Including Generation Of Associated Coded Record Patents (Class 713/179)
-
Patent number: 7205883Abstract: A security system including a token and a host system. The token includes volatile random access memory for storing security data for use during a step of secure authentication, an interface for providing communication with a host system when coupled thereto, and a processor. The processor performs the steps of authenticating a host system and the token, providing secure information to the host system upon authentication therewith, and re-authenticating the host system and the token in response to receipt of the secure information after a reset of the token has occurred.Type: GrantFiled: October 7, 2002Date of Patent: April 17, 2007Assignee: Safenet, Inc.Inventor: Doug Bailey
-
Patent number: 7203832Abstract: This network system includes a first device serving as a shared resource connected to a network, a second device connected to the network and including an object corresponding to the first device, and a third device for dynamically allocating first and second IP addresses of a plurality of available IP addresses to the first and second devices. The object has a static IP address, and the second device associates the first IP address allocated to the first device with the IP address of the object.Type: GrantFiled: February 4, 2003Date of Patent: April 10, 2007Assignee: Minolta Co., Ltd.Inventors: Mitsuhiro Onoda, Kazuo Matoba
-
Patent number: 7197156Abstract: The present invention relates generally to embedding and/or encoding auxiliary information within original data. For example, in one embodiment, a method of embedding auxiliary information in data is provided. The auxiliary information is not lost with compression of the embedded data. The embedded data initially includes a non-compressed form including the auxiliary information embedded therein. The method includes: (a) retrieving the auxiliary information from the non-compressed form of the embedded data; (b) compressing the non-compressed form of the embedded data; and (c) embedding the retrieved auxiliary information in the compressed embedded data, whereby the compressed embedded data comprises the auxiliary information embedded therein. Other embodiments are provided and claimed as well.Type: GrantFiled: September 23, 1999Date of Patent: March 27, 2007Assignee: Digimarc CorporationInventor: Kenneth Lee Levy
-
Patent number: 7197645Abstract: A system for detecting and identifying the identity of a base station or cell which transmits a scrambling code is provided. According to one aspect of the system, the system is used to perform scrambling code detection of eight (8) primary cells (each scrambling code being spaced sixteen (16) chips apart) in a group. According to another aspect of the system, a single scrambling code generator is used to generate a master scrambling code. The master scrambling code is then used to create individual scrambling codes which are used in correlation with received signals to detect in parallel which one of the eight (8) possible primary cells in the group transmitted the received signals. According to yet another aspect of the system, each of the correlators maintains a corresponding segment of the master scrambling code.Type: GrantFiled: August 3, 2006Date of Patent: March 27, 2007Assignee: QST Holdings, LLC.Inventors: Sharad D. Sambhwani, Ghobad Heidari-Bateni
-
Patent number: 7181044Abstract: A method of embedding information in digital content representing media streams. The method includes (1) selecting a set of locations within that digital content reprensenting the media stream to embed information, (2) selecting a set of possible alterations to make at those locations, and (3) making a subset of the possible alterations. The set of locations and possible alterations is herein sometimes called a “watermark.” The subset of actual alterations that are made is herein sometimes called a “fingerprint.” The method determines a set of locations at which there are alternative versions of digital content representing the same media stream, such as one being the original and one being an alternative version of the same digital content, herein sometimes called the “original movie” and the “alt-movie,” or herein sometimes called the “original block” and the “alt-block” for a particular block in the digital content representing the media stream.Type: GrantFiled: October 28, 2005Date of Patent: February 20, 2007Assignee: Kaleidescope, Inc.Inventors: Stephen Watson, Daniel A. Collens, Kevin Hui, Michael A. Malcolm
-
Patent number: 7167980Abstract: A process for comparing data, such as signatures in a data packet, includes retrieving, from a first hash table, a target value that corresponds to a segment of the data, processing the data in accordance with the target value to produce a checksum, locating an entry in a second hash table using the checksum, and comparing the data to the entry.Type: GrantFiled: May 30, 2002Date of Patent: January 23, 2007Assignee: Intel CorporationInventor: Chun Yang Chiu
-
Patent number: 7165051Abstract: An electronic commerce system having a server and an end user machine interacting through a network during an electronic commerce transaction is disclosed. The server includes a software module configured to receive user-entered information via the network including an electronic purchase order for a product within the electronic commerce system. In addition, the server includes a fraud detection mechanism active during electronic commerce transactions. The fraud detection mechanism determines a likelihood that the electronic purchase order is attempted fraud based upon (i) information associated with the user-entered information and (ii) factors relating to a users real-time interaction with the server during a transaction to process the electronic purchase order. A method performed by an electronic commerce system for determining a likelihood that the electronic purchase order is attempted fraud based is also provided.Type: GrantFiled: February 22, 2005Date of Patent: January 16, 2007Assignee: Digital River, Inc.Inventors: Joel A. Ronning, Kelly J. Wical
