Including Generation Of Associated Coded Record Patents (Class 713/179)
  • Publication number: 20120297198
    Abstract: Privacy-preserving metering with low overhead is described. In an embodiment consumption of a resource such as electricity, car insurance, cloud computing resources is monitored by a meter and bills are created in a manner which preserves privacy of a customer but at the same reduces bandwidth use between a meter and a provider of the resource. For example, fine grained meter readings which describe customer behavior are kept confidential without needing to send large cryptographic commitments to meter readings from a meter to a provider. In an example, meter readings are encrypted and sent from a meter to a provider who is unable to decrypt the readings. In examples a cryptographic signature is generated to commitments to the meter readings and only the signature is sent to a provider thus reducing bandwidth. For example, a customer device is able to regenerate the commitments using the signature.
    Type: Application
    Filed: May 19, 2011
    Publication date: November 22, 2012
    Applicant: Microsoft Corporation
    Inventors: George Danezis, Markulf Kohlweiss
  • Patent number: 8316238
    Abstract: An approach for tracking documents using image processing is disclosed. Auxiliary information corresponding to compressed digital information is extracted. The auxiliary information is used to output text lines, which undergo a hash function (e.g., checksum operation). In this manner, individual hash values are generated, as well as an overall hash value of the entire file of text lines. A reference set of hash values are maintained to identify other compressed digital information.
    Type: Grant
    Filed: October 25, 2006
    Date of Patent: November 20, 2012
    Assignee: Verizon Patent and Licensing Inc.
    Inventors: John Francis Mergen, Carl Marshall Eliot Powell, Daniel M. Wood
  • Patent number: 8315385
    Abstract: The present invention provides a system and method for introducing white noises into a digital audio signal so that there is progressive and cumulative degradation in audio quality after each successive reproduction of the audio sound signal in a fashion analogous to analog audio reproduction. The invention provides a white noise generator, and a digital entroping unit. In a preferred embodiment, the white noise generator is implemented by a hardware random number generator. The digital entroping unit controls the magnitude of white noise desired based on a random number generated by the random number generator, and adds the white noise to the input audio sound signal to produce a degraded audio sound signal. The magnitude of white noise can be controlled by using various masking and formatting of random number data.
    Type: Grant
    Filed: February 12, 2007
    Date of Patent: November 20, 2012
    Assignee: Nvidia Corporation
    Inventor: Jason Seung-Min Kim
  • Patent number: 8312281
    Abstract: A computer system includes a printer configured to print invisible coded data tags on print media. Each data tag includes a target and a dot arrangement representing a value. A pen-type device includes an image sensor configured to sense the targets and wirelessly transmit sensed data associated with the dot arrangements. A relay is configured to receive the transmitted data. One or more servers are interfaced to the relay, and are configured to process the received data from the relay and to perform an action based upon the processed data.
    Type: Grant
    Filed: November 18, 2008
    Date of Patent: November 13, 2012
    Assignee: Silverbrook Research Pty Ltd
    Inventors: Kia Silverbrook, Paul Lapstun
  • Patent number: 8301553
    Abstract: Electronic documents corresponding to executed paper documents are certified. A certifying agent receives an electronic document and a corresponding paper document that had been executed pursuant to some transaction. The certifying agent compares the information contained in the paper to that in the electronic mortgage document. If the paper adequately corresponds to the electronic document and is otherwise sufficient, then the certifying agent certifies the electronic document so that other parties can reliably engage in transactions involving the electronic document without having to possess or otherwise inspect the executed paper document. Certification involves application of some form of indicia of certification to the electronic document, such as updating the value of a field corresponding to certification in the electronic document and/or applying a digital or electronic signature corresponding to the certifying agent to the electronic document.
    Type: Grant
    Filed: December 20, 2002
    Date of Patent: October 30, 2012
    Assignee: Fannie Mae
    Inventors: J. Harvey Trimble, Jr., Cynthia H. Keith, Charlotte Haberaecker, N. Grande Bucca
  • Patent number: 8301892
    Abstract: A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user's certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient's certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients.
