Generating Specific Digital Signature Type (e.g., Blind, Shared, Or Undeniable) Patents (Class 713/180)
  • Patent number: 10320850
    Abstract: A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
    Type: Grant
    Filed: September 22, 2016
    Date of Patent: June 11, 2019
    Assignees: BlackBerry Limited, Certicom Corp.
    Inventors: Michael Eoin Buckley, Michael Charles Hollatz, Robert John Lambert, Nevine Maurice Nassif Ebeid
  • Patent number: 10212154
    Abstract: Method for authenticating a user, comprising the steps of a) providing a central server (101), in communication with at least two authentication service providers (110,120,130) and at least one user service provider (150); b) associating each authentication service provider with at least one respective available level of authentication; c) receiving a request from the user service provider to authenticate a particular user accessing the user service provider via an electronic device (170,180); d) identifying a minimum level of authentication; e) the central server identifying a selected one (110) of said authentication service providers; f) either providing user credential data directly to the selected authentication service provider, without said user credential data being supplied to the central server, or determining that the selected authentication service provider has an active authentication session for the particular user; and g) causing the selected authentication service provider to authenticate the
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: February 19, 2019
    Assignee: IDENTITRADE AB
    Inventor: Philip Hallenborg
  • Patent number: 10178093
    Abstract: Systems and methods for preventing fraud are disclosed. The system includes, for example, a front end device that is operatively coupled to a back end device. The front end device is configured to generate a first dynamic device identification based on dynamic device characteristics of the front end device. The back end device is configured to generate a second dynamic device identification based on the dynamic device characteristics of the front end device to authenticate the front end device. The front end device can also authenticate itself through an Internet of Things (IoT) device that has a trusted connection to the back end device.
    Type: Grant
    Filed: August 12, 2016
    Date of Patent: January 8, 2019
    Assignee: SEARS BRANDS, L.L.C.
    Inventors: Angel Favila, Puneet Shivam
  • Patent number: 10135824
    Abstract: Embodiments of the present application relate to a method and system for determining whether a terminal logging into a website is a mobile terminal. The method includes receiving a login request to access a website from a terminal, generating a first token, sending information including a redirect script to the terminal, the redirect script configured to cause the terminal to execute the redirect script and to access an activation link, receiving a verification request from the terminal, determining whether the version of the first token included in the verification request is valid relative to the generated first token, sending an indication that the first token is valid to the terminal, receiving an access request, the access request including the second token, determining whether the second token is valid, and determining whether the terminal is a mobile terminal according to whether the second token is valid.
    Type: Grant
    Filed: January 5, 2015
    Date of Patent: November 20, 2018
    Assignee: Alibaba Group Holding Limited
    Inventor: Tengfei Fang
  • Patent number: 10116453
    Abstract: A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.
    Type: Grant
    Filed: February 27, 2018
    Date of Patent: October 30, 2018
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Dug Song, Adam Goodman
  • Patent number: 10097583
    Abstract: Online retailers may operate one or more services configured to detect requests generated by automated agents. A CAPTCHA may be transmitted in response to requests generated by automated agents. The CAPTCHAs may be included in a modal pop-up box configured to be displayed by a client application displaying a webpage to a customer of the online retailer. Automated agents receiving the CAPTCHAs may not be blocked or otherwise restricted from the resources requested and therefore may not be configured to interact with the CAPTCHAs contained in the modal pop-up box.
    Type: Grant
    Filed: March 28, 2014
    Date of Patent: October 9, 2018
    Assignee: Amazon Technologies, Inc.
    Inventors: Sevag Demirjian, John Lindsay Bates, Mark Evans Brighton, Samuel Charles Goodwin, Colin James Hawkett, Blair Livingstone Hotchkies, Forrest MacKenzie Vines
  • Patent number: 10097868
    Abstract: The present technology relates to a data processing device and a data processing method capable of performing appropriate stream processing. An input stream is split into a split stream for each of a plurality of channels. A stream to be generated includes the split stream, and signature information unique for each of the input streams containing the split stream, or includes the split stream, the signature information, and location information about a transmission frequency band of a split stream constituting the input stream and different from the split stream included in the generated stream. The present technology is applicable to a channel bonding (CB) technology which splits an input stream into streams of a plurality of channels and transmits the split streams, for example.
