Including Generation Of Associated Coded Record Patents (Class 713/179)
  • Patent number: 7590852
    Abstract: A virtual notary Kiosk is disclosed for performing live electronic personal signatory verification, authentication and screening for the purpose of transacting remote electronic notarizations with live notaries. The virtual notary is a process that is compliant with the Uniform Electronic Transaction Act, and Electronic Signatures in Global and National Commerce Act. The virtual notary incorporates several electronic components, (digital web cam, electronic signature and thumbprint pad, electronic notary seal, electronic notary journal, video/audio transmission software for cellular/PDA or portable pc device, P.O.S. {point of sale} device, and electronic transaction manager {computer}, electronic scanner/printer, electronic remote notary/client software); all of the aforementioned allow both potential signatory and notary to execute electronic notarizations from remote locations.
    Type: Grant
    Filed: July 23, 2007
    Date of Patent: September 15, 2009
    Inventors: Jesse Andrew Hatter, Brenda Faye Hatter, Rosie Jean Hatter
  • Patent number: 7587607
    Abstract: Receiving a request for an attestation of platform configuration from an attestation requestor, receiving an acceptable configuration, and if the platform matches the acceptable configuration, sending an attestation of platform configuration including a signed response indicating that the platform configuration matches an acceptable configuration to the attestation requester.
    Type: Grant
    Filed: December 22, 2003
    Date of Patent: September 8, 2009
    Assignee: Intel Corporation
    Inventors: Ernie F. Brickell, Matthew D. Wood
  • Publication number: 20090222668
    Abstract: A method for managing a group signature scheme includes in a setup procedure for group initialization, generating, by a group manager, a group public key. In a join procedure for the group manager to add a new member to the group, the method includes generating by the new member, user information, and providing the generated user information to the group manager, and computing, by the group manager, membership information for the new member based on the user information received by the new member and on the group public key, and providing to the new member the computed membership information. In particular, the membership information is computed, by the group manager, as a function of the inverse of a given hash function of the user information. In a signing procedure for a group member to sign a message on behalf of the group, the method includes: using, by the group member, the membership information and the user information.
    Type: Application
    Filed: December 19, 2005
    Publication date: September 3, 2009
    Inventors: Pier Luigi Zaccone, Manuel Leone, Ettore Caprella, Francesco Bergadano, Davide Cavagnino, Paolo Dal Checco
  • Patent number: 7581102
    Abstract: A method of confirming a certificate by using a management computer that issues the certificate is disclosed. The management computer is coupled to an application terminal for applying for issuance of the certificate and to a confirmation terminal for reading a display code printed on the certificate.
    Type: Grant
    Filed: January 13, 2005
    Date of Patent: August 25, 2009
    Assignee: Ricoh Company, Ltd.
    Inventor: Hiroshi Yasuda
  • Patent number: 7581242
    Abstract: A method of authenticating products includes receiving a description of detectable features read from a package. The package includes two or more detectable features, and the detectable features are affixed on the package based on encoded information. Authentication information is provided based on a comparison of the received description to one or more stored package identifiers.
    Type: Grant
    Filed: April 30, 2005
    Date of Patent: August 25, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Guillaume Oget, Steven J. Simske, Jorge Badillo, Bill Serra, Cyril Brignone, Malena Mesarina
  • Publication number: 20090210719
    Abstract: In a first information processing device, a specific part of a binary code of a first application program developed in a first memory and a specific function are used to calculate a first identification value. The first identification value is transmitted from the first information processing device to a second information processing device. In the second information processing device, a specific part of a binary code of a second application program developed in a second memory and a specific function are used to calculate a second identification value, and the first identification value received from the first information processing device is compared with the second identification value. If these identification values are identical, connection with the first information processing device is permitted in the second information processing device.
    Type: Application
    Filed: August 29, 2008
    Publication date: August 20, 2009
    Applicant: Konica Minolta Holdings, Inc.
    Inventor: Hiroki Yoshida
  • Publication number: 20090204235
    Abstract: A triggering and activating device and an automated process coupling two reciprocally activatable monitoring devices or operational-intervention devices. A first synchronizing module synchronizes transmissible operational-intervention parameters of a lookup table with operational devices assigned to the first monitoring device, and a second synchronizing module synchronizes storable threshold-value parameters for activating the second monitoring device. Physical measuring parameters of intervention events are detected and transmitted to the activating device, an intervention-event stack being correspondingly incremented by a first filter module based on the physical measuring parameters and a dynamically implemented weighting of the lookup table.