    Type: Grant
    Filed: April 30, 2010
    Date of Patent: October 30, 2012
    Assignee: Marathon Solutions LLC
    Inventors: Robert B. Lord, Terry N. Hayes, Justin Uberti
  • Publication number: 20120265994
    Abstract: A method for establishing a secure connection between a first computer and a second computer, comprising the steps of (A) generating a signature authentication pair on the first computer, (B) receiving a plurality of authentication pairs that may or may not include the signature authentication pair, (C) detecting whether the signature authentication pair is received in the authentication pairs and (D) if the signature authentication pair is detected, creating a secure connection between the first computer and the second computer.
    Type: Application
    Filed: April 13, 2011
    Publication date: October 18, 2012
    Inventors: Mahmoud K. Jibbe, Senthil Kannan, Arunkumar Ragendran, Britto Rossario
  • Publication number: 20120265995
    Abstract: A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.
    Type: Application
    Filed: April 14, 2011
    Publication date: October 18, 2012
    Applicant: GM CLOBAL TECHNOLOGY OPERATIONS LLC
    Inventors: Arzad A. Kherani, Debojyoti Bhattacharya, Skanda N. Muthaiah
  • Patent number: 8291471
    Abstract: Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
    Type: Grant
    Filed: April 6, 2009
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sandro Piccinini, Luigi Pichetti, Marco Secchi, Antonio Secomandi
  • Patent number: 8284431
    Abstract: Insertion of a watermark corresponding to the content of a file at the time of the printing of the file is made possible. Importance and/or confidentiality is defined per keyword in advance, and the watermark to be inserted is defined based thereon. At the time of the printing of the file, a keyword search within the file is performed, and the watermark to be inserted is automatically selected based on the search result (see FIG. 5).
    Type: Grant
    Filed: December 5, 2008
    Date of Patent: October 9, 2012
    Assignee: Hitachi Solutions, Ltd.
    Inventor: Atsuo Ohsone
  • Patent number: 8281143
    Abstract: Various methods and systems for protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are disclosed. One method involves generating an encryption key for use in encrypting data and generating an identifier for the data. Generation of the encryption key is based upon a hash of the data to be encrypted. The method also involves detecting whether an encrypted copy of the data is already stored by a storage system, based upon the identifier. The method also modifies the data to be encrypted or the encryption key, based upon a client-specific value, prior to generating the identifier.
    Type: Grant
    Filed: September 29, 2008
    Date of Patent: October 2, 2012
    Assignee: Symantec Operating Corporation
    Inventors: Thomas G. Clifford, Weibao Wu
  • Patent number: 8281142
    Abstract: A system and method helps to control “read” and/or “write” access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper material that is protected by a security methodology accessible to authorized entities. Some embodiments maintain a record of access activity regarding the restricted portion, and a record of access activity regarding use of an item or product or service related to the e-paper informational data. Some implementations include an authorization listing of a party having a particular access privilege or authorization to make modifications to various restricted portions including an authentication region and a protected region. One possible aspect includes performing a verification analysis of data indicia in a restricted portion of the e-paper media. Additional possible system and process components may determine an authenticity status of the data indicia, and provide an output result.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: October 2, 2012
    Assignee: The Invention Science Fund I, LLC
    Inventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
  • Publication number: 20120239937
    Abstract: According to an embodiment, an information processing device includes a key set generating unit configured to generate a key set including at least a public key and a master key; a secret key generating unit configured to generate different secret keys for each server device accessing the information processing device by using the master key included in the key set; a secret key providing unit configured to provide each of the secret keys generated by the secret key generating unit to a corresponding server device; and a public key providing unit configured to provide the public key to a verification device to make the verification device verify signature information generated by using the secret key in each of the server devices.
