Including Generation Of Associated Coded Record Patents (Class 713/179)
-
Publication number: 20120297198Abstract: Privacy-preserving metering with low overhead is described. In an embodiment consumption of a resource such as electricity, car insurance, cloud computing resources is monitored by a meter and bills are created in a manner which preserves privacy of a customer but at the same reduces bandwidth use between a meter and a provider of the resource. For example, fine grained meter readings which describe customer behavior are kept confidential without needing to send large cryptographic commitments to meter readings from a meter to a provider. In an example, meter readings are encrypted and sent from a meter to a provider who is unable to decrypt the readings. In examples a cryptographic signature is generated to commitments to the meter readings and only the signature is sent to a provider thus reducing bandwidth. For example, a customer device is able to regenerate the commitments using the signature.Type: ApplicationFiled: May 19, 2011Publication date: November 22, 2012Applicant: Microsoft CorporationInventors: George Danezis, Markulf Kohlweiss
-
Patent number: 8316238Abstract: An approach for tracking documents using image processing is disclosed. Auxiliary information corresponding to compressed digital information is extracted. The auxiliary information is used to output text lines, which undergo a hash function (e.g., checksum operation). In this manner, individual hash values are generated, as well as an overall hash value of the entire file of text lines. A reference set of hash values are maintained to identify other compressed digital information.Type: GrantFiled: October 25, 2006Date of Patent: November 20, 2012Assignee: Verizon Patent and Licensing Inc.Inventors: John Francis Mergen, Carl Marshall Eliot Powell, Daniel M. Wood
-
Patent number: 8315385Abstract: The present invention provides a system and method for introducing white noises into a digital audio signal so that there is progressive and cumulative degradation in audio quality after each successive reproduction of the audio sound signal in a fashion analogous to analog audio reproduction. The invention provides a white noise generator, and a digital entroping unit. In a preferred embodiment, the white noise generator is implemented by a hardware random number generator. The digital entroping unit controls the magnitude of white noise desired based on a random number generated by the random number generator, and adds the white noise to the input audio sound signal to produce a degraded audio sound signal. The magnitude of white noise can be controlled by using various masking and formatting of random number data.Type: GrantFiled: February 12, 2007Date of Patent: November 20, 2012Assignee: Nvidia CorporationInventor: Jason Seung-Min Kim
-
Patent number: 8312281Abstract: A computer system includes a printer configured to print invisible coded data tags on print media. Each data tag includes a target and a dot arrangement representing a value. A pen-type device includes an image sensor configured to sense the targets and wirelessly transmit sensed data associated with the dot arrangements. A relay is configured to receive the transmitted data. One or more servers are interfaced to the relay, and are configured to process the received data from the relay and to perform an action based upon the processed data.Type: GrantFiled: November 18, 2008Date of Patent: November 13, 2012Assignee: Silverbrook Research Pty LtdInventors: Kia Silverbrook, Paul Lapstun
-
Patent number: 8301553Abstract: Electronic documents corresponding to executed paper documents are certified. A certifying agent receives an electronic document and a corresponding paper document that had been executed pursuant to some transaction. The certifying agent compares the information contained in the paper to that in the electronic mortgage document. If the paper adequately corresponds to the electronic document and is otherwise sufficient, then the certifying agent certifies the electronic document so that other parties can reliably engage in transactions involving the electronic document without having to possess or otherwise inspect the executed paper document. Certification involves application of some form of indicia of certification to the electronic document, such as updating the value of a field corresponding to certification in the electronic document and/or applying a digital or electronic signature corresponding to the certifying agent to the electronic document.Type: GrantFiled: December 20, 2002Date of Patent: October 30, 2012Assignee: Fannie MaeInventors: J. Harvey Trimble, Jr., Cynthia H. Keith, Charlotte Haberaecker, N. Grande Bucca
-
