Including Generation Of Associated Coded Record Patents (Class 713/179)
-
Patent number: 10158646Abstract: A system and method provides access to one or more web services requested from a web site by using an app on a smart device, such as a smart phone or tablet, or the smart device itself.Type: GrantFiled: October 10, 2017Date of Patent: December 18, 2018Assignee: Charles Schwab & Co., Inc.Inventors: Jay Desai, Konstantinos P. Konstantinides, Suwat Phruksawan, Toby R. Kendall, Patrick C. McGraw, Dominic E. Caudell, Valery Zubovsky, Charles E. Gotlieb
-
Patent number: 10146924Abstract: Systems and methods for authenticating a biometric device using a trusted coordinating smart device in accordance with embodiments of the invention are disclosed.Type: GrantFiled: December 14, 2017Date of Patent: December 4, 2018Assignee: FotoNation LimitedInventor: Peter Corcoran
-
Patent number: 10110614Abstract: One or more DNS services are provided that are configured to not only tolerate some commonly observed DNSSEC misconfigurations (while still providing DNSSEC's security guarantees), but also provide a more intelligent DNS resolution process informed by DNSSEC.Type: GrantFiled: July 28, 2016Date of Patent: October 23, 2018Assignee: VERISIGN, INC.Inventors: Burton S. Kaliski, Jr., Eric Osterweil
-
Patent number: 10032325Abstract: Disclosed herein are systems and methods for generating a signature on a card. The computer may present a user interface on a touch device having a bounding box that is specified by a width and height representative of a space on the card. The computer may receive signature data generated by an input stroke on the touch device. The computer may determine from the signature data coordinates of a signature represented by the input stroke. The computer may generate a set of points representing a curvature of the input stroke. The computer may scale the set of points such that the coordinates are maximized within the space. The computer may convert the scaled set of points from a vector format to a raster format. The raster formatted scaled set of points in the space may be imprinted on the card.Type: GrantFiled: December 16, 2016Date of Patent: July 24, 2018Assignee: Square, Inc.Inventors: Peter Westen, Robert Andersen
-
Patent number: 10020936Abstract: Systems and methods for securing or encrypting data or other information arising from a user's interaction with software and/or hardware, resulting in transformation of original data into ciphertext. Generally, the ciphertext is generated using context-based keys that depend on the environment in which the original data originated and/or was accessed. The ciphertext can be stored in a user's storage device or in an enterprise database (e.g., at-rest encryption) or shared with other users (e.g., cryptographic communication). The system generally allows for secure federation across organizations, including mechanisms to ensure that the system itself and any other actor with pervasive access to the network cannot compromise the confidentially of the protected data.Type: GrantFiled: April 3, 2017Date of Patent: July 10, 2018Assignee: Ionic Security Inc.Inventors: Adam Ghetti, James Jordan, Kenneth Silva, Jeremy Eckman, Robert McColl, Ryan Speers
-
Patent number: 9930071Abstract: Policy-based client-server systems and methods for attestation in managing and securing mobile computing devices. Attestation provides the means to make efficient, secure, and reproducible use of knowledge possessed by trusted expert parties and authorities within the expression and enforcement of policies for controlling use of, and access to, onboard software and hardware, network capabilities, and remote assets and services. Aspects of secure attestation of applications that use shared and dynamically loaded libraries are presented, as well as potential business models for attestation used in such a policy-based system. The system of the present invention resolves attestation record conflicts using digital certificates and digital signatures.Type: GrantFiled: May 18, 2016Date of Patent: March 27, 2018Assignee: Sequitur Labs, Inc.Inventors: Philip Attfield, Paul Chenard, Simon Curry, Vincent Ting, Mark Reed, David Baar
-
Patent number: 9917846Abstract: An improved technique identifies risky transactions by mapping raw user location data to a particular cell in a fixed grid. Along these lines, when a user initiates a transaction with a service provider over a mobile device, the service provider collects raw location data such as a latitude and longitude for the user and transmits the location data to an adaptive authentication server. The adaptive authentication server then accesses a fixed set of geographical areas overlaid on a map of the Earth. For example, the geographic areas can correspond to square cells whose corners are defined by selected latitudes and longitudes. The adaptive authentication server finds a particular geographical area which contains the latitude and longitude for the user. Based on an identifier of the particular geographical area, the adaptive authentication server assigns a risk score to the transaction.Type: GrantFiled: December 30, 2011Date of Patent: March 13, 2018Assignee: EMC IP Holding Company LLCInventors: Triinu Magi Shaashua, Harel Efraim, Ayelet Levin
