Including Generation Of Associated Coded Record Patents (Class 713/179)
  • Publication number: 20100153734
    Abstract: The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step.
    Type: Application
    Filed: December 22, 2009
    Publication date: June 17, 2010
    Inventors: Scott A. Moskowitz, Mike W. Berry
  • Patent number: 7739508
    Abstract: A secure instant messaging system integrates secure text instant messaging and secure file transfers into existing instant messaging systems. At least one certificate authority (CA) is provided that issues a security certificate to a user that binds the user's instant messaging screen name to a public key which is used by other users to encrypt messages and files sent to the user and by the user to decrypt the received messages and files. A subscriber database is used by the CA to keep track of valid users and their associated information, such as: user screen names, user subscription expiration dates, and enrollment agent information. A user sends his certificate to the invention's instant messaging server which publishes the user's certificate to other users by creating a hash value of the user's certificate and sending it to the other users which allows the recipients to decide if they need to update their caches with a new copy of the user's certificate.
    Type: Grant
    Filed: October 27, 2006
    Date of Patent: June 15, 2010
    Assignee: AOL Inc.
    Inventors: Robert B. Lord, Terry N. Hayes, Justin Uberti
  • Patent number: 7738743
    Abstract: An image reading system is disclosed that has an image information reading unit for reading optical information on a manuscript, and an image outputting unit for outputting the optical information read by the image information reading unit to a recording medium. The system includes an IC tag information reading unit for reading IC tag information held by an IC tag provided on the manuscript, an IC tag information outputting unit for outputting the IC tag information read by the IC tag information reading unit to the recording medium, a conversion unit for converting the IC tag information into coded image data, and a control unit for controlling outputting of the coded image data.
    Type: Grant
    Filed: November 1, 2005
    Date of Patent: June 15, 2010
    Assignee: Ricoh Company, Ltd.
    Inventor: Makoto Hino
  • Publication number: 20100146288
    Abstract: A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used to complete a transaction. The system includes: (a) A client system for storing an encoded version of the information and an identifier. The encoded version is generated from first data of the information and an encoded version of the second data of the information. The information can be generated from the first data and the second data, and the predetermined use is infeasible with only one of the first data and the second data. (b) A remote server for storing the second data and an encoded identifier generated from the identifier. The client system sends at least the encoded version of the second data to the remote server. The client system or the remote server is able to generate the information from the first data and the second data.
    Type: Application
    Filed: February 10, 2010
    Publication date: June 10, 2010
    Inventor: Andrew Dominic Tune
  • Publication number: 20100138662
    Abstract: According to respective embodiments of the present invention, it is possible to verify a security environment of an digital signature and assure validity of the digital signature. For example, in the case of generating the digital signature, the assertion for asserting a key management system and a user authentication system is generated, the conversion processing is applied to both of the digital signature and the assertion, and the acquired digital signature, assertion, and conversion value are outputted. Therefore, it is possible to verify validity of the assertion on the basis of the conversion value and verify the security environment of the digital signature on the basis of the key management system and the user authentication system included in the assertion. Accordingly, the validity of the digital signature can be assured.
    Type: Application
    Filed: February 2, 2010
    Publication date: June 3, 2010
    Inventor: Tatsuro Ikeda
  • Publication number: 20100138664
    Abstract: Methods of providing a private placement document to a potential investor in a private placement. The methods may comprise the step of generating the private placement document in an encrypted electronic format. The private placement document may include a unique identifier. The methods may also comprise the steps of providing the private placement document to the potential investor, and recording the unique identifier.
    Type: Application
    Filed: February 3, 2010
    Publication date: June 3, 2010
    Applicant: Morgan Stanley
    Inventors: Robert Ross Seelos, David J. Brastauskas, Jenny Mak
  • Publication number: 20100138659
    Abstract: A process is disclosed for notarizing document, by a client in the presence of a notary, comprising the steps of registering the notary, the client and the document, from a local workstation coupled to a central office, to provide for assigning at least one respective encryption key for identifying each of the notary, the client and the document to be notarized; associating in the central office, the respective encryption keys of the client with the notary and with the document; generating a transaction code, based on the step of associating the respective encryption keys, for authorizing execution of the document to provide the notarizing; executing the document; and embedding selected ones of the respective encryption keys together with a notary seal in the document.
    Type: Application
    Filed: February 9, 2010
    Publication date: June 3, 2010
    Applicant: COGNOMINA, INC.
