Message Digest Travels With Message Patents (Class 713/181)
-
Patent number: 7707427Abstract: Multi-level file digests for electronic files are disclosed. A top level digest represents a single digest for the associated electronic file. Lower level digests represent digests for portions of the associated electronic file. The top level digest is derived from the lower level digests. The top level digest is useful for facilitating rapid comparison to determine whether electronic files are the same. In one embodiment, electronic files are encrypted with a block encryption scheme, and digests are efficiently calculated and stored on a block-by-block basis. Advantageously, when modifications to an encrypted electronic file occurs, only those modified blocks need to be processed to undergo decryption and re-encryption to determine the appropriate digest.Type: GrantFiled: July 19, 2004Date of Patent: April 27, 2010Inventors: Michael Frederick Kenrich, Yevgeniy Gutnik
-
Patent number: 7707424Abstract: A method and apparatus are provided for identification/authentication of file transfers, that limits the attackers window of opportunity and that aims at incurring a minimum of overhead on the information processing between a client (CL) and a server (SV). According to a preferred embodiment of the invention hash functions (H1-H4) are involved at the server side and the client side. The client and server share a common secret value (S).Type: GrantFiled: April 9, 2002Date of Patent: April 27, 2010Assignee: Telefonaktiebolaget L M Ericsson (PUBL)Inventor: Stefan Axelsson
-
Patent number: 7707421Abstract: A digital document system in which a digital document in a communication network is shared between a plurality of stations, said system comprising: a first station (101A) having a first digital document (DD1) comprising a thumbnail data item (TH1) and an original data item (HR1); a second station (102A) having a second digital document (DD2) comprising a thumbnail data item (TH2); and a center station (100A) comprising: calculating means for calculating signatures of the thumbnail data items (TH1, TH2) of the first and second digital documents (DD1, DD2); comparing means for comparing the calculated signatures of the thumbnail data items (TH1, TH2); and transmitting means for transmitting information for accessing the original data item (HR1) of the first digital document (DD1) to the second station (102A) according to a result of the comparison.Type: GrantFiled: November 10, 2004Date of Patent: April 27, 2010Assignee: Canon Kabushiki KaishaInventors: Lilian Labelle, Eric Nassor
-
Publication number: 20100100946Abstract: A system and method for authenticating an application (client) to a server or service. During a registration phase, an application that requests access to a service can receive a service identifier, which it can authenticate. The application can generate and send to the server or service an application-service key that is based upon the authenticated service identifier and a secret application key; a service-application identifier that can be based upon the authenticated service identifier and an application identifier; and a registration nonce, all of which can be stored at the server. During the authentication phase, the client can send to the server the application-service identifier, which the server can use to lookup the stored registration data. The server can send the registration nonce to the client, which can compute a proof of possession of the service-application key and send to the server. The server can compute its own version of this key and compare it to the received key.Type: ApplicationFiled: September 17, 2009Publication date: April 22, 2010Applicant: VeriSign, Inc.Inventor: Phillip Martin Hallam-Baker
-
Patent number: 7702910Abstract: A method of processing a message to determine a tag value from the message and from a key according to a message authentication code. The method including the steps of selecting one of a plurality of symbols, the plurality of symbols forming a codeword encoding a data item derived from the message, the codeword encoding the data item according to an error correcting code, wherein said key determines which one of said plurality of symbols is selected; and determining the tag value to be the selected symbol.Type: GrantFiled: June 24, 2003Date of Patent: April 20, 2010Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventor: Christian Gehrmann
-
Patent number: 7698561Abstract: The invention provides a method and system of detecting aliases in a network. The network comprises at least one device and at least one Network management system (NMS) for managing the devices. The NMS identifies each device available in the network with a message digest. The NMS retrieves the message digest of a device that is submitted for management. The NMS tries to locate the retrieved message digest with a database of message digests. In case the retrieved message digest is located on the database, the NMS declares the device as an alias. However, if the message digest is not located on the database, the NMS stores the message digest in the database and starts managing the device.Type: GrantFiled: August 12, 2004Date of Patent: April 13, 2010Assignee: Cisco Technology, Inc.Inventors: Ps Nagendra, Vishnu Ls Kiran
-
Patent number: 7698559Abstract: Methods and apparatus, including computer program products, implementing and using techniques for digital rights management. In one aspect, a method is provided. The method includes receiving an electronic document, where the electronic document includes one or more content items, a set of usage rights defining one or more features to be enabled when the document is read by an electronic document reader, and a stored representation. The method further includes generating a representation of invariant content items of the electronic document, comparing the generated representation with the stored representation, and enabling features corresponding to the set of usage rights in the electronic document only if the generated representation and the stored representation are identical, where the features are features performed by the electronic document reader on the electronic document.Type: GrantFiled: October 1, 2007Date of Patent: April 13, 2010Assignee: Adobe Systems IncorporatedInventors: Krish Chaudhury, James D. Pravetz
-
Patent number: 7698562Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.Type: GrantFiled: December 16, 2004Date of Patent: April 13, 2010Assignee: Panasonic CorporationInventors: Tadao Kusudo, Takakazu Shiomi
-
Publication number: 20100088522Abstract: A method and apparatus for maintaining a tamper proof device log are described. In one embodiment, the method comprises maintaining an embedded log in the device, the embedded log being a chain of log entries. In one embodiment, the method may also comprise publishing at least one log entry to a location external to the device.Type: ApplicationFiled: October 2, 2008Publication date: April 8, 2010Inventors: John Barrus, Michael Gormish, Sergey Chemishkian
-
Patent number: 7693286Abstract: Delivering a Direct Proof private key in a signed group of keys to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored along with a group number in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored in a signed group of keys (e.g., a signed group record) on a removable storage medium (such as a CD or DVD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system.Type: GrantFiled: July 14, 2004Date of Patent: April 6, 2010Assignee: Intel CorporationInventors: James A. Sutton, II, Clifford D. Hall, Ernie F. Brickell, David W. Grawrock
-
Patent number: 7694335Abstract: A server is configured for preventing flood attacks by a client having sent a request, by dynamically generating a challenge to be performed by the client before the server will perform any work for the client. The challenge includes a dynamically generated computational request and a dynamically generated secure cookie. The server generates a first hash result based on hashing a first random number, having a prescribed length, with a second random number having a dynamically selected length. A secure cookie is generated based on hashing the first hash result with a prescribed secure key known only by the server, and a unique identifier for the request such as the client network address with a time stamp. The challenge requires the client to determine the second random number based on the first random number and the hash result. The server validates the challenge results using the secure cookie.Type: GrantFiled: March 9, 2004Date of Patent: April 6, 2010Assignee: Cisco Technology, Inc.Inventors: Bryan C. Turner, John Toebes
-
Publication number: 20100082994Abstract: A method for implementing electronic seal is disclosed. The method includes: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external portable apparatus; performing a Hash conversion to a file to be sealed and the seal data of the electronic seal to generate a data digest, wherein the file to be sealed is a layout file; sealing, in the portable apparatus, the data digest using the private key of the sealer and the electronic signature program to generate an electronic signature result; and combining the file to be sealed, the seal data of the electronic seal, the digital certificate and the electronic signature result to generate a seal combination file.Type: ApplicationFiled: November 20, 2009Publication date: April 1, 2010Inventors: Donglin Wang, Ningsheng Liu
-
Patent number: 7685428Abstract: An information stream (media stream) can be “bookmarked” with event markers to note points in time in the information stream of occurrences of interesting events. Repeat occurrences of an event are noted with the same event marker. The events of interest need not be a priori determined. In fact, unexpected events can be readily noted.Type: GrantFiled: August 14, 2003Date of Patent: March 23, 2010Assignee: Ricoh Company, Ltd.Inventor: Kurt Piersol
-
Patent number: 7685429Abstract: To generate and verify signature data using a known signature algorithm whose safety is ensured from the viewpoint of calculation quantity and ensuring the authenticity thereof over a long time period. A message to be signed is transmitted, a padding-data item is added to the message, and a signature-data item of the message with the padding-data item added thereto is generated by using a hash function and a public-key cryptosystem. The addition step and the generation step are performed a predetermined number of times by using the signature-data item, as the padding-data item, and the signature-data items generated the predetermined number of times and the padding-data items added the predetermined number of times are externally transmitted with the message.Type: GrantFiled: September 29, 2005Date of Patent: March 23, 2010Assignee: Canon Kabushiki KaishaInventor: Yuji Suga
-
Patent number: 7685422Abstract: An information processing apparatus has an authentication/key exchange unit, a round trip time measuring unit, a common key transmitter, a contents key transmitter and a contents transmitter. The round trip time measuring unit sends a round trip time measuring request generated to the communication apparatus through the first communication connection to measure the round trip time, and check whether the measured round trip time is within a predetermined time and whether a transmitting source of the round trip request response is the communication apparatus sharing the first key. The common key transmitter encrypts a second key used for contents transmission by using the first key and transmits the encrypted second key through the first communication connection when the round trip time measuring unit succeeds in the checking.Type: GrantFiled: May 17, 2005Date of Patent: March 23, 2010Assignee: Kabushiki Kaisha ToshibaInventors: Hiroshi Isozaki, Takashi Kokubo, Koji Kanazawa
-
Patent number: 7680269Abstract: A method ciphers a standardized stream of compressed audio or video data, wherein at least one part of the bits of data packets delimited by two consecutive synchronization markers is ciphered by pseudo-random stream.Type: GrantFiled: January 13, 2006Date of Patent: March 16, 2010Assignee: STMicroelectronics S.A.Inventors: Jean Nicolai, William Orlando
-
Patent number: 7676678Abstract: A method for signing a data package uses a signing apparatus, the signing apparatus having a binary identification code comprises the step of providing a set of node keys and a check value for the data package and the step of determining a signature block having a plurality of signature fields. In addition, the method comprises the step of providing the binary identification code of the signing apparatus and the signature block in order to sign the data package.Type: GrantFiled: December 14, 2005Date of Patent: March 9, 2010Assignee: Nero AGInventor: Andreas Eckleder
-
Patent number: 7672460Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.Type: GrantFiled: January 24, 2005Date of Patent: March 2, 2010Assignee: NEC CorporationInventors: Jun Furukawa, Kazue Sako
-
Publication number: 20100049986Abstract: To achieve high safety, large-sized nonlinear permutation is employed; however, the larger permutation processing is, the more the period of time required for the processing is, which hence is not efficient. There is provided a hash value generation method or a hash value generator which has the following aspects and which is highly safe and is capable of executing processing at a high speed. 1. As a message insertion method, there is employed a linear conversion in which the insertion message affects all subblocks. 2. An internal state is divided into a plurality of subblocks, and nonlinear permutation is conducted in each subblock unit. 3. Additionally, the linear conversion of item 1 above may be configured such that each subblock of the internal state affects the subblocks of the output.Type: ApplicationFiled: February 9, 2009Publication date: February 25, 2010Inventors: Dai WATANABE, Hisayoshi SATO
-
Patent number: 7668315Abstract: Methods and apparatus are presented for providing local authentication of subscribers travelling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.Type: GrantFiled: May 22, 2001Date of Patent: February 23, 2010Assignee: QUALCOMM IncorporatedInventors: Roy F. Quick, Jr., Gregory G. Rose
-
Patent number: 7660421Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: GrantFiled: June 28, 2002Date of Patent: February 9, 2010Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Publication number: 20100031051Abstract: The invention comprises a method of authenticating and encrypting a client-server communication, comprising the steps of: a) generating a first one-time password (OTP1) and a second one-time password (OTP2) from a cryptographic token; b) generating an encryption key (K_ENC) and a MAC key (K_MAC) based on OTP2; c) preparing and protecting the client data using K_ENC and K_MAC; d) sending a request message from the client to the server, the request message containing the protected client data, a cryptographic token identifier (TID) and OTP1; e) validating OTP1 at the server, and generating OTP2 at the server upon successful validation; f) deriving K_ENC and K_MAC from OTP2 at the server; g) processing the request message and generating result data h) encrypting the result data using K_ENC and creating a digest using K_MAC; i) sending the encrypted result data to the client; and i) decrypting the result data at the client using K_ENC and verifying the authenticity of the result data using K_MAC.Type: ApplicationFiled: February 8, 2008Publication date: February 4, 2010Inventors: Salah E. MACHANI, Konstantin TESLENKO
-
Publication number: 20100031052Abstract: There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile trusted computing environment and a low power keyed-hash message authentication code (HMAC) encryption apparatus using the low power SHA-1 hash algorithm apparatus, the HMAC encryption apparatus including: a key padder padding key data for HMAC algorithm; an XOR operator XOR operating the padded key data and a padding constant; a data connector connecting a text to be encrypted, to data obtained by the XOR operating; a data padder padding the connected data; an SHA-1 hash algorithm part performing an SHA-1 hash algorithm on the padded data; a data selector selecting and applying one of a result of the SHA-1 hash algorithm and the text to be encrypted, to the data connector; and a controller controlling operations of the key padder, data connector, and data padder, a sequence of performing a hash algorithm of the SHA-1 hash algorithm part, and storing aType: ApplicationFiled: April 15, 2008Publication date: February 4, 2010Applicant: Electronics & Telecommunications Research InstituteInventors: Moo Seop Kim, Young Sae Kim, Young Soo Park, Ji Man Park, Sung Ik Jun, Jong Soo Jang
-
Patent number: 7653814Abstract: Systems and methods and computer programs for verifying the authenticity and integrity of hyperlink addresses and files that are accessible by means of these hyperlink addresses. A system and a method are disclosed for authenticating a file such as an HTML document hyperlinked to a graphic object such as a digital image or to a graphic icon. The hyperlink network address (e.g., the URL of the hyperlink on the Internet) is encoded on a first portion of the graphic object. Checking information such as a MAC digital signature and the hyperlinked file are encoded into a second portion of the same graphic object. In accordance with another aspect of the invention, a system and a method are disclosed for verifying the authenticity and integrity of a hyperlink and a file when this hyperlink is activated.Type: GrantFiled: December 10, 2002Date of Patent: January 26, 2010Assignee: International Business Machines CorporationInventor: Fernando Incertis Carro
-
Patent number: 7650499Abstract: An encryption apparatus divides input original data into one or more data blocks. The size of each data block is an integer multiple of the bank size of a non-volatile memory equipped in a decryption apparatus. The encryption apparatus generates authentication data from this data block. The encryption apparatus generates encrypted data after it combines the authentication data to the data block. On the other hand, a decryption apparatus executes reverse processes to decrypt original data, and writes it in a non-volatile memory.Type: GrantFiled: July 7, 2005Date of Patent: January 19, 2010Assignee: Canon Kabushiki KaishaInventor: Hirotaka Ittogi
-
Patent number: 7649990Abstract: An apparatus arranged to accept digital data as an input and to process the data according to one of either the Secure Hash Algorithm (SHA-1) or Message Digest (MD5) algorithm to produce a fixed length output word. The apparatus includes a plurality of rotational registers for storing data, one of the registers arranged to receive the input data, and data stores for initialization of some of the plurality of registers according to whether the SHA-1 or MD5 algorithm is used. The data stores include fixed data relating to SHA-1 and MD5 operation. Also included is a plurality of dedicated combinatorial logic circuits arranged to perform logic operations on data stored in selected ones of the plurality of registers.Type: GrantFiled: October 21, 2002Date of Patent: January 19, 2010Assignee: STMicroelectronics Asia Pacific Pte. Ltd.Inventors: Bernard Plessier, Ming-Kiat Yap
-
Patent number: 7647624Abstract: Techniques are provided for preserving and managing identities within an audit log. Initial entries into a log do not include an explicit and direct reference to an agent that performs a transaction; rather, the agent acquires a temporary transaction identity for the transaction and an indirect reference to the transaction identity is written to the log while the transaction is pending. Once the transaction completes a direct reference to the transaction identity is written to the log, the identity of agent remains transparent until the identity of the agent expires, if at all.Type: GrantFiled: November 30, 2005Date of Patent: January 12, 2010Assignee: Novell, Inc.Inventors: Lloyd Leon Burch, Stephen R. Carter, Douglas G. Earl
-
Patent number: 7647498Abstract: Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.Type: GrantFiled: April 30, 2004Date of Patent: January 12, 2010Assignee: Research In Motion LimitedInventors: Michael K. Brown, Herbert A. Little, Dinah L. M. Davis
-
Patent number: 7647504Abstract: A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table. If an entry is found, the data store is accessed using the hashed access information, but if an entry is not found, another look-up table corresponding to another information type may be tried or the input access information permuted and retried.Type: GrantFiled: December 14, 2006Date of Patent: January 12, 2010Assignee: United States Postal ServiceInventors: James D. Wilson, Robert F. Snapp, David J. Payne, Edgar H. Gillock, II
-
Patent number: 7647630Abstract: A method for authorizing information flows based on security information associated with information objects is provided. A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.Type: GrantFiled: December 15, 2005Date of Patent: January 12, 2010Assignee: International Business Machines CorporationInventors: Diana J. Arroyo, George R. Blakley, III, Damir A. Jamsek, Sridhar R. Muppidi, Kimberly D. Simon, Ronald B. Williams
-
Publication number: 20100005307Abstract: A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security.Type: ApplicationFiled: August 4, 2008Publication date: January 7, 2010Inventor: Devi PRASHANTH
-
Patent number: 7644270Abstract: A system to validate a request for web services which includes a digital certificate is provided. The system includes a first certification authority that provides a public encryption key and a certificate revocation list in response to requests. The system also includes a certification revocation list component that determines whether a digital certificate is named in the certification revocation list, a certificate verification component that determines whether a digital certificate is valid, a plurality of verifier components that determine the validity of a request for web services and each of which operates in accordance with a different one of a plurality of OASIS Web Services Security versions. The system also includes a management component to determine the version of the OASIS Web Service Security version of the web services request and to select an appropriate verifier component.Type: GrantFiled: May 10, 2004Date of Patent: January 5, 2010Assignee: Sprint Communications Company L.P.Inventors: Vijaykumar Cherukumudi, David Fultz, Shrikant Jannu
-
Publication number: 20090327738Abstract: A mechanism for making increased amounts of firmware available to a computer pre-boot is discussed. To increase the amount of firmware available pre-boot, a design decision is made during the build process as to which segments of the firmware need to be placed on the ROM part and which segments of the firmware can be located elsewhere. The segments of the firmware that are stored remotely from the ROM are referred to as “virtual ROM modules”. Each of the virtual ROM modules is assigned a generated unique identifier, and a “message digest” is constructed for each module using an algorithm such as MD5 or SHA-1. In the software build of the ROM image, the message digest-unique identifier pair created for each Virtual ROM module is used as a logical pointer for the virtual module. Additionally, a search path variable is placed into the ROM image in non-volatile storage. The search path provides for one or more locations in which to look for the Virtual ROM modules, and may be updated at a later point in time.Type: ApplicationFiled: September 2, 2009Publication date: December 31, 2009Applicant: INSYDE SOFTWARE CORPORATIONInventor: Rex A. FLYNN
-
Publication number: 20090327736Abstract: Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.Type: ApplicationFiled: December 6, 2005Publication date: December 31, 2009Applicant: Cisco Technology, Inc.Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, JR.
-
Publication number: 20090327737Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.Type: ApplicationFiled: June 26, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
-
Patent number: 7640433Abstract: The present invention is a MILS network system employing functional separation of messages without customized switches. The MILS network system may maintain separation of data while eliminating a requirement of full message encryption. In an embodiment of the invention, a function may be employed whereby a keyed digest of a message is created. The function may receive a message and a key, and may emit a keyed digest value. The key may be representative of a particular level of security, thus promoting the separation of data. Messages may include an embedded keyed digest when sent through a switch to a MILS node. At the MILS node, the keyed digest may be recalculated, if it matches, the message may be passed to a host.Type: GrantFiled: January 28, 2005Date of Patent: December 29, 2009Assignee: Rockwell Collins, Inc.Inventors: James A. Marek, Sung J. Kim
-
Publication number: 20090319792Abstract: A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the access terminal with a secret key that is only known to the access terminal and the server. The access terminal may store the secret key in a secure storage device to prevent the secret key from being hacked. If the server determines that synchronization has been lost, the server may send a resynchronization message to the access terminal with the secret key attached. The access terminal retrieves the stored secret key from the secure memory device and compares it to the secret key attached to the resynchronization message. If there is a match, the access terminal may initiate a secure communication link with the server to reestablish synchronization.Type: ApplicationFiled: June 9, 2008Publication date: December 24, 2009Applicant: QUALCOMM INCORPORATEDInventors: Philip Michael Hawkes, Andreas K. Wachter, Michael Paddon
-
Patent number: 7636840Abstract: A method and system for secure communication and control in a fueling environment. In one aspect, the fueling environment with secure communication comprises a fuel dispenser and at least one node communicable coupled with the fuel dispenser. The fuel dispenser is operable to generate a first public key and a first private key associated with the fuel dispenser and publish the first public key within the fueling environment. The fuel dispenser is further operable to authenticate a particular one of the nodes using, at least in part, a second public key associated with the particular node and the first public and the first private keys. The fuel dispenser may then dynamically generate a run-time symmetric key using, at least in part, the first private key and the second public key and communicate data associated with the fueling environment to the authenticated node, with the data encrypted using the symmetric key.Type: GrantFiled: March 4, 2005Date of Patent: December 22, 2009Assignee: Dresser, Inc.Inventor: Weiming Tang
-
Patent number: 7636857Abstract: A data processing system ciphers and transfers data between a first memory unit and a second memory unit, such as, for example, between a share memory architecture (SMA) static random access memory (SRAM) and a double data rate (DDR) synchronous dynamic random access memory (SDRAM). The system includes a ciphering engine and a data-mover controller. The data-mover controller includes at least one register having a field that specifies whether or not the transferred data should be ciphered. If the field specifies that the transferred data should be ciphered, the field also specifies the type of ciphering that is to be performed, such as a third generation partnership project (3GPP) standardized confidentially cipher algorithm “f8” or integrity cipher algorithm “f9”.Type: GrantFiled: June 28, 2004Date of Patent: December 22, 2009Assignee: InterDigital Technology CorporationInventors: Edward L. Hepler, Robert G. Gazda
-
Publication number: 20090313475Abstract: A system for verifying the security of communications between a set of nodes via a high-bandwidth, insecure communications channel. A number of embodiments are described for enabling authenticated communication between the nodes in an environment wherein there is a high bandwidth Dolev-Yao network amongst the nodes and non-spoofable, low-bandwidth empirical channels between each pair of nodes.Type: ApplicationFiled: November 3, 2006Publication date: December 17, 2009Applicant: ISIS INNOVATION LIMITEDInventors: Andrew William Roscoe, Long Hoang Nguyen
-
Publication number: 20090307482Abstract: Methods and apparatus for securely transmitting sensitive information to a remote device at the request of an application program are provided. The application program generates a request to a secure channel provider to make a transmission to a remote device. A first message is passed from the from the application program to the secure channel provider containing insertion point codes indicating locations within the first message where the sensitive information should be inserted. Sensitive information is obtained from a source outside of the application program and the sensitive information is inserted into the first message at the locations in the first message indicated by the insertion point codes to form a second message containing the sensitive information. The second message is encrypted and this encrypted message is transmitted to the remote device. The sensitive information is unaccessed by the application program during the execution of the method.Type: ApplicationFiled: May 29, 2007Publication date: December 10, 2009Inventor: Daniel McCann
-
Patent number: 7630493Abstract: Techniques for generating a private portion of a split private key of an asymmetric key pair are provided. Multiple factors upon which the private portion of the split private key is based are received. Each of these multiple factors is under control of a user associated with the asymmetric key pair. Multiple cryptographic operations are then performed using the received multiple factors to generate the private portion.Type: GrantFiled: February 14, 2005Date of Patent: December 8, 2009Assignee: TriCipher, Inc.Inventors: Ravinderpal Singh Sandhu, Brett Jason Schoppert, Ravi Ganesan, Mihir Bellare, Colin Joseph deSa
-
Publication number: 20090300364Abstract: An apparatus and a method for an authentication protocol. In one embodiment, a client requests for an authentication challenge from a server. The server generates the authentication challenge and sends it to the client. The authentication challenge includes the authentication context identifier, a random string, a timestamp, and a signature value. The client computes a salt value based on a username and the authentication context identifier from the authentication challenge. The signature value is computed based on the authentication context identifier, the random string, and the timestamp. The client computes a hashed password value based on the computed salt value, and a message authentication code based on the hashed password value and the random string. The client sends a response to the server. The response includes the username, the message authentication code, the random string, the timestamp, and the signature value.Type: ApplicationFiled: May 29, 2008Publication date: December 3, 2009Inventor: James Paul Schneider
-
Publication number: 20090300362Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.Type: ApplicationFiled: March 12, 2009Publication date: December 3, 2009Inventor: Cheman Shaik
-
Patent number: 7627753Abstract: Authenticity of digital data, security policies, and usage of game software are enforced on a game console. When the software is secured prior to distribution on media, a private key is used to encrypt a header digest that includes a digest of each section of the software and information specifying a region, a rating, and media type of the software. A hashing algorithm is applied to produce the digests. On the game console, a public key is used to decrypt the header digest for comparison to a hash of the header. A digest of each section of digital data is computed and compared to the corresponding digest in the header to authenticate the data. The console will not execute the software unless the parameters in the header information match those stored in the console and the computed digests for each section match those in the header on the medium.Type: GrantFiled: March 19, 2002Date of Patent: December 1, 2009Assignee: Microsoft CorporationInventors: Jon Marcus Randall Whitten, Tracy Clayton Sharpe, Yasser B. Asmi, Jonathan E. Lange, Christopher Michael Pirich, Jonathan Gerald Thomason
-
Patent number: 7627764Abstract: An arrangement is provided for performing MD5 digesting. The arrangement includes apparatuses and methods that pipeline the MD5 digesting process to produce a 128 bit digest for an input message of any arbitrary length.Type: GrantFiled: June 25, 2004Date of Patent: December 1, 2009Assignee: Intel CorporationInventors: Kamal J. Koshy, Jaroslaw J. Sydir, Wajdi K. Feghali
-
Patent number: 7627906Abstract: A service discovery system including a client terminal and a service providing device which provides data or a function to the client terminal, including: a service request unit which generates a message requesting a service of the service providing device; a communication unit which sends the message generated by the service request unit to the service providing device and which receives from the service providing device a problem imposing a load on the client terminal; and a solution unit which solves the problem.Type: GrantFiled: August 26, 2005Date of Patent: December 1, 2009Assignee: NTT DoCoMo, Inc.Inventors: Tomohiro Nakagawa, Motoharu Miyake, Hiroshi Inamura
-
Patent number: 7627765Abstract: A document management apparatus includes a hash generator that generates a hash value based on digital document data stored in a database, a communication unit that inputs time information, and a microfilm writer that performs processing to record a converted document data, converted to image data based on the digital document data, on a microfilm, and record a document ID as identification information of the converted document data recorded on the microfilm, the hash value, and the time information, on the microfilm.Type: GrantFiled: May 31, 2005Date of Patent: December 1, 2009Assignee: Fuji Xerox Co., Ltd.Inventors: Osamu Nakamura, Mitsuru Aonuma
-
Patent number: 7624434Abstract: A system for providing security in a computing network. The system has a server for distributing policies to be implemented by firewall devices in the network. The firewall devices provide hardware implemented firewalls to communication devices making network connections. The system has logic to allow a connection to be made to the network via a communication device at a node provided the firewall device is at that node. Therefore, the firewall device must be in the system for a connection to be established via the communication device. Additionally, the system is configured to cause data transferred by the communication device to be processed by the firewall.Type: GrantFiled: March 1, 2002Date of Patent: November 24, 2009Assignee: 3Com CorporationInventors: Peter M. Rigstad, John Y. Yoon, Mark Farahar, Barani Subbiah, Brant D. Thomsen, David E. Richmond, Vered Maor Semel, Earl Bryner
-
Patent number: 7624272Abstract: An integrity signature may provide information about a platform used to create a digital signature. The value of a digital signature may be related to the integrity and trustworthiness of the platform on which it is created. Signed platform integrity information provides a measure of trust regarding the platform used to create the digital signature. The integrity signature may be created separately from a document signature, or a combined integrity and document signature may be provided.Type: GrantFiled: March 31, 2003Date of Patent: November 24, 2009Assignee: Intel CorporationInventors: Willard M. Wiseman, David W. Grawrock