Including Generation Of Associated Coded Record Patents (Class 713/179)
-
Publication number: 20040236951Abstract: Techniques for incorporating authentication information into digital representations of objects and using the authentication information to authenticate the objects. The authentication information may be made from information in one portion of the digital representation and incorporated into another portion of the digital representation that does not overlap the first portion. Where the digital representation is made into an analog form and that in turn is made into a digital representation and the second digital representation is verified, the two portions must further be non-overlapping in the analog form. The information from which the authentication information is made may exist at many levels: representations of physical effects produced by the object, representations of features of the object, codes that represent the object's contents, and representations of descriptions of the object. Also disclosed are a verification server and techniques for reducing errors by an OCR.Type: ApplicationFiled: June 14, 2004Publication date: November 25, 2004Inventor: Jian Zhao
-
Patent number: 6820200Abstract: An application program that was encrypted by using a predetermined secret key is input to an input section that is a part of a program execution system, and encrypted sentences as the encrypted application program are supplied to a decoding section as they are. The decoding section is supplied not only with the encrypted sentences from the input section but also with a publicized key corresponding to a secret key that was used in generating the encrypted sentences. The decoding section decodes the encrypted sentences by using the publicized key and supplies Java byte codes as a decoding result to a Java virtual machine. The Java virtual machine interprets and executes the Java byte codes that are supplied from the decoding section.Type: GrantFiled: April 24, 1998Date of Patent: November 16, 2004Assignee: Sony CorporationInventors: Akikazu Takeuchi, Shinji Nanba
-
Patent number: 6820201Abstract: A method, system, and apparatus for authenticating transactions and records is disclosed. A nonce stamp is a physical article that is relatively difficult to copy illicitly, and that bears a “nonce” number. The “nonce” is a relatively unique identifier, in that it is chosen from a distribution such that any given user/customer is extremely unlikely to obtain two nonce stamps bearing the same nonce. The method includes: presenting a nonce stamp having a nonce number; presenting a numbered digital certificate derived securely from the nonce number; and authenticating the transaction by comparing the number on the digital certificate and the nonce number. The digital certificate is typically obtained by users/customers in exchange for the purchase price of a desired transaction. The apparatus is an information-based indicium including a nonce stamp, and a digital certificate including a number derived securely from the nonce.Type: GrantFiled: August 4, 2000Date of Patent: November 16, 2004Assignee: SRI InternationalInventors: Patrick D. Lincoln, Natarajan Shankar
-
Publication number: 20040199774Abstract: A simple scheme is provided for server storage of private keys and certificates in a secure manner, thus solving the difficult problems of roaming certificates. A user can access his private keys and certificates from anywhere in the network. Despite that the server stores the user's private keys, the server must not be able to impersonate the user on a network or sign messages for the user. A scheme for truly secure transactions is also provided.Type: ApplicationFiled: April 7, 2003Publication date: October 7, 2004Inventors: Vasileios Zissimopoulos, Ognian Zdravkov Topalov
-
Patent number: 6799272Abstract: Method and system for authenticating a remote device are disclosed by an arrangement in which the remote device and an authentication center each contain an identical key code index, which includes a plurality of key code numbers. When a remote device identifies itself to the authentication center by sending identification information, the authentication center generates a first key using a portion of the received identification information and a first random number that specifies a first key code number. The remote device determines the first key code number from the first key. If the remote device recognizes the first key code number from among the stored plurality of key code numbers, the remote device generates a second key, which includes a second random number that specifies a second key code number, and a portion of the identification information. From the second key, the authentication center determines a second key code number.Type: GrantFiled: May 26, 1999Date of Patent: September 28, 2004Assignee: Lucent Technologies Inc.Inventor: Susumu Urata
-
Patent number: 6792539Abstract: The present invention provides a data processing method and apparatus capable of shortening the processing time required when editing previously encrypted track data. An example of a transfer of audio track data between a portable player and a storage device is provided. The track data is comprised of one or more parts, each of which in turn is comprised of a series of data blocks. Each block of the track data is encrypted prior to transfer using a block key. The block keys are determined in such a manner that subsequent editing of the track data which results in redistribution of the parts does not require full decryption of the data.Type: GrantFiled: March 14, 2000Date of Patent: September 14, 2004Assignee: Sony CorporationInventors: Tateo Oishi, Ryuji Ishiguro, Takumi Okaue, Nobuyuki Kihara, Teppei Yokota