Patent number: 8301892Abstract: A secure instant messaging (IM) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (CA) issues security certificates to users binding the user's IM screen name to a public key, used by sending users to encrypt messages and files for the user. The CA uses a subscriber database to keep track of valid users and associated information, e.g. user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to an instant messaging server which publishes the user's certificate to other users. Users encrypt instant messages and files using an encryption algorithm and the recipient's certificate. A sending user can sign instant messages using his private signing key. The security status of received messages is displayed to recipients.Type: GrantFiled: April 30, 2010Date of Patent: October 30, 2012Assignee: Marathon Solutions LLCInventors: Robert B. Lord, Terry N. Hayes, Justin Uberti
-
Publication number: 20120265994Abstract: A method for establishing a secure connection between a first computer and a second computer, comprising the steps of (A) generating a signature authentication pair on the first computer, (B) receiving a plurality of authentication pairs that may or may not include the signature authentication pair, (C) detecting whether the signature authentication pair is received in the authentication pairs and (D) if the signature authentication pair is detected, creating a secure connection between the first computer and the second computer.Type: ApplicationFiled: April 13, 2011Publication date: October 18, 2012Inventors: Mahmoud K. Jibbe, Senthil Kannan, Arunkumar Ragendran, Britto Rossario
-
Publication number: 20120265995Abstract: A method for securing communications in a vehicle-to-vehicle (V2V) system including an on-board computer of a broadcasting vehicle predicting a value for a vehicle parameter, generating a heavyweight signature corresponding to the predicted value, and obtaining an actual value for the vehicle parameter. The method also includes the computer comparing the predicted value to the actual value to determine if the predicted value bears a first relationship to the actual value. If the computer determines that the predicted value bears the relationship to the actual value, the on-board computer generates a lightweight authenticating signature to correspond to the predicted value and broadcasts a data message having the predicted value with the corresponding heavyweight authenticating signature and the corresponding lightweight authenticating signature.Type: ApplicationFiled: April 14, 2011Publication date: October 18, 2012Applicant: GM CLOBAL TECHNOLOGY OPERATIONS LLCInventors: Arzad A. Kherani, Debojyoti Bhattacharya, Skanda N. Muthaiah
-
Patent number: 8291471Abstract: Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.Type: GrantFiled: April 6, 2009Date of Patent: October 16, 2012Assignee: International Business Machines CorporationInventors: Sandro Piccinini, Luigi Pichetti, Marco Secchi, Antonio Secomandi
-
Patent number: 8284431Abstract: Insertion of a watermark corresponding to the content of a file at the time of the printing of the file is made possible. Importance and/or confidentiality is defined per keyword in advance, and the watermark to be inserted is defined based thereon. At the time of the printing of the file, a keyword search within the file is performed, and the watermark to be inserted is automatically selected based on the search result (see FIG. 5).Type: GrantFiled: December 5, 2008Date of Patent: October 9, 2012Assignee: Hitachi Solutions, Ltd.Inventor: Atsuo Ohsone
-
Patent number: 8281143Abstract: Various methods and systems for protecting against chosen plaintext attacks when encrypting data for storage on an untrusted storage system are disclosed. One method involves generating an encryption key for use in encrypting data and generating an identifier for the data. Generation of the encryption key is based upon a hash of the data to be encrypted. The method also involves detecting whether an encrypted copy of the data is already stored by a storage system, based upon the identifier. The method also modifies the data to be encrypted or the encryption key, based upon a client-specific value, prior to generating the identifier.Type: GrantFiled: September 29, 2008Date of Patent: October 2, 2012Assignee: Symantec Operating CorporationInventors: Thomas G. Clifford, Weibao Wu
-
Patent number: 8281142Abstract: A system and method helps to control “read” and/or “write” access to electronic paper (e-paper). Informational data may be on a restricted portion of e-paper material that is protected by a security methodology accessible to authorized entities. Some embodiments maintain a record of access activity regarding the restricted portion, and a record of access activity regarding use of an item or product or service related to the e-paper informational data. Some implementations include an authorization listing of a party having a particular access privilege or authorization to make modifications to various restricted portions including an authentication region and a protected region. One possible aspect includes performing a verification analysis of data indicia in a restricted portion of the e-paper media. Additional possible system and process components may determine an authenticity status of the data indicia, and provide an output result.Type: GrantFiled: October 31, 2007Date of Patent: October 2, 2012Assignee: The Invention Science Fund I, LLCInventors: Edward K. Y. Jung, Royce A. Levien, Mark A. Malamud, John D. Rinaldo, Jr.