-
Patent number: 7162638Abstract: An electronic data management system for accurately determining the authenticity of the electronic data and the specification of the source of unauthenticated electronic data. A drawing output processor transmits original electronic drawing data A1 to an order receiving unit with a tag T attached. The order receiving unit and a manufacturing unit transmit a manufacturer's copied data B2(T) copied from the original data A1(T) to an inspection unit. The inspection unit transmits the inspection result Fa for the product M, the client's copied data A2 re-copied from the original data A1, and the manufacturer's copied data B2 (T) to a determination unit. The determination unit compares the tag T extracted from the manufacturer's copied data B2 with the original value of the client's copied data A2 and the original value of the manufacturer's copied data B2 and determines the authenticity of the client's copied data A2 and the manufacturer's copied data B2.Type: GrantFiled: January 5, 2001Date of Patent: January 9, 2007Assignee: Honda Giken Kogyo Kabushiki KaishaInventor: Takuji Yoshihiro
-
Patent number: 7155737Abstract: A method and apparatus is provided for securely executing access control functions that may be customized by or on behalf of administrators of information access systems. Examples of such functions include changing a password of a user, determining whether or not data specifying a user and a password identifies an authentic user, and displaying a message indicating whether a login attempt was successful. An access control function is mapped to a digital signature. The digital signature is used to verify that an executable element retrieved for executing the access control function is the proper executable element. The access control functions may be invoked upon the occurrence of access control events, such as a user successfully logging onto an information access system or the modification of a user's password. A mapping contains data used to determine what events are tied to what access control functions, and whether the access control function should be executed.Type: GrantFiled: May 11, 1999Date of Patent: December 26, 2006Assignee: Entrust, Inc.Inventors: Mario Lim, Teresa Win, Emilio Belmonte
-
Patent number: 7143290Abstract: Documents and other items can be delivered electronically from sender to recipient with a level of trustedness approaching or exceeding that provided by a personal document courier. A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction. Printed or imaged documents can be marked using handwritten signature images, seal images, electronic fingerprinting, watermarking, and/or steganography. Electronic commercial transactions and transmissions take place in a reliable, “trusted” virtual distribution environment that provides significant efficiency and cost savings benefits to users in addition to providing an extremely high degree of confidence and trustedness. The systems and techniques have many uses including but not limited to secure document delivery, execution of legal documents, and electronic data interchange (EDI).Type: GrantFiled: August 4, 2000Date of Patent: November 28, 2006Assignee: Intertrust Technologies CorporationInventors: Karl L. Ginter, Victor H. Shear, Francis J. Spahn, David M. Van Wie, Robert P. Weber
-
Patent number: 7140039Abstract: A method for identifying a particular component of an electronic system that accesses a resource of the electronic system using electronic security value units is described. First, electronic security value units are selectively distributing to a plurality of components, such as to a client, of the electronic system. Next, a unique first association is created with each individual component to which the security electronic security value units are distributed. Further, upon a particular access to a resource, a unique second association is created between particular ones of security electronic security value units and the particular access to the resource. In addition, the unique second association is analyzed to determine which particular security electronic security value units were used to access the particular resource. Then, the first association of the particular security electronic security value units is analyzed to determine the identity of the component which accessed the resource.Type: GrantFiled: June 7, 2000Date of Patent: November 21, 2006Assignee: The Trustees of Columbia University in the City of New YorkInventors: Yechiam Yemeni, Danilo Florissi, Apostolos Dailianas
-
Patent number: 7136486Abstract: Content data (CD) and printer specifying information (PI) generated by encrypting a printer identifier to specify a printer capable of printing this content data (CD) are included in print job data to be transmitted from a content server (44) to a printer (36). The printer (36) which has received the print job data reads and decrypts the printer specifying information (PI) included in the print job data and judges whether the printer identifier included therein coincides with its own printer identifier or not. Only when both printer identifiers coincide, print of the print job data is executed. Hence, unjust copy print of content data can be prevented.Type: GrantFiled: August 27, 2001Date of Patent: November 14, 2006Assignee: Seiko Epson CorporationInventor: Kazuhito Gassho
-