    Type: Application
    Filed: January 19, 2012
    Publication date: September 20, 2012
    Applicant: KABUSHIKI KAISHA TOSHIBA
    Inventors: Shinji Yamanaka, Yuichi Komano
  • Patent number: 8271795
    Abstract: This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique.
    Type: Grant
    Filed: September 11, 2006
    Date of Patent: September 18, 2012
    Assignee: Blue Spike, Inc.
    Inventor: Scott A. Moskowitz
  • Patent number: 8272060
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Grant
    Filed: April 18, 2010
    Date of Patent: September 18, 2012
    Assignee: Stragent, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 8266435
    Abstract: The invention pertains to a method, computer readable medium, and data processing system for generation of an asymmetric cryptographic key pair including reception of an arbitrarily selectable login name, calculation of a first data object key, whereby a random value and the login name are included in the calculation, and calculation of a second data object key from the first data object key, whereby the first and second data object keys form the asymmetric cryptographic key pair.
    Type: Grant
    Filed: January 25, 2010
    Date of Patent: September 11, 2012
    Assignee: CompuGROUP Holding AG
    Inventors: Adrian Spalka, Jan Lehnhardt
  • Patent number: 8261084
    Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: September 4, 2012
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
  • Patent number: 8261085
    Abstract: According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security component, the security component adapted to read and verify data within data blocks stored in a L1 instruction cache memory and to allow the execution of data block instructions in the core only upon the instructions being verified by the use of a cryptographic algorithm.
    Type: Grant
    Filed: September 26, 2011
    Date of Patent: September 4, 2012
    Assignee: Media Patents, S.L.
    Inventor: Álvaro Fernández Gutiérrez
  • Patent number: 8255694
    Abstract: A method, system, and apparatus for authenticating transactions and records is disclosed. An information-based indicium includes an article bearing a first identifier, wherein the first identifier substantially prevents a single user from accumulating multiple articles bearing the same first identifier, and a first digital certificate that is derived in part by encoding the first identifier, wherein the first digital certificate and the article may be presented together to authenticate the indicium by comparing the first digital certificate and the first identifier.
    Type: Grant
    Filed: September 15, 2006
    Date of Patent: August 28, 2012
    Assignee: Sint Holdings Limited Liability Company
    Inventors: Patrick D. Lincoln, Natarajan Shankar
  • Patent number: 8255335
    Abstract: Disclosed are systems and methods for establishing a personal identification number (PIN). The systems and methods provide techniques to begin a remote session with a customer, prompt the customer to select a PIN to associate with a financial account card during the remote session, and receive the PIN from the customer during the remote session.
    Type: Grant
    Filed: April 11, 2007
    Date of Patent: August 28, 2012
    Assignee: United Services Automobile Association (USAA)
    Inventors: Ryan Ray Barth, Felicia Tavares
  • Patent number: 8250626
    Abstract: The present invention provides a way to secure data accessed by a software package pre-loaded on a computer system (for delivery to a customer). Specifically, under the present invention, customer data is loaded on a computer system along with any software package(s) that access the customer data prior to shipping the computer system to the customer. Also prior to shipping, a set (e.g., one or more) of passwords for accessing the data such as an administrative password and a hard disk password are set. After the computer system is shipped to the customer, confirmation of proper delivery will be sought. Once this confirmation is received, an access code such as a key or the set of passwords themselves will be shipped to the customer to unlock and use the data.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: David B. Rhoades, Simon C. Chu, William M. Privette
  • Patent number: 8245918
    Abstract: A method for securely handling processing of information includes, in a chip, selecting one of a plurality of data processes based on a random index. After a randomly allocated time interval has elapsed, the selected one of the plurality of data processes may be initiated. The selected one of the plurality of data processes may include accessing data and/or acquiring the data. Burstiness of the data may be approximately equal to burstiness of data acquired by at least one of a plurality of clients on the chip. Data may be verified by the selected one of the plurality of data processes prior to the processing of the data.