    Inventors: PAT CARMICHAEL, J. CHARLES DAVIS, SCOTTIE ASHLEY, CRAIG LAIRD
  • Publication number: 20100138663
    Abstract: A method of providing a security document is provided in which a computer system generates a digital signature of at least part of an identity associated with the security document, generates a plurality of coded data tags to each encode data on the identity and a respective part of the digital signature, and prints, with a printer networked therewith, the security document with the tags tiled thereacross. The tags are generated and printed so that interaction with only one of the tags to detect the identity and respective signature part encoded thereby allows authentication of the entire digital signature.
    Type: Application
    Filed: February 2, 2010
    Publication date: June 3, 2010
    Inventors: Kia Silverbrook, Paul Lapstun
  • Patent number: 7725726
    Abstract: A method and apparatus for determining the distance between transitions from a first logical state to a second logical state stored on a medium (i.e., a document). This determination is used to precisely characterize the information pattern in order to authenticate the information and the medium on which the information is stored. The invention uses a reader having a leading and trailing read apparatus which allow information to be read simultaneously from two or more locations spaced a known distance apart. The distance between the centerlines of each read apparatus is preferably an odd integer multiple of one half the distance between logical clock transitions. The distance between a first transition at the leading read apparatus and a next transition at the trailing read apparatus is used as a reference (i.e., the “Reference Value”). The Reference Value is compared with the distance between the first transition and the next transition on the medium (i.e., the “Jitter Value”).
    Type: Grant
    Filed: August 20, 2007
    Date of Patent: May 25, 2010
    Assignee: Semtek Innovative Solutions Corporation
    Inventors: Clay von Mueller, Robert Mos
  • Patent number: 7716720
    Abstract: The present invention is directed to a system for providing a trusted environment for untrusted computing systems. The system may include a HAC subsystem managing shared resources and a trusted bus switch for controlling a COTS processor to access the shared resources. The shared resources such as memory and several I/O resources reside on the trusted side of the trusted bus switch. Alternatively, the system may include a SCM as an add-on module to an untrusted host environment. Only authenticated applications including COTS OS execute on the SCM while untrusted applications execute on the untrusted host environment. The SCM may control secure resource access from the untrusted host through a plug-in module interface. All secure resources may be maintained on the trusted side of the plug-in module interface.
    Type: Grant
    Filed: June 17, 2005
    Date of Patent: May 11, 2010
    Assignee: Rockwell Collins, Inc.
    Inventors: James A. Marek, David S. Hardin, Raymond A. Kamin, III, Steven E. Koenck, Allen P. Mass
  • Publication number: 20100115284
    Abstract: Tamper detection of audit records comprises configuring a proxy for adding tamper evidence information to audit information by obtaining audit records from at least one audit record generating source, grouping obtained audit records into subsets of audit records and providing tamper evidence processing to the subsets utilizing a cryptographic mechanism to calculate a signature over each subset of audit records. The proxy groups the subsets such that each subset contains at least one designated carryover audit record that overlaps into a next subset so that each carryover audit record is associated with at least two signatures. As such, the proxy creates an overlapping chain of digitally signed audit records subsets. The proxy further forwards the tamper evident audit records from the tamper evidence adding proxy to a corresponding audit log storage subsystem for storage, storing the calculated signatures.
    Type: Application
    Filed: October 31, 2008
    Publication date: May 6, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Timothy J. Hahn, Heather M. Hinton
  • Publication number: 20100115283
    Abstract: Computation environments are protected from bogus or rogue load modules, executables, and other data elements through use of digital signatures, seals, and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules and/or other items to verify that their corresponding specifications are accurate and complete, and then digitally signs them based on a tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys), allowing one tamper resistance work factor environment to protect itself against load modules from another tamper resistance work factor environment. The verifying authority can provide an application intended for insecure environments with a credential having multiple elements covering different parts of the application.
    Type: Application
    Filed: January 11, 2010
    Publication date: May 6, 2010
    Applicant: Intertrust Technologies Corp.