Patent number: 7134021Abstract: According to the present invention, techniques, including a method and system, for restoring and/or validating data and/or associated signature log entries are provided. One embodiment of the present invention provides a method for validating a restored message, having an entry generated in a signature log for a message, where the entry includes cryptographic information associated with the message; Next, when said message is lost, the restored message is generated responsive to a request; and the restored message is validated using the signature log. In another embodiment a method for validating a selected log entry by using a signature log having a plurality of recorded log entries is provided. The method includes: computing a cryptographic value for the selected log entry; and determining if the cryptographic value is part of another recorded log entry.Type: GrantFiled: March 22, 2001Date of Patent: November 7, 2006Assignee: Hitachi, Ltd.Inventors: Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki
-
Patent number: 7124298Abstract: Method of and system for detecting a watermark in MPEG-2 encoded video data during high-speed copying of the video data. A bus spy (120) selects independently coded frames, such as I-frames, from the video data and feeds the selected frames to a watermark detector (130) for detecting a watermark therein. By only supplying some of the frames to the watermark detector (130), the average input data rate for the watermark detector (130) is much lower than the data rate during the high-speed copying. Various embodiments present various ways to efficiently supply the contents of the selected frames to the watermark detector (130).Type: GrantFiled: June 11, 2002Date of Patent: October 17, 2006Assignee: Koninklijke Philips Electronics N.V.Inventors: Jan Johannes Petrus Maria Beekmans, Frits Anthony Steenhof
-
Patent number: 7117368Abstract: A system allowing a participant to participate anonymously in a plurality of sessions but to be detected that the same participant has participated more than once in the same session is disclosed. The participant authorizes individual data using secret information depending on session-related information. The reception subsystem determines whether received data is anonymous participation data authorized by the participant subsystem and further determines whether anonymous signatures of arbitrary two pieces of anonymous participation data are signed by an identical participant subsystem. The anonymous signature may include data generated by raising a session-dependent base to a power dependent on the secret information.Type: GrantFiled: January 22, 2001Date of Patent: October 3, 2006Assignee: NEC CorporationInventor: Kazue Sako
-
Patent number: 7117363Abstract: A method, system, and apparatus for authenticating transactions and records is disclosed. A nonce stamp is a physical article that is relatively difficult to copy illicitly, and that bears a “nonce” number. The “nonce” is a relatively unique identifier, in that it is chosen from a distribution such that any given user/customer is extremely unlikely to obtain two nonce stamps bearing the same nonce. The method includes: presenting a nonce stamp having a nonce number; presenting a numbered digital certificate derived securely from the nonce number; and authenticating the transaction by comparing the number on the digital certificate and the nonce number. The digital certificate is typically obtained by users/customers in exchange for the purchase price of a desired transaction. The apparatus is an information-based indicium including a nonce stamp, and a digital certificate including a number derived securely from the nonce.Type: GrantFiled: September 9, 2002Date of Patent: October 3, 2006Assignee: SRI InternationalInventors: Patrick D. Lincoln, Natarajan Shankar
-
Patent number: 7111167Abstract: In some embodiments, the invention involves receiving remotely originating data (ROD) and creating a customized identification (CID) which is at least partially created through encrypting the ROD as a function of a platform key (PK) and a random number (RN) of a computer system receiving the ROD. Further, content is received which includes at least one watermark in which at least part of the CID is embedded. Authentication comparison data (ACD) is created which is at least partially created through decrypting data embedded in the watermark. In some embodiments, content includes first and second data sets, wherein the first data set is used to create a watermark key (WK) and the second data set is extracted utilizing the WK and the ACD includes at least part of the second data set.Type: GrantFiled: June 30, 2000Date of Patent: September 19, 2006Assignee: Intel CorporationInventors: Minerva M. Yeung, Shreekant S. Thakkar
-
Patent number: 7111170Abstract: A method and system that registers data carried by a watermark with a server, reads watermark data from a document and generates an action string if a watermark read from a document matches registered data. In one embodiment the system includes two servers. Registration is done on one server via the internet the registration data is sent to a second server. The second server is interrogated via a local area network (LAN) to determine if particular watermark data is registered. The LAN allows data carried on documents such as tickets to be authenticated very quickly. In a second embodiment, there are multiple registration servers, each of which registers a different sets of watermark data. The compartmentalization of data increases security and privacy of data.Type: GrantFiled: March 29, 2002Date of Patent: September 19, 2006Assignee: Digimarc CorporationInventors: William Hein, Geoffrey B. Rhoads
-
Patent number: 7107454Abstract: A user inputs identification information in a terminal, and generates identification information and bar code information about a signature program. A receiver reads the bar code information of the user using a bar code reader. The bar code reader executes a signature program, generates signature information containing the identification information of the user, and requests a certification device to verify the signature information.Type: GrantFiled: January 30, 2001Date of Patent: September 12, 2006Assignees: Fujitsu Limited, Sumitomo Mitsui Banking CorporationInventors: Nobuyuki Mori, Michihiro Miyasaka, Takayuki Yamaguchi