-
Publication number: 20120239937Abstract: According to an embodiment, an information processing device includes a key set generating unit configured to generate a key set including at least a public key and a master key; a secret key generating unit configured to generate different secret keys for each server device accessing the information processing device by using the master key included in the key set; a secret key providing unit configured to provide each of the secret keys generated by the secret key generating unit to a corresponding server device; and a public key providing unit configured to provide the public key to a verification device to make the verification device verify signature information generated by using the secret key in each of the server devices.Type: ApplicationFiled: January 19, 2012Publication date: September 20, 2012Applicant: KABUSHIKI KAISHA TOSHIBAInventors: Shinji Yamanaka, Yuichi Komano
-
Patent number: 8271795Abstract: This invention relates to security for data objects; more particularly, the present invention relates to improved security based on subliminal and supraliminal channels for data objects. In another embodiment, a method of protecting a data object comprises: steganographically encoding a subset of candidate bits in a digitized sample stream; perceptibly manipulating data in the digitized sample stream; and combining the imperceptible and perceptible data changes to create a secure/unique digital sample stream. In yet another embodiment, a method for securing a data signal comprises: preanalyzing said data signal for candidate watermark/signature bits; steganographically encoding independent data into the data signal into a subset of the candidate watermark bits, at least one time; and encoding the data signal subsequently with a perceptible technique.Type: GrantFiled: September 11, 2006Date of Patent: September 18, 2012Assignee: Blue Spike, Inc.Inventor: Scott A. Moskowitz
-
Patent number: 8272060Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.Type: GrantFiled: April 18, 2010Date of Patent: September 18, 2012Assignee: Stragent, LLCInventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
-
Patent number: 8266435Abstract: The invention pertains to a method, computer readable medium, and data processing system for generation of an asymmetric cryptographic key pair including reception of an arbitrarily selectable login name, calculation of a first data object key, whereby a random value and the login name are included in the calculation, and calculation of a second data object key from the first data object key, whereby the first and second data object keys form the asymmetric cryptographic key pair.Type: GrantFiled: January 25, 2010Date of Patent: September 11, 2012Assignee: CompuGROUP Holding AGInventors: Adrian Spalka, Jan Lehnhardt
-
Patent number: 8261084Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.Type: GrantFiled: January 21, 2011Date of Patent: September 4, 2012Assignee: Panasonic CorporationInventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
-
Patent number: 8261085Abstract: According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security component, the security component adapted to read and verify data within data blocks stored in a L1 instruction cache memory and to allow the execution of data block instructions in the core only upon the instructions being verified by the use of a cryptographic algorithm.Type: GrantFiled: September 26, 2011Date of Patent: September 4, 2012Assignee: Media Patents, S.L.Inventor: Álvaro Fernández Gutiérrez
-
Patent number: 8255694Abstract: A method, system, and apparatus for authenticating transactions and records is disclosed. An information-based indicium includes an article bearing a first identifier, wherein the first identifier substantially prevents a single user from accumulating multiple articles bearing the same first identifier, and a first digital certificate that is derived in part by encoding the first identifier, wherein the first digital certificate and the article may be presented together to authenticate the indicium by comparing the first digital certificate and the first identifier.Type: GrantFiled: September 15, 2006Date of Patent: August 28, 2012Assignee: Sint Holdings Limited Liability CompanyInventors: Patrick D. Lincoln, Natarajan Shankar
-
Patent number: 8255335Abstract: Disclosed are systems and methods for establishing a personal identification number (PIN). The systems and methods provide techniques to begin a remote session with a customer, prompt the customer to select a PIN to associate with a financial account card during the remote session, and receive the PIN from the customer during the remote session.Type: GrantFiled: April 11, 2007Date of Patent: August 28, 2012Assignee: United Services Automobile Association (USAA)Inventors: Ryan Ray Barth, Felicia Tavares
-
Patent number: 8250626Abstract: The present invention provides a way to secure data accessed by a software package pre-loaded on a computer system (for delivery to a customer). Specifically, under the present invention, customer data is loaded on a computer system along with any software package(s) that access the customer data prior to shipping the computer system to the customer. Also prior to shipping, a set (e.g., one or more) of passwords for accessing the data such as an administrative password and a hard disk password are set. After the computer system is shipped to the customer, confirmation of proper delivery will be sought. Once this confirmation is received, an access code such as a key or the set of passwords themselves will be shipped to the customer to unlock and use the data.Type: GrantFiled: November 3, 2006Date of Patent: August 21, 2012Assignee: International Business Machines CorporationInventors: David B. Rhoades, Simon C. Chu, William M. Privette