-
Patent number: 9773101Abstract: An electronic device is provided. The electronic device includes an output module, a sensing module, and a processor. The output module is configured to output contents. The sensing module is configured to obtain at least one of user information and environment information. The processor is configured to control an operation of the electronic device in response to at least one of the user information and the environment information depending on an attribute of the contents.Type: GrantFiled: October 21, 2016Date of Patent: September 26, 2017Assignee: Samsung Electronics Co., Ltd.Inventors: Tae-Young Lee, Soo-Jin Park, Heung-Sik Shin, Bo-Hyun Yu, Ki-Tae Lee, Cheol-Ho Cheong, Jin-Gil Yang, Jae-Seok Joo
-
Patent number: 9729326Abstract: This invention safeguards the integrity of a machine-printed paper document by entangling a characteristic signature derived from the document's paper grain structure with the identities of the printing device and the person or organization which issued the document. This protection is achieved using a certification phase performed by an augmented document printer and an authentication phase performed by an augmented document scanner. In the certification phase, the grain structure of a specific area of the original paper is imaged and processed to generate a unique signature for the paper. This signature is doubly encrypted using the private keys of the augmented printer and the certifier. These encryption steps entangle the signature of the paper with its source information in a way that thwarts counterfeiting attacks which either copy the document or falsely attribute its source to a specific printer and/or certifier.Type: GrantFiled: April 25, 2008Date of Patent: August 8, 2017Inventors: Feng Lin, Robert D. Brandt, William Stephen Lacy
-
Patent number: 9665737Abstract: A web-based method and system for applying a legally enforceable signature of a user on an electronic document. The user accesses a web environment from a secure electronic system having verified his identity. Once in this web environment, the user is presented with a web-based representation of the document, and with legal disclosure and consent information related to the signing process. The user must agree with all of the information presented to him before his signature is applied to the document. A process log of the signing is kept for future reference.Type: GrantFiled: December 14, 2001Date of Patent: May 30, 2017Assignee: SILANIS TECHNOLOGY INC.Inventors: Tommy Petrogiannis, Michael Laurie, François Leblanc, Benoit Goudreault-Emond
-
Patent number: 9635421Abstract: Methods and apparatus for collection and processing of data relating to users of a content-delivery network. In one embodiment, the content delivery network is a cable or satellite or HFCu network, and the apparatus includes an architecture for routinely harvesting, parsing, processing, and storing data relating to the activities of the users (e.g., subscribers) of the network. In one variant, at least portions of the data are anonymized to protect subscriber privacy.Type: GrantFiled: September 7, 2010Date of Patent: April 25, 2017Assignee: TIME WARNER CABLE ENTERPRISES LLCInventors: Justin Tidwell, Luis Roberto Anaya
-
Patent number: 9628830Abstract: Automatic content recognition (ACR) and media content encoding technologies are described. A content device can include a processing device and a capture interface. The processing device can be on a circuit board. A capture interface can be coupled to the processing device and include a data port. The processing device can be operable to execute a capture daemon. The capture daemon can include a capturer to receive media content from a content feed and generate content frames of the media content. The capture daemon can also include an encoder to receive the content frames from the capturer and encode the media content. The capture daemon can include an uploader to receive the encoded media content from the encoder and communicate the encoded media content to a broadcast sever. The capture daemon can also include an ACR fingerprinter to receive the content frames from the capturer and generate ACR fingerprint information.Type: GrantFiled: August 28, 2015Date of Patent: April 18, 2017Assignee: Sorenson Media, Inc.Inventors: Andrew Ashbacher, Marcus Liassides
-
Patent number: 9607185Abstract: Systems for encoding and reading RFID tags on a collection of items are shown. One embodiment of the invention includes a plurality of items, where each item possesses an item identifier string, and a plurality of RFID tags, where an RFID tag is affixed to each of the items and each RFID tag is encoded with a code word element generated using at least all of the item identifier strings. In many embodiments, the collection is a plurality of goods contained within a case, pallet, container or storage area.Type: GrantFiled: December 10, 2012Date of Patent: March 28, 2017Assignee: Mojix, Inc.Inventors: Christopher R. Jones, Ramin Sadr
-