-
Publication number: 20040153653Abstract: A method for preserving a digitally signed document (160) in a digital data preservation system (10). A secure preservation request (176) combines the document (160) with a preservation signature (174) that is generated using an identification mark (172) and the document's associated digital signature (168). Once the document (160) is authenticated by the digital preservation system vendor, both the document (160) and the identification mark (172) are recorded onto preservation media (210) in human-readable form.Type: ApplicationFiled: February 4, 2003Publication date: August 5, 2004Applicant: Eastman Kodak CompanyInventors: Vishwas G. Abhyankar, Victor C. Wong, Robert V. Reisch, Robert Breslawski, Robert S. Jones, Donald R. Williams, Robert B. Bayley, Badhri Narayan, Louis S. Horvath
-
Publication number: 20040128516Abstract: A computer-implemented system provides secure distribution of value-bearing instruments, such as coupons, tickets, gift certificates, money orders and traveler's checks. The distribution system involves three parties which are the consumer of the instrument, the supplier of the instrument and a security party which is referred to as a secure transaction service. The consumer registers with the secure transaction service for identity verification either before or after a transaction is initiated with the supplier products or services. Verification of the consumer's identity can be established at any required level. In one aspect of the system, the supplier provides the consumer with a confirmation token which the consumer must then provide to the secure transaction service together with identification information of the consumer, so that only the valid consumer can complete the transaction.Type: ApplicationFiled: May 9, 2003Publication date: July 1, 2004Inventors: Steve Atsushi Okamoto, Steven Miller Schattmaier, Tim Von Kaenel, Mike Todd Zeile
-
Patent number: 6757826Abstract: The present invention relates to a digital graphic signature system and methods for use in electronic commerce. The system comprises a document portion, including information relating to the document being executed, and a signature portion. The document portion and the signature portion may be encrypted and merged into a single object readily identifiable to an individual. The terminology “digital graphic signature” or “digigraphic signature” is utilized herein to describe the merged object. The digital graphic signature system of the present invention may be advantageously utilized in electronic transactions, including transactions over the internet and network systems. The digital graphic signature system of the present invention may also be advantageously utilized in conjunction with information banking and virtual wallets. Also disclosed is a digital graphic signet for transmitting a private communication.Type: GrantFiled: April 13, 1999Date of Patent: June 29, 2004Assignee: Citicorp Development Center, Inc.Inventor: Cris T. Paltenghe
-
Patent number: 6754823Abstract: A computer program product and method for installing downloaded software on a client system over a network is described. The product and method include generating an access key by receiving an installation key produced using a random number generated from a seed that is the value of a client system internal clock at the exact moment in time to the millisecond at which a software installation program was run on the client produce the access code by modulo combining the installation key and user name received by the client system.Type: GrantFiled: October 24, 2000Date of Patent: June 22, 2004Assignee: Kurzweil CyberArt TechnologiesInventors: Raymond C. Kurzweil, John A. Keklak, Jules A. Yasuna
-
Publication number: 20040117631Abstract: A method for reducing unauthorized use of software and selectively exchanging information includes designating software for protection and information exchange via one or more corresponding identifier(s) associated with the software. An identifier is detected by an authorized representative entity resident on a user computer, network, or device, remotely located relative to the user, or both. During first use/transfer of content designated for protection, the authorized representative generates a password or authentication code based on user system information and links the code to the content. Subsequent use/access to the content requires that the current system information at least partially match system information of the authorized system encoded in the authorization code or codes associated with the content.Type: ApplicationFiled: September 5, 2003Publication date: June 17, 2004Applicant: Z4 TECHNOLOGIES, INC.Inventor: David S. Colvin
-
Publication number: 20040111619Abstract: A system for securely vaulting, auditing, controlling and transferring electronic transferable records (TRs) with unique ownership, including at least one registry for registering the electronic transferable record with unique ownership in a TR registry record; at least one secure storage manager (SSM) associated with the registry, the SSM storing the transferable record registered in the registry as an authoritative copy, the secure storage manager being distinct from said registry. The transferable record can be transferred in a transaction between an originating party and a receiving party with a transaction descriptor including information about the parties involved in the transaction and an identification of the TR being transferred. The transaction descriptor is initially signed by the originating party with the TR, subsequently verified and countersigned by the registry and signed by said accepting party.Type: ApplicationFiled: June 17, 2003Publication date: June 10, 2004Applicant: Silanis Technology Inc.Inventors: Michael Laurie, Robert Al-Jaar, Oleksiy Savchenko