    Type: Grant
    Filed: June 14, 2011
    Date of Patent: August 21, 2012
    Assignee: Broadcom Corporation
    Inventors: Xuemin Chen, Iue-Shuenn I. Chen, Francis Chi-Wai Cheung, Longyin Wei
  • Patent number: 8245038
    Abstract: One embodiment of the present invention provides a system which allows a document owner to redact content from a document and allows a recipient of the redacted document to challenge the appropriateness of the redaction. During operation, the system allows the document owner to redact a string Mi from location i in the document. In doing so, the system produces a commitment Ci=C(Mi, Ri) based on string Mi and a string Ri used as randomness and communicates Ci to the recipient. When the recipient challenges the redaction, the system receives a topic string T from the recipient, and produces a string RT. The system then communicates RT to the recipient, thereby allowing the recipient to produce a commitment CT=C(T, RT) based on strings T and RT, and compare CT with Ci. Comparing commitment CT with Ci allows the recipient to test redactions for string equality.
    Type: Grant
    Filed: March 26, 2008
    Date of Patent: August 14, 2012
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Philippe Jean-Paul Golle, Jessica N. Staddon, Richard Chow
  • Patent number: 8230228
    Abstract: Tamper detection of audit records comprises configuring a proxy for adding tamper evidence information to audit information by obtaining audit records from at least one audit record generating source, grouping obtained audit records into subsets of audit records and providing tamper evidence processing to the subsets utilizing a cryptographic mechanism to calculate a signature over each subset of audit records. The proxy groups the subsets such that each subset contains at least one designated carryover audit record that overlaps into a next subset so that each carryover audit record is associated with at least two signatures. As such, the proxy creates an overlapping chain of digitally signed audit records subsets. The proxy further forwards the tamper evident audit records from the tamper evidence adding proxy to a corresponding audit log storage subsystem for storage, storing the calculated signatures.
    Type: Grant
    Filed: October 31, 2008
    Date of Patent: July 24, 2012
    Assignee: International Business Machines Corporation
    Inventors: Timothy J. Hahn, Heather M. Hinton
  • Patent number: 8230215
    Abstract: In a vehicle-to-vehicle communication network utilizing PKI security methods to protect communications and in which the PKI encryption utilizes a Certificate Authority having both a private key and a publicly distributed key, a method for allocating multiple certificates for each vehicle which are assigned to each vehicle in the communication network. The method includes the step of assigning a unique secret key k to each vehicle in the communication network. The Certificate Authority then creates a plurality of public key and private key encryption pairs for each vehicle and each encryption pair is associated with an index i. A plurality of certificates are then created with one certificate for each value of the index. A revocation list comprising the secret keys is maintained by the Certificate Authority so that all encryption pairs assigned to a particular vehicle may be revoked by the secret key k corresponding to that vehicle.
    Type: Grant
    Filed: April 11, 2008
    Date of Patent: July 24, 2012
    Assignees: Toyota Motor Engineering & Manufacturing North America, Inc., The Board of Trustees, University of Illinois at Urbana-Champaign
    Inventors: Kenneth P. Laberteaux, Yih-Chun Hu, Jason Haas
  • Patent number: 8208157
    Abstract: An authentication apparatus outputs an application form to be used in applying for access authorization, which is printed with an identification image showing information including identification information of terminal equipment. The authentication apparatus scans the application form which is filled out by a user as required, recognizes the abovementioned information from the image data obtained by scanning, and authorizes the terminal equipment that corresponds to the abovementioned recognized information to have access to a specified network.
    Type: Grant
    Filed: September 20, 2007
    Date of Patent: June 26, 2012
    Assignee: Konica Minolta Business Technologies, Inc.
