Including Generation Of Associated Coded Record Patents (Class 713/179)
-
Patent number: 7590852Abstract: A virtual notary Kiosk is disclosed for performing live electronic personal signatory verification, authentication and screening for the purpose of transacting remote electronic notarizations with live notaries. The virtual notary is a process that is compliant with the Uniform Electronic Transaction Act, and Electronic Signatures in Global and National Commerce Act. The virtual notary incorporates several electronic components, (digital web cam, electronic signature and thumbprint pad, electronic notary seal, electronic notary journal, video/audio transmission software for cellular/PDA or portable pc device, P.O.S. {point of sale} device, and electronic transaction manager {computer}, electronic scanner/printer, electronic remote notary/client software); all of the aforementioned allow both potential signatory and notary to execute electronic notarizations from remote locations.Type: GrantFiled: July 23, 2007Date of Patent: September 15, 2009Inventors: Jesse Andrew Hatter, Brenda Faye Hatter, Rosie Jean Hatter
-
Patent number: 7587607Abstract: Receiving a request for an attestation of platform configuration from an attestation requestor, receiving an acceptable configuration, and if the platform matches the acceptable configuration, sending an attestation of platform configuration including a signed response indicating that the platform configuration matches an acceptable configuration to the attestation requester.Type: GrantFiled: December 22, 2003Date of Patent: September 8, 2009Assignee: Intel CorporationInventors: Ernie F. Brickell, Matthew D. Wood
-
Publication number: 20090222668Abstract: A method for managing a group signature scheme includes in a setup procedure for group initialization, generating, by a group manager, a group public key. In a join procedure for the group manager to add a new member to the group, the method includes generating by the new member, user information, and providing the generated user information to the group manager, and computing, by the group manager, membership information for the new member based on the user information received by the new member and on the group public key, and providing to the new member the computed membership information. In particular, the membership information is computed, by the group manager, as a function of the inverse of a given hash function of the user information. In a signing procedure for a group member to sign a message on behalf of the group, the method includes: using, by the group member, the membership information and the user information.Type: ApplicationFiled: December 19, 2005Publication date: September 3, 2009Inventors: Pier Luigi Zaccone, Manuel Leone, Ettore Caprella, Francesco Bergadano, Davide Cavagnino, Paolo Dal Checco
-
Patent number: 7581102Abstract: A method of confirming a certificate by using a management computer that issues the certificate is disclosed. The management computer is coupled to an application terminal for applying for issuance of the certificate and to a confirmation terminal for reading a display code printed on the certificate.Type: GrantFiled: January 13, 2005Date of Patent: August 25, 2009Assignee: Ricoh Company, Ltd.Inventor: Hiroshi Yasuda
-
Patent number: 7581242Abstract: A method of authenticating products includes receiving a description of detectable features read from a package. The package includes two or more detectable features, and the detectable features are affixed on the package based on encoded information. Authentication information is provided based on a comparison of the received description to one or more stored package identifiers.Type: GrantFiled: April 30, 2005Date of Patent: August 25, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Guillaume Oget, Steven J. Simske, Jorge Badillo, Bill Serra, Cyril Brignone, Malena Mesarina
-
Publication number: 20090210719Abstract: In a first information processing device, a specific part of a binary code of a first application program developed in a first memory and a specific function are used to calculate a first identification value. The first identification value is transmitted from the first information processing device to a second information processing device. In the second information processing device, a specific part of a binary code of a second application program developed in a second memory and a specific function are used to calculate a second identification value, and the first identification value received from the first information processing device is compared with the second identification value. If these identification values are identical, connection with the first information processing device is permitted in the second information processing device.Type: ApplicationFiled: August 29, 2008Publication date: August 20, 2009Applicant: Konica Minolta Holdings, Inc.Inventor: Hiroki Yoshida
-