-
Patent number: 8245918Abstract: A method for securely handling processing of information includes, in a chip, selecting one of a plurality of data processes based on a random index. After a randomly allocated time interval has elapsed, the selected one of the plurality of data processes may be initiated. The selected one of the plurality of data processes may include accessing data and/or acquiring the data. Burstiness of the data may be approximately equal to burstiness of data acquired by at least one of a plurality of clients on the chip. Data may be verified by the selected one of the plurality of data processes prior to the processing of the data.Type: GrantFiled: June 14, 2011Date of Patent: August 21, 2012Assignee: Broadcom CorporationInventors: Xuemin Chen, Iue-Shuenn I. Chen, Francis Chi-Wai Cheung, Longyin Wei
-
Patent number: 8245038Abstract: One embodiment of the present invention provides a system which allows a document owner to redact content from a document and allows a recipient of the redacted document to challenge the appropriateness of the redaction. During operation, the system allows the document owner to redact a string Mi from location i in the document. In doing so, the system produces a commitment Ci=C(Mi, Ri) based on string Mi and a string Ri used as randomness and communicates Ci to the recipient. When the recipient challenges the redaction, the system receives a topic string T from the recipient, and produces a string RT. The system then communicates RT to the recipient, thereby allowing the recipient to produce a commitment CT=C(T, RT) based on strings T and RT, and compare CT with Ci. Comparing commitment CT with Ci allows the recipient to test redactions for string equality.Type: GrantFiled: March 26, 2008Date of Patent: August 14, 2012Assignee: Palo Alto Research Center IncorporatedInventors: Philippe Jean-Paul Golle, Jessica N. Staddon, Richard Chow
-
Patent number: 8230228Abstract: Tamper detection of audit records comprises configuring a proxy for adding tamper evidence information to audit information by obtaining audit records from at least one audit record generating source, grouping obtained audit records into subsets of audit records and providing tamper evidence processing to the subsets utilizing a cryptographic mechanism to calculate a signature over each subset of audit records. The proxy groups the subsets such that each subset contains at least one designated carryover audit record that overlaps into a next subset so that each carryover audit record is associated with at least two signatures. As such, the proxy creates an overlapping chain of digitally signed audit records subsets. The proxy further forwards the tamper evident audit records from the tamper evidence adding proxy to a corresponding audit log storage subsystem for storage, storing the calculated signatures.Type: GrantFiled: October 31, 2008Date of Patent: July 24, 2012Assignee: International Business Machines CorporationInventors: Timothy J. Hahn, Heather M. Hinton
-
Patent number: 8230215Abstract: In a vehicle-to-vehicle communication network utilizing PKI security methods to protect communications and in which the PKI encryption utilizes a Certificate Authority having both a private key and a publicly distributed key, a method for allocating multiple certificates for each vehicle which are assigned to each vehicle in the communication network. The method includes the step of assigning a unique secret key k to each vehicle in the communication network. The Certificate Authority then creates a plurality of public key and private key encryption pairs for each vehicle and each encryption pair is associated with an index i. A plurality of certificates are then created with one certificate for each value of the index. A revocation list comprising the secret keys is maintained by the Certificate Authority so that all encryption pairs assigned to a particular vehicle may be revoked by the secret key k corresponding to that vehicle.Type: GrantFiled: April 11, 2008Date of Patent: July 24, 2012Assignees: Toyota Motor Engineering & Manufacturing North America, Inc., The Board of Trustees, University of Illinois at Urbana-ChampaignInventors: Kenneth P. Laberteaux, Yih-Chun Hu, Jason Haas
-
Patent number: 8208157Abstract: An authentication apparatus outputs an application form to be used in applying for access authorization, which is printed with an identification image showing information including identification information of terminal equipment. The authentication apparatus scans the application form which is filled out by a user as required, recognizes the abovementioned information from the image data obtained by scanning, and authorizes the terminal equipment that corresponds to the abovementioned recognized information to have access to a specified network.Type: GrantFiled: September 20, 2007Date of Patent: June 26, 2012Assignee: Konica Minolta Business Technologies, Inc.Inventors: Shuichiro Kaneko, Kenji Ogasawara, Hiroyuki Ozawa
-