-
Patent number: 7107616Abstract: The present invention relates to a device (1) comprising an input for receiving an input; calculation means (P) for producing a response (OUTPUT) in response to the input (INPUT) and a secret key (A) by utilizing a first predetermined function (f), and an output (3) for feeding said response (OUTPUT) further. In order for an attacker not be able to find out the secret key, the device further comprises a memory (M) in which the key-specific number (RND) is stored, and means for retrieving the key-specific number (RND) from the memory (M) and for feeding it to the calculation means (P?) for carrying out predetermined calculation operations (f2) on the basis of the key-specific number (RND) when producing said response (OUTPUT).Type: GrantFiled: January 15, 2002Date of Patent: September 12, 2006Assignee: Setec OyInventor: Lauri Paatero
-
Patent number: 7089420Abstract: The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides an efficient means for the production of labels and verification of authenticity, whereby a recording apparatus which includes a recording medium, having anisotrophic optical domains, along with a means for transferring a portion of the recording medium to a carrier, wherein a bulk portion of the recording medium has macroscopically detectable anisotrophic optical properties and the detecting apparatus thereon.Type: GrantFiled: May 24, 2000Date of Patent: August 8, 2006Assignee: Tracer Detection Technology Corp.Inventors: David I. Durst, Norman Kaish, Jay Fraser
-
Patent number: 7080257Abstract: Oblivious checking of a digital good is performed by identifying a plurality of key instructions within a function of a digital good. Each key instruction is an instruction that possibly modifies a register or a flag. An extra instruction is then inserted into the function for each of the key instructions. The extra instructions each correspond to one of the key instructions and modify a register in a deterministic fashion based on the corresponding key instruction. A set of inputs to the function are then identified that result in different valid computation paths in the function being taken. A checksum for the function is then generated by using a mapping function which maps the contents of the register to the set of inputs.Type: GrantFiled: August 30, 2000Date of Patent: July 18, 2006Assignee: Microsoft CorporationInventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan
-
Patent number: 7076660Abstract: A method for copy protecting a record carrier is disclosed, in which method the copy protected record carriers are provided with a pattern of logical errors which cannot be corrected by the error correcting rules predefined for said record carrier. The pattern of logical errors represents access control information. The logical errors are generated during decoding the bit sequence read from the record carrier. Bit errors may be positioned in the bit sequence so as to counteract de-interleaving which is part of an error decoding process in a reading device and accumulate in error words which are uncorrectable. Also a method for detecting access control information and a retrieval arrangement are disclosed, which retrieval arrangement serves to detect the access control information by selecting at least one error location, but not all error locations on the record carrier, and verifying the presence of an error by reading the selected error location via the reading means.Type: GrantFiled: October 25, 2001Date of Patent: July 11, 2006Assignee: Koninklijke Philips Electronics N.V.Inventor: Peter A. Newman
-
Patent number: 7069441Abstract: A virtual private network (VPN) enrollment protocol gateway is described herein. The protocol gateway is implemented as a registration authority that operates as an intermediary between routers and a certificate authority, allowing routers operating in accordance with one protocol to obtain and maintain certificates for a VPN from a certificate authority operating in accordance with another protocol. In accordance with one aspect, the gateway protocol supports various requests from the router, including router enrollment requests, get certificate revocation list request, get certificate requests, get certificate authority certificate requests, and password requests.Type: GrantFiled: September 21, 2004Date of Patent: June 27, 2006Assignee: Microsoft CorporationInventors: Rudolph Balaz, Victor W. Heller, Xiaohong Su, Keith R. Vogel
-
Patent number: 7069250Abstract: A method and system for verifying a check that is being used for an on-line transaction, utilizes a hash code value either printed directly on the check, or obtained from an insert card provided by a check printer. To conduct an on-line transaction using a check, the customer enters in data obtained from a MICR line of the check, whereby the data includes a one-way hash value that is based on the data provided on the MICR line as well as private data not provided on the MICR line. A web server of an e-tailer for which the customer seeks to make the on-line transaction, receives the data entered by the customer. The web server of the e-tailer transmits, to a check verifier, the data entered by the customer. The check verifier verifies whether or not the check is valid, by comparing the hash code value entered in by the customer with a hash code value that is separately calculated by the check verifier, based on private data of the customer obtained by the check verifier from a database.Type: GrantFiled: October 15, 2001Date of Patent: June 27, 2006Assignee: Payformance CorporationInventors: William D. Meadow, Randall A. Gordie, Jr., Sanjay P. Ahuja
-