Publication number: 20090204235Abstract: A triggering and activating device and an automated process coupling two reciprocally activatable monitoring devices or operational-intervention devices. A first synchronizing module synchronizes transmissible operational-intervention parameters of a lookup table with operational devices assigned to the first monitoring device, and a second synchronizing module synchronizes storable threshold-value parameters for activating the second monitoring device. Physical measuring parameters of intervention events are detected and transmitted to the activating device, an intervention-event stack being correspondingly incremented by a first filter module based on the physical measuring parameters and a dynamically implemented weighting of the lookup table.Type: ApplicationFiled: March 13, 2007Publication date: August 13, 2009Applicant: SWISS REINSURANCE COMPANYInventor: William J. Dubinsky
-
Patent number: 7574604Abstract: An embodiment of the present invention includes a technique to register a client to a server for communication. A remote commander transmits an identification code to the server and the client. The server has a key. The client is coupled to the server via a network. The server encrypts the key with the identification code and sends the encrypted key to the client. The client decrypts the encrypted key using the identification code. The server and the client then exchanges information encrypted by the key.Type: GrantFiled: May 20, 2005Date of Patent: August 11, 2009Assignees: Sony Corporation, Sony Electronics Inc.Inventor: Ryuichi Iwamura
-
Patent number: 7574744Abstract: A system and method is provided for securely duplicating digital documents of disparate types, such that there is a cryptographically secure link between the duplicate and the original. The system also provides each document with a serial number that is both sequential with all other copied documents and cryptographically linked with the document itself, and which includes verifiable proof against tampering and modification. The system further produces copies of documents in a canonical format suitable for indexing and searching using automated processing tools.Type: GrantFiled: October 13, 2006Date of Patent: August 11, 2009Assignee: Peraogulne Corp.Inventors: Myron Eagle, Michael Prounis
-
Patent number: 7574606Abstract: A location stamp automatically attached to messages indicates location information such as longitude and latitude information from a GPS device. The location stamp helps a receiver to identify the location of the sender or a transaction, identify the sender, and provides context to the message that further indicates the messages meaning. Applications of the location stamp include authentication of the location of a sender or a transaction and identifying the location of a sender for a search and rescue.Type: GrantFiled: October 24, 2000Date of Patent: August 11, 2009Assignee: Trimble Navigation LimitedInventors: Carey B. Fan, Kulbir S. Sandhu, Kenny Man D Nguyen
-
Patent number: 7568113Abstract: A method of and device (110) for granting access to content on a storage medium (101), comprising obtaining cryptographic data (Y) from a property (102), such as a wobble, of the storage medium (101), reading helper data (W) from the storage medium (101), and granting the access based on an application of a delta-contracting function to the cryptographic data (Y) and the helper data (W). The delta-contracting function allows the choice of an appropriate value of the helper data (W), such that any value of the cryptographic data (Y) which sufficiently resembles said original primary input value leads to the same output value. Substantially different values of the cryptographic data (Y) lead to different values of the output.Type: GrantFiled: December 24, 2003Date of Patent: July 28, 2009Inventor: Johan Paul Marie Gerard Linnartz
-
Patent number: 7565537Abstract: A secure key exchange with mutual authentication allows devices on a network to perform, in a single roundtrip over the network, the exchange. A key exchange initiator packet that does not include a key to be established is sent from an initiating device to another device via a network. The key exchange initiator packet is validated and the other device generates the key without requiring any additional packets to be received from the initiating device in order to generate the key. A key exchange response packet that does not include the key is returned to the initiating device, which validates the key exchange response packet and generates the key without requiring any additional packets to be sent to the other device or received from the other device.Type: GrantFiled: June 10, 2002Date of Patent: July 21, 2009Assignee: Microsoft CorporationInventors: Dinarte R. Morais, Ling Tony Chen, Damon V. Danieli
-
Publication number: 20090177891Abstract: A method and system for embedding into a text document generated by a licensed software a License Identification Signature of the software.Type: ApplicationFiled: January 5, 2009Publication date: July 9, 2009Inventor: Fernando Incertis Carro
-
