for recording relevant electronic document information, and a transferring protocol for transferring the ownership of electronic documents. The present invention also provides an electronic authentication system including an electronic document authentication watermark seal or signature line for confirming a document's signing within the view.Type: GrantFiled: January 18, 2005Date of Patent: October 26, 2010Inventors: Paul Rakowicz, Robert Shanahan
-
Patent number: 7809131Abstract: Sensor device times can vary and may be set significantly wrong. In one embodiment, the present invention can adjust a sensor's time by receiving a raw security event from a sensor device, determining whether a timestamp included in the raw security event is within a timerange around a time known by the agent, determining whether a time offset is in a non-initialized state, and determining whether to adjust the timestamp by applying the time offset to the timestamp, the determination being based on whether the timestamp included in the security event is within the timerange around the time known by the agent and whether the time offset is in a non-initialized state.Type: GrantFiled: December 23, 2004Date of Patent: October 5, 2010Assignee: ArcSight, Inc.Inventors: Hugh S. Njemanze, Hector Aguilar-Macias
-
Patent number: 7809652Abstract: At each of a plurality of transit readers of a transit system, for each of a plurality of riders, where each rider seeks to conduct an access transaction with the transit system for access into the transit facility by using a payment device issued by an issuer in a payment system, data is read from the payment device. The data includes an encryption code that uniquely corresponds to the payment device and was created by the issuer using one or more encryption keys and a predetermined algorithm. A check will be performed, remotely and/or locally, of one or more lists of other encryption codes to determine if the encryption code is on the list. On the basis of whether the encryption code is on the list, the rider is permitted access to the facility of the transit system. The payment device need not be changed for the rider's fare. Decryption of the encryption code read from the payment device is not required to complete the access transaction.Type: GrantFiled: March 1, 2007Date of Patent: October 5, 2010Assignee: Visa U.S.A. Inc.Inventors: Phil Dixon, Ayman Hammad, William Alexander Thaw, Christian Aabye
-
Publication number: 20100250230Abstract: A computing system in which a software component executing on a platform can reliably and efficiently obtain state information about a component supported by the platform through the use of a shared memory page. State information may be supplied by the platform, but any state translation information needed to map the state information as supplied to a format as used may be provided through the shared page. In a virtualized environment, the state translation information can be used to map the value of a virtual timer counter or other component from a value provided by a virtual processor to a normalized reference time that will yield the same result, regardless of whether the software component is migrated to or from another virtual processor. Use of a shared page avoids the inefficiency of an intercept into a virtualized environment or a system calls in native mode operation.Type: ApplicationFiled: March 30, 2009Publication date: September 30, 2010Applicant: Microsoft CorporationInventors: Shuvabrata Ganguly, Jason S. Wohlgemuth, Allen Marshall
-
Publication number: 20100250944Abstract: An information processing apparatus includes a first signing unit which digitally signs device information and environment information, a first generator which generates a first digital envelope as data including the signed device information and the signed environment information, a second signing unit which digitally signs biometric authentication information and the first digital envelope, a second generator which generates a second digital envelope as data including the signed biometric authentication information and the signed first digital envelope, a transmitter which transmits the second digital envelope, and a receiver which receives authentication results.Type: ApplicationFiled: February 17, 2010Publication date: September 30, 2010Applicant: FUJITSU LIMITEDInventor: Masato SUZUKI
-
Patent number: 7805612Abstract: A system and method for providing secure one-way transmissions in a vehicle wireless communications system. The system and method rely on a clock signal to assure that the vehicle and server receive proper messages. The vehicle and the server will periodically synchronize their internal clocks to a global clock signal. The server will add its local time to the body of a message including a vehicle identification number and a function code. The server will then encrypt the message and transmit it to the vehicle. The vehicle will decrypt the message and compare the transmitted vehicle identification number with its identification number. If the identification numbers match, the vehicle will then see if the time in the message is within a predefined window of the vehicle time. If the transmitted time is within the predefined window of the vehicle time, the vehicle will accept the message and perform the function.Type: GrantFiled: December 2, 2005Date of Patent: September 28, 2010Assignee: GM Global Technology Operations, Inc.Inventor: Ansaf I. Alrabady
-