Patent number: 7069442Abstract: A method and apparatus for initiating secure operations in a microprocessor system is described. In one embodiment, one initiating logical processor initiates the process by halting the execution of the other logical processors, and then loading initialization and secure virtual machine monitor software into memory. The initiating processor then loads the initialization software into secure memory for authentication and execution. The initialization software then authenticates and registers the secure virtual machine monitor software prior to secure system operations.Type: GrantFiled: March 29, 2002Date of Patent: June 27, 2006Assignee: Intel CorporationInventors: James A. Sutton, II, David W. Grawrock
-
Patent number: 7065645Abstract: A visual tag having an imprinted image, a processor for calculating a response string corresponding to the content of the imprinted image and a challenge string, and a changeable screen to display the response string in machine-readable symbols. An authentication device reads the displayed symbols, and authenticates the displayed contents corresponding to the challenge string. The challenge string is generated either according to a random generator within the authentication device, or according to a real-time clock. A plurality of tags or objects can be authenticated and spotted within an image. The tag can also authenticate inputted messages and credentials.Type: GrantFiled: February 16, 2003Date of Patent: June 20, 2006Inventor: Mordechai Teicher
-
Patent number: 7051208Abstract: Apparatus and an accompanying method, for forming and embedding a highly tamper-resistant cryptographic identifier, i.e., a watermark, within non-marked executable code, e.g., an application program, to generate a “watermarked” version of that code. Specifically, the watermark, containing, e.g., a relatively large number of separate executable routines, is tightly integrated into a flow pattern of non-marked executable code, e.g., an application program, through randomly establishing additional control flows in the executable code and inserting a selected one of the routines along each such flow. Since the flow pattern of the watermark is highly intertwined with the flow pattern of the non-marked code, the watermark is effectively impossible to either remove from the code and/or circumvent. The routines are added in such a manner that the flow pattern of resulting watermarked code is not substantially different from that of the non-marked code, thus frustrating third party detection of the watermark using, e.Type: GrantFiled: October 21, 2004Date of Patent: May 23, 2006Assignee: Microsoft CorporationInventors: Ramarathnam Venkatesan, Vijay Vazirani
-
Patent number: 7046807Abstract: Data administration method which prevents the infringement of a copyright by encrypting and distributing digital content, and readily grasps which contents are contained in the digital content included in the data. Preparing symbol information symbolized so as to visually and auditorily recognize the contents of the digital content that conduct distribution (Step S12), embedding the symbol information in a header data section (Step S13), encrypting the digital content (Step S15), embedding consent information including the information on the contents key in the header data section as an electronic watermark (Step S16), and compositing the real data section and the consent-information-added header data section and distributing the composite data (Step S17).Type: GrantFiled: March 20, 2001Date of Patent: May 16, 2006Assignee: Fujitsu LimitedInventors: Hideyuki Hirano, Shinji Hashimoto, Eiki Hattori, Shigetoshi Mochizuki
-
Patent number: 7043473Abstract: A method for identifying a media file transmitted over a network includes creating a plurality of known media file identifiers, each for a respective one of a plurality of known media files, using an identifier generating algorithm, storing the known media file identifiers in a database, creating a media file identifier for an unknown media file with the identifier generating algorithm and comparing the media file identifier for the unknown media file with known media file identifiers in order to produce an identification of the unknown media file.Type: GrantFiled: November 20, 2001Date of Patent: May 9, 2006Assignee: Widevine Technologies, Inc.Inventors: Reza Rassool, William P. Worzel, Brian Baker
-
Patent number: 7007167Abstract: A watermarking system allowing an appended-type watermark to be easily inserted into a scaled-up/down image without deteriorating the detection accuracy of the appended-type watermark is disclosed. A first scaling factor of an input watermarked image is detected by detecting a copy control watermark from the input watermarked image. It is determined whether a watermark including a second scaling factor is detected from the input watermarked image. When the watermark including the second scaling factor fails to be detected, a second watermark including the first scaling factor is created and embedded into the input watermarked image and further an appended-type watermark is inserted into the input watermarked image. When the watermark including the second scaling factor is detected, the first and second scaling factors are used to calculate a third scaling factor, which is used to detect the appended-type watermark.Type: GrantFiled: November 21, 2001Date of Patent: February 28, 2006Assignee: NEC CorporationInventor: Shigeyuki Kurahashi
-
Patent number: 6996717Abstract: The semi-fragile watermark comprises a fragile watermark component and a robust watermark component. Features are extracted from the video stream and subsequent hashing and encryption processes are performed to generate the fragile watermark. The fragile watermark includes control data information at the block level as well as frame and group level information. The fragile watermark is added on top of the robust watermark, giving the system the ability to detect alteration at the block level as well as the group level. The resulting semi-fragile watermark has the advantage of being both sensitive to malicious attack while being robust enough to survive bit rate reduction and other types of manipulation typically performed on digital multimedia signals.Type: GrantFiled: May 24, 2001Date of Patent: February 7, 2006Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Peng Yin, Hong Heather Yu