    Inventor: W. Olin Sibert
  • Patent number: 7711958
    Abstract: Method and system for verifying the authenticity and integrity of files transmitted through a computer network. Authentication information is encoded in the filename of the file. In a preferred embodiment, authentication information is provided by computing a hash value of the file, computing a digital signature of the hash value using a private key, and encoding the digital signature in the filename of the file at a predetermined position or using delimiters, to create a signed filename. Upon reception of a file, the encoded digital signature is extracted from the signed filename. Then, the encoded hash value of the file is recovered using a public key and extracted digital signature, and compared with the hash value computed on the file. If the decoded and computed hash values are identical, the received file is processed as authentic.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: May 4, 2010
    Assignee: International Business Machines Corporation
    Inventor: Fernando Incertis Carro
  • Publication number: 20100106974
    Abstract: In accordance with an embodiment of the invention, a method of writing and reading redundant data is provided. Data is written by storing a copy of the data along with a timestamp and a signature at each of a set of storage devices. The data is read by retrieving the copy of the data, the timestamp and the signature from each of a plurality of the set of data storage devices. One of the copies of the data is selected to be provided to a requestor of the data. Each of the storage devices of the set is requested to certify the selected copy of the data. Provided that a proof of certification of the selected copy of the data is valid, the storage devices of the set are instructed to store the selected copy of the data along with a new timestamp.
    Type: Application
    Filed: October 24, 2008
    Publication date: April 29, 2010
    Inventors: Marcos K. Aguilera, Ram Swaminathan
  • Patent number: 7707429
    Abstract: Software intrusion is proactively detected using a dynamically evolving audit log wherein log entries are generated in the audit log and key values are evolved based upon a one-way function depending on both the previous log entry and the previous key. The audit log with the generated log entries and the final key value is transmitted to a clearinghouse that detects software intrusion by analyzing these values. In an effort to reduce the size of the log to be transmitted, the log entries are assigned identical values, thereby only needing to transmit one log entry and the last key value to the clearinghouse.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: April 27, 2010
    Assignee: International Business Machines Corporation
    Inventors: Hongxia Jin, Jeffrey Bruce Lotspiech
  • Patent number: 7707424
    Abstract: A method and apparatus are provided for identification/authentication of file transfers, that limits the attackers window of opportunity and that aims at incurring a minimum of overhead on the information processing between a client (CL) and a server (SV). According to a preferred embodiment of the invention hash functions (H1-H4) are involved at the server side and the client side. The client and server share a common secret value (S).
    Type: Grant
    Filed: April 9, 2002
    Date of Patent: April 27, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (PUBL)
    Inventor: Stefan Axelsson
  • Publication number: 20100095128
    Abstract: A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering, where such security was previously unavailable, for example, documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can extend, by many years, the useful life of currently-trusted integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
    Type: Application
    Filed: December 15, 2009
    Publication date: April 15, 2010
    Inventor: Kelce S. Wilson
  • Publication number: 20100095127
    Abstract: A method, programmed medium and system are provided for enabling a user to choose a user-preferred encryption type from among a plurality of encryption types listed in a user's Kerberos configuration file. During the ticket granting process in a Kerberos system, a user is requested to select a preferred encryption type to be used in the Kerberos communication from among encryption types contained in the user's Kerberos configuration file. The user-selected encryption type is then implemented for use in encrypting a session ticket (as well as generating the session key of user requested encryption type) for use by the user machine in communicating securely with an Kerberized application server when being communicated by that particular user. Thus, the system allows different users to simultaneously communicate with the same Kerberized application server using a supported encryption type of the user's own choice.
    Type: Application
    Filed: October 10, 2008
    Publication date: April 15, 2010
    Applicant: International Business Machines Corporation
    Inventors: Dwip N. Banerjee, Sandeep Ramesh Patil, Sachin C. Punadikar, Ravi A. Shankar
  • Patent number: 7698560
    Abstract: A system for storing information having a predetermined use which requires the information to be secured. The information may comprise credit card details used to complete a transaction. The system includes: (a) A client system for storing an encoded version of the information and an identifier. The encoded version is generated from first data of the information and an encoded version of the second data of the information. The information can be generated from the first data and the second data, and the predetermined use is infeasible with only one of the first data and the second data, (b) A remote server for storing the second data and an encoded identifier generated from the identifier. The client system sends at least the encoded version of the second data to the remote server. The client system or the remote server is able to generate the information from the first data and the second data.