-
Patent number: 6748362Abstract: A novel process and system for enabling the seamless and facile embedding of relatively large quantities of supplemental digital data into pre-prepared digital media files (audio, image, video, 3D, volumetric and multimedia and the like) by compressing such files and encoding them into sets of coefficient representations (preferably frequency-domain coefficient representations) of the pre-prepared media file information, and embedding bits of the supplemental digital data at selected coefficients, preferably, though not exclusively, using the least significant bit of the selected coefficients, and with stenographic encoding processes.Type: GrantFiled: September 3, 1999Date of Patent: June 8, 2004Inventors: Thomas W. Meyer, Josslyn Motha Meyer
-
Patent number: 6748533Abstract: A method, an apparatus and a computer program product are disclosed for protecting the legitimacy of an article (100), and in particular an electronic document, against forgery or fraud. Such articles include passports, credit cards, bank notes, lottery tickets, secure forms. The method includes the following steps: several watermarks (204, 224, 244) are generated independently (304, 306, 308) by different cryptographic watermarking mechanisms controlled utilising information permanently associated within the article or product (100); and each watermark is embedded in a linked cryptographic manner (160, 162, 164). Subsequently, the watermarks can be scanned and digitised (410). The authenticity of the article (100) can be determined by verifying the correctness of extracted watermarks and the encryption links (160, 162, 164) among them. Also disclosed is a method of embedding an invisible watermark (714) in an official seal (712) incorporated in an electronic article or document (700).Type: GrantFiled: December 2, 1999Date of Patent: June 8, 2004Assignee: Kent Ridge Digital LabsInventors: Jiankang Wu, Qibin Sun, Huijie Robert Deng
-
Publication number: 20040093501Abstract: The Common Point Authoring system functions to provide Livestock Informational Objects via the use of a centralized repository of uniquely identified, immutable Livestock Informational Objects. This system automates the authoring, maintenance and distribution of the Livestock Informational Objects by using an Internet-based paradigm and a centralized repository of uniquely-identified, immutable Data Elements. The Common Point Authoring system provides a set of software modules that the manufacturers can use to author, maintain and distribute Livestock Informational Objects and their customers, as Members of the system of Livestock Informational Objects, can use to retrieve, maintain and distribute the Livestock Informational Objects. The system's interconnectivity allows for the use of an Internet-based paradigm for the purchase and sale among Members of the system of Livestock Informational Objects as commodities, and for reducing the burden costs among Members of compliance with government regulations.Type: ApplicationFiled: October 10, 2003Publication date: May 13, 2004Inventors: Steven L. Holcombe, Marvin L. Stone, Kathleen D. Legako
-
Patent number: 6731774Abstract: The present invention relates to an information adding apparatus and method for adding information as a watermark to an image. Particularly, the invention is characterized in that a unit watermark pattern having a size corresponding to a small region made of vertical×horizontal=M×N (M and N are respectively a positive integer) pixels of a part of an image is generated, a repetitive watermark in which the unit watermark pattern from a unit watermark pattern generator is repeated vertically and horizontally is generated, checking is performed against the repetitive watermark, a watermark is added to the image, and in the unit watermark pattern generator, the size of the unit watermark pattern is determined such that at all resolutions expected that resolution conversion for the image is performed, each of the vertical and horizontal sizes of the unit watermark is integer times as large as a size of an encoded block at image encoding.Type: GrantFiled: November 30, 1999Date of Patent: May 4, 2004Assignee: Sony CorporationInventors: Kazuhisa Hosaka, Nobuyoshi Miyahara, Yoichi Yagasaki
-
Patent number: 6728882Abstract: Disclosed is an optical disk barcode forming method wherein, as information to be barcoded, position information for piracy prevention, which is a form of ID, is coded as a barcode and is recorded by laser trimming on a reflective film in a PCA area of an optical disk. When playing back the thus manufactured optical disk on a reproduction apparatus, the barcode data can be played back using the same optical pickup.Type: GrantFiled: February 20, 2002Date of Patent: April 27, 2004Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Yoshiho Gotoh, Mitsuaki Oshima, Shinichi Tanaka, Kenji Koishi, Mitsuro Moriya
-