-
Patent number: 6986049Abstract: A method and system is directed to providing authentication of a message, such as email, and the like, by combining Public Key encryption and the Internet Domain Name System (the “DNS”). A domain owner may validate that an email originates from an authorized sender within their domain by using a private key component to digitally sign email outbound from its domain. Employing a public key component, along with a selector, an email recipient may check the validity of the signature, and thus determine that the email originated from a sender authorized by the domain owner. In one embodiment, the public key component used to verify an email signature may be “advertised” or otherwise made available via a TXT record in the DNS.Type: GrantFiled: September 24, 2003Date of Patent: January 10, 2006Assignee: Yahoo! Inc.Inventor: Mark Delany
-
Patent number: 6950938Abstract: Disclosed is a service identification tag for being used in accessing an information transmission server on the Internet. The tag is formed combining an exclusive graphic pattern that can be recognized by a human, and an identification code that can be read by a reading unit. Also disclosed is a communications system having: a service server provided with an identification code/URL conversion table; an information transmission server provided with an information storage; and a terminal unit that is connected through a radio or wire communication network to the information transmission server, the terminal unit having a function for communicating with a Web server. The terminal unit makes a unique link to the service server, reads the identification code from a service identification tag, sends the identification code to the service server, and receives the URL information of the information transmission server corresponding to the identification code from service server.Type: GrantFiled: October 10, 2000Date of Patent: September 27, 2005Assignee: NEC CorporationInventor: Ryuhei Fujiwara
-
Patent number: 6938028Abstract: An image encrypting method, an image encrypting device, a recording medium on which image encrypting procedures are recorded, and a recording medium on which an encrypted image file is recorded are provided in order to be able to respond to a request for transmission of a portion of an image and improve a rate of processing image data, even when a device which stores the encrypted image file is not authorized to decrypt. An image inputting device reads an image file. An image portion unit dividing device divides a read image file into a portion image data of tile units. An encrypting device encrypts the portion image data. An identifier generating device generates information incidental to the portion image data. A file generating device generates a single image file from the incidental information and encrypted portion image data.Type: GrantFiled: September 21, 1999Date of Patent: August 30, 2005Assignee: Fuji Photo Film Co., Ltd.Inventor: Wataru Ito
-
Patent number: 6938157Abstract: A system can process a digital representation (DF) of a document with a one-way cryptographic hash function (CHF) to yield a digital fingerprint (DFP) value that is associated with the DF. A document identification number (DID) is created, uniquely associated with the DFP, and with DID and DFP are associated optional credential information (C). A registration certificate DFC that represents an optional electronic signature associated with the document and that includes the DID and DFP is promulgated and archived at a plurality of storage locations. The system can authenticate whether a putative document is the original document by generating a digital fingerprint value for the putative document and comparing it to DFP retrieved from various of the storage locations. Authentication can confirm that the electronic signature is unaltered.Type: GrantFiled: August 17, 2001Date of Patent: August 30, 2005Inventor: Jonathan C. Kaplan
-
Patent number: 6925448Abstract: A digital work recorded on a computer readable media for use within a system having at least one repository for enforcing use of digital content in accordance with usage rights associated with the digital content. The digital work includes digital content electronically recorded on a first media portion and being capable of being rendered by a rendering engine, and usage rights electronically recorded on a second media portion and being associated with the digital content. The usage rights specify a manner of use by which a repository will permit use of the digital content. The usage rights can be constructed of a grammar including symbols selected from a set of predetermined symbols which define a valid sequence of symbols that are interpreted by the repository to indicate the manner of use.Type: GrantFiled: July 14, 2003Date of Patent: August 2, 2005Assignee: ContentGuard Holdings, Inc.Inventors: Mark J. Stefik, Peter L.T. Pirolli
-
Patent number: 6907528Abstract: A method for authenticating a printed document is described. A document producer sends information to be included in a document to an authentication authority. The authentication authority cryptographically generates an authentication code from this information, and sends the authentication code back to the document producer. The document producer then prints the document, including both the information and the authentication code, and a bar code representing the authentication code. A document checker scans in the bar code, and cryptographically checks the authentication code against the information in the document.Type: GrantFiled: February 15, 2000Date of Patent: June 14, 2005Assignee: Fujitsu Services LimitedInventor: Michael George Bunn