    Type: Grant
    Filed: April 11, 2003
    Date of Patent: April 13, 2010
    Assignee: Spitlock Holdings Pty Ltd
    Inventor: Andrew Dominic Tune
  • Patent number: 7694335
    Abstract: A server is configured for preventing flood attacks by a client having sent a request, by dynamically generating a challenge to be performed by the client before the server will perform any work for the client. The challenge includes a dynamically generated computational request and a dynamically generated secure cookie. The server generates a first hash result based on hashing a first random number, having a prescribed length, with a second random number having a dynamically selected length. A secure cookie is generated based on hashing the first hash result with a prescribed secure key known only by the server, and a unique identifier for the request such as the client network address with a time stamp. The challenge requires the client to determine the second random number based on the first random number and the hash result. The server validates the challenge results using the secure cookie.
    Type: Grant
    Filed: March 9, 2004
    Date of Patent: April 6, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Bryan C. Turner, John Toebes
  • Patent number: 7689827
    Abstract: Computation environments are protected from bogus or rogue load modules, executables, and other data elements through use of digital signatures, seals, and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules and/or other items to verify that their corresponding specifications are accurate and complete, and then digitally signs them based on a tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys), allowing one tamper resistance work factor environment to protect itself against load modules from another tamper resistance work factor environment. The verifying authority can provide an application intended for insecure environments with a credential having multiple elements covering different parts of the application.
    Type: Grant
    Filed: May 22, 2007
    Date of Patent: March 30, 2010
    Assignee: Intertrust Technologies Corp.
    Inventor: W. Olin Sibert
  • Publication number: 20100077221
    Abstract: One or more content providers push data related to: movies, movie products, digital movie content over a network (e.g., a LAN, a WAN, the Internet, or a wireless network) onto an information filling station which, in turn, wirelessly transacts (over a network based on the 802.11b protocol) and transmits any requested data to a portable computer-based device (e.g., laptop, a pen-based computer device, a PDA, a wireless phone, or a pager). The portable device performs financial transactions for: purchasing movie tickets (directly or via auctions), downloading digital entertainment content of interest (e.g., copy of a movie of interest, copy of a movie identified based on a pre-stored profile, copy of soundtrack of a movie of interest), or movie related products. Any purchased digital content is either transferred wirelessly onto the portable device or, optionally, sent on a storage medium to a physical address associated with the profile.
    Type: Application
    Filed: November 30, 2009
    Publication date: March 25, 2010
    Inventors: David A. Deas, Lalitha Suryanarayana, Bruce Edward Stuckman, David Randall Wolter, Rias Muhamed, Russell William White, Michael Grannan
  • Patent number: 7685427
    Abstract: A system for loading digital watermarks automatically includes an application server (4). The application server includes a main controller. The main controller includes: a document fetching module (401) configured for fetching a document to be printed, and for accessing a document DRM header of the document fetched; a watermark downloading module (402) configured for downloading a digital watermark corresponding to the document; and an integrating module (403) configured for transforming the document into a graphical file and integrating the graphical file with the downloaded digital watermark. A related method is also disclosed.
    Type: Grant
    Filed: September 1, 2006
    Date of Patent: March 23, 2010
    Assignee: Hon Hai Precision Industry Co., Ltd.
    Inventor: Bor-Chuan Lin
  • Patent number: 7685422
    Abstract: An information processing apparatus has an authentication/key exchange unit, a round trip time measuring unit, a common key transmitter, a contents key transmitter and a contents transmitter. The round trip time measuring unit sends a round trip time measuring request generated to the communication apparatus through the first communication connection to measure the round trip time, and check whether the measured round trip time is within a predetermined time and whether a transmitting source of the round trip request response is the communication apparatus sharing the first key. The common key transmitter encrypts a second key used for contents transmission by using the first key and transmits the encrypted second key through the first communication connection when the round trip time measuring unit succeeds in the checking.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: March 23, 2010
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Hiroshi Isozaki, Takashi Kokubo, Koji Kanazawa
  • Patent number: 7685426
    Abstract: A method of managing content, and in particular, managing content on the Internet retrieves a web page that includes an image and detects whether the image included within the web page is embedded with a digital watermark. It generates an indicia associated with an image included in the web page that is embedded with a digital watermark. The indicia indicate to the user which images include watermarks. The watermarks may be used to convey links to related web pages or specific information about the images, such as usage rights and licensing information. Variations of this method create image bookmarks to web pages including images using thumbnails of those images. A content management system comprises a first program for retrieving web pages including images. It also includes a second program for extracting an image from a web page, creating a thumbnail of the image, and forming an image bookmark linking the thumbnail to the web page that the image has been extracted from.