Publication number: 20120159179Abstract: Representations of polynomials a, s, t, e—1 and e—2 can be provided. Values of coefficients of the polynomials can be limited, and can be computed using randomization techniques. A verification key can be generated to include representations of polynomials a, b, and c. Computation of b can include computing a product using a and s, and adding e—1. Computation of c can include computing a product using a and t, and adding e—2. A signing key can represent s and t. The signing key can be used to produce a message signature that can represent a sum of t and a product of s and m, with m being derived from a message to be signed. The verification key can be used to verify the signature by checking coefficient sizes of a polynomial represented by the signature, and of a checking polynomial derived from the verification key and the signature.Type: ApplicationFiled: December 17, 2010Publication date: June 21, 2012Applicant: MICROSOFT CORPORATIONInventors: Kristin E. Lauter, Elisabeth Malmskog, Michael Naehrig, Vinod Vaikuntanathan
-
Patent number: 8203431Abstract: In a method of processing data, an RFID signal (6) sent by a reader (3,5) via a field generated by the reader (3,5) is received at a passive RFID transponder (2). The transponder (2) comprises a dedicated receiver (28) for receiving a time signal (8), which is wirelessly sent By an external sender (4) and comprises information about the present time. The transponder (2) including the dedicated receiver (28) is powered utilizing the field such that the dedicated receiver (28) detects the time signal (8) and decodes the present time. Utilizing the transponder (2), the first data (7) contained in the RFID signal (6) is decoded and processed. Second data (9) which are time stamped by said transponder (2) utilizing said present time are generated, and a response signal (10) comprising the second data (9) is transmitted from the transponder.Type: GrantFiled: February 12, 2008Date of Patent: June 19, 2012Assignee: NXP B.V.Inventor: Frank Graeber
-
Patent number: 8191165Abstract: A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide tagged fragments for distribution. The tags may be generated using a pseudo-random number (PRN) bit sequence. A digital rights license is generated for the digital content file based on the tags and/or fragments. The digital rights license is configured to allow reassembly of the tagged fragments to provide the digital content file. Later, the fragments may be re-tagged with corresponding second tags to provide second tagged fragments for distribution that are different from the first tagged fragments. Related systems and computer program products are also discussed.Type: GrantFiled: December 8, 2010Date of Patent: May 29, 2012Assignee: AT&T Intellectual Property I, L.P.Inventor: Jeffrey A. Aaron
-
Patent number: 8189854Abstract: A method of embedding information in digital content representing media streams. The method includes (1) selecting a set of locations within that digital content representing the media stream to embed information, (2) selecting a set of possible alterations to make at those locations, and (3) making a subset of the possible alterations. The set of locations and possible alterations is herein sometimes called a “watermark.” The subset of actual alterations that are made is herein sometimes called a “fingerprint.” The method determines a set of locations at which there are alternative versions of digital content representing the same media stream, such as one being the original and one being an alternative version of the same digital content, herein sometimes called the “original movie” and the “alt-movie,” or herein sometimes called the “original block” and the “alt-block” for a particular block in the digital content representing the media stream.Type: GrantFiled: February 16, 2007Date of Patent: May 29, 2012Assignee: Kaleidescape, Inc.Inventors: Stephen Watson, Daniel A. Collens, Kevin Hui, Michael A. Malcolm
-
Patent number: 8190902Abstract: Techniques are provided for forming a digital signature for a portion of a document. A registered module is invoked to process the document in accordance with a structured format associated with the document. The registered module is able to process a plurality of different structured formats. The registered module obtains the portion. A digital signature is formed for the portion. The digital signature is included in the document in accordance with the structured format.Type: GrantFiled: February 27, 2006Date of Patent: May 29, 2012Assignee: Microsoft CorporationInventors: Andrew T. Lytle, Bryan J. Reich, Gitika Gupta, Matthew C. Pohle, Mariya Tikunova
-
Publication number: 20120124385Abstract: In a method for detecting infringements of the authenticity of a system component an authentication request is sent from a controller to an authentication device of the system component. A first authentication code is calculated in the authentication device by applying a shared one-way function to an identification code, stored in the authentication device, for the system component. A second authentication code in the controller is calculated by applying the shared one-way function to an identification code, stored in the controller, for the system component, and an authentication response including the first authentication code is sent from the authentication device to the controller. The first authentication code is compared with the second authentication code in the controller for detecting infringements of the authenticity of the system component.Type: ApplicationFiled: January 27, 2012Publication date: May 17, 2012Applicant: Siemens AktiengesellschaftInventors: Wolfgang Klasen, Angela Schattleitner