Patent number: 6725371Abstract: A secure packet processor includes a buffer, a cryptographic engine and an authentication engine. The buffer is adapted to receive a secure packet that includes encrypted data and indicates an authentication signature. The cryptographic engine is adapted to decrypt the encrypted data to produce an indication of second data. The authentication engine is adapted to use the encrypted data to validate the signature concurrently with the decryption of at least a portion of the decrypted data. The authentication engine and the cryptographic engines may also be adapted to concurrently validate and encrypt data of an unsecure packet.Type: GrantFiled: June 30, 1999Date of Patent: April 20, 2004Assignee: Intel CorporationInventors: Frank C. Verhoorn, III, Jonathan Lo
-
Patent number: 6725373Abstract: A method for generating a signed manifest includes referencing an object. A metadata name is recorded. A digest algorithm is recorded. An integrity value that belongs to the object that corresponds to the metadata subject name is digested with the digest algorithm.Type: GrantFiled: March 25, 1998Date of Patent: April 20, 2004Assignee: Intel CorporationInventors: John M. Carbajal, Gary Graunke, Carlos Rozas
-
Patent number: 6724913Abstract: A watermarking method and device to embed a digitized watermark into a digital image file in the transformation domain is disclosed. In the watermarking technology of this invention, the digitized watermark is first error corrected to enhance its robustness. The digital image file to be embedded with the digitized watermark is first processed such that capacity of each element of the digital image file is calculated. The capacity of an element of the digital image file represents the highest value of tolerance for an element of the watermark to be added to the said element of the digital image file. Elements of the digital image file to which watermark elements may be added are selected and their addresses are recorded. The selected elements are then modulated so that they are suited to be embedded with elements of the digital watermark. After modulation the digitized watermark is embedded into the digital file by distributing the modulated elements of the watermark into the selected addresses.Type: GrantFiled: September 21, 2000Date of Patent: April 20, 2004Inventors: Trista Chen, Wen-Hsing Hsu
-
Patent number: 6701434Abstract: Methods, apparatus and computer products provide solutions to the problem caused by the slow speed of public key signature algorithms. The solutions also solve problems of packet authentication for multicast and other scenarios requiring fast, compact digital signatures. Security guarantees required for packet authentication are provided in a way that can handle multiple independent flows, produces authentication fields of fixed size, works in the fully unreliable setting, does not require any packet delays and has the additional property of being able to withstand and smooth over irregular processor loading and bursty packet output rate. One aspect of the present invention uses a hybrid approach consisting of the signer creating a certificate for the public key of an efficient k-time signature scheme using a regular signature key. The signer then signing up to k messages with the private key corresponding to k-time public key.Type: GrantFiled: May 7, 1999Date of Patent: March 2, 2004Assignee: International Business Machines CorporationInventor: Pankaj Rohatgi
-
Publication number: 20040039917Abstract: Embodiments of the present invention encompass systems and methods for use in identity authentication. One illustrative application is in the context of authenticating the identity of a subject by verifying items of identifying information stored by, or accessible through, a plurality of data sources. In particular, a multi-item query can be presented to multiple data sources and the results of the query can be combined into an overall composite result that can be used to authenticate the subject's identity.Type: ApplicationFiled: May 29, 2003Publication date: February 26, 2004Inventor: David Justin Ross
-
Publication number: 20040034788Abstract: This process for biometric intellectual property protection and verification uses the science of combining “keystroke dynamics” and a “copy protection key” generated by this keystroke dynamic methodology and embedding it into intellectual property to prevent unauthorized licensors or persons from accessing copy-protected intellectual property or documents. As the “authorized licensor's or person's protection key” is typed or entered, timing measurements taken between each keystroke or character input are applied to define a “biometric signature” or “template” of the authorized licensor or person. This “signature or template” is then embedded into the intellectual property and would require the proper signature to access the intellectual property “as defined” by the owner of the intellectual property.Type: ApplicationFiled: August 15, 2002Publication date: February 19, 2004Inventor: Gordon Alfred Ross
-
Patent number: 6687824Abstract: Digital image encoding/decoding apparatus and methods for recording a signature image using watermarking, and for restoring the recorded signature image are provided.Type: GrantFiled: July 1, 1999Date of Patent: February 3, 2004Assignee: Samsung Electronics Co., Ltd.Inventor: Hyun-doo Shin
-