    Type: Application
    Filed: March 13, 2007
    Publication date: August 13, 2009
    Applicant: SWISS REINSURANCE COMPANY
    Inventor: William J. Dubinsky
  • Patent number: 7574604
    Abstract: An embodiment of the present invention includes a technique to register a client to a server for communication. A remote commander transmits an identification code to the server and the client. The server has a key. The client is coupled to the server via a network. The server encrypts the key with the identification code and sends the encrypted key to the client. The client decrypts the encrypted key using the identification code. The server and the client then exchanges information encrypted by the key.
    Type: Grant
    Filed: May 20, 2005
    Date of Patent: August 11, 2009
    Assignees: Sony Corporation, Sony Electronics Inc.
    Inventor: Ryuichi Iwamura
  • Patent number: 7574744
    Abstract: A system and method is provided for securely duplicating digital documents of disparate types, such that there is a cryptographically secure link between the duplicate and the original. The system also provides each document with a serial number that is both sequential with all other copied documents and cryptographically linked with the document itself, and which includes verifiable proof against tampering and modification. The system further produces copies of documents in a canonical format suitable for indexing and searching using automated processing tools.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: August 11, 2009
    Assignee: Peraogulne Corp.
    Inventors: Myron Eagle, Michael Prounis
  • Patent number: 7574606
    Abstract: A location stamp automatically attached to messages indicates location information such as longitude and latitude information from a GPS device. The location stamp helps a receiver to identify the location of the sender or a transaction, identify the sender, and provides context to the message that further indicates the messages meaning. Applications of the location stamp include authentication of the location of a sender or a transaction and identifying the location of a sender for a search and rescue.
    Type: Grant
    Filed: October 24, 2000
    Date of Patent: August 11, 2009
    Assignee: Trimble Navigation Limited
    Inventors: Carey B. Fan, Kulbir S. Sandhu, Kenny Man D Nguyen
  • Patent number: 7568113
    Abstract: A method of and device (110) for granting access to content on a storage medium (101), comprising obtaining cryptographic data (Y) from a property (102), such as a wobble, of the storage medium (101), reading helper data (W) from the storage medium (101), and granting the access based on an application of a delta-contracting function to the cryptographic data (Y) and the helper data (W). The delta-contracting function allows the choice of an appropriate value of the helper data (W), such that any value of the cryptographic data (Y) which sufficiently resembles said original primary input value leads to the same output value. Substantially different values of the cryptographic data (Y) lead to different values of the output.
    Type: Grant
    Filed: December 24, 2003
    Date of Patent: July 28, 2009
    Inventor: Johan Paul Marie Gerard Linnartz
  • Patent number: 7565537
    Abstract: A secure key exchange with mutual authentication allows devices on a network to perform, in a single roundtrip over the network, the exchange. A key exchange initiator packet that does not include a key to be established is sent from an initiating device to another device via a network. The key exchange initiator packet is validated and the other device generates the key without requiring any additional packets to be received from the initiating device in order to generate the key. A key exchange response packet that does not include the key is returned to the initiating device, which validates the key exchange response packet and generates the key without requiring any additional packets to be sent to the other device or received from the other device.
    Type: Grant
    Filed: June 10, 2002
    Date of Patent: July 21, 2009
    Assignee: Microsoft Corporation
    Inventors: Dinarte R. Morais, Ling Tony Chen, Damon V. Danieli
  • Publication number: 20090177891
    Abstract: A method and system for embedding into a text document generated by a licensed software a License Identification Signature of the software.