    Type: Grant
    Filed: November 27, 2014
    Date of Patent: October 9, 2018
    Assignee: SONY CORPORATION
    Inventors: Muhammad Nabil Sven Loghin, Satoshi Okada, Lothar Stadelmeier
  • Patent number: 10063374
    Abstract: A system for continuous authentication of internet of things (IoT) devices in a communication network utilizes lightweight authentication for a sequence of message transmissions in a specific time-frame. A claimer device and a verifier device are in communication with the network. The claimer is configured to define a time frame and a time flag for an authentication session for a predetermined maximum number of messages, generate a time-bound share from a secret key, calculate a share authenticator for the share, combine a claimer identity (ID), a verifier ID, a message payload, the share, the share authenticator, a time flag, a timestamp, and message authenticator into a message, and send the message to the verifier within the time period. The verifier is configured to receive the message from the claimer, verify the message freshness, verify authenticity of the time flag and timestamp, and reveal and check the authenticity of the share.
    Type: Grant
    Filed: April 15, 2016
    Date of Patent: August 28, 2018
    Assignee: Massachusetts Institute of Technology
    Inventors: Omaimah Omar Bamasag, Kamal Youcef-Toumi
  • Patent number: 10049362
    Abstract: There is provided a method of authenticating data, comprising the following elements. Firstly, a voice biometric system is trained to identify a user from a message spoken by the user. Then a spoken message is received from the user, the spoken message comprising word content to be authenticated. The word content is then authenticated by using the voice biometric system to identify the user, and thereby authenticating the word content in the spoken message as word content spoken by the identified user. Suitable apparatus and systems are also disclosed.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: August 14, 2018
    Assignee: MASTERCARD INTERNATIONAL INCORPORATED
    Inventor: Alan Mushing
  • Patent number: 10007795
    Abstract: Documents that have been compromised by malware are detected and recovered. A hash of a portion of a file of a document is generated. An identifier of the file includes a signature that is embedded in the file, with the identifier including the hash of the portion of the file and other file information, such as a pathname of the file. A list that includes the identifier of the file is consulted before generating a backup copy of the file. The file is restored from the backup copy of the file in response to detecting that the file has been encrypted.
    Type: Grant
    Filed: February 13, 2014
    Date of Patent: June 26, 2018
    Assignee: Trend Micro Incorporated
    Inventors: Chih-Ko Chung, Pei-yin Wu, Shuang-Fu Han
  • Patent number: 9942048
    Abstract: A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.
    Type: Grant
    Filed: September 26, 2017
    Date of Patent: April 10, 2018
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Dug Song, Adam Goodman
  • Patent number: 9866533
    Abstract: A method is provided to share a content stored on a secured server. The content is associated to a first electronic device and encrypted using a public key of the first electronic device. The secured server stores a first re-encryption key from the first electronic device to a second electronic device. The method is implemented by the secured server and includes the steps of determining association of the content with the second electronic device, re-encrypting the content using the first re-encryption key, sending the content to the second electronic device for encryption using a second device public key and storing the encrypted content received from the second electronic device in association with the second electronic device.
    Type: Grant
    Filed: July 1, 2013
    Date of Patent: January 9, 2018
    Assignee: ORANGE
    Inventors: Boris Chazalet, Tansir Ahmed
  • Patent number: 9847993
    Abstract: The present invention relates to a method for accessing service/data of a first network from a second network for service/data access via the second network, comprising the steps of a) Pairing of a user device with the first network, b) Attaching the user device to the second network, c) Authenticating the user device with the second network, d) Providing connectivity information for services/data of the first network to the second network, e) Providing available services/data information by the first network to the second network, f) Accessing a service and/or data of the first network by the second network. The present invention relates also to a system for accessing service/data of a first network from a second network for service/data access via the second network.
    Type: Grant
    Filed: November 8, 2012
    Date of Patent: December 19, 2017
    Assignee: NEC CORPORATION
    Inventors: Mischa Schmidt, Hans-Joerg Kolbe, Raihan Ul-Islam
  • Patent number: 9825765
    Abstract: A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.