    Inventors: Shuichiro Kaneko, Kenji Ogasawara, Hiroyuki Ozawa
  • Publication number: 20120159179
    Abstract: Representations of polynomials a, s, t, e—1 and e—2 can be provided. Values of coefficients of the polynomials can be limited, and can be computed using randomization techniques. A verification key can be generated to include representations of polynomials a, b, and c. Computation of b can include computing a product using a and s, and adding e—1. Computation of c can include computing a product using a and t, and adding e—2. A signing key can represent s and t. The signing key can be used to produce a message signature that can represent a sum of t and a product of s and m, with m being derived from a message to be signed. The verification key can be used to verify the signature by checking coefficient sizes of a polynomial represented by the signature, and of a checking polynomial derived from the verification key and the signature.
    Type: Application
    Filed: December 17, 2010
    Publication date: June 21, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Kristin E. Lauter, Elisabeth Malmskog, Michael Naehrig, Vinod Vaikuntanathan
  • Patent number: 8203431
    Abstract: In a method of processing data, an RFID signal (6) sent by a reader (3,5) via a field generated by the reader (3,5) is received at a passive RFID transponder (2). The transponder (2) comprises a dedicated receiver (28) for receiving a time signal (8), which is wirelessly sent By an external sender (4) and comprises information about the present time. The transponder (2) including the dedicated receiver (28) is powered utilizing the field such that the dedicated receiver (28) detects the time signal (8) and decodes the present time. Utilizing the transponder (2), the first data (7) contained in the RFID signal (6) is decoded and processed. Second data (9) which are time stamped by said transponder (2) utilizing said present time are generated, and a response signal (10) comprising the second data (9) is transmitted from the transponder.
    Type: Grant
    Filed: February 12, 2008
    Date of Patent: June 19, 2012
    Assignee: NXP B.V.
    Inventor: Frank Graeber
  • Patent number: 8191165
    Abstract: A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide tagged fragments for distribution. The tags may be generated using a pseudo-random number (PRN) bit sequence. A digital rights license is generated for the digital content file based on the tags and/or fragments. The digital rights license is configured to allow reassembly of the tagged fragments to provide the digital content file. Later, the fragments may be re-tagged with corresponding second tags to provide second tagged fragments for distribution that are different from the first tagged fragments. Related systems and computer program products are also discussed.
    Type: Grant
    Filed: December 8, 2010
    Date of Patent: May 29, 2012
    Assignee: AT&T Intellectual Property I, L.P.
    Inventor: Jeffrey A. Aaron
  • Patent number: 8189854
    Abstract: A method of embedding information in digital content representing media streams. The method includes (1) selecting a set of locations within that digital content representing the media stream to embed information, (2) selecting a set of possible alterations to make at those locations, and (3) making a subset of the possible alterations. The set of locations and possible alterations is herein sometimes called a “watermark.” The subset of actual alterations that are made is herein sometimes called a “fingerprint.” The method determines a set of locations at which there are alternative versions of digital content representing the same media stream, such as one being the original and one being an alternative version of the same digital content, herein sometimes called the “original movie” and the “alt-movie,” or herein sometimes called the “original block” and the “alt-block” for a particular block in the digital content representing the media stream.
    Type: Grant
    Filed: February 16, 2007
    Date of Patent: May 29, 2012
    Assignee: Kaleidescape, Inc.
    Inventors: Stephen Watson, Daniel A. Collens, Kevin Hui, Michael A. Malcolm
  • Patent number: 8190902
    Abstract: Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with the document. The registered module is able to process a plurality of different structured formats. The registered module obtains the portion. A digital signature is formed for the portion. The digital signature is included in the document in accordance with the structured format.
    Type: Grant
    Filed: February 27, 2006
    Date of Patent: May 29, 2012
    Assignee: Microsoft Corporation
    Inventors: Andrew T. Lytle, Bryan J. Reich, Gitika Gupta, Matthew C. Pohle, Mariya Tikunova
  • Publication number: 20120124385
    Abstract: In a method for detecting infringements of the authenticity of a system component an authentication request is sent from a controller to an authentication device of the system component. A first authentication code is calculated in the authentication device by applying a shared one-way function to an identification code, stored in the authentication device, for the system component. A second authentication code in the controller is calculated by applying the shared one-way function to an identification code, stored in the controller, for the system component, and an authentication response including the first authentication code is sent from the authentication device to the controller. The first authentication code is compared with the second authentication code in the controller for detecting infringements of the authenticity of the system component.