    Type: Grant
    Filed: February 2, 2005
    Date of Patent: March 23, 2010
    Assignee: Digimarc Corporation
    Inventors: Daniel O. Ramos, Brian T. MacIntosh, Geoffrey B. Rhoads
  • Patent number: 7676680
    Abstract: Methods of providing a private placement document to a potential investor in a private placement. The methods may comprise the step of generating the private placement document in an encrypted electronic format. The private placement document may include a unique identifier. The methods may also comprise the steps of providing the private placement document to the potential investor, and recording the unique identifier.
    Type: Grant
    Filed: July 8, 2005
    Date of Patent: March 9, 2010
    Assignee: Morgan Stanley
    Inventors: Robert Ross Seelos, David J. Brastauskas, Jenny Mak
  • Publication number: 20100044438
    Abstract: Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed.
    Type: Application
    Filed: February 23, 2009
    Publication date: February 25, 2010
    Applicant: Microsoft Corporation
    Inventors: Yuqun Chen, Darko Kirovski, Yacov Yacobi, Gideon A. Yuval
  • Publication number: 20100049984
    Abstract: An information processing apparatus according to the present application includes a first application allowed to access the IC chip, including an IC chip in which predetermined data is recorded, an IC chip reading unit that reads the data recorded in the IC chip, and a signature data generation unit that generates signature data by performing encryption processing on the recorded data read by the IC chip reading unit and a second application not allowed to access the IC chip, including a server access unit that requests acquisition of content from an information providing server by receiving the signature data and the recorded data from the first application and transmitting the signature data and the recorded data to the information providing server that provides predetermined content.
    Type: Application
    Filed: August 18, 2009
    Publication date: February 25, 2010
    Applicant: FELICA NETWORKS, INC.
    Inventors: Tomohiro Masushio, Naoto Tobita, Hiroaki Yamada
  • Patent number: 7669114
    Abstract: Software, and a master system with hardware and connections, for validated drug clinical studies includes: creating data collection documents with unique identifiers; having operators complete security identification verification before proceeding; having secured operators fill out and sign specified data collection documents; creating permanent records of the preceding; tracking by unique identifiers in a local system; uploading to a central system; independently reviewing filled out signed data collection documents to accept or require clarifications; keeping permanent read only records of all originally filled out and signed documents; making document clarification requests; reviewing each response; assigning new unique identifier links to each version of every revision; iteratively repeating the above until the documents are clean, and storing and tracking every version of every document in the central system; providing a monitor query and document entry history of all changes to all documents to create a
    Type: Grant
    Filed: May 6, 2005
    Date of Patent: February 23, 2010
    Assignee: Clynisys, Inc.
    Inventor: Thomas Wood
  • Patent number: 7660988
    Abstract: A process is disclosed for notarizing a document, by a client in the presence of a notary, comprising the steps of registering the notary, the client and the document, from a local workstation coupled to a central office, to provide for assigning at least one respective encryption key for identifying each of the notary, the client and the document to be notarized; associating in the central office, the respective encryption keys of the client with the notary and with the; generating a transaction code, based on the step of associating the respective encryption keys, for authorizing execution of the to provide the notarizing; executing the; and embedding selected ones of the respective encryption keys together with a notary seal in the document.
    Type: Grant
    Filed: March 18, 2002
    Date of Patent: February 9, 2010
    Assignee: Cognomina, Inc.
    Inventors: Pat Carmichael, J. Charles Davis, Scottie Ashley, Craig Laird
  • Patent number: 7660989
    Abstract: A sewer provides a message from a sender to a recipient and an attachment including the sender's identity, the recipient's identity and address, and the time of transmission from the sewer to the recipient. The method includes receiving the message and attachment at a sewer displaced from the recipient's location from the recipient and operates upon the message and attachment to allow comparison between information contained in the attachment and/or the message to determine the authenticity of the message.
    Type: Grant
    Filed: November 21, 2003
    Date of Patent: February 9, 2010
    Assignee: Rpost International Limited
    Inventor: Terrence A. Tomkow
  • Patent number: 7660992
    Abstract: An electronic data storage system stores electronic data with attaching an electronic signature, and output the electronic data along with the attached electronic signature, which decreases the operation costs with a simple operation. By using a public key-based signature, a third party can verify the data, and by using a secret check code, the electronic signature at registration is always valid without risk of falsification. Also by attaching an electronic signature at access, the validity of the stored data is assured, and a third party can verify the data. By using all of these features, the verification by a third party becomes possible over the long term. In this way the long term storage of electronic data is implemented.