    Type: Application
    Filed: January 5, 2009
    Publication date: July 9, 2009
    Inventor: Fernando Incertis Carro
  • Patent number: 7558963
    Abstract: The present invention provides a means for determining authenticity of a combination of files which are downloaded to a mobile station, and which are related to one another. To achieve the stated object, in a system according to the present invention, mobile station 16, which is capable of running a Java-APP, receives an ADF from CP server device 12. Then mobile station 16 receives a SDF from trusted server device 18, which is identified by data contained in the ADF. Mobile station 16 calculates a hash value of certificate data contained in the ADF, and verifies whether the calculated hash value of the certificate data and a hash value of the certificate data which is contained in the SDF are identical to each other. Next, mobile station 16 receives a JAR file from CP server device 12. Mobile station 16 calculates a hash value of the JAR file, and verifies whether the calculated hash value of the JAR file and a hash value of the JAR file contained in the ADF are identical to each other.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: July 7, 2009
    Assignee: NTT DoCoMo, Inc.
    Inventors: Naoki Naruse, Yuichi Ichikawa, Tatsuro Oi, Nobuyuki Watanabe, Yasunori Hattori, Masato Takeshita, Masakazu Nishida, Mao Asai, Masayuki Tsuda, Atsuki Tomioka, Kazuhiro Yamada, Satoshi Washio, Dai Kamiya, Naoki Yamane, Keiichi Murakami
  • Patent number: 7555647
    Abstract: An encoding device to encode an object image to be encoded includes a reference information generating unit that generates reference information with respect to a key image different from the object image, and a code generating unit that generates code data of the reference information generated by the reference information generating unit as code data of at least a portion of the object image.
    Type: Grant
    Filed: March 17, 2005
    Date of Patent: June 30, 2009
    Assignee: Fuji Xerox Co., Ltd.
    Inventor: Taro Yokose
  • Patent number: 7549051
    Abstract: A digital certificate is employed to produce a digital signature for a digital construct. In the digital certificate is set forth a certificate validity period defining for the digital certificate a time period during which the digital certificate is to be honored as valid for producing digital signatures, and a signature validity period defining for each digital signature produced based on the digital certificate a time period during which the digital signature is to be honored as valid.
    Type: Grant
    Filed: March 10, 2005
    Date of Patent: June 16, 2009
    Assignee: Microsoft Corporation
    Inventors: Blair Brewster Dillaway, Brian LaMacchia, John Manferdelli, Muthukrishnan Paramasivam
  • Patent number: 7549061
    Abstract: An executing device for conducting playback is high during the playback of contents. The executing device is equipped with a highly efficient processor and reduces the processing load involved in verification by using, for the verification, only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the executing device is capable of improving the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
    Type: Grant
    Filed: March 24, 2005
    Date of Patent: June 16, 2009
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
  • Patent number: 7543151
    Abstract: A method and apparatus for determining the distance between transitions from a first logical state to a second logical state stored on a medium (i.e., a document). This determination is used to precisely characterize the information pattern in order to authenticate the information and the medium on which the information is stored. The invention uses a reader having a leading and trailing read apparatus which allow information to be read simultaneously from two or more locations spaced a known distance apart. The distance between the centerlines of each read apparatus is preferably an odd integer multiple of one half the distance between logical clock transitions. The distance between a first transition at the leading read apparatus and a next transition at the trailing read apparatus is used as a reference (i.e., the “Reference Value”). The Reference Value is compared with the distance between the first transition and the next transition on the medium (i.e., the “Jitter Value”).
    Type: Grant
    Filed: December 21, 2006
    Date of Patent: June 2, 2009
    Assignee: Semtek Innovative Solutions Corporation
    Inventors: Clay von Mueller, Robert Mos
  • Patent number: 7543138
    Abstract: An image registration server stores encryption keys of respective ones of a plurality of client terminals. Image data is encrypted by the image registration server using the encryption key corresponding to the client terminal to which the image data is applied. The encrypted image data is applied to the client terminal via a server. The client terminal has a decryption key stored within so that only a client terminal that is duly authorized can decrypt encrypted image data. Other client terminals that are not duly authorized cannot decode the image data. This makes it possible to prevent unlawful use of image data even if the image data has been intercepted.
    Type: Grant
    Filed: September 22, 2000
    Date of Patent: June 2, 2009
    Assignee: Fujifilm Corporation
    Inventors: Yoshiki Kawaoka, Norihisa Haneda, Hiroshi Suganuma, Hiroyuki Yoshinaga
  • Patent number: 7539868
    Abstract: A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to the particular computing platform (10). The manufacturer certificate may also store configuration parameters and device identification numbers. A secure run-time platform data checker (200) and a secure run-time checker (202) check the system firmware during operation of the computing platform (10) to ensure that the system firmware (30) or information in the manufacturer certificate (36) has not been altered. Application software files (32) and data files (34) are bound to the particular computing device (10) by a platform certificate (38). A key generator may be used to generate a random key and an encrypted key may be generated by encrypting the random key using a secret identification number associated with the particular computing platform (10). Only the encrypted key is stored in the platform certificate (36).