    Type: Application
    Filed: January 27, 2012
    Publication date: May 17, 2012
    Applicant: Siemens Aktiengesellschaft
    Inventors: Wolfgang Klasen, Angela Schattleitner
  • Patent number: 8181261
    Abstract: A system and method for controlling the reproduction of documents containing sensitive information includes an input for receiving a document; a device for storing a digitized document; a detector for identifying encoded sensitive information; a decoder operatively connected to the detector, which extracts digitally encoded information from the sensitive information; a processor operatively connected to the decoder, which receives digitally decoded sensitive information; a user interface module for receiving a user identity and an access mediator for receiving decoded sensitive information from the processor, comparing the user identity with a decoding scheme associated with the document and allowing or disallowing the decoded sensitive information to be reproduced.
    Type: Grant
    Filed: May 13, 2005
    Date of Patent: May 15, 2012
    Assignee: Xerox Corporation
    Inventor: Robert H. Sperry
  • Patent number: 8179547
    Abstract: This invention facilitates an operation required to restore a desired file from code information. To accomplish this, a printing apparatus prints code information generated by encoding a file on a first sheet set, and prints identification information required to identify the sheet on which the code information corresponding to the file is printed. A restoration apparatus scans the first and second sheet sets. The restoration apparatus specifies, based on the identification information on the second sheet set, a sheet on which code information corresponding to a desired file is printed. Furthermore, the restoration apparatus restores the desired file by decoding the code information printed on the specified sheet.
    Type: Grant
    Filed: January 31, 2007
    Date of Patent: May 15, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventors: Atsushi Kamasuka, Fumio Shoji
  • Patent number: 8176106
    Abstract: The present invention relates to a method and a device (11) using a physical token (14), which provides measurable parameters, to derive at least one data set. A plurality of values of one or more of the parameters are measured. From these measured values, a measure of variance is calculated. Quantization intervals into which a measured value is to be quantized are then determined. A possible value of a data set, which subsequently can be derived from a measured value provided by the physical token, is associated with each quantization interval. Further, information which subsequently enables determination of these quantization intervals is stored. Hence, an enrolling phase has been completed. When the preparing phase has been completed, a deriving phase may commence. When a data set is to be derived, for example to be used as a cryptographic key, a value of any one of the parameters provided by the PUF is measured.
    Type: Grant
    Filed: December 12, 2006
    Date of Patent: May 8, 2012
    Assignee: NXP B.V.
    Inventors: Geert Jan Schrijen, Boris Skoric
  • Patent number: 8171285
    Abstract: A cryptographically signed filesystem provides a central database resident on a server that contains database objects. The server creates startup software to be installed in a client system's read only memory. The startup software contains a hash value for a second stage loader. The server also creates software for a bootstrap loader object which typically contains the operating system for a client system and also the bootstrap loader's hash value and a digital signature that is unique to the server. The startup software and objects created by the server are initially installed on a client device at the time of manufacture. The server can update a client's bootstrap loader and root filesystem at any time through the transmission of slices.
    Type: Grant
    Filed: October 25, 2006
    Date of Patent: May 1, 2012
    Assignee: TiVo Inc.
    Inventor: David C. Platt
  • Patent number: 8171297
    Abstract: A method, system, and apparatus for authenticating transactions and records is disclosed. A method for authenticating an information-based indicium includes receiving an article bearing a first identifier, wherein the first identifier substantially prevents a single user from accumulating multiple articles bearing the same first identifier, receiving a first digital certificate that is derived in part by encoding the first identifier, and comparing the first digital certificate and the first identifier to authenticate the information-based indicium.