    Type: Grant
    Filed: March 21, 2017
    Date of Patent: November 21, 2017
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Dug Song, Adam Goodman
  • Patent number: 9769179
    Abstract: A user credential comprising a user password and a one-time password (OTP) may be provided to access a computing system. The user password is authenticated and the network connection status of the computing system is determined. If the computing system is offline, the user password and the OTP are stored in memory and the user is granted a first level of access to the computing system. Upon detecting that the network connection status of the computing system has changed to online, the user password and the OTP are provided to an authentication server for authentication. If the authentication of the user password and the OTP is successful, the user is granted a second level of access to the computing system, the second level of access being higher than the first level of access.
    Type: Grant
    Filed: May 16, 2016
    Date of Patent: September 19, 2017
    Assignee: Red Hat, Inc.
    Inventors: Dmitri V. Pal, Stephen J. Gallagher
  • Patent number: 9660813
    Abstract: A server is configured to communicate with a group of clients over a network in one embodiment. The server maps the group of clients into a plurality of subgroups of bounded size, communicates to a given one of the clients information identifying the particular subgroup to which that client belongs as well as the other clients in that subgroup. The given client utilizes the communicated information to generate a ring signature over the corresponding subgroup of clients based on the communicated information. The subgroup size may be bounded to a minimum size and a maximum size in accordance with a variable privacy parameter. The server can increase or decrease the value of the parameter in order to provide respective increased or decreased privacy to the clients, by making it respectively more or less difficult to determine which client in a corresponding one of the subgroups produced the received ring signature.
    Type: Grant
    Filed: March 27, 2012
    Date of Patent: May 23, 2017
    Assignee: EMC IP Holding Company LLC
    Inventors: Marten Erik van Dijk, Eyal Kolman, Roy Hodgman
  • Patent number: 9641341
    Abstract: A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication factor, generating a second partial digital signature for the second authentication response to the secondary authentication, combining the first and second partial digital signatures to form a composite digital signature, and validating the composite digital signature.
    Type: Grant
    Filed: March 21, 2016
    Date of Patent: May 2, 2017
    Assignee: Duo Security, Inc.
    Inventors: Jon Oberheide, Dug Song, Adam Goodman
  • Patent number: 9571275
    Abstract: Apparatus and method for providing unique device identification values for a network accessible device. In accordance with some embodiments, a unique device identifier value is generated in response to a data exchange operation with a network accessible device. The identifier value is subsequently transmitted by the device as a unique device identifier value in conjunction with the transmitting of a request for a subsequent data exchange operation with the device.
    Type: Grant
    Filed: August 14, 2012
    Date of Patent: February 14, 2017
    Assignee: Google Inc.
    Inventors: Neha Pattan, Venu Vemula, Mike Ying
  • Patent number: 9542114
    Abstract: A disclosed example involves managing power states, signing a suspend-to-RAM (STR) data structure by: generating a header key, a scatter/gather table key and a dynamic random access memory (DRAM) key using a root key generated by the secure processor. Generating a header signature using the header key, the header signature based on a table header and a random or pseudo-random value. Generating a scatter/gather table signature using the scatter/gather table key, the scatter/gather table signature based on a scatter/gather table header and a random or pseudo-random value. Generating a DRAM signature using the DRAM key and a value from a region of DRAM. Storing the header signature, the scatter/gather table signature and the DRAM signature in the STR data structure. Resume the processor system from the low-power mode when the data structure is valid based on a comparison of a first signature and a second signature.
    Type: Grant
    Filed: June 20, 2016
    Date of Patent: January 10, 2017
    Assignee: Intel Corporation
    Inventors: Adrian R. Pearson, Christopher Andrew Thornburg, Steven J. Brown, Peter R. Munguia
  • Patent number: 9536262
    Abstract: A method and apparatus are provided for verifying authenticity of a data acquisition peripheral to be used, which has at least one identifier. The method includes: receiving the identifier by means of an authentication server, verifying, by the authentication server, an association of the identifier with a referenced authentic peripheral, delivering a decision of identification; and transmission, by the server, of the decision of identification.
    Type: Grant
    Filed: August 7, 2013
    Date of Patent: January 3, 2017
    Assignee: INGENICO GROUP
    Inventor: Christopher Rotsaert
  • Patent number: 9449177
    Abstract: Described is a system for proactively secure multi-party computation (MPC). Secret shares representing data are constructed to perform computations between a plurality of parties modeled as probabilistic polynomial-time interactive turing machines. A number of rounds of communication where the plurality of parties jointly compute on the secret shares is specified. Additionally, a threshold of a number of the plurality of parties that can be corrupted by an adversary is specified. The secret shares are periodicially refreshed and reshared among the plurality of parties before and after computations in each of the rounds of communication. The data the secret shares represent is proactively secured.