    Type: Grant
    Filed: July 14, 2003
    Date of Patent: May 26, 2009
    Assignee: Texas Instruments Incorporated
    Inventors: Eric Balard, Alain Chateau, Jerome Azema
  • Publication number: 20090132824
    Abstract: An original data circulation system for storing or circulating original data which is digital information is provided. The original data circulation system includes an issuer apparatus, a user apparatus and a collector apparatus. The issuer apparatus generates originality information including first information corresponding to the issuer apparatus and second information corresponding to data and sends the originality information. The user apparatus verifies the validity of the source apparatus of the originality information and stores the originality information when the validity is verified. The collector apparatus verifies the validity of the source apparatus of the originality information and processes data corresponding to the second information when the validity is verified.
    Type: Application
    Filed: December 18, 2008
    Publication date: May 21, 2009
    Inventors: Masayuki Terada, Ko Fujimura, Hiroshi Kuno, Masayuki Hanadate
  • Patent number: 7532740
    Abstract: This patent application is generally related to watermarking and steganography. In one implementation, a method of embedding auxiliary information within original data is provided. The original data is divided into a series of groups, with each group in the series of groups associated with a value. The method includes: investigating a first group to determine a presence of a local masking opportunity; and if there exists a presence of a local masking opportunity with the first group, embedding data by setting a value of one or more groups in a neighborhood of the first group, including the first group, in accordance with a value associated with at least a portion of the auxiliary data. Other implementations and embodiments are provided as well.
    Type: Grant
    Filed: March 27, 2007
    Date of Patent: May 12, 2009
    Assignee: Digimarc Corporation
    Inventor: Kenneth L. Levy
  • Patent number: 7526649
    Abstract: According to an embodiment of the invention, a method and apparatus for session key exchange are described. An embodiment of a method comprises requesting a service for a platform; certifying the use of the service for one or more acceptable configurations of the platform; and receiving a session key for a session of the service, the service being limited to the one or more acceptable configurations of the platform.
    Type: Grant
    Filed: December 30, 2003
    Date of Patent: April 28, 2009
    Assignee: Intel Corporation
    Inventors: Willard M. Wiseman, David W. Grawrock, Ernie Brickell, Matthew D. Wood, Joseph F. Cihula
  • Patent number: 7526798
    Abstract: Run-as credentials delegation using identity assertion is presented. A server receives a request from a client that includes the client's user identifier and password. The server authenticates the client and stores the client's user identifier without the corresponding password in a client credential storage area. The server determines if a run-as command is specified to communicate with a downstream server. If a run-as command is specified, the server retrieves a corresponding run-as identity which identifies whether a client credential type, a server credential type, or a specific identifier credential type should be used in the run-as command. The server retrieves an identified credential corresponding to the identified credential type, and sends the identified credential in an identity assertion token to a downstream server.
    Type: Grant
    Filed: October 31, 2002
    Date of Patent: April 28, 2009
    Assignee: International Business Machines Corporation
    Inventors: Ching-Yun Chao, Hyen Vui Chung, Ajay Reddy, Vishwanath Venkataramappa
  • Publication number: 20090106557
    Abstract: Embodiments of the present invention enable a message recipient or messaging system to indicate the trustworthiness of a message, especially messages that comprise content that has been digitally signed. In addition, embodiments may alter or control the message to change user behavior by preventing the user from doing things that the message would induce the user into doing. In some embodiments, various characteristics and indicia of the message are determined. For example, for e-mail messages having digitally signed content, certain embodiments may determine the entity or entities asserting a basis for trust, the status or role of the sender, the name of the sender, the affiliation of the sender, the messaging address the location, and the most recent status of the trust relationship. Based on the determined indicia, a plain language notification is composed and the message is displayed with the notification.