    Type: Grant
    Filed: January 30, 2004
    Date of Patent: February 9, 2010
    Assignees: Fujitsu Limited, Fujitsu Frontech Limited
    Inventors: Yasuyuki Higashiura, Takumi Kishino, Keizo Sato, Shoki Kadowaki, Seigo Kotani
  • Patent number: 7661132
    Abstract: A tag device causes a second calculator to read a confidential value from a confidential value memory and to apply a second function F2 which disturbs a relationship between elements of a definition domain and a mapping thereof to generate tag output information. The tag device delivers the tag output information to a backend apparatus. Subsequently, a first calculator reads out at least part of elements of the confidential value from the confidential value memory, and applies a first function F1, an inverse image of which is difficult to obtain, and a result of such calculation is used to update a confidential value in the confidential value memory by overwriting.
    Type: Grant
    Filed: September 27, 2004
    Date of Patent: February 9, 2010
    Assignee: Nippon Telegraph and Telephone Corporation
    Inventors: Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita
  • Publication number: 20100031024
    Abstract: A digital signature is applied to digital data in real-time. The digital signature serves as a mark of authenticity assuring a recipient that the digital data did in fact originate from an indicated source. The digital signature may be applied to any digital data, including video signals, audio signals, electronic commerce information, data pertaining to land vehicles, marine vessels, aircraft, or any other data that can be transmitted and received in digital form.
    Type: Application
    Filed: March 16, 2007
    Publication date: February 4, 2010
    Applicant: VERIZON BUSINESS GLOBAL LLC
    Inventor: David Scott Hayes
  • Patent number: 7653814
    Abstract: Systems and methods and computer programs for verifying the authenticity and integrity of hyperlink addresses and files that are accessible by means of these hyperlink addresses. A system and a method are disclosed for authenticating a file such as an HTML document hyperlinked to a graphic object such as a digital image or to a graphic icon. The hyperlink network address (e.g., the URL of the hyperlink on the Internet) is encoded on a first portion of the graphic object. Checking information such as a MAC digital signature and the hyperlinked file are encoded into a second portion of the same graphic object. In accordance with another aspect of the invention, a system and a method are disclosed for verifying the authenticity and integrity of a hyperlink and a file when this hyperlink is activated.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: January 26, 2010
    Assignee: International Business Machines Corporation
    Inventor: Fernando Incertis Carro
  • Patent number: 7647499
    Abstract: A method and apparatus identifying an item by attaching a radio frequency identification device to the item; obtaining encryption information; generating an encrypted code from the encryption information by a programmer; inserting the encrypted code into the radio frequency identification device by the programmer whereas the encrypted code may be one of a plurality of encrypted codes; attempting to access the radio frequency identification device by a security reader by transmission of another encrypted code to the radio frequency identification device; and responding with a correct access signal by the radio frequency identification device in response to receipt of the other encrypted code if the other encrypted code is same as the inserted encrypted code.
    Type: Grant
    Filed: March 24, 2005
    Date of Patent: January 12, 2010
    Assignee: Avaya Inc
    Inventors: Colin Blair, Kevin Chan, Alexander Quentin Forbes, Christopher Reon Gentle, Neil Hepworth, Andrew W. Lang, Paul Roller Michaelis
  • Patent number: 7644283
    Abstract: A method and system for surreptitiously detecting and analyzing sites suspected of transferring steganographic communications, is accomplished by analyzing a targeted site for steganographic communications via a server that directs a plurality of clients to analyze the targeted site. The clients are dispatched according to the objectives of the server and the data retrieved by previous clients, which have been directed to scan the site. The client's data is aggregated and analyzed to determine if a steganographic communication is present.
    Type: Grant
    Filed: May 26, 2006
    Date of Patent: January 5, 2010
    Inventors: William W. Cowan, Steven Rogers, William R. Rice
  • Publication number: 20090327731
    Abstract: Cryptographic systems and methods are provided in which authentication operations, digital signature operations, and encryption operations may be performed. Authentication operations may be performed using authentication information. The authentication information may be constructed using a symmetric authentication key or a public/private pair of authentication keys. Users may digitally sign data using private signing keys. Corresponding public signing keys may be used to verify user signatures. Identity-based-encryption (IBE) arrangements may be used for encrypting messages using the identity of a recipient. IBE-encrypted messages may be decrypted using appropriate IBE private keys. A smart card, universal serial bus key, or other security device having a tamper-proof enclosure may use the authentication information to obtain secret key information. Information such as IBE private key information, private signature key information, and authentication information may be stored in the tamper-proof enclosure.