    Type: Grant
    Filed: October 15, 2013
    Date of Patent: September 20, 2016
    Assignee: HRL Laboratories, LLC
    Inventors: Karim El Defrawy, Joshua W. Baron
  • Patent number: 9430619
    Abstract: Innovations in the area of hardware-protected digital rights management (“DRM”) systems are presented. For example, a hardware-protected DRM system includes a trusted layer and untrusted layer. In the untrusted layer, a control module receives source media data that includes encrypted media data. The control module processes metadata about the media data. The metadata, possibly exposed by a module in the trusted layer, is not opaque within the untrusted layer. In the trusted layer, using key data, a module decrypts encrypted media data, which can be the encrypted media data from the source media data or a transcripted version thereof. A module in the trusted layer decodes the decrypted media data. A host decoder in the untrusted layer uses the metadata to manage at least some aspects of the decoding, rendering and display in the trusted layer, without exposure of decrypted media data or key data within the untrusted layer.
    Type: Grant
    Filed: September 10, 2014
    Date of Patent: August 30, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yongjun Wu, Shyam Sadhwani, Samuel J. Wenker, Brian P. Evans, Hany Farag, Lucia Darsa
  • Patent number: 9413750
    Abstract: Facilitating single sign-on (SSO) across multiple browser instances such that user authentication at one browser instance is used as a basis to permit access to protected resources (hosted on server systems) from other browser instances. In an embodiment, the different browser instances are executing on different client systems. An authentication server may maintain a registration data indicating the different client systems/browser instances registered by a user for SSO feature. After a user is authenticated for a first session from one browser instance, the authentication server enables the user to access any protected resource from registered client systems/browser instances without requiring further authentication (based on the presence of the authenticated first session).
    Type: Grant
    Filed: February 11, 2011
    Date of Patent: August 9, 2016
    Assignee: Oracle International Corporation
    Inventors: Naga Sravani Akula, Vikas Pooven Chatoth
  • Patent number: 9392205
    Abstract: A content providing method of an electronic apparatus communicably connected with an external apparatus is provided. The method includes receiving a command for transferring content to the external apparatus; checking whether the content includes information indicating that the content is transferable to the external apparatus, the information being set by determining, based on a meta data included in the content, whether a predetermined condition is satisfied; and transferring the content, based on the checked information, to the external apparatus.
    Type: Grant
    Filed: October 25, 2013
    Date of Patent: July 12, 2016
    Assignee: Samsung Electronics Co., Ltd
    Inventors: Woo-Yong Chang, Seung-dong Yu, Se-jun Park, Min-jeong Moon
  • Patent number: 9342824
    Abstract: The present invention provides a seamless entry system that comprises a universal session manager. Users connect to the host service provider with a unique username and password. Then, through a series of data exchanges between the universal session manager, a validation database, and the remote service module, the customer may be transparently logged into remote service providers. Internet banking customers utilize a browser system to connect to a host server providing a range of banking services supported by a remote or distinct server. According to the method, the customer first enters a username and password to gain access to the host service provider. The universal session manager transmits data required for login to the remote service provider. The user is thus able to utilize the remote services with his/her web browser system without having entered a username or password particular to the remote service.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: May 17, 2016
    Assignee: JPMORGAN CHASE BANK, N.A.
    Inventors: Robert Rosko, Jayashree Gudipati
  • Patent number: 9344410
    Abstract: The invention provides for a telecommunication method of securely exchanging unencrypted data between a telecommunications device and a first server computer system via a digital cellular wireless telecommunications network, wherein the telecommunications device is a battery powered mobile end user telecommunications device, wherein the method comprises the steps of: encrypting the unencrypted data using a first encryption algorithm into first encrypted data, sending the first encrypted data to a second server computer system via a first network connection of the digital cellular wireless telecommunications network, storing the first encrypted data by the second server computer system, sending an order request to the first server computer system via a second network connection of the digital cellular wireless telecommunications network by the telecommunications device, sending a data publishing request to the second server computer system, generating a cryptographic key pair, sending the first encrypted data,
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: May 17, 2016
    Assignee: SAP SE
    Inventor: Wei Lin
  • Patent number: 9338142
    Abstract: A method for verifying the security of a device for generating private and public cryptographic keys. Such a method includes generating at least one pair of private and public cryptographic keys by the device from at least one random variable coming from a random-variable generator; transmitting at least one constituent element of a generated private or public key to at least one device for verifying; and determining a level of security of the device from the at least one transmitted element, as a function of pieces of information stored by the device for verifying.