    Type: Application
    Filed: October 20, 2008
    Publication date: April 23, 2009
    Inventor: Sean Leonard
  • Patent number: 7523303
    Abstract: An editing apparatus generates a capsular work with usage conditions for each of plural usages and usage secret information. A ticket server apparatus issues a ticket containing a ticket key in the case of allowing a user to practice the usage requested by the user. A distribution center apparatus distributes the capsular work in accordance with the user's request. An audiovisual apparatus acquires the capsular work from the distribution center apparatus and requests the ticket necessary to make use of the capsular work from the ticket server apparatus, and then decrypts the encrypted work data contained in the capsular work and reproduces the work data only in the case where the audiovisual apparatus has acquired the ticket.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: April 21, 2009
    Assignee: NEC Corporation
    Inventor: Masayuki Nakae
  • Patent number: 7519179
    Abstract: Described herein is an information transmission apparatus for encrypting and transmitting first data and second data, the information transmission apparatus including: encryption element for deriving a second key from a first key by using an irreversible function, encrypting the first data by using the first key to generate encrypted first data and encrypting the second data by using the second key to generate encrypted second data; and transmission element for transmitting the encrypted first data, the encrypted second data and the first key.
    Type: Grant
    Filed: May 27, 2004
    Date of Patent: April 14, 2009
    Assignee: Sony Corporation
    Inventor: Makoto Shiina
  • Patent number: 7516329
    Abstract: An information processing apparatus that enables management of copyrighted content to which identification information is not added. An arithmetical unit computes a hash value based on data from a portion of the content data recorded in a mini-disk (MD), and transmits the value from an input/output unit to a personal computer. Based on the hash value, the personal computer identifies the content recorded in the MD, and performs management procedures based on the display information of check-in and checkout of the content. The information processing apparatus can also be applied to personal computers.
    Type: Grant
    Filed: March 25, 2002
    Date of Patent: April 7, 2009
    Assignee: Sony Corporation
    Inventors: Munetake Ebihara, Mitsuru Tanabe, Ichiro Sato
  • Patent number: 7516496
    Abstract: An authorized client communication system seeking access to a host communication system may be identified by locating a memory segment within the client communication system that stores client software used to access the host computer system. The memory segment then is examined to determine whether the client software stored in the memory segment corresponds to client software for an official client communication, system. Communications from the client communication system are terminated when the client software in the memory segment is determined to diverge from software for an official client communication system.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: April 7, 2009
    Assignee: AOL LLC
    Inventors: Robert G. Watkins, Andrew L. Wick
  • Publication number: 20090089575
    Abstract: When an entrustor entrusts an outsourcer with the supply of a service for members, member information managed by the entrustor is kept secret from the outsourcer, and users can receive the service without communicating with the entrustor. For using the service, user apparatus 3 sends group signature data to outsourcer apparatus 2. Outsourcer apparatus 2 authenticates the group signature data using public information of entrustor apparatus 1. When the group signature data passes the authentication, confirming that user apparatus 3 is a member of entrustor apparatus 1, outsourcer apparatus 2 provides the service to user apparatus 3.
    Type: Application
    Filed: May 31, 2006
    Publication date: April 2, 2009
    Inventors: Shoko Yonezawa, Kazue Sako
  • Patent number: 7509496
    Abstract: In a communication system (1), a header comprising information, preferably being related with a device-type associated commitment, is additionally provided with a signature for that information. The signature guarantees the authenticity of the header information. The signature is tamper-resistantly created in a first device (20), preferably based on at least tamper-resistant device-type specific information of the first device (20). The header information and the signature are communicated to a content provider (10), where the signature is verified before accepting the device-type associated commitment to be valid. Such signatures can preferably be used in systems using HTTP or SMTP.
    Type: Grant
    Filed: February 18, 2004
    Date of Patent: March 24, 2009
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Robert Skog, Peter Stark
  • Patent number: 7506167
    Abstract: Apparatus and an accompanying method, for forming and embedding a highly tamper-resistant cryptographic identifier, i.e., a watermark, within non-marked executable code, e.g., an application program, to generate a “watermarked” version of that code. Specifically, the watermark, containing, e.g., a relatively large number of separate executable routines, is tightly integrated into a flow pattern of non-marked executable code, e.g., an application program, through randomly establishing additional control flows in the executable code and inserting a selected one of the routines along each such flow. Since the flow pattern of the watermark is highly intertwined with the flow pattern of the non-marked code, the watermark is effectively impossible to either remove from the code and/or circumvent. The routines are added in such a manner that the flow pattern of resulting watermarked code is not substantially different from that of the non-marked code, thus frustrating third party detection of the watermark using, e.