Publication number: 20040019791Abstract: Codes are randomly generated for objects. There is no relationship between the object and the code assigned to the object. The only meaning to the code is in the association between the code and the object in a database. The service supports requests for new codes for objects, and for inquiries about codes (either existing or not). An inquiry about a code returns information stored in the database associated with an object associated with the code.Type: ApplicationFiled: July 21, 2003Publication date: January 29, 2004Applicant: Congruence, LLCInventor: Garry R. Whyte
-
Publication number: 20040019792Abstract: A method for assigning an identification barcode to a party desiring identity verification. A barcode request signal is received from the party, including a sender number of the party, and a barcode is generated for the party. The generated barcode is transmitted to the party. An assigning device is provided for assigning barcodes, and an identity verifying method and an identity verifying device are provided for utilizing such barcodes.Type: ApplicationFiled: July 25, 2003Publication date: January 29, 2004Applicant: Jeness CorporationInventors: Yoshihisa Funamoto, Mitsuo Takamura, Yukio Yanagi
-
Patent number: 6683957Abstract: Digital image coding/decoding apparatus using watermarking, and methods thereof are provided.Type: GrantFiled: July 1, 1999Date of Patent: January 27, 2004Assignee: Samsung Electronics Co., Ltd.Inventor: Hyun-doo Shin
-
Patent number: 6683966Abstract: A watermark embedder transforms a media signal from its perceptual domain to frequency domain regions and embeds a hash of data from one frequency domain region into a watermark in another frequency domain region. Alternatively, it encodes instances of the same message into the frequency domain regions. To detect alteration of the media signal, a watermark decoder transforms a suspect signal into the frequency domain regions, extracts the watermark message from a first frequency domain region and compares it with a reference derived from another frequency domain region. The reference signal is either a hash computed from the other frequency domain region of the watermarked signal, or another instance of the same message embedded into the other frequency domain region. The decoder can be used to detect alteration of the signal, such as alteration that occurs with reproduction (printing, scanning, copying, D/A-A/D conversion, etc.), compression, cropping or swapping of media signal content, etc.Type: GrantFiled: October 11, 2000Date of Patent: January 27, 2004Assignee: Digimarc CorporationInventors: Jun Tian, Stephen K. Decker, Hugh L. Brunk
-
Publication number: 20040015699Abstract: Identification and contact information is captured and verified for dissemination. Electronic scals that identify an originator or author of an electronic message or document are inserted in the message or document. The seal forms an identification card for the originator or author based upon the verified contact information. A recipient or viewer of the message or document can view, in the message or document, the embedded seal that comprises a graphic and associated text. A network hyperlink reference from the seal to a server displays a seal verification page. The seal verification page comprises contact information for the originator or author, and other details such as those relating specifically to the message or document. The verified contact information is also used to provide a secure directory of contact information and a facility for printing business cards.Type: ApplicationFiled: July 21, 2003Publication date: January 22, 2004Inventors: Christopher Field Thomas, Steven Michael Giddings, Ellis Brover, Richard Gilbert Crothers
-
Publication number: 20040015700Abstract: Attestation label system for marking and checking the licensed legal status of products, wherein the products (3) are provided with respective attestation labels (10) before they are brought into sale, the affixed attestation label (10) cannot be removed from the associated product (3) without being injured, the surface of the attestation labels (3) comprise structures rendering copying and reproduction very difficult and a code field (14) divided into a first and a second domain (12, 13), the first domain (12) comprises a code characteristic to the owner of rights (1) and/or to the limitations of the license, and the second domain (13) comprises an individual code characteristic to the particular product (3) associated with the attestation label (10).Type: ApplicationFiled: April 15, 2003Publication date: January 22, 2004Inventor: Imre Kokenyesi
-
Publication number: 20040003256Abstract: A method and system for providing external user interfaces is described. In one configuration a co-located external processor and a business machine negotiate a communications connection. The co-located external processor then utilizes a server to determine a shared secret in order to pair a wireless connection with the business machine in order to act as the user interface for the business machine. In another configuration, the co-located external processor is connected to a remote data center that authenticates the user and provides the user interface code and secret pairing information to the co-located external processor. In another configuration, the co-located external processor performs data processing for providing a cryptographically processed print stream to a postage meter.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Applicant: Pitney Bowes Inc.Inventors: Jean-Hiram Coffy, Edilberto I. Salazar
-
Printed-matter issuing managing system, printed-matter verifying device and contents managing device