Patent number: 9560010Abstract: A technology is described for transferring a file from an unsecure network to a secure network. An example method may include identifying an unsecure account profile and determining that a file is to be transmitted from an unsecure network to a secure network using a one-way transfer device. In response, the file may be obtained from a file storage location and an unsecure account profile name for the unsecure account profile may be identified. A request may be made that the one-way transfer device to transmit the file and the unsecure account profile name to the secure network. The file and the unsecure account profile name may then be transmitted to the secure network, where a secure account profile corresponding to the unsecure account profile may be identified in the secure network and the file may be placed in a folder associated with the secure account profile.Type: GrantFiled: March 30, 2015Date of Patent: January 31, 2017Assignee: Amazon Technologies, Inc.Inventors: Matthew Allen Estes, David Eugene Walter Koenig, Robert Eric Fitzgerald, Brent William Farrell
-
Patent number: 9477850Abstract: An electronic device is provided. The electronic device includes an output module, a sensing module, and a processor. The output module is configured to output contents. The sensing module is configured to obtain at least one of user information and environment information. The processor is configured to control an operation of the electronic device in response to at least one of the user information and the environment information depending on an attribute of the contents.Type: GrantFiled: July 7, 2014Date of Patent: October 25, 2016Assignee: Samsung Electronics Co., Ltd.Inventors: Tae-Young Lee, Soo-Jin Park, Heung-Sik Shin, Bo-Hyun Yu, Ki-Tae Lee, Cheol-Ho Cheong, Jin-Gil Yang, Jae-Seok Joo
-
Patent number: 9471916Abstract: A method, a system, and a computer program product are provided for wireless establishment of identity via bi-directional radio-frequency identification (RFID). The method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions operable for sending device data including at least a username and a password to a transceiver. The method also includes receiving an identifier of an access point in a wireless network from the transceiver, the transceiver sending the device data to the access point via a security server. The device data is sent to the access point based on the identifier of the access point, the access point establishing a secure connection to the computer infrastructure based on the device data received from the transceiver and the computer infrastructure.Type: GrantFiled: May 11, 2012Date of Patent: October 18, 2016Assignee: International Business Machines CorporationInventors: John R. Dingler, Frank C. Fisk, Sri Ramanathan, Matthew A. Terry, Matthew B. Trevathan
-
Patent number: 9411962Abstract: Policy-based client-server systems and methods for attestation in managing and securing mobile computing devices. Attestation provides the means to make efficient, secure, and reproducible use of knowledge possessed by trusted expert parties and authorities within the expression and enforcement of policies for controlling use of, and access to, onboard software and hardware, network capabilities, and remote assets and services. Aspects of secure attestation of applications that use shared and dynamically loaded libraries are presented, as well as potential business models for attestation used in such a policy-based system.Type: GrantFiled: October 24, 2013Date of Patent: August 9, 2016Assignee: Sequitur Labs Inc.Inventors: Philip Attfield, Paul Chenard, Simon Curry, Vincent Ting, Mark Reed, David Baar
-
Patent number: 9407620Abstract: Some implementations may provide a machine-assisted method that includes: receiving, from a relying party, a request to determine a trustworthiness of a particular transaction request, the transaction request initially submitted by a user to access data managed by the relying party; based on the transaction request, summarizing the particular transaction request into transactional characteristics, the transactional characteristics devoid of source assets of the transaction; generating first machine-readable data encoding transactional characteristics of the underlying transaction as requested, the transactional characteristics unique to the particular transaction request; submitting a first inquiry at a first engine to determine an access eligibility of the user submitting the transaction request, the first inquiry including the credential information of the submitting user, as well as the summarized transactional characteristics that is applicable only once to the underlying transaction request; and receivinType: GrantFiled: August 22, 2014Date of Patent: August 2, 2016Assignee: MorphoTrust USA, LLCInventor: Stephen Miu
-
Patent number: 9400992Abstract: A method and system for populating a software catalogue in software applications which monitor the presence of software products on a plurality of computers. The proposed method aims at populating a software catalogue with a limited manual intervention of an administrator. The present invention reduces the cost of producing and maintaining a comprehensive knowledge base (the catalogue) which contains definitions of software products and the related signature. Information about software products and their related signature is obtained through a process using some special files (e.g. XML files) which contains information and/or pointers to other products.Type: GrantFiled: April 3, 2008Date of Patent: July 26, 2016Assignee: International Business Machines CorporationInventors: Luca Di Litta, Scot MacLellan, Luigi Pichetti, Marco Secchi, Antonio Secomandi