    Type: Grant
    Filed: July 2, 2013
    Date of Patent: May 10, 2016
    Assignee: OBERTHUR TECHNOLOGIES
    Inventors: Emmanuelle Dottax, Paul Dischamp, Marc Bertin
  • Patent number: 9331984
    Abstract: In a secret sharing process based on an improved threshold scheme, secret data is shared as shared data parts equal to or greater than a threshold value in number such that the secret data cannot be reconstructed from shared data parts less than the threshold value in number. Each of the shared data pieces is created essentially from a different combination of the secret data pieces and the data pieces for secret sharing computation. The secret sharing process allows an algorithm desired by the user to be freely incorporated, and can prevent the secret data to be easily reconstructed even when more shared data parts than the threshold value are acquired by a third party.
    Type: Grant
    Filed: August 22, 2013
    Date of Patent: May 3, 2016
    Assignee: PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO., LTD.
    Inventor: Masakatsu Matsuo
  • Patent number: 9311487
    Abstract: A management device 200d comprises: a key share generation unit 251d generating a plurality of key shares by decomposing a decryption key, the decryption key being for decrypting an encrypted application program generated as a result of encryption of the application program; and an output unit 252d outputting each of the key shares to a different one of a plurality of detection modules. The detection modules acquire and store therein the key shares. The protection control module 120d comprises: an acquisition unit 381d acquiring the key shares from the detection modules; a reconstruction unit 382d reconstructing the decryption key by composing the key shares; a decryption unit 383d decrypting the encrypted application program with use of the decryption key; and a deletion unit 384d deleting the decryption key, after the decryption by the decryption unit is completed.
    Type: Grant
    Filed: March 1, 2012
    Date of Patent: April 12, 2016
    Assignee: Panasonic Corporation
    Inventors: Yuji Unagami, Yuichi Futa, Natsume Matsuzaki, Hiroki Shizuya, Shuji Isobe, Atsushi Umeta
  • Patent number: 9311636
    Abstract: A mobile payment method to be implemented using an electronic device includes: receiving transaction information, establishing wireless short-range communication with a mobile device provided with a payment card, during the wireless short-range communication, transmitting the transaction information to the mobile device and receiving a payment command generated based on the transaction information from the mobile device, transmitting the payment command to a payment institution server, and receiving a payment result therefrom. The payment command enables the payment institution server to identify validity of the payment card and to process the payment. The payment result is generated after completing the payment.
    Type: Grant
    Filed: February 16, 2015
    Date of Patent: April 12, 2016
    Inventor: Chien-Kang Yang
  • Patent number: 9276739
    Abstract: A method of encrypting data using a first key and multiple encryption keys at least in part based on the first key. The method includes encoding the data into a redundant representation by distributing the information content of the data among a number of groups, each group being associated with a respective encryption key of the multiple encryption keys, each encryption key being associated with at least one group, the redundant representation allowing recovery of the data in the absence of the groups associated with the at least one of the multiple encryption keys, and encrypting each group by the respective associated encryption key.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: March 1, 2016
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Mehmet Utku Celik, Boris Skoric, Pim Theo Tuyls
  • Patent number: 9231940
    Abstract: A first server device may receive, from a user device, a request to authenticate the user device for a first service using authentication credentials for a second service that is different than the first service; provide the authentication credentials to a second server device that provides the second service; receive from the second server device, and when the authentication credentials are valid for the second service, user information relating to a user of the user device; and provide, to the user device, an authentication response, associated with the user information, that provides authentication of the user device for the first service.
    Type: Grant
    Filed: December 16, 2013
    Date of Patent: January 5, 2016
    Assignee: Verizon Patent and Licensing Inc.