-
Patent number: 8181261Abstract: A system and method for controlling the reproduction of documents containing sensitive information includes an input for receiving a document; a device for storing a digitized document; a detector for identifying encoded sensitive information; a decoder operatively connected to the detector, which extracts digitally encoded information from the sensitive information; a processor operatively connected to the decoder, which receives digitally decoded sensitive information; a user interface module for receiving a user identity and an access mediator for receiving decoded sensitive information from the processor, comparing the user identity with a decoding scheme associated with the document and allowing or disallowing the decoded sensitive information to be reproduced.Type: GrantFiled: May 13, 2005Date of Patent: May 15, 2012Assignee: Xerox CorporationInventor: Robert H. Sperry
-
Patent number: 8179547Abstract: This invention facilitates an operation required to restore a desired file from code information. To accomplish this, a printing apparatus prints code information generated by encoding a file on a first sheet set, and prints identification information required to identify the sheet on which the code information corresponding to the file is printed. A restoration apparatus scans the first and second sheet sets. The restoration apparatus specifies, based on the identification information on the second sheet set, a sheet on which code information corresponding to a desired file is printed. Furthermore, the restoration apparatus restores the desired file by decoding the code information printed on the specified sheet.Type: GrantFiled: January 31, 2007Date of Patent: May 15, 2012Assignee: Canon Kabushiki KaishaInventors: Atsushi Kamasuka, Fumio Shoji
-
Patent number: 8176106Abstract: The present invention relates to a method and a device (11) using a physical token (14), which provides measurable parameters, to derive at least one data set. A plurality of values of one or more of the parameters are measured. From these measured values, a measure of variance is calculated. Quantization intervals into which a measured value is to be quantized are then determined. A possible value of a data set, which subsequently can be derived from a measured value provided by the physical token, is associated with each quantization interval. Further, information which subsequently enables determination of these quantization intervals is stored. Hence, an enrolling phase has been completed. When the preparing phase has been completed, a deriving phase may commence. When a data set is to be derived, for example to be used as a cryptographic key, a value of any one of the parameters provided by the PUF is measured.Type: GrantFiled: December 12, 2006Date of Patent: May 8, 2012Assignee: NXP B.V.Inventors: Geert Jan Schrijen, Boris Skoric
-
Patent number: 8171285Abstract: A cryptographically signed filesystem provides a central database resident on a server that contains database objects. The server creates startup software to be installed in a client system's read only memory. The startup software contains a hash value for a second stage loader. The server also creates software for a bootstrap loader object which typically contains the operating system for a client system and also the bootstrap loader's hash value and a digital signature that is unique to the server. The startup software and objects created by the server are initially installed on a client device at the time of manufacture. The server can update a client's bootstrap loader and root filesystem at any time through the transmission of slices.Type: GrantFiled: October 25, 2006Date of Patent: May 1, 2012Assignee: TiVo Inc.Inventor: David C. Platt
-
Patent number: 8171297Abstract: A method, system, and apparatus for authenticating transactions and records is disclosed. A method for authenticating an information-based indicium includes receiving an article bearing a first identifier, wherein the first identifier substantially prevents a single user from accumulating multiple articles bearing the same first identifier, receiving a first digital certificate that is derived in part by encoding the first identifier, and comparing the first digital certificate and the first identifier to authenticate the information-based indicium.Type: GrantFiled: September 15, 2006Date of Patent: May 1, 2012Assignee: SINT Holdings Limited Liability CompanyInventors: Patrick D. Lincoln, Natarajan Shankar
-
Patent number: 8166549Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.Type: GrantFiled: April 18, 2010Date of Patent: April 24, 2012Assignee: Stragent, LLCInventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
-