-
Patent number: 6904524Abstract: Using know methods a digital signature, such as a one-way hash, of a document is produced. A digital representation of a signature is associated with the digital signature. The digital representation may be, for example, a digitized picture of the signature. Both the digital signature and the digital representation of the signature are sent to a recipient. The recipient may then view the digital representation of the signature and provide visual confirmation of the authenticity of the signature. In addition, the digital representation of the signature may be electronically analyzed to determine a match. The digital representation of the signature may then be shown to the recipient when the electronic analysis indicates an authentically signed document so as to provide a visual assurance of integrity.Type: GrantFiled: December 21, 1999Date of Patent: June 7, 2005Assignee: American Management Systems, Inc.Inventors: William L. Jaeger, Jr., M. Greg Shanton
-
Patent number: 6904525Abstract: A method for verifying the source of an article of manufacture. A label having information relating to the article is prepared and digitally signed or otherwise encrypted to authenticate the information. The label and a tangible representation of the digital signature or other encrypted information are then securely associated with the article. The information relating to the article can include verifying information such as an expiration date, unique identification of the article, identification of an authorized provider of the article or a description of the article to protect against unauthorized use of duplicate labels. The label can also include an unreproduceable pattern such as a pattern of magnetic fibers embedded in the label and a digitally signed description of the pattern.Type: GrantFiled: July 1, 1997Date of Patent: June 7, 2005Assignee: Pitney Bowes Inc.Inventors: William Berson, Claude Zeller
-
Patent number: 6892304Abstract: In accordance with one aspect of the current invention, the system comprises a memory for storing instruction sequences by which the processor-based system is processed, where the memory includes a physical memory and a virtual memory. The system also comprises a processor for executing the stored instruction sequences. The stored instruction sequences include process acts to cause the processor to: map a plurality of predetermined instruction sequences from the physical memory to the virtual memory, determine an offset to one of the plurality of predetermined instruction sequences in the virtual memory, receive an instruction to execute the one of the plurality of predetermined instruction sequences, transfer control to the one of the plurality of predetermined instruction sequences, and process the one of the plurality of predetermined instruction sequences from the virtual memory.Type: GrantFiled: October 3, 2000Date of Patent: May 10, 2005Assignee: Phoenix Technologies Ltd.Inventors: Leonard J. Galasso, Matthew E. Zilmer, Quang Phan
-
Patent number: 6889324Abstract: A digital measurement apparatus measures a physical measurement object, provides a digital signature of public-key cryptography to measured data of a thus-measured physical quantity, and manages the measured data. The apparatus generates at least a pair of a public key and a private key, to be used for the digital signature of the public-key cryptography, through a key generating algorithm.Type: GrantFiled: November 16, 1999Date of Patent: May 3, 2005Assignee: Ricoh Company, Ltd.Inventors: Yoichi Kanai, Masuyoshi Yachida
-
Patent number: 6862685Abstract: Disclosed is an optical disk barcode forming method wherein, as information to be barcoded, position information for piracy prevention, which is a form of ID, is coded as a barcode and is recorded by laser trimming on a reflective film in a PCA area of an optical disk. When playing back the thus manufactured optical disk on a reproduction apparatus, the barcode data can be played back using the same optical pickup.Type: GrantFiled: February 4, 2002Date of Patent: March 1, 2005Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Yoshiho Gotoh, Mitsuaki Oshima, Shinichi Tanaka, Kenji Koishi, Mitsuro Moriya
-
Patent number: 6857071Abstract: An editing apparatus generates a capsular work in which usage conditions for each of plural usages and usage secret information, obtained by encrypting a decryption key encrypted work data with ticket keys which differ depending on usage from each other, are encapsulated together with the encrypted work data. A ticket server apparatus, which manages the usage conditions and the ticket keys, issues a ticket containing a ticket key in the case of allowing a user to practice the usage requested by the user. A distribution center apparatus, which manages the capsular work, distributes the capsular work in accordance with the user's request. An audiovisual apparatus acquires the capsular work from the distribution center apparatus and requests the ticket necessary to make use of the capsular work from the ticket server apparatus.Type: GrantFiled: July 29, 1999Date of Patent: February 15, 2005Assignee: NEC CorporationInventor: Masayuki Nakae
-
Patent number: 6839434Abstract: A key update system uses information in an update message from a communications system to generate a new key and perform a bidirectional validation of the new key. After a unit validates the new key, at least a portion of information from the update message is used by the communications system to validate the new key. As a result, the communications system is not required to generate and transmit a separate authentication challenge to validate the new key. For example, a wireless communications system can send an update message with a sequence RANDSSD to the wireless unit. The wireless unit generates a new SSD using at least a portion of the sequence RANDSSD, and the wireless unit uses at least a portion of the new SSD to generate a signature value AUTHBS to validate the new key and thereby the home authentication center that initiated the update of the SSD.Type: GrantFiled: July 28, 1999Date of Patent: January 4, 2005Assignee: Lucent Technologies Inc.Inventor: Semyon B. Mizikovsky