Patent number: 7558963Abstract: The present invention provides a means for determining authenticity of a combination of files which are downloaded to a mobile station, and which are related to one another. To achieve the stated object, in a system according to the present invention, mobile station 16, which is capable of running a Java-APP, receives an ADF from CP server device 12. Then mobile station 16 receives a SDF from trusted server device 18, which is identified by data contained in the ADF. Mobile station 16 calculates a hash value of certificate data contained in the ADF, and verifies whether the calculated hash value of the certificate data and a hash value of the certificate data which is contained in the SDF are identical to each other. Next, mobile station 16 receives a JAR file from CP server device 12. Mobile station 16 calculates a hash value of the JAR file, and verifies whether the calculated hash value of the JAR file and a hash value of the JAR file contained in the ADF are identical to each other.Type: GrantFiled: March 31, 2004Date of Patent: July 7, 2009Assignee: NTT DoCoMo, Inc.Inventors: Naoki Naruse, Yuichi Ichikawa, Tatsuro Oi, Nobuyuki Watanabe, Yasunori Hattori, Masato Takeshita, Masakazu Nishida, Mao Asai, Masayuki Tsuda, Atsuki Tomioka, Kazuhiro Yamada, Satoshi Washio, Dai Kamiya, Naoki Yamane, Keiichi Murakami
-
Patent number: 7555647Abstract: An encoding device to encode an object image to be encoded includes a reference information generating unit that generates reference information with respect to a key image different from the object image, and a code generating unit that generates code data of the reference information generated by the reference information generating unit as code data of at least a portion of the object image.Type: GrantFiled: March 17, 2005Date of Patent: June 30, 2009Assignee: Fuji Xerox Co., Ltd.Inventor: Taro Yokose
-
Patent number: 7549051Abstract: A digital certificate is employed to produce a digital signature for a digital construct. In the digital certificate is set forth a certificate validity period defining for the digital certificate a time period during which the digital certificate is to be honored as valid for producing digital signatures, and a signature validity period defining for each digital signature produced based on the digital certificate a time period during which the digital signature is to be honored as valid.Type: GrantFiled: March 10, 2005Date of Patent: June 16, 2009Assignee: Microsoft CorporationInventors: Blair Brewster Dillaway, Brian LaMacchia, John Manferdelli, Muthukrishnan Paramasivam
-
Patent number: 7549061Abstract: An executing device for conducting playback is high during the playback of contents. The executing device is equipped with a highly efficient processor and reduces the processing load involved in verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the executing device is capable of improving the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.Type: GrantFiled: March 24, 2005Date of Patent: June 16, 2009Assignee: Panasonic CorporationInventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
-
Method and apparatus for securing and authenticating encoded data and documents containing such data
Patent number: 7543151Abstract: A method and apparatus for determining the distance between transitions from a first logical state to a second logical state stored on a medium (i.e., a document). This determination is used to precisely characterize the information pattern in order to authenticate the information and the medium on which the information is stored. The invention uses a reader having a leading and trailing read apparatus which allow information to be read simultaneously from two or more locations spaced a known distance apart. The distance between the centerlines of each read apparatus is preferably an odd integer multiple of one half the distance between logical clock transitions. The distance between a first transition at the leading read apparatus and a next transition at the trailing read apparatus is used as a reference (i.e., the “Reference Value”). The Reference Value is compared with the distance between the first transition and the next transition on the medium (i.e., the “Jitter Value”).Type: GrantFiled: December 21, 2006Date of Patent: June 2, 2009Assignee: Semtek Innovative Solutions CorporationInventors: Clay von Mueller, Robert Mos -
Patent number: 7543138Abstract: An image registration server stores encryption keys of respective ones of a plurality of client terminals. Image data is encrypted by the image registration server using the encryption key corresponding to the client terminal to which the image data is applied. The encrypted image data is applied to the client terminal via a server. The client terminal has a decryption key stored within so that only a client terminal that is duly authorized can decrypt encrypted image data. Other client terminals that are not duly authorized cannot decode the image data. This makes it possible to prevent unlawful use of image data even if the image data has been intercepted.Type: GrantFiled: September 22, 2000Date of Patent: June 2, 2009Assignee: Fujifilm CorporationInventors: Yoshiki Kawaoka, Norihisa Haneda, Hiroshi Suganuma, Hiroyuki Yoshinaga
-