Patent number: 8166307Abstract: A document accessible over a network can be registered. A registered document, and the content contained therein, cannot be transmitted undetected over and off of the network. In one embodiment, the invention includes maintaining a plurality of stored signatures, each signature being associated with one of a plurality of registered documents, intercepting an object being transmitted over a network, calculating a set of signatures associated with the intercepted object, and comparing the set of signatures with the plurality of stored signatures. In one embodiment, the invention can further include detecting registered content from the registered document being contained in the intercepted object, if the comparison results in a match of at least one of the signatures in the set of signatures with one or more of the plurality of stored signatures.Type: GrantFiled: August 31, 2010Date of Patent: April 24, 2012Assignee: McAffee, Inc.Inventors: Ratinder Paul Singh Ahuja, Matthew Howard, Rick Lowe, Erik de la Iglesia, William Deninger
-
Publication number: 20120096277Abstract: A system and method is for personal authentication with respect to a service provider using a mobile device. The method includes providing the user of the mobile device (2) with a two-dimensional code (1), the information contained in a two-dimensional code (1) including encrypted original data which includes an encrypted session key for certifying the user with respect to the service provider; the mobile device (2) obtaining an image containing the two-dimensional code (1) via an image capturing system; the mobile device (2) obtaining the two-dimensional code (1) from the image; the two-dimensional code (1) being converted into a character code. The mobile device (2) obtains the original data including the dynamic session key for authenticating the user before the service provider from the character code, by applying a decryption process.Type: ApplicationFiled: April 19, 2010Publication date: April 19, 2012Applicant: ALTER CORE, S.L.Inventor: José Maria Perez Soria
-
Patent number: 8159698Abstract: A print instruction apparatus includes a selecting unit which selects an attached file to be printed on a sheet together with a base file designated in advance as a print target. The print instructing apparatus includes a generating unit which generates code information for the selected attached file, and a transmitting unit which transmits a print instruction of the base file and the code information of the attached file to the printing apparatus.Type: GrantFiled: January 30, 2007Date of Patent: April 17, 2012Assignee: Canon Kabushiki KaishaInventors: Atsushi Kamasuka, Fumio Shoji
-
Patent number: 8161281Abstract: The present invention is a method and system for high-assurance data tagging for input/output feeds. The method may include executing a high-assurance tagging application on a microprocessor (e.g., the microprocessor being designed for use in a high-assurance embedded system). Further, the method may include analyzing a message with the high-assurance tagging application and generating and attaching a tag to the message. In addition, the method may include binding the tag to the message by applying a message authentication scheme and providing a mechanism for down-stream applications to identify information about data included in the message by reference to the tag.Type: GrantFiled: April 13, 2006Date of Patent: April 17, 2012Assignee: Rockwell Collins, Inc.Inventors: Tony L. Johnson, Antonino N. Mione, James A. Marek
-
Patent number: 8161534Abstract: One embodiment provides a system that verifies a user's identity. The system generates a list including a plurality of items and formulates a substantially large set of security questions base on the plurality of items. The number of questions in the set is significantly larger than a subset of security questions presented to the user to reduce the likelihood of the same questions being asked repeatedly. During account creation, the system presents to the user the subset of questions, and receives and stores a response from the user. At least one question in the subset is selected based on user information that is automatically extracted from devices associated with the user. Subsequently, the system receives a request to reset the user's password and presents the subset of questions to the requester. The system determines whether the requester is the user by comparing the requester's response with the stored user response.Type: GrantFiled: November 13, 2008Date of Patent: April 17, 2012Assignee: Palo Alto Research Center IncorporatedInventors: Philippe J. P. Golle, Bjorn Markus Jakobsson, Richard Chow
-
Patent number: 8161114Abstract: In a method for transmitting information using a data structure that is defined by the formal language called Abstract Syntax Notation One, the information is transmitted encoded as text. A form of plain-text encoding may generally be used. This enables the use of text-based transmission media, which are in widespread use. Furthermore, it enables fault localization without the use of additional tools.Type: GrantFiled: April 15, 1998Date of Patent: April 17, 2012Assignee: Deutsche Telekom AGInventors: Heiko Dassow, Birgit Frohnhoff, Egbert Terlinde
-
Publication number: 20120086971Abstract: Exemplary embodiments include methods of handling stored electronic original information objects that have been created by electronically signing information objects by respective authorized users and transfer agents, submitting signed information objects to a trusted repository system, validating the submitted signed information objects by at least testing the integrity of the contents of each signed information object and the validity of the signature of the respective transfer agent, and applying to each validated information object a date-time stamp and a digital signature and authentication certificate of the trusted repository system that is an electronic vault. One method includes the remote signing of electronic documents without the trusted repository ever releasing the electronic original documents and other information objects that are controlled and protected by the trusted repository system.Type: ApplicationFiled: December 13, 2010Publication date: April 12, 2012Applicant: eOriginal, Inc.Inventors: Stephen F. Bisbee, Bryan K. Caporlette, Jack J. Moskowitz