-
Patent number: 9343070Abstract: A sound transmission-based verification method comprises: a client receiving a data packet set generated by a server according to request information, and converting the data packet set into audio data and play the audio data; a dynamic password apparatus collecting the audio data played by the client, decoding the audio data to obtain data information, and when the information is integral, generating and outputting display information; after the client receives a dynamic password, the client sending the dynamic password to the server; and the server generating, according to the request information, a verifying dynamic password to verify whether the dynamic password is valid, and if the dynamic password is valid, performing an operation according to the request information.Type: GrantFiled: August 30, 2013Date of Patent: May 17, 2016Assignee: Feitian Technologies Co., Ltd.Inventors: Zhou Lu, Huazhang Yu
-
Patent number: 9304624Abstract: An electronic device with a display and a fingerprint sensor may authenticate a user for a respective function. While access to one or more resources of the device is restricted, the device displays an irregular arrangement of shapes on the touch-sensitive display. The device receives input based on the displayed irregular arrangement of the shapes. In accordance with a determination that the input meets input pattern criteria, the device provides access to the one or more restricted resources. In accordance with a determination that the input does not meet the input pattern criteria, the devices forgoes providing access to the one or more restricted resources of the device.Type: GrantFiled: September 5, 2014Date of Patent: April 5, 2016Assignee: Apple Inc.Inventors: Anthony Fadell, Andrew Hodge, Stephan Schell, Ruben Caballero, Jesse Lee Dorogusker, Stephen Zadesky, Emery Sanford
-
Patent number: 9275213Abstract: A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device.Type: GrantFiled: April 15, 2013Date of Patent: March 1, 2016Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ashish Kundu, Amit A Nanavati, Danny Soroker
-
Patent number: 9275053Abstract: Watermark encoders and decoders can be integrated into operating systems, Internet browsers, media players, and other applications and devices. Such integration enables the watermark-enabled application or device to provide additional functionality and information available via the watermark. The watermark, for example, may link to metadata or actions related to a media object. To exploit this watermark enabled functionality, the integrated application uses a watermark decoder to access the related metadata and actions. The user interface of the integrated application is enhanced to present metadata and actions linked via the watermark. Similarly, watermark encoders may be integrated into applications to convert media objects into enhanced, watermarked objects. A variety of other arrangements and features are also detailed. Many arrangements can be implemented using object identifiers other than watermarks.Type: GrantFiled: November 3, 2011Date of Patent: March 1, 2016Assignee: Digimarc CorporationInventors: Daniel O. Ramos, Kevin C. Jones, Geoffrey B. Rhoads
-
Patent number: 9258127Abstract: A method is provided in one example embodiment and includes generating a first document and a second document associated with video data that includes a group of pictures (GOPs). The method also includes hashing a plurality of video frames associated with the video data. Additionally, the method includes appending each of the video frames' respective hash and respective display times to the first document, and appending each of a plurality of I-frames' respective hash and respective display times to the second document. The method further includes communicating the first document and the second document in a reliable manner over a network to a next destination.Type: GrantFiled: July 9, 2012Date of Patent: February 9, 2016Assignee: CISCO TECHNOLOGY, INC.Inventors: Paul Quinn, Jim Chen Chou, Michael Freed, Elango Ganesan
-
Patent number: 9246673Abstract: Examples are disclosed for transforming a multi-dimensional attribute value for a taste related to an area of interest for a user of a computing device and encrypting or decrypting a ciphertext using the transformed multi-dimensional attribute value in order to securely share data with another computing device.Type: GrantFiled: December 28, 2011Date of Patent: January 26, 2016Assignee: Empire Technology Development LLCInventor: Mun-Kyu Lee
-