Publication number: 20030217274Abstract: A printed-matter issuing client takes out contents from a contents management server, and prints the contents on a printing recording part, while at the same time records ID information indicative of a storage location of the contents into an IC chip integrated into the printing recording part. A printed-matter verifying client reads out an image to be verified on a printing surface of a printing recording part, by an information acquiring part, and acquires ID information from the IC chip. The printed-matter verifying client takes out contents from the contents management server according to the ID information, and verifies it with the image on the print surface, and it judges whether the printing recording part is true or false on the basis of the verifying result.Type: ApplicationFiled: December 16, 2002Publication date: November 20, 2003Applicant: FUJI XEROX CO., LTD.Inventor: Ikutaroh Nagatsuka -
Publication number: 20030208681Abstract: A method and system of enforcing file authorization access. The method may include generating an authorization combination at a metadata server and encrypting the authorization combination. The authorization combination may include a block combination including a block list for accessing user requested data from a storage server system and an authorization prefix. The authorization prefix may indicate at least one operation which the user requesting data access is authorized to perform. The method may further include receiving the encrypted authorization combination at the storage server, and decrypting the encrypted authorization combination to recover the block list for retrieving the user requested data.Type: ApplicationFiled: May 6, 2002Publication date: November 6, 2003Inventors: Daniel A. Muntz, Zheng Zhang, Baila Ndiaye
-
Publication number: 20030208680Abstract: A data distribution system is provided which supplies customers with an executable for requested secured data files to provide the customer with fulfillment software, obviating the need for the customer to download fulfillment software prior to requesting secure data. The data distribution system is characterized by server technology which can dynamically encrypt secured data files just prior to a customer request to download the data file. A framework for building a universal data distribution infrastructure is provided which employs Requesters.Type: ApplicationFiled: April 22, 2002Publication date: November 6, 2003Inventors: Shannon Byrne, Innes Muecke, Andrew Patterson, David Slik
-
Publication number: 20030206633Abstract: An image decrypting apparatus derives spectral reflectance of the face of an original on the basis of obtained original image data, built-in light source data and basis function data, and obtains weighted coefficients of each pixel as object color component data. The apparatus stores a file including the basis function data used at the time of obtaining the spectral reflectance as a key file, and stores a file including the object color component data as an encrypted file. From each of the key file and the encrypted file, the original image data cannot be reproduced. By using the key file and the encrypted file in a correct combination, the original image data can be reproduced. In such a manner, the original image data can be protected.Type: ApplicationFiled: May 1, 2003Publication date: November 6, 2003Applicant: MINOLTA CO. LTD.Inventor: Fumiko Uchino
-
Publication number: 20030200440Abstract: In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using a symmetric cipher, in a manner that allows only one or more target programs to be able to obtain the data from the ciphertext. In accordance with other aspects, a bit string is received from a calling program. An identifier of the calling program is checked to determine whether the calling program is allowed to access data encrypted in ciphertext of the bit string. The integrity of the data is also verified, and the data is decrypted using a symmetric key. The data is returned to the calling program only if the calling program is allowed to access the data and if the integrity of the data is successfully verified.Type: ApplicationFiled: April 4, 2003Publication date: October 23, 2003Inventors: Paul England, Marcus Peinado
-
Publication number: 20030196094Abstract: The invention comprises a combined public and private hashing scheme for authenticating the content of a distributed database. The public portion of the scheme is as performed in the prior art. When a portion of content is submitted to the database, a hash is computed using a publicly distributed hashing algorithm and a publicly distributed key, if a key is needed. The computation of the hash may be performed either by a registry computer system or the computer system of the individual submitting the content. Once the hash is computed, it is associated with the submitted content. Subsequent users of the submitted content can then authenticate the content locally, by computing a hash using the publicly available algorithm, and comparing the hash obtained to the hash associated with the content.Type: ApplicationFiled: November 6, 2002Publication date: October 16, 2003Inventors: W. Daniel Hillis, Bran Ferren
-