Patent number: 7539868Abstract: A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to the particular computing platform (10). The manufacturer certificate may also store configuration parameters and device identification numbers. A secure run-time platform data checker (200) and a secure run-time checker (202) check the system firmware during operation of the computing platform (10) to ensure that the system firmware (30) or information in the manufacturer certificate (36) has not been altered. Application software files (32) and data files (34) are bound to the particular computing device (10) by a platform certificate (38). A key generator may be used to generate a random key and an encrypted key may be generated by encrypting the random key using a secret identification number associated with the particular computing platform (10). Only the encrypted key is stored in the platform certificate (36).Type: GrantFiled: July 14, 2003Date of Patent: May 26, 2009Assignee: Texas Instruments IncorporatedInventors: Eric Balard, Alain Chateau, Jerome Azema
-
Publication number: 20090132824Abstract: An original data circulation system for storing or circulating original data which is digital information is provided. The original data circulation system includes an issuer apparatus, a user apparatus and a collector apparatus. The issuer apparatus generates originality information including first information corresponding to the issuer apparatus and second information corresponding to data and sends the originality information. The user apparatus verifies the validity of the source apparatus of the originality information and stores the originality information when the validity is verified. The collector apparatus verifies the validity of the source apparatus of the originality information and processes data corresponding to the second information when the validity is verified.Type: ApplicationFiled: December 18, 2008Publication date: May 21, 2009Inventors: Masayuki Terada, Ko Fujimura, Hiroshi Kuno, Masayuki Hanadate
-
Patent number: 7532740Abstract: This patent application is generally related to watermarking and steganography. In one implementation, a method of embedding auxiliary information within original data is provided. The original data is divided into a series of groups, with each group in the series of groups associated with a value. The method includes: investigating a first group to determine a presence of a local masking opportunity; and if there exists a presence of a local masking opportunity with the first group, embedding data by setting a value of one or more groups in a neighborhood of the first group, including the first group, in accordance with a value associated with at least a portion of the auxiliary data. Other implementations and embodiments are provided as well.Type: GrantFiled: March 27, 2007Date of Patent: May 12, 2009Assignee: Digimarc CorporationInventor: Kenneth L. Levy
-
Patent number: 7526649Abstract: According to an embodiment of the invention, a method and apparatus for session key exchange are described. An embodiment of a method comprises requesting a service for a platform; certifying the use of the service for one or more acceptable configurations of the platform; and receiving a session key for a session of the service, the service being limited to the one or more acceptable configurations of the platform.Type: GrantFiled: December 30, 2003Date of Patent: April 28, 2009Assignee: Intel CorporationInventors: Willard M. Wiseman, David W. Grawrock, Ernie Brickell, Matthew D. Wood, Joseph F. Cihula
-
Patent number: 7526798Abstract: Run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.Type: GrantFiled: October 31, 2002Date of Patent: April 28, 2009Assignee: International Business Machines CorporationInventors: Ching-Yun Chao, Hyen Vui Chung, Ajay Reddy, Vishwanath Venkataramappa
-
Publication number: 20090106557Abstract: Embodiments of the present invention enable a message recipient or messaging system to indicate the trustworthiness of a message, especially messages that comprise content that has been digitally signed. In addition, embodiments may alter or control the message to change user behavior by preventing the user from doing things that the message would induce the user into doing. In some embodiments, various characteristics and indicia of the message are determined. For example, for e-mail messages having digitally signed content, certain embodiments may determine the entity or entities asserting a basis for trust, the status or role of the sender, the name of the sender, the affiliation of the sender, the messaging address the location, and the most recent status of the trust relationship. Based on the determined indicia, a plain language notification is composed and the message is displayed with the notification.Type: ApplicationFiled: October 20, 2008Publication date: April 23, 2009Inventor: Sean Leonard
-
Patent number: 7523303Abstract: An editing apparatus generates a capsular work with usage conditions for each of plural usages and usage secret information. A ticket server apparatus issues a ticket containing a ticket key in the case of allowing a user to practice the usage requested by the user. A distribution center apparatus distributes the capsular work in accordance with the user's request. An audiovisual apparatus acquires the capsular work from the distribution center apparatus and requests the ticket necessary to make use of the capsular work from the ticket server apparatus, and then decrypts the encrypted work data contained in the capsular work and reproduces the work data only in the case where the audiovisual apparatus has acquired the ticket.Type: GrantFiled: April 30, 2004Date of Patent: April 21, 2009Assignee: NEC CorporationInventor: Masayuki Nakae