Patent number: 9235708Abstract: A client hosted virtualization system includes a full volume encryption (FVE) storage device, a processor, and non-volatile memory with BIOS code and virtualization manager code. The virtualization manager initializes the client hosted virtualization system, authenticates a virtual machine image, launches the virtual machine based on the image, receives a transaction from the virtual machine targeted to the FVE storage device, sends the transaction to the FVE storage device, receives a response from the FVE storage device, and sends the first response to the first virtual machine. The client hosted virtualization system is configurable to execute the BIOS or the virtualization manager.Type: GrantFiled: May 16, 2013Date of Patent: January 12, 2016Assignee: Dell Products, LPInventors: David Konetski, Kenneth W. Stufflebeam, Shree Dandekar
-
Patent number: 9231768Abstract: A method begins by a processing module generating a deterministic key from data and encrypting the data using the deterministic key to produce encrypted data. The method continues with the processing module generating transformed data from the encrypted data and generating a masked key from the deterministic key and the transformed data. The method continues with the processing module combining the masked key and the encrypted data to produce a secure package.Type: GrantFiled: June 7, 2011Date of Patent: January 5, 2016Assignee: International Business Machines CorporationInventors: Jason K. Resch, Wesley Leggette
-
Patent number: 9218499Abstract: An enhanced security protection in data duplication using a shared storage area is provided. Specifically, an information processing apparatus, in which one or more applications operate, includes a copy-operation monitoring portion that acquires copy data that the copy source application issues an instruction to copy to a general-purpose shared memory, sets a lifetime interpreted from an operation pattern via an input device for the copy data, and then stores the copy data in a storage area; a display portion that displays, on a display, a paste candidate selected from one or more items of copy data stored in the storage area; a paste-operation monitoring portion that transfers the paste candidate read from the storage area to the paste destination application in response to a confirmation operation via the input device; and an erasing portion that erases, from the storage area, copy data that has become unpermitted to remain because the lifetime has expired.Type: GrantFiled: December 22, 2011Date of Patent: December 22, 2015Assignee: International Business Machines CorporationInventors: Sanehiro Furuichi, Masami Tada
-
Patent number: 9206550Abstract: An anti-counterfeit method for random textures and a recognizer thereof The method includes: A. selecting texture material 2 with texture elements 1 distributed randomly; B. a recognition system storing inherent recognition features J of texture elements 1; C. extracting random features S of distribution of texture element 1 and storing in the recognition system, texture material 2 being anti-counterfeit identification 3; D. the recognition system extracting features J? and random features S? of texture elements 1? to be recognized on anti-counterfeit identification 3?, and comparing respectively features J? with recognition features J as well as random features S? and random features S. If the compared results do not match, anti-counterfeit identification 3? is judged not to be anti-counterfeit identification 3. Otherwise, anti-counterfeit identification 3? is judged to be anti-counterfeit identification 3.Type: GrantFiled: September 28, 2010Date of Patent: December 8, 2015Assignee: SHANGHAI KOS SECURITY PAPER TECHNOLOGY CO., LTD.Inventor: Xianlin Sun
-
Patent number: 9178862Abstract: A method that includes using a user input device to allow a user to log-in to an e-mail account or user account, using the user input device to allow the user to enter an electronic message or select an electronic message, generating a first checksum based on the electronic message, transmitting the first checksum to a server, encrypting the electronic message, using a communications module to receive a unique postal identifier from a server and associate the unique postal identifier with the encrypted electronic message, and using a communications module to transmit the encrypted electronic message to a recipient client via a computer network.Type: GrantFiled: November 18, 2013Date of Patent: November 3, 2015Inventor: Isaac S. Daniel
-
Patent number: 9171271Abstract: A computer system includes a network. The system includes a first client device in communication with the network having a transaction description for a transaction t. The first client device sends the transaction description to a second client device. The second client device receives the transaction description from the first client device. One of the first or second client devices executes the transaction description and creates a second transaction description for transaction t and then sends the second transaction description to a client device. A client device of a computer system having a network and a second client device. A method of a computer system. A method of a client device of a computer system having a network and a second client device.Type: GrantFiled: January 15, 2010Date of Patent: October 27, 2015Assignee: New York UniversityInventors: Dennis Shasha, Arthur Meacham
-