Patent number: 6631198Abstract: A perceptual model performs an analysis of a media signal, such as an image or audio signal. The model may be used in media signal processing applications such as digital watermarking and data compression to reduce perceptibility of changes made to code the signal. For image applications, the model computes the sensitivity of an image to changes based upon local image contrast, while taking into account the sensitivity of connected directional edges. By comparing the local image strength of various directionally filtered versions of the image, the model creates a directional control vector. This control vector may be used to reduce changes to an image in text and edge regions, and thus, avoid perceptible artifacts in those regions. The model takes into account the local contrast of the image and the directional control vector to create a gain vector. Using the local contrast measurements, the model follows the eye's nonlinear response to contrast discrimination.Type: GrantFiled: June 19, 2000Date of Patent: October 7, 2003Assignee: Digimarc CorporationInventors: Brett T. Hannigan, Brett A. Bradley, Alastair M. Reed
-
Patent number: 6611608Abstract: A method and apparatus of hiding identification data in visual media. When image or video data is received, frequency masking is performed to divide the image or video data into blocks of smooth regions and blocks of non-smooth regions and to obtain preliminary just-noticeable-difference. Edge detection is performed to divide the non-smooth region of the image or video data into texture blocks and edge blocks. Then blocks of regions that are substantially proximate to blocks of smooth regions of the image or video data are determined. The image or video data is then adjusted by applying different strength of watermark in association with the type of each block.Type: GrantFiled: October 18, 2000Date of Patent: August 26, 2003Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Min Wu, Hong Heather Yu
-
Publication number: 20030145209Abstract: A system and method is provided for securely duplicating digital documents of disparate types, such that there is a cryptographically secure link between the duplicate and the original. The system also provides each document with a serial number that is both sequential with all other copied documents and cryptographically linked with the document itself, and which includes verifiable proof against tampering and modification. The system further produces copies of documents in a canonical format suitable for indexing and searching using automated processing tools.Type: ApplicationFiled: January 31, 2002Publication date: July 31, 2003Inventors: Myron Eagle, Michael Prounis
-
Patent number: 6600823Abstract: The invention is a method for creating a self-authenticating value document at a senders location and for verifying it at a receivers location. At the senders location a document is created having a machine readable data field, a taggant containing extractable first tag data, and a storage medium with clear text data and the first tag data extracted from said taggant written on it. The clear text, first tag data and data from a machine readable data field collectively make up a document message. The document message is hashed with a hashing algorithm to create a first message digest. The first message digest is digitally signed with a private key to create a digital signature which is written on the storage medium in addition with the clear text data, and the first tag data.Type: GrantFiled: October 16, 1997Date of Patent: July 29, 2003Assignee: Unisys CorporationInventor: Thomas D. Hayosh
-
Patent number: 6601172Abstract: In a computer network, documents are produced, the document is hashed to produce a fingerprint, and the fingerprint is encrypted to sign the document then the document signature is transmitted from the user system to a secure computer system. The secure computer system creates a time stamp including the document signature and a digital time. The secure system signs the time stamp to verify its origin. The time stamp and notary's signature are transmitted from the secure system to the user's system. The user has access to the notary's public key which is used for determining whether the time stamp is authentic. Then, if the document is revised, the revised document is hashed and the hash is combined with an indication that the revision is related to the original document. The indication could be a hash of the original document, the original document signature, the notary's time stamp for the original document, or the notary's signature for the original document.Type: GrantFiled: December 31, 1997Date of Patent: July 29, 2003Assignee: Philips Electronics North America Corp.Inventor: Michael Epstein
-
Patent number: 6591009Abstract: To deeply encrypt and embed auxiliary information into image data, table generation means generates a table, based on a quantization error which occurs when image data S0 is converted from a first color space, to which the image data S0 belongs, to a second color space that is a destination of conversion. The table represents which color coordinate of a second color space a color coordinate of a first color space is mapped onto. In coding means, information H0 to be embedded is coded by referring to the table, whereby coded auxiliary information H1 is obtained. When the image data S0 is converted in color conversion means, the auxiliary information H1 is embedded into the quantization error, whereby image data S1 embedded with the auxiliary information H1 is obtained.Type: GrantFiled: July 28, 1999Date of Patent: July 8, 2003Assignee: Fuji Photo Film Co., Ltd.Inventors: Yoshinori Usami, Akira Yoda
-