Patent number: 7805614Abstract: A method for secure identity processing using biometrics is provided. A public key and a unique serial number are received from a BIOTOKEN. A random number is generated. The random number and the unique serial number are transmitted to the BIOTOKEN. A serial number received from the BIOTOKEN is compared with the unique serial number and if there is a match, an encrypted symmetric key, transmitted by the BIOTOKEN, is decrypted using the public key. An encrypted random number and encrypted biometric data associated with a user are decrypted using the decrypted symmetric key. The decrypted random number is compared with the transmitted random number, if there is a match, the decrypted biometric data is validated and the received serial number and the public key are transmitted to a certification authority if the biometric data is validated. An authentication certificate associated with the BIOTOKEN is issued by the certification authority.Type: GrantFiled: March 31, 2005Date of Patent: September 28, 2010Assignee: Northrop Grumman CorporationInventors: Kenneth W. Aull, William Gravell, James B. Rekas
-
Patent number: 7801870Abstract: A method of effectively managing information shared by synchronizing between a plurality of Universal Plug and Play (UPnP) devices is provided. According to the method, all devices exchange version information of the devices at initial synchronization, and when shared information stored in some of the devices is changed, a device changing shared information transmits new version information to the other devices via an event message, so that all of the devices can maintain the latest shared information. Also, by having a counter indicating an update state of respective parts of shared information, when shared information is changed by a plurality of the UPnP devices, it is easy to recognize which part from among the respective parts of the shared information is the latest.Type: GrantFiled: October 26, 2007Date of Patent: September 21, 2010Assignee: Samsung Electronics Co., Ltd.Inventors: Seung-jae Oh, Se-hee Han, Won-Seok Kwon, Joo-yeol Lee, Dong-shin Jung
-
Patent number: 7797543Abstract: Systems and methods are disclosed for authenticating electronic messages. A data structure is generated by a computer server which allows for the authentication of the contents and computer server identity of a received electronic message and provides a trusted stamp to authenticate when the message was sent. Data which can authenticate the message, the computer server identity, and the time the message was sent is included into a data structure which is called an Electronic PostMark (EPM).Type: GrantFiled: September 29, 2000Date of Patent: September 14, 2010Assignee: United States Postal ServiceInventors: Leo J. Campbell, Jon L. Cook, Charles R. Chamberlain, Michael J. McGrath, Isadore Schoen
-
Patent number: 7788801Abstract: A tamper-proof cap adapted to be mounted on a large assembly for shielding a selected area of the large assembly is disclosed. The tamper-proof cap comprises a laminate stack-up structure wherein at least one open chamber is formed. The stack-up structure comprises at least two layers wherein tamper-proof layers are formed on top of the open chamber. A plurality of vias are disposed around the open chamber, forming with said tamper proof layers a tamper-proof structure around said open chamber. The vias are adapted for connecting the tamper-proof layers to the large assembly when the tamper-proof cap is mounted. In a preferred embodiment, the tamper-proof cap further comprises a shielding layer on top of the tamper-proof layer that are preferably done using conductive ink.Type: GrantFiled: July 27, 2006Date of Patent: September 7, 2010Assignee: International Business Machines CorporationInventors: Stefano Sergio Oggioni, Vincenzo Condorelli, Nihad Hadzic
-
Publication number: 20100217995Abstract: A database system that issues a reference transaction by designating a time stamp. Data structures are provided for making an inquiry about the latest value at a designated time using a database in which values and information on times associated with the individual values are contained in a table. One of the data structures includes, for each of IDs associated with the values in the database, at least one time stamp that is sorted in chronological order (hereinafter referred to as a first time stamp); values belonging to the individual first time stamps; and a pointer that designates one of the first time stamps, the first time stamps indicating the times when the values become valid. The other of the data structures includes, for each of the IDs, the designated first time stamp and a value belonging to the designated first time stamp.Type: ApplicationFiled: February 19, 2010Publication date: August 26, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Miki Enoki, Kiyokuni Kawachiya
-
Patent number: 7770209Abstract: A system is provided to monitor a user's interaction with a computer. The system may comprise a reference string generator to generate a random reference string, an image generator to generate an image including the random reference string, a communications module to communicate the image to a client computer for display to a user and to receive user input data and a comparator to compare the random reference string and the user input data to detect human interaction with the computer. The image including the random reference string may be generated such that each character in the random reference string is off-centered.Type: GrantFiled: September 19, 2006Date of Patent: August 3, 2010Assignee: eBay Inc.Inventors: Eric N. Billingsley, Louis M. Monier
-
Patent number: 7770013Abstract: The present invention relates generally to systems for creating and authenticating printed objects using authentication information. One implementation recites: An apparatus for determining authenticity of a digital representation of an object. The digital representation includes embedded first authentication information. The apparatus includes: a storage system in which stored second authentication information is associated with stored reference codes; and a processor which receives the digital representation and a reference code associated therewith.Type: GrantFiled: September 4, 2003Date of Patent: August 3, 2010Assignee: Digimarc CorporationInventors: Geoffrey B. Rhoads, J. Scott Carr, Burt W. Perry