Patent number: 9171191Abstract: The present disclosure discloses a method for dynamic authentication between a reader and a tag, and an implementing device therefor, to solve the technical problem of necessity of dependence of a traditional authentication method on a real-time, online, reliable and secure connection with a background database, as well as lack of ways for highly autonomous authentication of a tag by a reader. In the present disclosure, only a legitimate reader can obtain corresponding tag authentication information from an authentication database and authenticate or update a corresponding tag status; only a legitimate tag can be processed by the legitimate reader; during the authentication, a dynamic updating mechanism is used for a tag ID which ensures forward security; the reader stores tag information using a hash table and thus increases an authentication speed; data synchronization is achieved cleverly by ways of a counting value.Type: GrantFiled: September 1, 2011Date of Patent: October 27, 2015Assignee: ZTE CorporationInventors: Tao Xue, Junzhao Du, Hui Liu, Shujun Liu, Wen He, Wenjing Chen, Jiangkun Guo, Qingzhe Deng, Chuanyi Liu
-
Patent number: 9164161Abstract: Mobile devices are able to determine their location based radio transmitters that are visible at the device to provide geographic location services. A knowledge of the location of the transmitters is required for the mobile device to determine a location estimate, however this can be difficult in network environments where the transmitters are temporary and their locations are not identified in location databases. Locations of temporary transmitters can be provided to mobile devices in order to augment the available location data used in determining the mobile device location. 3rd parties can provide temporal location data on transmitters that are set up for short period of time, as well as better control the distribution of the location data.Type: GrantFiled: February 4, 2013Date of Patent: October 20, 2015Assignee: BlackBerry LimitedInventors: Bruce Allen Bernhardt, Jingwei Xu, I-Ming Tsai
-
Patent number: 9152777Abstract: In one embodiment a controller comprises logic configured to receive a document copy, wherein the document copy comprises an identifier which uniquely identifies an electronic device and an authentication algorithm logic, generate, with the authentication algorithm logic, a security key for the document copy based on at least one input from the user, transmit the security key to a remote device, and store the document copy and a computer-readable code which uniquely associates the document with the electronic device in a memory. Other embodiments may be described.Type: GrantFiled: June 23, 2013Date of Patent: October 6, 2015Assignee: Intel CorporationInventor: Arnab Ganguly
-
Patent number: 9137020Abstract: A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.Type: GrantFiled: March 3, 2015Date of Patent: September 15, 2015Assignee: Copilot Ventures Fund III LLCInventor: Jay Fraser
-
Patent number: 9087196Abstract: Methods and apparatus to provide secure application attestation using dynamic measurement kernels are described. In some embodiments, secure application attestation is provided by using dynamic measurement kernels. In various embodiments, P-MAPS (Processor-Measured Application Protection Service), Secure Enclaves (SE), and/or combinations thereof may be used to provide dynamic measurement kernels to support secure application attestation. Other embodiments are also described.Type: GrantFiled: December 24, 2010Date of Patent: July 21, 2015Assignee: Intel CorporationInventors: Matthew D. Wood, Ylian Saint-Hilaire
-
Patent number: 9088733Abstract: Digital Cameras configured to verify authenticity of digital photos taken with the digital camera and related methods and computer program products are provided. GPS information associated with a photograph taken with the digital camera is obtained. A checksum of pixels that make up the photograph and the obtained GPS information is generated. The generated checksum is encrypted using a private key associated with the digital camera so as to allow verification that the photograph has not been modified.Type: GrantFiled: June 27, 2006Date of Patent: July 21, 2015Assignee: AT&T Intellectual Property I, L.P.Inventor: Douglas Van Natter
-
Patent number: 9071444Abstract: An electronic content storage and exchange system includes an interface configured to send and receive messages; a database and a controller. The database includes a plurality of records, each record representing a respective virtual storage media and including at least: a respective unique identifier assigned to the virtual storage media; a respective Private key and certificate assigned to the virtual storage media; a current content value, and a log of content transfers. The controller executes transfer-in and transfer-out processes in respect of each of the virtual storage media. The transfer-in process includes steps of: receiving a content transfer message including at least a message content to be transferred and the respective identifier assigned to a recipient virtual storage media; accessing the record representing the recipient virtual storage media; and storing the message content in the current content of the recipient virtual storage media.Type: GrantFiled: September 17, 2010Date of Patent: June 30, 2015Assignee: ROYAL CANADIAN MINT/MONNAIE ROYALE CANADIENNEInventor: David Everett