    Type: Application
    Filed: April 21, 2008
    Publication date: December 31, 2009
    Inventors: Guido Appenzeller, Terence Spies, Xavier Boyen
  • Publication number: 20090327144
    Abstract: A system for remote electronic verification and authentication and screening of potential signatories for remote electronic notary transactions via remote pc encrypted platform to a broadband digitally or WIFI cellular/PDA device or portable pc device. The system implements the following electronic components, but not limited to, electronic signature device, digital certificates, electronic document, electronic biometric devices, electronic audio/visual software/hardware, and electronic payment systems and devices, all electronically synchronized to afford capable notary publics in executing remote electronic notary transactions via a satellite kiosk network or on-line virtual kiosk application.
    Type: Application
    Filed: September 4, 2009
    Publication date: December 31, 2009
    Inventors: JESSE ANDREW HATTER, BRENDA FATE HATTER, AUDRELLA MARIE JACKSON
  • Patent number: 7636440
    Abstract: A digital watermark in a data file occurs at multiple locations within the file. The location of each digital watermark, other than a first digital watermark, is specified by a previous digital watermark, or by other auxiliary information in a same logical block as a previous digital watermark.
    Type: Grant
    Filed: January 31, 2003
    Date of Patent: December 22, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Charles R. Weirauch
  • Publication number: 20090313172
    Abstract: A method for automatically linking an anonymous electronic trade order having an order quantity (q) to an identity of a trader by providing an identity marker (s) of the trader; embedding the identity marker (s) by splitting the anonymous trade order into a number (n) of trade orders each having a corresponding order quantity x (i) to generate a trade order set; and placing the generated trade order set in an electronic order book.
    Type: Application
    Filed: August 20, 2009
    Publication date: December 17, 2009
    Applicant: International Business Machines Corporation
    Inventors: Jan Leonhard Camenisch, Christopher Mark Kenyon
  • Patent number: 7631189
    Abstract: An apparatus for recording additional information hard to analyze in an information recording medium, a reproducer, a recording medium, a method, and a computer program for the same are provided. Bit values set at a plurality of DC control bit information setting positions set in a recording frame are decided based on constituent bit information of additional data, and additional data such as key information used for decoding contents is recorded in the information recording medium. In the reproducer, the additional data constituent bit information can be acquired by detecting the bit position set at a selected DC control bit storage position in the additional data-associated recording frame. With the configuration, it is possible to embed additional information such as key information used for decoding contents, key production information, contents reproduction control information, and copying control information with a format hard to analyze and also to accurately read out for data reproduction.
    Type: Grant
    Filed: September 1, 2004
    Date of Patent: December 8, 2009
    Assignee: Sony Corporation
    Inventors: Tsutomu Ichinose, Yoichiro Sako
  • Patent number: 7631195
    Abstract: A system for providing security to a portable storage device coupleable to a host system and associated methods are disclosed. The system includes a portable storage device random number generator operable to generate a random number for storage in the portable storage device and the host system each time the portable storage device is accessed by the host system. A random number generated in this manner may be used by the host system in a write process to encrypt a logical branch address, a user password, and user data which may be written to the portable storage device as encrypted data and stored in a secure area of the portable storage device. The write process may further include encrypting the random number using a key associated with the portable storage device to generate an encrypted random number, which may be written to the portable storage device and associated with the encrypted data. The random number is not stored in the host system.
    Type: Grant
    Filed: March 15, 2006
    Date of Patent: December 8, 2009
    Assignee: Super Talent Electronics, Inc.
    Inventors: I-Kang Yu, Charles C. Lee
  • Patent number: 7627761
    Abstract: A system and method for authentication of JPEG image data enables the recipient to ascertain whether the received image file originated from a known identified source or whether the contents of the file have been altered in some fashion prior to receipt. A unique hashing function is derived from a first section of image data contained in the JPEG compressed image in such a way that any changes subsequently made to the first section of image data is reflected in a different hashing function being derived from a signature string is then embedded into a next section of the image data. Since the embedding of a previous section's integrity checking number is done without modifying the JPEG bit stream, any JPEG decoder can thereafter properly decode the image.