-
Patent number: 7519179Abstract: Described herein is an information transmission apparatus for encrypting and transmitting first data and second data, the information transmission apparatus including: encryption element for deriving a second key from a first key by using an irreversible function, encrypting the first data by using the first key to generate encrypted first data and encrypting the second data by using the second key to generate encrypted second data; and transmission element for transmitting the encrypted first data, the encrypted second data and the first key.Type: GrantFiled: May 27, 2004Date of Patent: April 14, 2009Assignee: Sony CorporationInventor: Makoto Shiina
-
Patent number: 7516329Abstract: An information processing apparatus that enables management of copyrighted content to which identification information is not added. An arithmetical unit computes a hash value based on data from a portion of the content data recorded in a mini-disk (MD), and transmits the value from an input/output unit to a personal computer. Based on the hash value, the personal computer identifies the content recorded in the MD, and performs management procedures based on the display information of check-in and checkout of the content. The information processing apparatus can also be applied to personal computers.Type: GrantFiled: March 25, 2002Date of Patent: April 7, 2009Assignee: Sony CorporationInventors: Munetake Ebihara, Mitsuru Tanabe, Ichiro Sato
-
Patent number: 7516496Abstract: An authorized client communication system seeking access to a host communication system may be identified by locating a memory segment within the client communication system that stores client software used to access the host computer system. The memory segment then is examined to determine whether the client software stored in the memory segment corresponds to client software for an official client communication, system. Communications from the client communication system are terminated when the client software in the memory segment is determined to diverge from software for an official client communication system.Type: GrantFiled: September 1, 2005Date of Patent: April 7, 2009Assignee: AOL LLCInventors: Robert G. Watkins, Andrew L. Wick
-
Publication number: 20090089575Abstract: When an entrustor entrusts an outsourcer with the supply of a service for members, member information managed by the entrustor is kept secret from the outsourcer, and users can receive the service without communicating with the entrustor. For using the service, user apparatus 3 sends group signature data to outsourcer apparatus 2. Outsourcer apparatus 2 authenticates the group signature data using public information of entrustor apparatus 1. When the group signature data passes the authentication, confirming that user apparatus 3 is a member of entrustor apparatus 1, outsourcer apparatus 2 provides the service to user apparatus 3.Type: ApplicationFiled: May 31, 2006Publication date: April 2, 2009Inventors: Shoko Yonezawa, Kazue Sako
-
Patent number: 7509496Abstract: In a communication system (1), a header comprising information, preferably being related with a device-type associated commitment, is additionally provided with a signature for that information. The signature guarantees the authenticity of the header information. The signature is tamper-resistantly created in a first device (20), preferably based on at least tamper-resistant device-type specific information of the first device (20). The header information and the signature are communicated to a content provider (10), where the signature is verified before accepting the device-type associated commitment to be valid. Such signatures can preferably be used in systems using HTTP or SMTP.Type: GrantFiled: February 18, 2004Date of Patent: March 24, 2009Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Robert Skog, Peter Stark
-
Patent number: 7506167Abstract: Apparatus and an accompanying method, for forming and embedding a highly tamper-resistant cryptographic identifier, i.e., a watermark, within non-marked executable code, e.g., an application program, to generate a “watermarked” version of that code. Specifically, the watermark, containing, e.g., a relatively large number of separate executable routines, is tightly integrated into a flow pattern of non-marked executable code, e.g., an application program, through randomly establishing additional control flows in the executable code and inserting a selected one of the routines along each such flow. Since the flow pattern of the watermark is highly intertwined with the flow pattern of the non-marked code, the watermark is effectively impossible to either remove from the code and/or circumvent. The routines are added in such a manner that the flow pattern of resulting watermarked code is not substantially different from that of the non-marked code, thus frustrating third party detection of the watermark using, e.Type: GrantFiled: June 29, 2004Date of Patent: March 17, 2009Assignee: Microsoft CorporationInventors: Ramarathnam Venkatesan, Vijay Vazirani