-
Patent number: 9064133Abstract: Disclosed are an apparatus and methods of determining if at least one data file has been de-duplicated. One example method may include receiving a filekey based on at least a portion of the content of the at least one data file, checking a de-duplication registry in a database to determine whether a pre-stored filekey is present, decrypting at least a first data associated with the filekey and at least a second data associated with the pre-stored filekey, and comparing the decrypted at least first data with the decrypted at least second data to determine whether the at least one file has been de-duplicated.Type: GrantFiled: March 29, 2011Date of Patent: June 23, 2015Assignee: KASEYA LIMITEDInventor: Charles Bosson
-
Publication number: 20150149785Abstract: A method for generating, from initial content data, output content data for provision to one or more receivers, wherein the initial content data is encoded according to a coding scheme, wherein for a quantity of data encoded according to the coding scheme, the coding scheme provides a mechanism for including in the quantity of encoded data additional data such that a decoder for the coding scheme, upon decoding the quantity of encoded data, does not use the additional data to generate decoded data, the method comprising: selecting one or more portions of the initial content data; for each selected portion, generating a data construct that comprises a plurality of data structures, each data structure comprising data, including a version of the selected portion, that is encrypted using a corresponding encryption process different from each encryption process used to encrypt data in the other data structures, wherein the data construct is arranged such that using a decryption process that corresponds to the encrType: ApplicationFiled: February 15, 2012Publication date: May 28, 2015Applicant: IRDETO B.V.Inventors: Anthony Pickering, Rahul Mehra, Erik Hietbrink
-
Publication number: 20150143128Abstract: Counterfeit articles are distinguished from genuine articles by a combination of a party-specific code and a product authentication code of the article. After authenticating a genuine article, a replacement authentication code is generated based on the original authentication code and party-specific code. Documents and currencies can be authenticated independently of any party-specific code by an addition to or alteration of their authentication code with each authentication event.Type: ApplicationFiled: October 23, 2014Publication date: May 21, 2015Inventor: Thomas C. Goodman
-
Patent number: 9037863Abstract: A terminal device recording content onto a recording medium device, a permission to record the content onto the recording medium device being granted by a server device, the terminal device comprising: a generation unit generating a value calculated so as to represent subject content for which permission to record is requested; an information transmission unit requesting the permission from the server device by transmitting information indicating the value generated by the generation unit to the server device; a signature reception unit receiving subject content signature data from the server device, the subject content signature data being transmitted by the server device upon granting the permission; and a recording unit recording the subject content onto the recording medium device as one of plain-text data and encrypted data, as well as the subject content signature data received by the signature reception unit.Type: GrantFiled: March 25, 2014Date of Patent: May 19, 2015Assignee: Panasonic CorporationInventors: Takahiro Yamaguchi, Yuichi Futa
-
Patent number: 9032219Abstract: Methods and apparatus for reducing security vulnerabilities in a client/server speech recognition system including one or more client computers and one or more server computers connected via a network. Decryption of sensitive information, such as medical dictation information, is performed on designated servers to limit the attack surface of unencrypted data. Management of encryption and decryption keys to restrict the storage and/or use of decryption keys on the server side of the client/server speech recognition system, while maintaining encrypted data on the server side is also described.Type: GrantFiled: November 16, 2012Date of Patent: May 12, 2015Assignee: Nuance Communications, Inc.Inventors: William F. Ganong, III, Maximilian Bisani
-
Patent number: 9032211Abstract: Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place marker signature record is a modified signature Record Type Definition (RTD). A first set of records preceding the place marker signature record in the NDEF message is unsecured. The method also includes securing a second set of records following the place marker signature record. Another method includes placing a secured bytes field in the signature RTD. The secured byte field indicates a number of bytes of data to be secured preceding this field. The method also includes securing data in records preceding this field in the signature RTD, based on a value of the secured bytes field.Type: GrantFiled: July 9, 2009Date of Patent: May 12, 2015Assignee: Samsung Electronics Co., Ltd.Inventors: Thenmozhi Arunan, Eun-Tae Won