-
Publication number: 20040268130Abstract: A method of authenticating an article includes the steps of, at an issuing station, selecting an inherent feature of the article and converting the feature into digital data to form an identification code for the article. An encryptor is used to encrypt the identification code utilizing a secret private key of an asymmetric encryption key pair and associated with the issuing party. The encrypted code is made available on a label accompanying the article. During a subsequent phase and at an authentication station, digital data relating to the feature is determined directly from the article and the code is decrypted utilizing a public key of the pair obtained from a third party in accordance with rules of a public key infrastructure. The determined data and the data relating to the feature retrieved from the decrypted code are compared to authenticate the article.Type: ApplicationFiled: August 3, 2004Publication date: December 30, 2004Inventor: Albertus Jacobus Pretorius
-
Patent number: 6834344Abstract: A method is presented for marking high-quality digital images with a robust and invisible watermark. It requires the mark to survive and remain detectable and authenticatable through all image manipulations that in themselves do not damage the image beyond useability. These manipulations include JPEG “lossy” compression and, in the extreme, the printing and rescanning of the image. The watermark also has the property that it can detect if the essential contents of the image has changed. The first phase of the method comprises extracting a digest or number N from the image so that N only (or mostly) depends on the essential information content, such that the same number N can be obtained from a scan of a high quality print of the image, from the compressed form of the image, or in general, from the image after minor modifications (introduced inadvertently by processing, noise etc.). The second phase comprises the marking.Type: GrantFiled: September 17, 1999Date of Patent: December 21, 2004Assignee: International Business Machines CorporationInventors: Gaurav Aggarwal, Pradeep K. Dubey, Ashutosh Kulshreshtha, Marco Martens, Charles P. Tresser, Chai W. Wu
-
Patent number: 6834346Abstract: A first information processing unit 100 stores identification information into a storage module 152, stores an encrypted contents signal into a mass storage unit 180, and supplies the encrypted contents signal and identification information to a second information processing unit 200 through a communication section 110. In a receiving unit 170 of the first information processing unit 100, log information generated by a purchase processing module 153 is stored into the storage module 152 every time the contents key is decoded, and the log information is transmitted at predetermined timing to a key management center 30 through the transmission section 110. The second information processing unit 200 receives the encrypted contents signal and the identification information through a communication section 210, and causes a contents processing section 260 to decode the encrypted contents signal and to append the identification information thereto.Type: GrantFiled: March 28, 2000Date of Patent: December 21, 2004Assignee: Sony CorporationInventors: Yoshihito Ishibashi, Tateo Oishi, Tomoyuki Asano, Yoshitomo Osawa
-
Patent number: 6832315Abstract: A method of labelling an article, including a) choosing a first character string comprising an identification number chosen to represent an article or a given class of articles, the character string comprising two or more characters, b) expressing each character in said character string as a binary number having seven or more binary digits, c) storing a sequence of binary numbers corresponding to said character string in a data store, and d) attaching the data store to, or incorporating the data store in, an article. The sequence of binary numbers is preferably generated by multiplication of the identification number by an integer, followed by conversion of the resultant number into a base 84 number. The data store preferably comprises anisotropic magnetic particles having a permanent non-random orientation in predetermined spaced regions.Type: GrantFiled: June 15, 2000Date of Patent: December 14, 2004Assignee: Thorn Secure Science LimitedInventor: Richard Waltham
-
Patent number: 6826687Abstract: The present invention provides methods and apparatus for generating a TCR-commitment having properties differing from the properties of a regular commitment. It provides solutions to the problem of packet authentication for multicast and other scenarios requiring fast, compact digital signature/commitment for E-commerce protocols. It also provides a relatively high level of security guarantees required for packet authentication in a way that can handle multiple independent flows, produces authentication fields of fixed size, works in the fully unreliable setting, does not require any packet delays and has the additional property of being able to withstand and smooth over irregular processor loading and bursty packet output rate. In an embodiment, it uses a hybrid approach consisting of the commiter/signer/bidder creating a certificate for the public key of an efficient k-time signature scheme using a regular signature key.Type: GrantFiled: April 14, 2000Date of Patent: November 30, 2004Assignee: International Business Machines CorporationInventor: Pankaj Rohatgi