-
Patent number: 8156341Abstract: Provided a secure pattern recognition method. The method includes: receiving data and generating a probe by converting the received data into a template for pattern recognition; accessing a gallery that is a template registered and stored in advance; determining a region to which the probe belongs and obtaining the center point of the region; obtaining a hash value of the center point and coordinate of the probe; and determining whether or not the hash value of the center point and a hash value stored in the gallery are equal and determining whether or not the probe and the gallery are classified into the same class by calculating whether or not the coordinate of the probe is inside a decision boundary configured with thresholds on the basis of the coordinates of the center point.Type: GrantFiled: September 19, 2008Date of Patent: April 10, 2012Assignee: Electronics and Telecommunications Research InstituteInventors: Yongjin Lee, Ki Young Moon, Yun Su Chung, Kyo Il Chung
-
Patent number: 8145911Abstract: One aspect of the invention is a method for generating a certified electronic document that includes receiving identification information associated with a signatory user from a computer. From the same computer, identification information associated with a notary user is also received. At least one electronic document that requires certification is identified on a display. A first user command is received from the computer identifying the assent of the signatory user to the execution of the at least one electronic document. A second user command is received from the computer identifying the assent of the notary user to the certification of the at least one electronic document. Official indicia associated with the notary user is applied to the at least one electronic document to create at least one certified document.Type: GrantFiled: May 10, 2010Date of Patent: March 27, 2012Assignee: Stewart Title CompanyInventors: Darren G. Ross, Charles E. Epperson
-
Patent number: 8145909Abstract: In one example embodiment, a method is illustrated that includes parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, transmitting content information relating to the digital content to the signing entity, and receiving digitally signed content information relating to the digital content, the digitally signed content information signed by the signing entity. In another example embodiment, a method is illustrated as including parsing seed data from digital content, the seed data identifying a signing entity, transmitting identifier data to the signing entity identified by the seed data, receiving a credential from the signing entity, the credential used to sign the digital content, and signing the digital content using the credential.Type: GrantFiled: May 16, 2007Date of Patent: March 27, 2012Assignee: Adobe Systems IncorporatedInventors: Sunil Agrawal, Andrei Sheretov, John Landwehr
-
Patent number: 8140852Abstract: A system for authenticating a serialized commodity is presented. A fixed identification, serial number, and authentication code are received for a serialized commodity to be checked for authenticity. A reference table is searched for an entry that matches the received fixed identification. In response to finding an entry in the reference table that matches the received fixed identification, a fixed identification key is retrieved from the reference table that is associated with the received fixed identification. A recreated authentication code is generated for the serialized commodity using the retrieved fixed identification key, the received fixed identification, and the received serial number. Then, it is determined whether the recreated authentication code matches the received authentication code. In response to determining that the recreated authentication code does match the received authentication code, an authentication code match message is outputted to authenticate the serialized commodity.Type: GrantFiled: June 16, 2008Date of Patent: March 20, 2012Assignee: International Business Machines CorporationInventors: Erich Guenter, Mark Edmund Maresh, Thomas S. Mazzeo
-
Patent number: 8135955Abstract: The present invention relates to a device for detecting a manipulation of an information signal, having an extractor for extracting an information signal component characteristic for the information signal from the information signal, an encrypter for encrypting the information signal component to obtain an encrypted signal, and a comparator for comparing the encrypted signal to a reference signal, wherein the reference signal is an encrypted representation of a non-manipulated reference signal component of a reference information signal to detect the manipulation.Type: GrantFiled: December 1, 2010Date of Patent: March 13, 2012Assignee: Fraunhofer-Gesellschaft zur Foerderung der angewandten Forschung e.V.Inventors: Ralph Kulessa, Jörg Pickel, Stefan Krägeloh, Patrick Aichroth, Frank Siebenhaar, Christian Neubauer, Wolfgang Spinnler