    Inventor: Raymond C Counterman
  • Patent number: 9213804
    Abstract: A method, system or computer usable program product for securing displayed information including establishing a session between a first data processing device including a first memory and a second data processing device including a second memory and a display, maintaining session awareness indicating that both the first and second devices are alive in the session, inputting information into the second data processing device during the session producing input information stored in the second memory, and responsive to a determination the session has ended between the first and second device, deleting the input information in the second memory.
    Type: Grant
    Filed: February 1, 2012
    Date of Patent: December 15, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: James W. Barnes, Vasantha K. Alle, Devang Patel, Ryan R. Wilson
  • Patent number: 9202070
    Abstract: Disclosed are various embodiments providing a portable wireless communication device that includes a secure element configured to route a set of input/output (I/O) channels to host processing circuitry of a mobile communication device. The secure element includes an application executable by the secure element, the application being configured to obtain a policy via an I/O channel of the set of I/O channels. The application is further configured to prevent the host processing circuitry from accessing data corresponding to at least a portion of the set of I/O channels according to the policy.
    Type: Grant
    Filed: December 7, 2012
    Date of Patent: December 1, 2015
    Assignee: BROADCOM CORPORATION
    Inventors: Yasantha Rajakarunanayake, William Bunch, Jacob Mendel
  • Patent number: 9189617
    Abstract: An apparatus and method for zero knowledge proof security techniques within a computing platform. One embodiment includes a security module executed on a processing core to establish a domain of trust among a plurality of layers by sending a challenge from a verification layer to a first prover layer, the challenge comprising an indication of at least one selected option; in response to receiving the challenge, generating first verification information at the first prover layer based on the secret and the indication of the selected option; sending the first verification information to at least a second prover layer, the second prover layer generating second verification information based on the first verification information and the indication of the selected option; and performing a verification operation at the verification layer using the second verification information based on the selected option.
    Type: Grant
    Filed: September 27, 2013
    Date of Patent: November 17, 2015
    Assignee: INTEL CORPORATION
    Inventor: Brent M. Sherman
  • Patent number: 9185560
    Abstract: A wireless device may perform a local authentication to reduce the traffic on a network. The local authentication may be performed using a local web server and/or a local OpenID provider (OP) associated with the wireless device. The local web server and/or local OP may be implemented on a security module, such as a smartcard or a trusted execution environment for example. The local OP and/or local web server may be used to implement a provisioning phase to derive a session key, associated with a service provider, from an authentication between the wireless device and the network. The session key may be reusable for subsequent local authentications to locally authenticate a user of the wireless device to the service provider.
    Type: Grant
    Filed: November 10, 2014
    Date of Patent: November 10, 2015
    Assignee: InterDigital Patent Holdings, Inc.
    Inventors: Andreas U. Schmidt, Michael V. Meyerstein, Andreas Leicher, Yogendra C. Shah, Louis J. Guccione, Inhyok Cha
  • Patent number: 9172540
    Abstract: A system and method are provided for pre-processing encrypted and/or signed messages at a host system before the message is transmitted to a wireless mobile communication device. The message is received at the host system from a message sender. There is a determination as to whether any of the message receivers has a corresponding wireless mobile communication device. For each message receiver that has a corresponding wireless mobile communication device, the message is processed so as to modify the message with respect to one or more encryption and/or authentication aspects. The processed message is transmitted to a wireless mobile communication device that corresponds to the first message receiver. The system and method may include post-processing messages sent from a wireless mobile communications device to a host system. Authentication and/or encryption message processing is performed upon the message. The processed message may then be sent through the host system to one or more receivers.
    Type: Grant
    Filed: August 2, 2013
    Date of Patent: October 27, 2015
    Assignee: BlackBerry Limited
    Inventors: Michael Stephen Brown, Neil Patrick Adams, Michael Kenneth Brown, Michael Grant Kirkup, Herbert Anthony Little
  • Patent number: 9155959
    Abstract: Methods and systems that enable reliable audits of a number of predetermined trust requirements for games by electronic means, either on-site or remote, are disclosed. A system including a gaming module to which the players interact with a security module and an audit module capable of several degrees of dispersion and/or grouping performs provision by the gaming module to the security module of digital information containing significant events occurred during the games, generation by the security module of a protected record for each of the cited significant events, storage by the security module of every protected record, generating a file of protected records, and access by the audit module to the file of protected records, independent from the games operator, to verify the correct development of the games.