Publication number: 20030115470Abstract: Apparatus, methods, and articles of manufacture consistent with the present invention provide a check validation scheme wherein a payor's signature is digitized, encrypted and embedded on the front of the check using glyphs. When the payor seeks to convert a blank check into a negotiable instrument, the user fills out the check and signs it. When the check is presented to a bank for payment, a teller using a decoding device, decodes and decrypts the digitized signature such that a human-readable image of the digitized signature can be seen on a screen for comparison with the payor's scripted signature. If the two signatures are identical, the check is honored.Type: ApplicationFiled: December 14, 2001Publication date: June 19, 2003Inventors: Steve B. Cousins, Jeff Breidenbach, Rangaswamy Jagannathan
-
Patent number: 6580804Abstract: Predetermined information as a digital watermark is encoded near or substantially on edges of digital images. The application of this technique is particularly suited for binary images such as text since the embedded digital watermark does not significantly affect the appearance of the text. The embedded digital watermark is decoded to confirm the origin of the digital image even if only a portion of the original digital image is copied.Type: GrantFiled: August 5, 1999Date of Patent: June 17, 2003Assignee: Ricoh Co., LTDInventor: Yasushi Abe
-
Patent number: 6570989Abstract: To provide a cryptographic processing apparatus that cryptographically processes input data using substitution table data to generate output data. A storing unit stores (2{circumflex over ( )}N) sets of substitution data that each have a predetermined number of bits, where N is an integer no less than 2. A dividing unit divides the input data which is (N×M) bits long into M sets of N-bit subdata, where M is an integer no less than 2. A substituting unit receives an input that is any of: the M sets of N-bit subdata; and at least one set of N-bit input merged data generated by performing a merge process on the M sets of N-bit subdata, specifies one of the (2{circumflex over ( )}N) sets of substitution data in the storing unit for each N bits of the input, and outputs the set of substitution data specified for each N bits of the input.Type: GrantFiled: April 21, 1999Date of Patent: May 27, 2003Assignee: Matsushita Electric Industrial Co., Ltd.Inventors: Motoji Ohmori, Kaoru Yokota
-
Patent number: 6570997Abstract: An image processing method comprises the steps of developing coded data into image data by analyzing them, at the same time, creating the positional information within one display of the image data, discriminating the area to embed a pattern that indicates a specific addition information therein in accordance with the kind of image data and the positional information created in the development step at the time of development, and embedding the information hardly discriminately by eye-sight in the area discriminated in the discrimination step.Type: GrantFiled: March 19, 1999Date of Patent: May 27, 2003Assignee: Canon Kabushiki KaishaInventor: Yasutaka Noguchi
-
Patent number: 6564322Abstract: A watermark in the form of an added message is attached to a digital recording so that a significant content of the recording is completely unchanged by the process in the sense that any reader commonly used for such recording will extract from the recording exactly what would have been extracted in the case the added message had not been attached. This is done by hiding the added message in the error correcting code (ECC) for the significant content of the recording.Type: GrantFiled: January 26, 1999Date of Patent: May 13, 2003Assignee: International Business Machines CorporationInventors: David H. Jameson, Charles P. Tresser, Chai W. Wu, Steven R. Abrams, Shmuel Windgrad
-
Patent number: 6560709Abstract: An apparatus and method for the secure transmission of credit card data over an Internet connection. The apparatus includes a card reader for reading credit card data and is adapted for connecting to a network device, such as a personal computer. The card data are encrypted in an encryption circuit and transmitted over an Internet connection. The network device is unable to read the card data and so programs running on the network device cannot surreptitiously record the card data and later transmit it to a data thief. The isolation of the network device and the card reader provides for the secure and direct transmission of card data to the intended electronic merchant.Type: GrantFiled: April 30, 1999Date of Patent: May 6, 2003Assignee: 3Com CorporationInventor: David J. Galovich
-
Publication number: 20030084346Abstract: An apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment are described. The method includes disregarding a received load secure region instruction when a currently active load secure region operation is detected. Otherwise, a memory protection element is directed, in response to the received load secure region instruction, to form a secure memory environment. Once directed, unauthorized read/write access to one or more protected memory regions are prohibited. Finally, a cryptographic hash value of the one or more protected memory regions is stored within a digest information repository as a secure software identification value. Once stored, outside agents may request access to a digitally signed software identification value in order to establish security verification of secure software within the secure memory environment.Type: ApplicationFiled: November 1, 2001Publication date: May 1, 2003Inventors: Michael A. Kozuch, James A. Sutton, David Grawrock, Gilbert Neiger, Richard A. Uhlig, Bradley G. Burgess, David I. Poisner, Clifford D. Hall, Andy Glew, Lawrence O. Smith, Robert T. George