    Type: Grant
    Filed: September 15, 2006
    Date of Patent: May 1, 2012
    Assignee: SINT Holdings Limited Liability Company
    Inventors: Patrick D. Lincoln, Natarajan Shankar
  • Patent number: 8166549
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Grant
    Filed: April 18, 2010
    Date of Patent: April 24, 2012
    Assignee: Stragent, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 8166307
    Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures.
    Type: Grant
    Filed: August 31, 2010
    Date of Patent: April 24, 2012
    Assignee: McAffee, Inc.
    Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
  • Publication number: 20120096277
    Abstract: A system and method is for personal authentication with respect to a service provider using a mobile device. The method includes providing the user of the mobile device (2) with a two-dimensional code (1), the information contained in a two-dimensional code (1) including encrypted original data which includes an encrypted session key for certifying the user with respect to the service provider; the mobile device (2) obtaining an image containing the two-dimensional code (1) via an image capturing system; the mobile device (2) obtaining the two-dimensional code (1) from the image; the two-dimensional code (1) being converted into a character code. The mobile device (2) obtains the original data including the dynamic session key for authenticating the user before the service provider from the character code, by applying a decryption process.
    Type: Application
    Filed: April 19, 2010
    Publication date: April 19, 2012
    Applicant: ALTER CORE, S.L.
    Inventor: José Maria Perez Soria
  • Patent number: 8159698
    Abstract: A print instruction apparatus includes a selecting unit which selects an attached file to be printed on a sheet together with a base file designated in advance as a print target. The print instructing apparatus includes a generating unit which generates code information for the selected attached file, and a transmitting unit which transmits a print instruction of the base file and the code information of the attached file to the printing apparatus.
    Type: Grant
    Filed: January 30, 2007
    Date of Patent: April 17, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventors: Atsushi Kamasuka, Fumio Shoji
  • Patent number: 8161281
    Abstract: The present invention is a method and system for high-assurance data tagging for input/output feeds. The method may include executing a high-assurance tagging application on a microprocessor (e.g., the microprocessor being designed for use in a high-assurance embedded system). Further, the method may include analyzing a message with the high-assurance tagging application and generating and attaching a tag to the message. In addition, the method may include binding the tag to the message by applying a message authentication scheme and providing a mechanism for down-stream applications to identify information about data included in the message by reference to the tag.
    Type: Grant
    Filed: April 13, 2006
    Date of Patent: April 17, 2012
    Assignee: Rockwell Collins, Inc.
    Inventors: Tony L. Johnson, Antonino N. Mione, James A. Marek
  • Patent number: 8161534
    Abstract: One embodiment provides a system that verifies a user's identity. The system generates a list including a plurality of items and formulates a substantially large set of security questions base on the plurality of items. The number of questions in the set is significantly larger than a subset of security questions presented to the user to reduce the likelihood of the same questions being asked repeatedly. During account creation, the system presents to the user the subset of questions, and receives and stores a response from the user. At least one question in the subset is selected based on user information that is automatically extracted from devices associated with the user. Subsequently, the system receives a request to reset the user's password and presents the subset of questions to the requester. The system determines whether the requester is the user by comparing the requester's response with the stored user response.
    Type: Grant
    Filed: November 13, 2008
    Date of Patent: April 17, 2012
    Assignee: Palo Alto Research Center Incorporated
    Inventors: Philippe J. P. Golle, Bjorn Markus Jakobsson, Richard Chow
  • Patent number: 8161114
    Abstract: In a method for transmitting information using a data structure that is defined by the formal language called Abstract Syntax Notation One, the information is transmitted encoded as text. A form of plain-text encoding may generally be used. This enables the use of text-based transmission media, which are in widespread use. Furthermore, it enables fault localization without the use of additional tools.