-
Patent number: 7756509Abstract: Embodiments of methods and apparatus for providing an access profile system associated with a broadband wireless access network are generally described herein. Other embodiments may be described and claimed.Type: GrantFiled: March 31, 2006Date of Patent: July 13, 2010Assignee: Intel CorporationInventors: Bala Rajagopalan, Sanjay Bakshi
-
Patent number: 7743977Abstract: Methods and systems for random data access for security applications are disclosed and may comprise generating on a chip, a random process index. A data process may be randomly selected on the chip utilizing the generated random process index. A time interval may be randomly allocated on the chip. After the time interval, the randomly selected data process may initiate processing of data. The processing of the data may comprise accessing the data and/or acquiring the data. The data may be verified by the selected data process prior to the processing of the data. The data may be verified utilizing a digital signature verification algorithm, for example.Type: GrantFiled: February 28, 2005Date of Patent: June 29, 2010Inventors: Xuemin Chen, Iue-Shuenn I. Chen, Francis Chi-Wai Cheung, Longyin Wei
-
Publication number: 20100161993Abstract: A notary document processing system and related methods are described. The system receives files uploaded by users, processes them by applying a document ID, time stamp, etc. to pages of the document, and converts them to a read only format for storage. Once the documents are processed and stored in the system, they cannot be changed by any user including the owner of the document. The system makes stored documents available to the owner or other users upon the owner's request or permission. The system also processes files generated from short messages inputted by users and annotated versions of existing documents. The system provides a way of preserving original versions of documents to be used later for purposes of evidencing the dates and contents of documents, evidencing agreement between parties as to the contents of documents, etc. Electronic notary, electronic signature, tamper watermarking, etc. functions are also provided.Type: ApplicationFiled: December 29, 2009Publication date: June 24, 2010Inventor: Darcy Mayer
-
Publication number: 20100154048Abstract: A first user (110) requests a service provider (130) to create (200,400) a record of a transaction. The service provider (130) creates (230,430) a digital receipt (300,700,900), which includes a description (310,710,720,910,1020) of the transaction understandable by humans, tamper-proof evidence (320) of the transaction, and a verification prompt (330,740,940,1030). A second user (120) who desires to verify the transaction displays (265,465) the digital receipt (300,700,900) and activates (270,470) the verification prompt (330,740,940,1030). Upon activation, the tamper-proof evidence (320) is verified without requiring further human interaction to identify the tamper-proof evidence.Type: ApplicationFiled: February 26, 2010Publication date: June 17, 2010Applicant: VeriSign, Inc.Inventors: Xinhong Yuan, Stan J. Simon, Robert W. Pratt, Gregory R. Whitehead, Atul Tulshibagwale
-
Publication number: 20100146287Abstract: Media signals such as audio and/or video signals are certified as being authentic. A private key and a corresponding public key are provided. For a current media segment of the media signal, a signature is created using the private key to sign data based on media content of the current media segment combined with a signature from a media segment present at another point within the media signal where the signature from the media segment present at another point within the media signal is created by signing with the private key data based on media content of the media segment present at the other point within the media signal. The signature is included in metadata of the current media segment of the media signal and the public key is included in a second metadata of the media signal.Type: ApplicationFiled: December 10, 2008Publication date: June 10, 2010Inventors: Barrett Kreiner, Jonathan Reeves
-
Patent number: RE41960Abstract: According to one embodiment of the invention, a method is provided for receiving a timestamp from a caller via a telephone connection; receiving a device identifier from the caller, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining an indication of a time based on the timestamp and the cryptographic key; providing the indication of the time to the caller; determining an account; and charging a fee to the account.Type: GrantFiled: December 2, 2005Date of Patent: November 23, 2010Assignee: Walker Digital, LLCInventors: Jay S. Walker, Bruce Schneier, James A. Jorasch, Dean P. Alderucci
-
Patent number: RE42018Abstract: According to one embodiment of the invention, a method is provided for receiving a timestamp from a caller via a telephone connection; receiving a device identifier from the caller, in which the device identifier identifies a device; determining a cryptographic key based on the device identifier; determining an indication of a time based on the timestamp and the cryptographic key; providing the indication of the time to the caller; determining an account; and charging a fee to the account.Type: GrantFiled: September 29, 2006Date of Patent: December 28, 2010Assignee: Walker Digital, LLCInventors: Jay S. Walker, Bruce Schneier, James A. Jorasch, Dean P. Alderucci