-
Patent number: 9032214Abstract: A system and method for providing an image to an information handling system is disclosed. A method for delivering an image may include booting an information handling system with a provisioning operating system downloaded via a network into a memory of the information handling system. The method may also include calculating, by the second provisioning OS, a fingerprint of an image stored on the information handling system. The method may additionally include determining if the fingerprint matches a previously-calculated fingerprint of the image calculated prior to delivery of the information handling system to its intended destination. The method may further include enabling the information handling system to boot from a storage resource of the information handling system in response to a determination that the fingerprint matches the previously-calculated fingerprint.Type: GrantFiled: June 30, 2011Date of Patent: May 12, 2015Assignee: Dell Products L.P.Inventors: Sandeep Karandikar, Aaron Merkin
-
Patent number: 9026797Abstract: A server apparatus having a one-time scan code issuing function, a user terminal having a one-time scan code recognizing function, and a method for processing a one-time scan code are provided so as to safely and conveniently transmit one-time information used for key-exchange-scheme-based encryption, using a scan code such as a bar code and a QR code.Type: GrantFiled: December 13, 2012Date of Patent: May 5, 2015Assignee: Korea Center.Com Co., Ltd.Inventor: Seong-Noh Yi
-
Patent number: 9015484Abstract: A method, device, and system are disclosed. In one embodiment the method includes receiving measured health information from a client on a key distribution server. Once the measured health information is received the server is capable of validating the measured health information to see if it is authentic. The server is also capable of sending a session key to the client when the measured health information is validated. When the client receives the session key, the client is capable of initiating an encrypted and authenticated connection with an application server in the domain using the session key.Type: GrantFiled: July 29, 2013Date of Patent: April 21, 2015Assignee: Intel CorporationInventors: Divya Naidu Kolar Sundar, Prashant Dewan, Men Long
-
Patent number: 9015813Abstract: Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes providing a first identifier to at least one verification server and providing a second identifier to an electronic device being used by the user. The first identifier and the second identifier each corresponds to the secured capability. The method further includes providing the electronic device with a user-selectable link configured to, upon being selected by the user, initiate a program to run on the electronic device. The program is configured to transmit a third identifier to the at least one verification server. The third identifier corresponds to the secured capability. The method further includes receiving authorization information from at least one of the electronic device and the at least one verification server. The method further includes using a processor (e.g.Type: GrantFiled: March 10, 2014Date of Patent: April 21, 2015Inventor: Jack Bicer
-
Patent number: 9009482Abstract: Methods, systems, and apparatus are disclosed which enable flexible insertion of forensic watermarks into a digital content signal using a common customization function. The common customization function flexibly employs a range of different marking techniques that are applicable to a wide range of forensic marking schemes. These customization functions are also applicable to pre-processing and post-processing operations that may be necessary for enhancing the security and transparency of the embedded marks, as well as improving the computational efficiency of the marking process. The common customization function supports a well-defined set of operations specific to the task of forensic mark customization that can be carried out with a modest and preferably bounded effort on a wide range of devices. This is accomplished through the use of a generic transformation technique for use as a “customization” step for producing versions of content forensically marked with any of a multiplicity of mark messages.Type: GrantFiled: September 26, 2013Date of Patent: April 14, 2015Assignee: Verance CorporationInventor: Joseph M. Winograd
-
Patent number: 8984290Abstract: The present disclosure involves a method of verifying user check-ins to a venue. The method includes initializing a digital check-in chain for a venue. The method includes expanding, electronically by a processor, the check-in chain with a plurality of check-in entries that each correspond to a visit to the venue by a respective user. Each check-in entry on the check-in chain is generated in response to one or more preceding check-in entries on the check-in chain. The method includes detecting fraudulent check-in entries in response to a split in the check-in chain. The method includes removing the fraudulent check-in entries from the check-in chain.Type: GrantFiled: November 12, 2013Date of Patent: March 17, 2015Assignee: Ebay Inc.Inventor: John Hastings Granbery