    Type: Grant
    Filed: April 15, 1998
    Date of Patent: April 17, 2012
    Assignee: Deutsche Telekom AG
    Inventors: Heiko Dassow, Birgit Frohnhoff, Egbert Terlinde
  • Publication number: 20120086971
    Abstract: Exemplary embodiments include methods of handling stored electronic original information objects that have been created by electronically signing information objects by respective authorized users and transfer agents, submitting signed information objects to a trusted repository system, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying to each validated information object a date-time stamp and a digital signature and authentication certificate of the trusted repository system that is an electronic vault. One method includes the remote signing of electronic documents without the trusted repository ever releasing the electronic original documents and other information objects that are controlled and protected by the trusted repository system.
    Type: Application
    Filed: December 13, 2010
    Publication date: April 12, 2012
    Applicant: eOriginal, Inc.
    Inventors: Stephen F. Bisbee, Bryan K. Caporlette, Jack J. Moskowitz
  • Patent number: 8156341
    Abstract: Provided a secure pattern recognition method. The method includes: receiving data and generating a probe by converting the received data into a template for pattern recognition; accessing a gallery that is a template registered and stored in advance; determining a region to which the probe belongs and obtaining the center point of the region; obtaining a hash value of the center point and coordinate of the probe; and determining whether or not the hash value of the center point and a hash value stored in the gallery are equal and determining whether or not the probe and the gallery are classified into the same class by calculating whether or not the coordinate of the probe is inside a decision boundary configured with thresholds on the basis of the coordinates of the center point.
    Type: Grant
    Filed: September 19, 2008
    Date of Patent: April 10, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yongjin Lee, Ki Young Moon, Yun Su Chung, Kyo Il Chung
  • Patent number: 8145911
    Abstract: One aspect of the invention is a method for generating a certified electronic document that includes receiving identification information associated with a signatory user from a computer. From the same computer, identification information associated with a notary user is also received. At least one electronic document that requires certification is identified on a display. A first user command is received from the computer identifying the assent of the signatory user to the execution of the at least one electronic document. A second user command is received from the computer identifying the assent of the notary user to the certification of the at least one electronic document. Official indicia associated with the notary user is applied to the at least one electronic document to create at least one certified document.
    Type: Grant
    Filed: May 10, 2010
    Date of Patent: March 27, 2012
    Assignee: Stewart Title Company
    Inventors: Darren G. Ross, Charles E. Epperson
  • Patent number: 8145909
    Abstract: In one example embodiment, a method is illustrated that includes parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, transmitting content information relating to the digital content to the signing entity, and receiving digitally signed content information relating to the digital content, the digitally signed content information signed by the signing entity. In another example embodiment, a method is illustrated as including parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, receiving a credential from the signing entity, the credential used to sign the digital content, and signing the digital content using the credential.
    Type: Grant
    Filed: May 16, 2007
    Date of Patent: March 27, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Sunil Agrawal, Andrei Sheretov, John Landwehr
  • Patent number: 8140852
    Abstract: A system for authenticating a serialized commodity is presented. A fixed identification, serial number, and authentication code are received for a serialized commodity to be checked for authenticity. A reference table is searched for an entry that matches the received fixed identification. In response to finding an entry in the reference table that matches the received fixed identification, a fixed identification key is retrieved from the reference table that is associated with the received fixed identification. A recreated authentication code is generated for the serialized commodity using the retrieved fixed identification key, the received fixed identification, and the received serial number. Then, it is determined whether the recreated authentication code matches the received authentication code. In response to determining that the recreated authentication code does match the received authentication code, an authentication code match message is outputted to authenticate the serialized commodity.
    Type: Grant
    Filed: June 16, 2008
    Date of Patent: March 20, 2012
    Assignee: International Business Machines Corporation
    Inventors: Erich Guenter, Mark Edmund Maresh, Thomas S. Mazzeo
  • Patent number: 8135955
    Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encrypter for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.
    Type: Grant
    Filed: December 1, 2010
    Date of Patent: March 13, 2012
    Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.
    Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler