Message Digest Travels With Message Patents (Class 713/181)
  • Publication number: 20100138665
    Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.
    Type: Application
    Filed: February 3, 2010
    Publication date: June 3, 2010
    Applicant: PANASONIC CORPORATION
    Inventors: Tadao KUSUDO, Takakazu SHIOMI
  • Patent number: 7730305
    Abstract: An authentication method for link protection between an OLT and an ONU newly connected thereto in an EPON, which is implemented in a data link layer to which cryptography is applied. First, an authentication key is distributed to both the OLT and an ONU. The OLT (or ONU) generates first and second random values, generates an authentication request frame containing the random values, and transmits it to the ONU (or OLT). The ONU generates a first hash value according to a hash function using the random values contained in the request frame, and transmits an authentication response frame containing the first hash value to the OLT. The OLT compares the first hash value with a second hash value calculated by it according to the has function using the two random values and an authentication key distributed to it, and transmits an authentication result frame to the ONU.
    Type: Grant
    Filed: April 29, 2005
    Date of Patent: June 1, 2010
    Assignee: Electronics and Telecommunications Research Instutute
    Inventors: Jee Sook Eun, Tae Whan Yoo, Yool Kwon, Kyeong Soo Han
  • Patent number: 7730320
    Abstract: In a target apparatus which stores at least one piece of domain key information in a first area and a plurality of pieces of content key information each associated with any one of the domain key information in a second area, a method for generating data for detecting tampering of the content key information. The method comprises the steps of encrypting the content key information associated with one of the domain key information using a chain encryption technique, extracting data at predetermined positions in the encrypted content key information, concatenating the pieces of data extracted at the predetermined positions in the encrypted content key information to obtain concatenated data, performing a hash calculation with respect to the concatenated data to obtain a hash value, storing check values corresponding to the data at the predetermined positions in plain text, in the target apparatus, and storing the hash value in the target apparatus.
    Type: Grant
    Filed: September 13, 2005
    Date of Patent: June 1, 2010
    Assignee: Panasonic Corporation
    Inventors: Tomoya Satou, Makoto Fujiwara, Kentarou Shiomi, Yusuke Nemoto, Yuishi Torisaki, Kazuya Shimizu, Shinji Inoue, Kazuya Fujimura, Makoto Ochi
  • Patent number: 7725718
    Abstract: Method 300 facilitates the authentication of images, for example on a web-site (380). The method includes encoding images (310). In one embodiment, a search request is received (330) from a terminal (340) and the Internet is searched (350) in accordance with the search request and one or more web-sites identified (if any). An image associated with the identified web-site is checked (360) to see if the image is authentic. This can be achieved by decoding the image to obtain embedded identification information. If the image is authenticated, the image is transmitted (390) as part of a search results list. If the image is not authenticated, the image is not transmitted (395) or a warning that the image has not been authenticated can be provided. A method which facilitates the authentication of an email or other type of electronic document is also disclosed.
    Type: Grant
    Filed: June 16, 2005
    Date of Patent: May 25, 2010
    Inventor: Ronald Neville Langford
  • Patent number: 7725703
    Abstract: In a computer with a trusted platform module (TPM), an expected hash value of a boot component may be placed into a platform configuration register (PCR), which allows a TPM to unseal a secret. The secret may then be used to decrypt the boot component. The hash of the decrypted boot component may then be calculated and the result can be placed in a PCR. The PCRs may then be compared. If they do not, access to the an important secret for system operation can be revoked. Also, a first secret may be accessible only when a first plurality of PCR values are extant, while a second secret is accessible only after one or more of the first plurality of PCR values has been replaced with a new value, thereby necessarily revoking further access to the first secret in order to grant access to the second secret.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: May 25, 2010
    Assignee: Microsoft Corporation
    Inventors: Jamie Hunter, Paul England, Russell Humphries, Stefan Thom, James Anthony Schwartz, Jr., Kenneth D Ray, Jonathan Schwartz
  • Patent number: 7725728
    Abstract: A computer readable medium includes executable instructions to audit data migration. The executable instructions include instructions to define a data migration path from a source to a target. Audit points are specified within the data migration path. Audit statistics to be generated at the audit points are identified. The audit statistics including data corresponding to individual data values transmitted over the data migration path. Audit rules to be applied against the audit statistics are established.
    Type: Grant
    Filed: March 23, 2005
    Date of Patent: May 25, 2010
    Assignee: Business Objects Data Integration, Inc.
    Inventors: Ronaldo Ama, Sachinder S. Chawla, Balaji Gadhiraju, Awez Syed, Mark Todd, Mon For Yee
  • Patent number: 7725724
    Abstract: The present invention discloses a digital signature scheme based on braid group conjugacy problem and a verifying method thereof, wherein a signatory S selects three braids x?LBm(l), x??Bn(l), a?Bn(l), and considers braid pair (x?,x) as a public key of S, braid a as a private key of S; Signatory S uses hash function h for a message M needing signature to get y=h(M)?Bn(l); generating a braid b?RBn?1?m(l) randomly, then signing M with a and b to obtain Sign(M)=a?1byb?1a; a signature verifying party V obtains the public key of S, calculating the message M by employing hash function h, obtaining the y=h(M); judging whether sign(M) and y, sign(M)x? and xy are conjugate or not, if yes, sign(M) is a legal signature of message M; the present invention reduces the number of braids involved and the number for conjugacy decision without reducing security, thereby improving the operation efficiency of signature.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: May 25, 2010
    Assignee: ZTE Corporation
    Inventors: Yong Ding, Jianyong Chen, Zhiwei Peng
  • Patent number: 7721108
    Abstract: To check a digital signature, using a microcircuit card, the microcircuit being designed to receive and to process requests to check digital signatures, the process comprises storing in a memory in the microcircuit a certificates table containing digest forms of authorized public keys, and a phase of checking a digital signature consisting of: receiving by the microcircuit the digital signature to be checked and a public key corresponding to a private key that was used to generate the digital signature to be checked; calculating a digest form of the received public key, searching for the calculated digest form of the public key in the certificates table, and decrypting the digital signature using the received public key if the calculated digest form of the public key is located in the certificates table.
    Type: Grant
    Filed: May 21, 2003
    Date of Patent: May 18, 2010
    Assignee: France Telecom
    Inventors: Jean-Claude Pailles, Vincent Boutroux
  • Patent number: 7719708
    Abstract: An effective method for securing the release of the transmission, rendering, and outputting of an imaging/print job at an imaging device, for imaging/print jobs that originate in traditional print/spooling subsystems include the following steps. A print job header is associated with an imaging/print job to form a headed imaging/print job. A secured release input (that may be input at a secured release input apparatus of the client host device) is associated with the print job header by including a secured release indicative command/code in the print job header. The headed imaging/print job is divided into data packets. Initial data packet(s) are transmitted to the imaging device. It is determined whether the secured release indicative command/code is present in the initial data packet(s). Acceptance of subsequent data packets of the headed imaging/print job are prevented if the secured release indicative command/code is present in the initial data packet(s).
    Type: Grant
    Filed: June 1, 2005
    Date of Patent: May 18, 2010
    Assignee: Sharp Laboratories of America, Inc.
    Inventors: Andrew Rodney Ferlitsch, Roy K. Chrisop
  • Patent number: 7721102
    Abstract: A system and method for detecting exposure of an OCSP responder's session private key in a D-OCSP-KIS to verify the status of a user's certificate online are provided. The system includes: a client for requesting certificate status information from the OCSP responder; the OCSP responder for receiving the certificate status information request from the client, sending a response, producing a hash value, and delivering the hash value to a certificate authority (CA) to get a certificate issued; and the CA for receiving the hash value from the OCSP responder and issuing the certificate to the OCSP responder in response to a certificate issue request; wherein the client verifies a digital signature using a hash value contained in the OCSP responder's certificate and the hash value contained in the response, and each client stores a counter value for a hash operation in each verification and recognizes the response as valid when a current counter value is greater than a previous counter value.
    Type: Grant
    Filed: May 11, 2006
    Date of Patent: May 18, 2010
    Assignee: Sungkyunkwan University Foundation for Corporate Collaboration
    Inventors: Dongho Won, Seungjoo Kim, Younggyo Lee
  • Patent number: 7721098
    Abstract: A system, method, and computer program product enabling individual user devices to authenticate and validate a digital message sent by a distribution center, without requiring transmissions to the distribution center. The center transmits the message with an appended modulus that is the product of two specially selected primes. The transmission also includes an appended authentication value that is based on an original message hash value, a new message hash value, and the modulus. The new message hash value is designed to be the center's public RSA key; a corresponding private RSA key is also computed. Individual user devices combine a digital signet, a public modulus, preferably unique hardware-based numbers, and an original message hash to compute a unique integrity value K. Subsequent messages are similarly processed to determine new integrity values K?, which equal K if and only if new messages originated from the center and have not been corrupted.
    Type: Grant
    Filed: June 5, 2008
    Date of Patent: May 18, 2010
    Assignee: International Business Machines Corporation
    Inventor: Jeffrey B. Lotspiech
  • Patent number: 7715553
    Abstract: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The present invention generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag without any further steps that is N times longer than the block size where N is the number of pseudorandom permutations used in the encipherment of each block. The authentication tag provides a unique mapping to the plaintext for any number of plaintext blocks that is less than or equal to N. In addition to being a stand alone encryption algorithm, the disclosed technique is applicable to any mode that uses pseudorandom permutations such as, key dependent lookup tables, S-Boxes, and block ciphers such as RC5, TEA, and AES.
    Type: Grant
    Filed: July 31, 2006
    Date of Patent: May 11, 2010
    Inventors: Eric Myron Smith, Kevin Martin Henson, Daniel Jason Williams, Peter Schweitzer
  • Publication number: 20100115285
    Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.
    Type: Application
    Filed: January 8, 2010
    Publication date: May 6, 2010
    Applicant: NEC CORPORATION
    Inventors: JUN FURUKAWA, KAZUE SAKO
  • Patent number: 7712143
    Abstract: A trusted enclave for a software system of a computer node provides relatively high assurance protection of a section of the software system. The trusted enclave attempts to stop malware from compromising parts of the software system within the trusted enclave. If a software system process outside the trusted enclave becomes compromised, the compromised process may be prevented from compromising software system resources within the trusted enclave. Compromise of a process or resource of the software system refers to, for example, malware access, alteration or control of the process or resource.
    Type: Grant
    Filed: September 27, 2006
    Date of Patent: May 4, 2010
    Assignee: Blue Ridge Networks, Inc.
    Inventor: Fatih Comlekoglu
  • Patent number: 7711959
    Abstract: The present invention relates to a method for handling or transmitting encrypted user data objects. According to such method, a data preparation component (D) of a data preparation system provides user data objects. The data preparation component first encrypts a user data object that has been prepared. It then determines a checksum of the encrypted user data object and creates a container data object (DCF), in which the encrypted user data object and the determined checksum are provided. The container data object is subsequently transmitted to a first telecommunications device (A). Preferably, in order to use the encrypted user data object, the data preparation component (D) transmits descriptive information (BI1) containing a description of the possible usage rights for the encrypted user data object to the telecommunications device (A).
    Type: Grant
    Filed: August 14, 2003
    Date of Patent: May 4, 2010
    Assignee: Gigaset Communications GmbH
    Inventors: Andreas Schmidt, Markus Trauberg
  • Publication number: 20100106970
    Abstract: Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.
    Type: Application
    Filed: January 11, 2010
    Publication date: April 29, 2010
    Applicant: RESEARCH IN MOTION LIMITED
    Inventors: Michael K. BROWN, Herbert A. LITTLE, Dinah L. M. DAVIS
  • Patent number: 7707421
    Abstract: A digital document system in which a digital document in a communication network is shared between a plurality of stations, said system comprising: a first station (101A) having a first digital document (DD1) comprising a thumbnail data item (TH1) and an original data item (HR1); a second station (102A) having a second digital document (DD2) comprising a thumbnail data item (TH2); and a center station (100A) comprising: calculating means for calculating signatures of the thumbnail data items (TH1, TH2) of the first and second digital documents (DD1, DD2); comparing means for comparing the calculated signatures of the thumbnail data items (TH1, TH2); and transmitting means for transmitting information for accessing the original data item (HR1) of the first digital document (DD1) to the second station (102A) according to a result of the comparison.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: April 27, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventors: Lilian Labelle, Eric Nassor
  • Patent number: 7707424
    Abstract: A method and apparatus are provided for identification/authentication of file transfers, that limits the attackers window of opportunity and that aims at incurring a minimum of overhead on the information processing between a client (CL) and a server (SV). According to a preferred embodiment of the invention hash functions (H1-H4) are involved at the server side and the client side. The client and server share a common secret value (S).
    Type: Grant
    Filed: April 9, 2002
    Date of Patent: April 27, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (PUBL)
    Inventor: Stefan Axelsson
  • Patent number: 7707427
    Abstract: Multi-level file digests for electronic files are disclosed. A top level digest represents a single digest for the associated electronic file. Lower level digests represent digests for portions of the associated electronic file. The top level digest is derived from the lower level digests. The top level digest is useful for facilitating rapid comparison to determine whether electronic files are the same. In one embodiment, electronic files are encrypted with a block encryption scheme, and digests are efficiently calculated and stored on a block-by-block basis. Advantageously, when modifications to an encrypted electronic file occurs, only those modified blocks need to be processed to undergo decryption and re-encryption to determine the appropriate digest.
    Type: Grant
    Filed: July 19, 2004
    Date of Patent: April 27, 2010
    Inventors: Michael Frederick Kenrich, Yevgeniy Gutnik
  • Publication number: 20100100946
    Abstract: A system and method for authenticating an application (client) to a server or service. During a registration phase, an application that requests access to a service can receive a service identifier, which it can authenticate. The application can generate and send to the server or service an application-service key that is based upon the authenticated service identifier and a secret application key; a service-application identifier that can be based upon the authenticated service identifier and an application identifier; and a registration nonce, all of which can be stored at the server. During the authentication phase, the client can send to the server the application-service identifier, which the server can use to lookup the stored registration data. The server can send the registration nonce to the client, which can compute a proof of possession of the service-application key and send to the server. The server can compute its own version of this key and compare it to the received key.
    Type: Application
    Filed: September 17, 2009
    Publication date: April 22, 2010
    Applicant: VeriSign, Inc.
    Inventor: Phillip Martin Hallam-Baker
  • Patent number: 7702910
    Abstract: A method of processing a message to determine a tag value from the message and from a key according to a message authentication code. The method including the steps of selecting one of a plurality of symbols, the plurality of symbols forming a codeword encoding a data item derived from the message, the codeword encoding the data item according to an error correcting code, wherein said key determines which one of said plurality of symbols is selected; and determining the tag value to be the selected symbol.
    Type: Grant
    Filed: June 24, 2003
    Date of Patent: April 20, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventor: Christian Gehrmann
  • Patent number: 7698562
    Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: April 13, 2010
    Assignee: Panasonic Corporation
    Inventors: Tadao Kusudo, Takakazu Shiomi
  • Patent number: 7698559
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for digital rights management. In one aspect, a method is provided. The method includes receiving an electronic document, where the electronic document includes one or more content items, a set of usage rights defining one or more features to be enabled when the document is read by an electronic document reader, and a stored representation. The method further includes generating a representation of invariant content items of the electronic document, comparing the generated representation with the stored representation, and enabling features corresponding to the set of usage rights in the electronic document only if the generated representation and the stored representation are identical, where the features are features performed by the electronic document reader on the electronic document.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: April 13, 2010
    Assignee: Adobe Systems Incorporated
    Inventors: Krish Chaudhury, James D. Pravetz
  • Patent number: 7698561
    Abstract: The invention provides a method and system of detecting aliases in a network. The network comprises at least one device and at least one Network management system (NMS) for managing the devices. The NMS identifies each device available in the network with a message digest. The NMS retrieves the message digest of a device that is submitted for management. The NMS tries to locate the retrieved message digest with a database of message digests. In case the retrieved message digest is located on the database, the NMS declares the device as an alias. However, if the message digest is not located on the database, the NMS stores the message digest in the database and starts managing the device.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: April 13, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Ps Nagendra, Vishnu Ls Kiran
  • Publication number: 20100088522
    Abstract: A method and apparatus for maintaining a tamper proof device log are described. In one embodiment, the method comprises maintaining an embedded log in the device, the embedded log being a chain of log entries. In one embodiment, the method may also comprise publishing at least one log entry to a location external to the device.
    Type: Application
    Filed: October 2, 2008
    Publication date: April 8, 2010
    Inventors: John Barrus, Michael Gormish, Sergey Chemishkian
  • Patent number: 7693286
    Abstract: Delivering a Direct Proof private key in a signed group of keys to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored along with a group number in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored in a signed group of keys (e.g., a signed group record) on a removable storage medium (such as a CD or DVD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system.
    Type: Grant
    Filed: July 14, 2004
    Date of Patent: April 6, 2010
    Assignee: Intel Corporation
    Inventors: James A. Sutton, II, Clifford D. Hall, Ernie F. Brickell, David W. Grawrock
  • Patent number: 7694335
    Abstract: A server is configured for preventing flood attacks by a client having sent a request, by dynamically generating a challenge to be performed by the client before the server will perform any work for the client. The challenge includes a dynamically generated computational request and a dynamically generated secure cookie. The server generates a first hash result based on hashing a first random number, having a prescribed length, with a second random number having a dynamically selected length. A secure cookie is generated based on hashing the first hash result with a prescribed secure key known only by the server, and a unique identifier for the request such as the client network address with a time stamp. The challenge requires the client to determine the second random number based on the first random number and the hash result. The server validates the challenge results using the secure cookie.
    Type: Grant
    Filed: March 9, 2004
    Date of Patent: April 6, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Bryan C. Turner, John Toebes
  • Publication number: 20100082994
    Abstract: A method for implementing electronic seal is disclosed. The method includes: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external portable apparatus; performing a Hash conversion to a file to be sealed and the seal data of the electronic seal to generate a data digest, wherein the file to be sealed is a layout file; sealing, in the portable apparatus, the data digest using the private key of the sealer and the electronic signature program to generate an electronic signature result; and combining the file to be sealed, the seal data of the electronic seal, the digital certificate and the electronic signature result to generate a seal combination file.
    Type: Application
    Filed: November 20, 2009
    Publication date: April 1, 2010
    Inventors: Donglin Wang, Ningsheng Liu
  • Patent number: 7685422
    Abstract: An information processing apparatus has an authentication/key exchange unit, a round trip time measuring unit, a common key transmitter, a contents key transmitter and a contents transmitter. The round trip time measuring unit sends a round trip time measuring request generated to the communication apparatus through the first communication connection to measure the round trip time, and check whether the measured round trip time is within a predetermined time and whether a transmitting source of the round trip request response is the communication apparatus sharing the first key. The common key transmitter encrypts a second key used for contents transmission by using the first key and transmits the encrypted second key through the first communication connection when the round trip time measuring unit succeeds in the checking.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: March 23, 2010
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Hiroshi Isozaki, Takashi Kokubo, Koji Kanazawa
  • Patent number: 7685428
    Abstract: An information stream (media stream) can be “bookmarked” with event markers to note points in time in the information stream of occurrences of interesting events. Repeat occurrences of an event are noted with the same event marker. The events of interest need not be a priori determined. In fact, unexpected events can be readily noted.
    Type: Grant
    Filed: August 14, 2003
    Date of Patent: March 23, 2010
    Assignee: Ricoh Company, Ltd.
    Inventor: Kurt Piersol
  • Patent number: 7685429
    Abstract: To generate and verify signature data using a known signature algorithm whose safety is ensured from the viewpoint of calculation quantity and ensuring the authenticity thereof over a long time period. A message to be signed is transmitted, a padding-data item is added to the message, and a signature-data item of the message with the padding-data item added thereto is generated by using a hash function and a public-key cryptosystem. The addition step and the generation step are performed a predetermined number of times by using the signature-data item, as the padding-data item, and the signature-data items generated the predetermined number of times and the padding-data items added the predetermined number of times are externally transmitted with the message.
    Type: Grant
    Filed: September 29, 2005
    Date of Patent: March 23, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yuji Suga
  • Patent number: 7680269
    Abstract: A method ciphers a standardized stream of compressed audio or video data, wherein at least one part of the bits of data packets delimited by two consecutive synchronization markers is ciphered by pseudo-random stream.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: March 16, 2010
    Assignee: STMicroelectronics S.A.
    Inventors: Jean Nicolai, William Orlando
  • Patent number: 7676678
    Abstract: A method for signing a data package uses a signing apparatus, the signing apparatus having a binary identification code comprises the step of providing a set of node keys and a check value for the data package and the step of determining a signature block having a plurality of signature fields. In addition, the method comprises the step of providing the binary identification code of the signing apparatus and the signature block in order to sign the data package.
    Type: Grant
    Filed: December 14, 2005
    Date of Patent: March 9, 2010
    Assignee: Nero AG
    Inventor: Andreas Eckleder
  • Patent number: 7672460
    Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.
    Type: Grant
    Filed: January 24, 2005
    Date of Patent: March 2, 2010
    Assignee: NEC Corporation
    Inventors: Jun Furukawa, Kazue Sako
  • Publication number: 20100049986
    Abstract: To achieve high safety, large-sized nonlinear permutation is employed; however, the larger permutation processing is, the more the period of time required for the processing is, which hence is not efficient. There is provided a hash value generation method or a hash value generator which has the following aspects and which is highly safe and is capable of executing processing at a high speed. 1. As a message insertion method, there is employed a linear conversion in which the insertion message affects all subblocks. 2. An internal state is divided into a plurality of subblocks, and nonlinear permutation is conducted in each subblock unit. 3. Additionally, the linear conversion of item 1 above may be configured such that each subblock of the internal state affects the subblocks of the output.
    Type: Application
    Filed: February 9, 2009
    Publication date: February 25, 2010
    Inventors: Dai WATANABE, Hisayoshi SATO
  • Patent number: 7668315
    Abstract: Methods and apparatus are presented for providing local authentication of subscribers travelling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
    Type: Grant
    Filed: May 22, 2001
    Date of Patent: February 23, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: Roy F. Quick, Jr., Gregory G. Rose
  • Patent number: 7660421
    Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: February 9, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
  • Publication number: 20100031052
    Abstract: There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile trusted computing environment and a low power keyed-hash message authentication code (HMAC) encryption apparatus using the low power SHA-1 hash algorithm apparatus, the HMAC encryption apparatus including: a key padder padding key data for HMAC algorithm; an XOR operator XOR operating the padded key data and a padding constant; a data connector connecting a text to be encrypted, to data obtained by the XOR operating; a data padder padding the connected data; an SHA-1 hash algorithm part performing an SHA-1 hash algorithm on the padded data; a data selector selecting and applying one of a result of the SHA-1 hash algorithm and the text to be encrypted, to the data connector; and a controller controlling operations of the key padder, data connector, and data padder, a sequence of performing a hash algorithm of the SHA-1 hash algorithm part, and storing a
    Type: Application
    Filed: April 15, 2008
    Publication date: February 4, 2010
    Applicant: Electronics & Telecommunications Research Institute
    Inventors: Moo Seop Kim, Young Sae Kim, Young Soo Park, Ji Man Park, Sung Ik Jun, Jong Soo Jang
  • Publication number: 20100031051
    Abstract: The invention comprises a method of authenticating and encrypting a client-server communication, comprising the steps of: a) generating a first one-time password (OTP1) and a second one-time password (OTP2) from a cryptographic token; b) generating an encryption key (K_ENC) and a MAC key (K_MAC) based on OTP2; c) preparing and protecting the client data using K_ENC and K_MAC; d) sending a request message from the client to the server, the request message containing the protected client data, a cryptographic token identifier (TID) and OTP1; e) validating OTP1 at the server, and generating OTP2 at the server upon successful validation; f) deriving K_ENC and K_MAC from OTP2 at the server; g) processing the request message and generating result data h) encrypting the result data using K_ENC and creating a digest using K_MAC; i) sending the encrypted result data to the client; and i) decrypting the result data at the client using K_ENC and verifying the authenticity of the result data using K_MAC.
    Type: Application
    Filed: February 8, 2008
    Publication date: February 4, 2010
    Inventors: Salah E. MACHANI, Konstantin TESLENKO
  • Patent number: 7653814
    Abstract: Systems and methods and computer programs for verifying the authenticity and integrity of hyperlink addresses and files that are accessible by means of these hyperlink addresses. A system and a method are disclosed for authenticating a file such as an HTML document hyperlinked to a graphic object such as a digital image or to a graphic icon. The hyperlink network address (e.g., the URL of the hyperlink on the Internet) is encoded on a first portion of the graphic object. Checking information such as a MAC digital signature and the hyperlinked file are encoded into a second portion of the same graphic object. In accordance with another aspect of the invention, a system and a method are disclosed for verifying the authenticity and integrity of a hyperlink and a file when this hyperlink is activated.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: January 26, 2010
    Assignee: International Business Machines Corporation
    Inventor: Fernando Incertis Carro
  • Patent number: 7650499
    Abstract: An encryption apparatus divides input original data into one or more data blocks. The size of each data block is an integer multiple of the bank size of a non-volatile memory equipped in a decryption apparatus. The encryption apparatus generates authentication data from this data block. The encryption apparatus generates encrypted data after it combines the authentication data to the data block. On the other hand, a decryption apparatus executes reverse processes to decrypt original data, and writes it in a non-volatile memory.
    Type: Grant
    Filed: July 7, 2005
    Date of Patent: January 19, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventor: Hirotaka Ittogi
  • Patent number: 7649990
    Abstract: An apparatus arranged to accept digital data as an input and to process the data according to one of either the Secure Hash Algorithm (SHA-1) or Message Digest (MD5) algorithm to produce a fixed length output word. The apparatus includes a plurality of rotational registers for storing data, one of the registers arranged to receive the input data, and data stores for initialization of some of the plurality of registers according to whether the SHA-1 or MD5 algorithm is used. The data stores include fixed data relating to SHA-1 and MD5 operation. Also included is a plurality of dedicated combinatorial logic circuits arranged to perform logic operations on data stored in selected ones of the plurality of registers.
    Type: Grant
    Filed: October 21, 2002
    Date of Patent: January 19, 2010
    Assignee: STMicroelectronics Asia Pacific Pte. Ltd.
    Inventors: Bernard Plessier, Ming-Kiat Yap
  • Patent number: 7647624
    Abstract: Techniques are provided for preserving and managing identities within an audit log. Initial entries into a log do not include an explicit and direct reference to an agent that performs a transaction; rather, the agent acquires a temporary transaction identity for the transaction and an indirect reference to the transaction identity is written to the log while the transaction is pending. Once the transaction completes a direct reference to the transaction identity is written to the log, the identity of agent remains transparent until the identity of the agent expires, if at all.
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: January 12, 2010
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Stephen R. Carter, Douglas G. Earl
  • Patent number: 7647504
    Abstract: A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table. If an entry is found, the data store is accessed using the hashed access information, but if an entry is not found, another look-up table corresponding to another information type may be tried or the input access information permuted and retried.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: January 12, 2010
    Assignee: United States Postal Service
    Inventors: James D. Wilson, Robert F. Snapp, David J. Payne, Edgar H. Gillock, II
  • Patent number: 7647498
    Abstract: Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: January 12, 2010
    Assignee: Research In Motion Limited
    Inventors: Michael K. Brown, Herbert A. Little, Dinah L. M. Davis
  • Patent number: 7647630
    Abstract: A method for authorizing information flows based on security information associated with information objects is provided. A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.
    Type: Grant
    Filed: December 15, 2005
    Date of Patent: January 12, 2010
    Assignee: International Business Machines Corporation
    Inventors: Diana J. Arroyo, George R. Blakley, III, Damir A. Jamsek, Sridhar R. Muppidi, Kimberly D. Simon, Ronald B. Williams
  • Publication number: 20100005307
    Abstract: A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security.
    Type: Application
    Filed: August 4, 2008
    Publication date: January 7, 2010
    Inventor: Devi PRASHANTH
  • Patent number: 7644270
    Abstract: A system to validate a request for web services which includes a digital certificate is provided. The system includes a first certification authority that provides a public encryption key and a certificate revocation list in response to requests. The system also includes a certification revocation list component that determines whether a digital certificate is named in the certification revocation list, a certificate verification component that determines whether a digital certificate is valid, a plurality of verifier components that determine the validity of a request for web services and each of which operates in accordance with a different one of a plurality of OASIS Web Services Security versions. The system also includes a management component to determine the version of the OASIS Web Service Security version of the web services request and to select an appropriate verifier component.
    Type: Grant
    Filed: May 10, 2004
    Date of Patent: January 5, 2010
    Assignee: Sprint Communications Company L.P.
    Inventors: Vijaykumar Cherukumudi, David Fultz, Shrikant Jannu
  • Publication number: 20090327738
    Abstract: A mechanism for making increased amounts of firmware available to a computer pre-boot is discussed. To increase the amount of firmware available pre-boot, a design decision is made during the build process as to which segments of the firmware need to be placed on the ROM part and which segments of the firmware can be located elsewhere. The segments of the firmware that are stored remotely from the ROM are referred to as “virtual ROM modules”. Each of the virtual ROM modules is assigned a generated unique identifier, and a “message digest” is constructed for each module using an algorithm such as MD5 or SHA-1. In the software build of the ROM image, the message digest-unique identifier pair created for each Virtual ROM module is used as a logical pointer for the virtual module. Additionally, a search path variable is placed into the ROM image in non-volatile storage. The search path provides for one or more locations in which to look for the Virtual ROM modules, and may be updated at a later point in time.
    Type: Application
    Filed: September 2, 2009
    Publication date: December 31, 2009
    Applicant: INSYDE SOFTWARE CORPORATION
    Inventor: Rex A. FLYNN
  • Publication number: 20090327736
    Abstract: Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.
    Type: Application
    Filed: December 6, 2005
    Publication date: December 31, 2009
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, JR.