-
Patent number: 7502934Abstract: Methods, apparatus, including computer program products, and systems implement and use techniques relating to electronic signatures. In one implementation, a one-way hash is calculated for an electronic document and a digital watermark representing the one-way hash is embedded in a signature document. Based on a user input, the signature document having the embedded digital watermark is altered, and the electronic document is associated with the signature document. The electronic document and the signature document together comprise a signed electronic document. The user input can include biometric information, such as a handwritten signature or a voice recording. For additional security, the one-way hash can be encrypted before a representation of the hash is embedded in the signature document.Type: GrantFiled: December 16, 2003Date of Patent: March 10, 2009Assignee: SAP AktiengesellschaftInventor: Josef Dietl
-
Patent number: 7497379Abstract: Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.Type: GrantFiled: February 27, 2004Date of Patent: March 3, 2009Assignee: Microsoft CorporationInventors: Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon A. Yuval
-
Patent number: 7500106Abstract: A method for identifying, authenticating and authorizing a user of protected data, in particular a use of protected in an automation system, whereby the user is identified by the user ID input by them in an input field in a login area, this input user ID is combined with a password input by the user and transferred with a one-way encryption function to a system ID which authenticates the user, at least this system ID is transferred in an access identifier from the login area to a protected area and the user is authorized by this transferred access identifier to obtain access to protected data in the protected area.Type: GrantFiled: October 22, 2004Date of Patent: March 3, 2009Assignee: Siemens AktiengesellschaftInventor: Harald Herberth
-
Patent number: 7489798Abstract: The invention relates to a system for detecting a watermark using informed detection. A first signal potentially having a watermark embedded is received (601) as is a second signal corresponding to the original signal. The signals are segmented (605) into symbol segments. For each symbol segment a first characteristic is determined (607) for a first section and a second characteristic is determined (609) for a second section in response to the first and second signals in those sections. Specifically, ratios between average envelopes are determined. Thus, the first and second characteristic is indicative of the variations of the envelope during a watermark symbol. A watermark symbol estimate is determined (611) from the first and second characteristic. A sequence of estimated watermark symbols is compared to reference watermark symbols and the presence of a watermark symbol is determined (615) depending on the comparison.Type: GrantFiled: November 24, 2004Date of Patent: February 10, 2009Assignee: Koninklijke Philips Electronics N.V.Inventors: Minne Van Der Veen, Aweke Negash Lemma
-
Patent number: 7489797Abstract: A method of fragile watermarking is characterized by the step of generating at least a first ill-conditioned operator, said ill-conditioned operator being related to values extracted from an image or portion thereof A.Type: GrantFiled: June 28, 2004Date of Patent: February 10, 2009Assignee: Motorola, Inc.Inventor: Ebroul Izquierdo
-
Patent number: 7475429Abstract: Method of invisibly embedding into a text document generated by a licensed software the License Identification Signature of the software wherein each original copy of the software has been assigned a unique Software License Code (SLC) and a unique License Identification Key (LIK) by a Licensing Authority, such a method comprising the steps of computing a Document Hash Value (DHV) of the text document (12), getting from the DHV a License Identification Code (LIC) of the text document by using the LUK (14), and embedding (18) invisibly into the text document the License Identification Signature (LIS) formed by the SLC, DHV and LIC after the LIS has been encoded by using character attributes.Type: GrantFiled: June 4, 2002Date of Patent: January 6, 2009Assignee: International Business Machines CorporationInventor: Fernando Incertis Carro
-
Patent number: 7471806Abstract: At every reproduction of a moving image, a tamper resistant module (TRM) randomly selects any one of plural electronic watermark inserting modules, and incorporates the module selected into an area randomly selected from among plural non-operation (NOP) areas in an MPEG expansion module. The module can be switched for each image in a series of the moving images. Since an algorithm for inserting the electronic watermark differs for each moving image or each image, elimination of the electronic watermark by means of analysis, particularly, complete elimination from all the images, is extremely difficult.Type: GrantFiled: January 29, 2004Date of Patent: December 30, 2008Assignee: Fujitsu LimitedInventors: Kiyoshi Kohiyama, Hiroshi Komazaki