    Type: Grant
    Filed: June 29, 2004
    Date of Patent: March 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Vijay Vazirani
  • Patent number: 7502934
    Abstract: Methods, apparatus, including computer program products, and systems implement and use techniques relating to electronic signatures. In one implementation, a one-way hash is calculated for an electronic document and a digital watermark representing the one-way hash is embedded in a signature document. Based on a user input, the signature document having the embedded digital watermark is altered, and the electronic document is associated with the signature document. The electronic document and the signature document together comprise a signed electronic document. The user input can include biometric information, such as a handwritten signature or a voice recording. For additional security, the one-way hash can be encrypted before a representation of the hash is embedded in the signature document.
    Type: Grant
    Filed: December 16, 2003
    Date of Patent: March 10, 2009
    Assignee: SAP Aktiengesellschaft
    Inventor: Josef Dietl
  • Patent number: 7497379
    Abstract: Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.
    Type: Grant
    Filed: February 27, 2004
    Date of Patent: March 3, 2009
    Assignee: Microsoft Corporation
    Inventors: Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon A. Yuval
  • Patent number: 7500106
    Abstract: A method for identifying, authenticating and authorizing a user of protected data, in particular a use of protected in an automation system, whereby the user is identified by the user ID input by them in an input field in a login area, this input user ID is combined with a password input by the user and transferred with a one-way encryption function to a system ID which authenticates the user, at least this system ID is transferred in an access identifier from the login area to a protected area and the user is authorized by this transferred access identifier to obtain access to protected data in the protected area.
    Type: Grant
    Filed: October 22, 2004
    Date of Patent: March 3, 2009
    Assignee: Siemens Aktiengesellschaft
    Inventor: Harald Herberth
  • Patent number: 7489798
    Abstract: The invention relates to a system for detecting a watermark using informed detection. A first signal potentially having a watermark embedded is received (601) as is a second signal corresponding to the original signal. The signals are segmented (605) into symbol segments. For each symbol segment a first characteristic is determined (607) for a first section and a second characteristic is determined (609) for a second section in response to the first and second signals in those sections. Specifically, ratios between average envelopes are determined. Thus, the first and second characteristic is indicative of the variations of the envelope during a watermark symbol. A watermark symbol estimate is determined (611) from the first and second characteristic. A sequence of estimated watermark symbols is compared to reference watermark symbols and the presence of a watermark symbol is determined (615) depending on the comparison.
    Type: Grant
    Filed: November 24, 2004
    Date of Patent: February 10, 2009
    Assignee: Koninklijke Philips Electronics N.V.
    Inventors: Minne Van Der Veen, Aweke Negash Lemma
  • Patent number: 7489797
    Abstract: A method of fragile watermarking is characterized by the step of generating at least a first ill-conditioned operator, said ill-conditioned operator being related to values extracted from an image or portion thereof A.
    Type: Grant
    Filed: June 28, 2004
    Date of Patent: February 10, 2009
    Assignee: Motorola, Inc.
    Inventor: Ebroul Izquierdo
  • Patent number: 7475429
    Abstract: Method of invisibly embedding into a text document generated by a licensed software the License Identification Signature of the software wherein each original copy of the software has been assigned a unique Software License Code (SLC) and a unique License Identification Key (LIK) by a Licensing Authority, such a method comprising the steps of computing a Document Hash Value (DHV) of the text document (12), getting from the DHV a License Identification Code (LIC) of the text document by using the LUK (14), and embedding (18) invisibly into the text document the License Identification Signature (LIS) formed by the SLC, DHV and LIC after the LIS has been encoded by using character attributes.