    Type: Grant
    Filed: July 15, 2005
    Date of Patent: October 13, 2015
    Assignee: SCYTL SECURE ELECTRONIC VOTING S.A.
    Inventors: Andreu Riera Jorba, Vanesa Daza Fernandez
  • Patent number: 9154480
    Abstract: In conjunction with a registration mode of operation, a first cryptographic device in one embodiment sends challenges to a second cryptographic device comprising a symmetric-key cryptographic module or other key-based cryptographic module that utilizes one or more secret keys. The first cryptographic device receives from the second cryptographic device responses to respective ones of the challenges, and stores information characterizing the responses. In conjunction with an authentication mode of operation, the first cryptographic device sends a selected one of the challenges to the second cryptographic device, receives from the second cryptographic device a response to the selected challenge, and authenticates the second cryptographic device utilizing the response to the selected challenge and the stored information.
    Type: Grant
    Filed: December 12, 2012
    Date of Patent: October 6, 2015
    Assignee: EMC Corporation
    Inventor: Ari Juels
  • Patent number: 9129465
    Abstract: Provided is a medium sensing apparatus. The medium sensing apparatus comprises a first frame having a hole in a side surface thereof, a second frame coupled to the first frame, a first sensor mounted on the first frame, a bracket connected to the first sensor, the bracket contacting the second frame, and a shaft disposed on the first sensor or the bracket to pass through the hole, the shaft being movable within the hole.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: September 8, 2015
    Assignee: LG CNS CO., LTD.
    Inventors: Ji Hoon Han, Bok Nam Jeong
  • Patent number: 9129122
    Abstract: A signature verification apparatus including a signature acquisition unit configured to acquire a digital signature including first information generated based on a pair of multi-order multivariate polynomials F=(f1, . . . , fm) defined in a ring K, a signature key s which is an element of a set Kn, and a document M and a plurality of pieces of second information for verifying that the first information is generated using the signature key s based on the data M, the pair of multi-order multivariate polynomials F, and vectors y=(f1(s), . . . , fm(s)), and a signature verification unit configured to verify legitimacy of the document M by confirming whether or not the first information is restorable using the plurality of pieces of second information included in the digital signature. The pair of multivariate polynomials F and the vectors y are public keys.
    Type: Grant
    Filed: July 19, 2012
    Date of Patent: September 8, 2015
    Inventors: Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari
  • Patent number: 9130741
    Abstract: A data protection system includes terminals, and an encryption device that encrypts distribution data distributed to each terminal. Each terminal corresponds with one node on a lowest level of a tree structure having hierarchies. A data protection system excludes nodes on the lowest level, determines a plurality of combination patterns that include combinations of two or more of all four nodes that are reached one level below the node, decides an individual decryption key for each determined combination pattern, and decides an individual decryption key for each node on the lowest level. The data protection system prescribes nodes that are reached from the node on the lowest level and a terminal to the node on the highest level that is an invalid node.
    Type: Grant
    Filed: April 8, 2013
    Date of Patent: September 8, 2015
    Assignee: PANASONIC CORPORATION
    Inventors: Toshihisa Nakano, Motoji Ohmori, Natsume Matsuzaki, Makoto Tatebayashi
  • Patent number: 9101860
    Abstract: An electrospinning fine fiber production methodology for generating a significant amount of fibers with diameters of less than 100 nanometers is provided. Also, a filter media composite comprising a substrate layer and an electrospun fine fiber layer having a increased efficiency relative to pressure drop and/or a controlled pore size distribution is provided. According to some embodiments nylon is electrospun from a solvent combination of formic and acetic acids.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: August 11, 2015
    Assignee: Clarcor Inc.
    Inventors: Thomas B. Green, Scotty L. King, Lei Li
  • Patent number: 9092780
    Abstract: Methods, systems and apparatuses for a user-mediator controlling access to an electronic content, are disclosed. One method includes receiving, by a user-mediator server of the user-mediator, a second share SKG2 from an owner server, wherein a first share SKG1 is provided to a member server of a member of a group by the owner. Further, the user-mediator receives a request from the member for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content. Further, the mediator receives a request for mediation, including the mediator receiving a dispatch of the header of the encrypted electronic content from the member. Further, the user-mediator determines whether the member is eligible to decrypt the electronic content, if eligible, the user-mediator responds to the request for mediation with a member accessible header, wherein the member accessible header includes the header after application of SKG2.