-
Patent number: 7472275Abstract: A universal lightweight, easily carried memory identification card records information and controls access to this information. The memory card includes a file system of electronic files on the card, which are automatically detected and recognized by selected authorized readers. The file system is organized so that stored electronic files appear in separate and distinct encrypted compartments in the card, so that only authorized preselected readers have access to particular compartments. Biometric identifying information is imprinted in the card, so that no data can be transferred unless there is a biometric match between a reader and a person assigned to the card and who possesses the card.Type: GrantFiled: June 13, 2003Date of Patent: December 30, 2008Inventor: Michael Arnouse
-
Patent number: 7472283Abstract: The specification discloses a system and related method for tracking access to digital information that involves combining biometric information of a person seeking access with the digital information and a digital signature. Each person who accesses the digital information has their biometric and digital signatures combined in this manner. Thus, the digital information itself reflects who has accessed the information. Where the digital information is a video, the combining of the biometric and digital signatures is done on a frame-by-frame basis.Type: GrantFiled: May 30, 2002Date of Patent: December 30, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Michael F. Angelo, E. David Neufeld
-
Patent number: 7472279Abstract: A technique for executing customized code on off-loaded or retrieved documents in a document processing environment. The present invention provides a code component in the form of an agent that can be automatically executed relative to a document before a document is off-loaded, after it has been off-loaded or after it has been retrieved. Preferably, the code component is in the form of a plug-in. Embodiments of the present invention enable advantageous pre-processing and post-processing of documents in the document processing environment. Invocation of at least one agent and execution of customized code at a well-defined time, i.e., synchronous with the underlying document processing step or event.Type: GrantFiled: December 12, 2001Date of Patent: December 30, 2008Assignee: International Business Machines CorporationInventors: Matthias Stefan Bierbrauer, Daniel Haenle
-
Publication number: 20080307233Abstract: A method and system for securing and tracing confidential data is described. A request to generate a hardcopy printout is received by a computing device. Document output instructions for the request then are generated and data to associate with the document output instructions is determined. Then the determined data is encoded with the generated document output instructions. The encoded data includes information specific to a terminal device associated with the request and an identifier representative of a starting position for reading the encoded data. One ore more software modules within a terminal device, an intermediate server, and/or a printer may perform the operation of encoding the data. A hardcopy printout includes the content requested to be printed in addition to the encoded data. The encoded data may appear as representations of noise on one or more pages of the hardcopy printout.Type: ApplicationFiled: June 9, 2007Publication date: December 11, 2008Applicant: BANK OF AMERICA CORPORATIONInventor: Matthew Alexander Calman
-
Patent number: 7463752Abstract: An additional data useful for the management of copies of a document for an image forming apparatus is embedded in a hard copy of the document. The additional data is embedded in an inherent image of a document as discrete dots arranged in a prescribed format. Preferably, the size of each of said discrete dots is not so large as to be recognized easily with naked eyes. The additional data can be embedded in unit of blocks. Further, the density of the discrete dots is different from the density adjacent to the discrete dots. The image data for embedding an additional data can be obtained by reading a document, or by receiving data sent from a computer or read from a floppy disk. An additional data embedded in a hard copy can be extracted from the image data on the hard copy. Further, the production of a copy according to the image data can be controlled according to the extracted additional data.Type: GrantFiled: April 12, 2007Date of Patent: December 9, 2008Assignee: Konica Minolta Business Technologies, Inc.Inventor: Yoshikazu Ikenoue
-