    Type: Grant
    Filed: June 4, 2002
    Date of Patent: January 6, 2009
    Assignee: International Business Machines Corporation
    Inventor: Fernando Incertis Carro
  • Patent number: 7471806
    Abstract: At every reproduction of a moving image, a tamper resistant module (TRM) randomly selects any one of plural electronic watermark inserting modules, and incorporates the module selected into an area randomly selected from among plural non-operation (NOP) areas in an MPEG expansion module. The module can be switched for each image in a series of the moving images. Since an algorithm for inserting the electronic watermark differs for each moving image or each image, elimination of the electronic watermark by means of analysis, particularly, complete elimination from all the images, is extremely difficult.
    Type: Grant
    Filed: January 29, 2004
    Date of Patent: December 30, 2008
    Assignee: Fujitsu Limited
    Inventors: Kiyoshi Kohiyama, Hiroshi Komazaki
  • Patent number: 7472275
    Abstract: A universal lightweight, easily carried memory identification card records information and controls access to this information. The memory card includes a file system of electronic files on the card, which are automatically detected and recognized by selected authorized readers. The file system is organized so that stored electronic files appear in separate and distinct encrypted compartments in the card, so that only authorized preselected readers have access to particular compartments. Biometric identifying information is imprinted in the card, so that no data can be transferred unless there is a biometric match between a reader and a person assigned to the card and who possesses the card.
    Type: Grant
    Filed: June 13, 2003
    Date of Patent: December 30, 2008
    Inventor: Michael Arnouse
  • Patent number: 7472283
    Abstract: The specification discloses a system and related method for tracking access to digital information that involves combining biometric information of a person seeking access with the digital information and a digital signature. Each person who accesses the digital information has their biometric and digital signatures combined in this manner. Thus, the digital information itself reflects who has accessed the information. Where the digital information is a video, the combining of the biometric and digital signatures is done on a frame-by-frame basis.
    Type: Grant
    Filed: May 30, 2002
    Date of Patent: December 30, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Michael F. Angelo, E. David Neufeld
  • Patent number: 7472279
    Abstract: A technique for executing customized code on off-loaded or retrieved documents in a document processing environment. The present invention provides a code component in the form of an agent that can be automatically executed relative to a document before a document is off-loaded, after it has been off-loaded or after it has been retrieved. Preferably, the code component is in the form of a plug-in. Embodiments of the present invention enable advantageous pre-processing and post-processing of documents in the document processing environment. Invocation of at least one agent and execution of customized code at a well-defined time, i.e., synchronous with the underlying document processing step or event.
    Type: Grant
    Filed: December 12, 2001
    Date of Patent: December 30, 2008
    Assignee: International Business Machines Corporation
    Inventors: Matthias Stefan Bierbrauer, Daniel Haenle
  • Publication number: 20080307233
    Abstract: A method and system for securing and tracing confidential data is described. A request to generate a hardcopy printout is received by a computing device. Document output instructions for the request then are generated and data to associate with the document output instructions is determined. Then the determined data is encoded with the generated document output instructions. The encoded data includes information specific to a terminal device associated with the request and an identifier representative of a starting position for reading the encoded data. One ore more software modules within a terminal device, an intermediate server, and/or a printer may perform the operation of encoding the data. A hardcopy printout includes the content requested to be printed in addition to the encoded data. The encoded data may appear as representations of noise on one or more pages of the hardcopy printout.
    Type: Application
    Filed: June 9, 2007
    Publication date: December 11, 2008
    Applicant: BANK OF AMERICA CORPORATION
    Inventor: Matthew Alexander Calman
  • Patent number: 7463752
    Abstract: An additional data useful for the management of copies of a document for an image forming apparatus is embedded in a hard copy of the document. The additional data is embedded in an inherent image of a document as discrete dots arranged in a prescribed format. Preferably, the size of each of said discrete dots is not so large as to be recognized easily with naked eyes. The additional data can be embedded in unit of blocks. Further, the density of the discrete dots is different from the density adjacent to the discrete dots. The image data for embedding an additional data can be obtained by reading a document, or by receiving data sent from a computer or read from a floppy disk. An additional data embedded in a hard copy can be extracted from the image data on the hard copy. Further, the production of a copy according to the image data can be controlled according to the extracted additional data.