    Type: Grant
    Filed: April 30, 2014
    Date of Patent: July 28, 2015
    Assignee: PivotCloud, Inc.
    Inventor: Roy Peter D'Souza
  • Patent number: 9088545
    Abstract: Techniques for matching information representing private files against files obtained from a public network.
    Type: Grant
    Filed: September 5, 2013
    Date of Patent: July 21, 2015
    Assignee: Tiversa IP, Inc.
    Inventors: Robert J. Boback, Anju Chopra
  • Patent number: 9084115
    Abstract: A system and method for data verification using a smart phone which verifies data and biometric identity information using only locally stored biometric information. The system and method for data verification using a smart phone generally includes a mobile device, a central validating server, and an activation client. The validating server and activation client are utilized upon initial activation of the mobile device to verify data information (i.e. name, date of birth, social security number, etc.) and/or biometric data regarding an individual and then flag the mobile device as activated and verified. The biometric data is not stored in any location other than the memory of the mobile device. The activated and verified mobile device may then be utilized in combination with a wide range of verification clients to easily verify data information and/or biometric data of an individual.
    Type: Grant
    Filed: August 20, 2013
    Date of Patent: July 14, 2015
    Inventor: Dennis Thomas Abraham
  • Patent number: 9038064
    Abstract: The disclosed implementations are related to trace-assisted prefetching of a virtual machine from a network resource to improve interactive performance of the virtual machine on a host device. Trace patterns can be automatically uploaded to a network resource, which aggregates the patterns, and serves the patterns back to the host device, or a different host device, when the host device downloads a virtual machine for the first time.
    Type: Grant
    Filed: November 29, 2011
    Date of Patent: May 19, 2015
    Assignee: Moka5, Inc.
    Inventors: John C. Whaley, Wen-Suk Chun, Monica Sin-Ling Lam, Constantine P. Sapuntzakis
  • Patent number: 9037867
    Abstract: A configuration for achieving efficient content verification processing based on hash values is provided. Hash values of hash units set as segmented data of a content stored on an information storage medium are recorded in a content hash table and are stored on the information storage medium together with the content. An information processing apparatus for executing content playback executes hash-value comparison processing based on one or more randomly selected hash values. Regardless of the data amount of content, the configuration can perform hash-value determination and comparison processing based on hash units having a small amount of data, so that user equipment for executing content playback can perform efficient content verification.
    Type: Grant
    Filed: December 20, 2013
    Date of Patent: May 19, 2015
    Assignee: Sony Corporation
    Inventors: Kenjiro Ueda, Tateo Oishi, Yoshitomo Osawa, Katsumi Muramatsu, Motoki Kato, Yoshikazu Takashima
  • Patent number: 9032211
    Abstract: Methods for selectively securing records in a Near Field Communication Data Exchange Format (NDEF) message. A method includes placing a place marker signature record in the NDEF message. The place marker signature record is a modified signature Record Type Definition (RTD). A first set of records preceding the place marker signature record in the NDEF message is unsecured. The method also includes securing a second set of records following the place marker signature record. Another method includes placing a secured bytes field in the signature RTD. The secured byte field indicates a number of bytes of data to be secured preceding this field. The method also includes securing data in records preceding this field in the signature RTD, based on a value of the secured bytes field.
    Type: Grant
    Filed: July 9, 2009
    Date of Patent: May 12, 2015
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Thenmozhi Arunan, Eun-Tae Won
  • Patent number: 9009464
    Abstract: A uniform certificate revocation list managing apparatus is provided for managing canceled register information of all believable groups in a believable anonymous register system. Canceled register information includes canceled member information of each believable group, list information of unbelievable groups, and list information of unbelievable register service institutions. The uniform certificate revocation list managing apparatus interacts with each believable group and each register system, so as to update a certificate revocation list of each believable group in real time.
    Type: Grant
    Filed: April 15, 2010
    Date of Patent: April 14, 2015
    Assignee: Sony Corporation
    Inventors: Zhihui Zhang, Mingshu Hu