    Type: Grant
    Filed: July 22, 2002
    Date of Patent: December 1, 2009
    Assignee: Xerox Corporation
    Inventor: Ricardo L. de Queiroz
  • Patent number: 7627768
    Abstract: A method for automatic validation of a computer program can access a secure memory and a non-secure memory, the program using at least one coding function and at least one de-coding function. The method includes a verification step (E340) during which verification occurs to ensure that each function which is adapted in order to read data from the secure memory and to produce data in the non-secure memory is a coding function and that all data produced by the coding function is stored in the secure memory.
    Type: Grant
    Filed: March 18, 2003
    Date of Patent: December 1, 2009
    Assignee: Oberthur Card Systems SA
    Inventors: Vincent Finkelstein, Fabrice Elisabeth
  • Patent number: 7614047
    Abstract: Illustrative embodiments provide a computer-implemented method for indicating a change in a service offering. The computer-implemented method generates a token representative of a state of the service offering, and determines whether the service offering has been modified to form a modified service. Responsive to a determination that the service offering has been modified, generates a token representative of the state of the modified service, and determines whether the service offering has been restarted to form a restarted service. Responsive to a determination that the offered service has been restarted, generates a token representative of the state of the restarted service, and provides the token to a requester.
    Type: Grant
    Filed: August 21, 2008
    Date of Patent: November 3, 2009
    Assignee: International Business Machines Corporation
    Inventor: Wei-Lung Wang
  • Patent number: 7603344
    Abstract: A digital forensic search tool which enables a first entity, such as a federal investigation agency, to share its suspect and sensitive data with a second entity, such as another investigative agency, in a manner that allows the second agency to utilize the suspect data while not revealing the actual content of the sensitive data to the second agency. The second agency can perform comparisons and other operations on the sensitive data without having to know the actual content of the data. The search tool allows an investigative agency to define an investigative strategy for a particular case via the search markup language programs and by the data features that it includes in the search tool. Thus, by sharing search tools among agencies, an agency can share or inform others of that agency's theory of the case and investigative goal.
    Type: Grant
    Filed: December 23, 2005
    Date of Patent: October 13, 2009
    Assignee: Advanced Digital Forensic Solutions, Inc.
    Inventors: Raphael Bousquet, Jai Jit Singh Wallia
  • Publication number: 20090252159
    Abstract: In one embodiment, the method of processing telephony sessions includes: communicating with an application server using an application layer protocol; processing telephony instructions with a call router; and creating call router resources accessible through a call router Application Programming Interface (API). In another embodiment, the system for processing telephony sessions includes: a call router, a URI for an application server, a telephony instruction executed by the call router, and a call router API resource.
    Type: Application
    Filed: April 2, 2009
    Publication date: October 8, 2009
    Inventors: Jeffrey Lawson, John Wolthuis, Evan Cooke
  • Patent number: 7600255
    Abstract: Accumulated proof-of-work approaches for protecting network resources against denial-of-service attacks are disclosed. A client computer or other requester is required to perform work, such as repeatedly hashing a message until a specified number of bits is zero, as a condition for accessing a resource. Proof of the work performed by a legitimate requester is accumulated across multiple requests, so that established users of a resource are not penalized when proof-of-work is used to prevent a denial of service attack. Requesters who cannot show accumulated work greater than a specified threshold are required to perform additional work. In certain embodiments, work may be accumulated only within a specified time window, and the threshold may vary according to resource capacity or loading. Proof-of-work values may be communicated between the user and the resource in cookies.
    Type: Grant
    Filed: April 14, 2004
    Date of Patent: October 6, 2009
    Assignee: Cisco Technology, Inc.
    Inventor: Mark Baugher
  • Patent number: 7596700
    Abstract: A method and system for sharing data and interrogating data include establishing a level of trust between mutually mistrusting entities so that data may be shared therebetween based on the level of trust. The method and system include interrogating data provided from one of the entities to the other entity without the receiving entity having complete access to the data associated therewith.
    Type: Grant
    Filed: December 22, 2004
    Date of Patent: September 29, 2009
    Assignee: Storage Technology Corporation
    Inventors: Charles Milligan, Kuntal G. Rawal, Corey Klaasmeyer, William Lynch, Diana Lubow