Patent number: 7464265Abstract: Disclosed are methods for a client, having established one set of security keys, to establish a new set without having to communicate with an authentication server. When the client joins a group, master session security keys are derived and made known to the client and to the group's access server. From the master session security keys, the access server and client each derive transient session security keys, used for authentication and encryption. To change the transient session security keys, the access server creates “liveness” information and sends it to the client. New master session security keys are derived from the liveness information and the current set of transient session security keys. From these new master session security keys are derived new transient session security keys. This process limits the amount of data sent using one set of transient session security keys and thus limits the effectiveness of any statistical attacker.Type: GrantFiled: May 3, 2002Date of Patent: December 9, 2008Assignee: Microsoft CorporationInventors: Arun Ayyagari, Daniel R. Simon, Bernard D. Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl
-
Patent number: 7461257Abstract: A system (50, 150) for assisting a user (14) to determine whether a hyperlink (152) to a target uniform resource locator (URL) is spoofed. A computerized system having a display unit is provided and logic (158) therein listens for activation of the hyperlink (152) in a message (154). The logic (158) extracts an originator identifier (102) and encrypted data from the hyperlink (152), and decrypts the encrypted data into decrypted data based on the originator identifier (102). The logic (158) determines whether the hyperlink (152) includes the originator identifier (102) and the encrypted data decrypts successfully. Responsive to this it then presents a confirmation of authentication conveying the name of the owner and the domain name of the target URL on the display unit, and it redirects the user (14) to the target URL. Otherwise, it presents a warning dialog to the user (14) on the display unit.Type: GrantFiled: September 21, 2004Date of Patent: December 2, 2008Assignee: Proofpoint, Inc.Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
-
Patent number: 7457958Abstract: A system (50, 150) for assisting a user (14) to determine whether an email (18) comes from a purported originator (16). A computerized system having a display unit is provided. Logic (54) in the computerized system determines whether the email (18) includes an authenticity mark (52) including an originator identifier (102) and encrypted data (104). Logic (54) in the computerized system then decrypts the encrypted data (104) into decrypted data (108-14), based on the originator identifier (102). Logic (54) in the computerized system then presents to the user (14), on the display, whether the email (18) includes the authenticity mark (52), whether the encrypted data (104) decrypts successfully, and information based on the authenticity mark (52) and the decrypted data (108-14).Type: GrantFiled: September 21, 2004Date of Patent: November 25, 2008Assignee: Proofprint, Inc.Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
-
Publication number: 20080276095Abstract: A verification information generation system comprises a first and a second data processing apparatuses.Type: ApplicationFiled: October 25, 2005Publication date: November 6, 2008Inventor: Keiichi Iwamura
-
Publication number: 20080270801Abstract: A method of imperceptibly embedding a code signal in a media signal encodes auxiliary information in frequency components of the media signal. This method forms a code signal comprising a plurality of frequency components. The method embeds the code signal into the media signal by adjusting the frequency component relative to a neighboring component. The method changes selection of the plurality of frequency components corresponding to the codes signal for different instances of embedding the code signal in the media signal. The code signal may be used to encode a combination of fixed and variable message information in audio and image signals, including video. In one application, the attributes of the code signal are measured to determine broadcast signal quality. In another, the code signal robustly carries auxiliary information in distribution channels where distortion is common, such as compression, broadcast distortion, packet loss, digital to analog conversion, and ambient air transmission.Type: ApplicationFiled: March 18, 2008Publication date: October 30, 2008Inventors: Kenneth L. Levy, Jun Tian
-
Patent number: 7415612Abstract: An image decrypting apparatus derives spectral reflectance of the face of an original on the basis of obtained original image data, built-in light source data and basis function data, and obtains weighted coefficients of each pixel as object color component data. The apparatus stores a file including the basis function data used at the time of obtaining the spectral reflectance as a key file, and stores a file including the object color component data as an encrypted file. From each of the key file and the encrypted file, the original image data cannot be reproduced. By using the key file and the encrypted file in a correct combination, the original image data can be reproduced. In such a manner, the original image data can be protected.Type: GrantFiled: May 1, 2003Date of Patent: August 19, 2008Assignee: Minolta Co., Ltd.Inventor: Fumiko Uchino