    Type: Grant
    Filed: April 12, 2007
    Date of Patent: December 9, 2008
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventor: Yoshikazu Ikenoue
  • Patent number: 7464265
    Abstract: Disclosed are methods for a client, having established one set of security keys, to establish a new set without having to communicate with an authentication server. When the client joins a group, master session security keys are derived and made known to the client and to the group's access server. From the master session security keys, the access server and client each derive transient session security keys, used for authentication and encryption. To change the transient session security keys, the access server creates “liveness” information and sends it to the client. New master session security keys are derived from the liveness information and the current set of transient session security keys. From these new master session security keys are derived new transient session security keys. This process limits the amount of data sent using one set of transient session security keys and thus limits the effectiveness of any statistical attacker.
    Type: Grant
    Filed: May 3, 2002
    Date of Patent: December 9, 2008
    Assignee: Microsoft Corporation
    Inventors: Arun Ayyagari, Daniel R. Simon, Bernard D. Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl
  • Patent number: 7461257
    Abstract: A system (50, 150) for assisting a user (14) to determine whether a hyperlink (152) to a target uniform resource locator (URL) is spoofed. A computerized system having a display unit is provided and logic (158) therein listens for activation of the hyperlink (152) in a message (154). The logic (158) extracts an originator identifier (102) and encrypted data from the hyperlink (152), and decrypts the encrypted data into decrypted data based on the originator identifier (102). The logic (158) determines whether the hyperlink (152) includes the originator identifier (102) and the encrypted data decrypts successfully. Responsive to this it then presents a confirmation of authentication conveying the name of the owner and the domain name of the target URL on the display unit, and it redirects the user (14) to the target URL. Otherwise, it presents a warning dialog to the user (14) on the display unit.
    Type: Grant
    Filed: September 21, 2004
    Date of Patent: December 2, 2008
    Assignee: Proofpoint, Inc.
    Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
  • Patent number: 7457958
    Abstract: A system (50, 150) for assisting a user (14) to determine whether an email (18) comes from a purported originator (16). A computerized system having a display unit is provided. Logic (54) in the computerized system determines whether the email (18) includes an authenticity mark (52) including an originator identifier (102) and encrypted data (104). Logic (54) in the computerized system then decrypts the encrypted data (104) into decrypted data (108-14), based on the originator identifier (102). Logic (54) in the computerized system then presents to the user (14), on the display, whether the email (18) includes the authenticity mark (52), whether the encrypted data (104) decrypts successfully, and information based on the authenticity mark (52) and the decrypted data (108-14).
    Type: Grant
    Filed: September 21, 2004
    Date of Patent: November 25, 2008
    Assignee: Proofprint, Inc.
    Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
  • Publication number: 20080276095
    Abstract: A verification information generation system comprises a first and a second data processing apparatuses.
    Type: Application
    Filed: October 25, 2005
    Publication date: November 6, 2008
    Inventor: Keiichi Iwamura
  • Publication number: 20080270801
    Abstract: A method of imperceptibly embedding a code signal in a media signal encodes auxiliary information in frequency components of the media signal. This method forms a code signal comprising a plurality of frequency components. The method embeds the code signal into the media signal by adjusting the frequency component relative to a neighboring component. The method changes selection of the plurality of frequency components corresponding to the codes signal for different instances of embedding the code signal in the media signal. The code signal may be used to encode a combination of fixed and variable message information in audio and image signals, including video. In one application, the attributes of the code signal are measured to determine broadcast signal quality. In another, the code signal robustly carries auxiliary information in distribution channels where distortion is common, such as compression, broadcast distortion, packet loss, digital to analog conversion, and ambient air transmission.
    Type: Application
    Filed: March 18, 2008
    Publication date: October 30, 2008
    Inventors: Kenneth L. Levy, Jun Tian
  • Patent number: 7415612
    Abstract: An image decrypting apparatus derives spectral reflectance of the face of an original on the basis of obtained original image data, built-in light source data and basis function data, and obtains weighted coefficients of each pixel as object color component data. The apparatus stores a file including the basis function data used at the time of obtaining the spectral reflectance as a key file, and stores a file including the object color component data as an encrypted file. From each of the key file and the encrypted file, the original image data cannot be reproduced. By using the key file and the encrypted file in a correct combination, the original image data can be reproduced. In such a manner, the original image data can be protected.
    Type: Grant
    Filed: May 1, 2003
    Date of Patent: August 19, 2008
    Assignee: Minolta Co., Ltd.
    Inventor: Fumiko Uchino