Message Digest Travels With Message Patents (Class 713/181)
  • Patent number: 7707427
    Abstract: Multi-level file digests for electronic files are disclosed. A top level digest represents a single digest for the associated electronic file. Lower level digests represent digests for portions of the associated electronic file. The top level digest is derived from the lower level digests. The top level digest is useful for facilitating rapid comparison to determine whether electronic files are the same. In one embodiment, electronic files are encrypted with a block encryption scheme, and digests are efficiently calculated and stored on a block-by-block basis. Advantageously, when modifications to an encrypted electronic file occurs, only those modified blocks need to be processed to undergo decryption and re-encryption to determine the appropriate digest.
    Type: Grant
    Filed: July 19, 2004
    Date of Patent: April 27, 2010
    Inventors: Michael Frederick Kenrich, Yevgeniy Gutnik
  • Patent number: 7707424
    Abstract: A method and apparatus are provided for identification/authentication of file transfers, that limits the attackers window of opportunity and that aims at incurring a minimum of overhead on the information processing between a client (CL) and a server (SV). According to a preferred embodiment of the invention hash functions (H1-H4) are involved at the server side and the client side. The client and server share a common secret value (S).
    Type: Grant
    Filed: April 9, 2002
    Date of Patent: April 27, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (PUBL)
    Inventor: Stefan Axelsson
  • Patent number: 7707421
    Abstract: A digital document system in which a digital document in a communication network is shared between a plurality of stations, said system comprising: a first station (101A) having a first digital document (DD1) comprising a thumbnail data item (TH1) and an original data item (HR1); a second station (102A) having a second digital document (DD2) comprising a thumbnail data item (TH2); and a center station (100A) comprising: calculating means for calculating signatures of the thumbnail data items (TH1, TH2) of the first and second digital documents (DD1, DD2); comparing means for comparing the calculated signatures of the thumbnail data items (TH1, TH2); and transmitting means for transmitting information for accessing the original data item (HR1) of the first digital document (DD1) to the second station (102A) according to a result of the comparison.
    Type: Grant
    Filed: November 10, 2004
    Date of Patent: April 27, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventors: Lilian Labelle, Eric Nassor
  • Publication number: 20100100946
    Abstract: A system and method for authenticating an application (client) to a server or service. During a registration phase, an application that requests access to a service can receive a service identifier, which it can authenticate. The application can generate and send to the server or service an application-service key that is based upon the authenticated service identifier and a secret application key; a service-application identifier that can be based upon the authenticated service identifier and an application identifier; and a registration nonce, all of which can be stored at the server. During the authentication phase, the client can send to the server the application-service identifier, which the server can use to lookup the stored registration data. The server can send the registration nonce to the client, which can compute a proof of possession of the service-application key and send to the server. The server can compute its own version of this key and compare it to the received key.
    Type: Application
    Filed: September 17, 2009
    Publication date: April 22, 2010
    Applicant: VeriSign, Inc.
    Inventor: Phillip Martin Hallam-Baker
  • Patent number: 7702910
    Abstract: A method of processing a message to determine a tag value from the message and from a key according to a message authentication code. The method including the steps of selecting one of a plurality of symbols, the plurality of symbols forming a codeword encoding a data item derived from the message, the codeword encoding the data item according to an error correcting code, wherein said key determines which one of said plurality of symbols is selected; and determining the tag value to be the selected symbol.
    Type: Grant
    Filed: June 24, 2003
    Date of Patent: April 20, 2010
    Assignee: Telefonaktiebolaget L M Ericsson (Publ)
    Inventor: Christian Gehrmann
  • Patent number: 7698561
    Abstract: The invention provides a method and system of detecting aliases in a network. The network comprises at least one device and at least one Network management system (NMS) for managing the devices. The NMS identifies each device available in the network with a message digest. The NMS retrieves the message digest of a device that is submitted for management. The NMS tries to locate the retrieved message digest with a database of message digests. In case the retrieved message digest is located on the database, the NMS declares the device as an alias. However, if the message digest is not located on the database, the NMS stores the message digest in the database and starts managing the device.
    Type: Grant
    Filed: August 12, 2004
    Date of Patent: April 13, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Ps Nagendra, Vishnu Ls Kiran
  • Patent number: 7698559
    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for digital rights management. In one aspect, a method is provided. The method includes receiving an electronic document, where the electronic document includes one or more content items, a set of usage rights defining one or more features to be enabled when the document is read by an electronic document reader, and a stored representation. The method further includes generating a representation of invariant content items of the electronic document, comparing the generated representation with the stored representation, and enabling features corresponding to the set of usage rights in the electronic document only if the generated representation and the stored representation are identical, where the features are features performed by the electronic document reader on the electronic document.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: April 13, 2010
    Assignee: Adobe Systems Incorporated
    Inventors: Krish Chaudhury, James D. Pravetz
  • Patent number: 7698562
    Abstract: According to a conventional technique, in the case where a program is stored into a non-volatile memory once and then activated, authentication of the program is performed immediately before such activation. However, calculations such as decryption of encrypted values are required before the activation of the program starts, which causes the problem that responsiveness is decreased in proportion to the time required for calculations. In order to solve this problem, authentication of a program is performed immediately before such program is stored, so that no authentication is performed or only a part of the authentication is performed to verify the validity of certificates at program activation time.
    Type: Grant
    Filed: December 16, 2004
    Date of Patent: April 13, 2010
    Assignee: Panasonic Corporation
    Inventors: Tadao Kusudo, Takakazu Shiomi
  • Publication number: 20100088522
    Abstract: A method and apparatus for maintaining a tamper proof device log are described. In one embodiment, the method comprises maintaining an embedded log in the device, the embedded log being a chain of log entries. In one embodiment, the method may also comprise publishing at least one log entry to a location external to the device.
    Type: Application
    Filed: October 2, 2008
    Publication date: April 8, 2010
    Inventors: John Barrus, Michael Gormish, Sergey Chemishkian
  • Patent number: 7693286
    Abstract: Delivering a Direct Proof private key in a signed group of keys to a device installed in a client computer system in the field may be accomplished in a secure manner without requiring significant non-volatile storage in the device. A unique pseudo-random value is generated and stored along with a group number in the device at manufacturing time. The pseudo-random value is used to generate a symmetric key for encrypting a data structure holding a Direct Proof private key and a private key digest associated with the device. The resulting encrypted data structure is stored in a signed group of keys (e.g., a signed group record) on a removable storage medium (such as a CD or DVD), and distributed to the owner of the client computer system. When the device is initialized on the client computer system, the system checks if a localized encrypted data structure is present in the system.
    Type: Grant
    Filed: July 14, 2004
    Date of Patent: April 6, 2010
    Assignee: Intel Corporation
    Inventors: James A. Sutton, II, Clifford D. Hall, Ernie F. Brickell, David W. Grawrock
  • Patent number: 7694335
    Abstract: A server is configured for preventing flood attacks by a client having sent a request, by dynamically generating a challenge to be performed by the client before the server will perform any work for the client. The challenge includes a dynamically generated computational request and a dynamically generated secure cookie. The server generates a first hash result based on hashing a first random number, having a prescribed length, with a second random number having a dynamically selected length. A secure cookie is generated based on hashing the first hash result with a prescribed secure key known only by the server, and a unique identifier for the request such as the client network address with a time stamp. The challenge requires the client to determine the second random number based on the first random number and the hash result. The server validates the challenge results using the secure cookie.
    Type: Grant
    Filed: March 9, 2004
    Date of Patent: April 6, 2010
    Assignee: Cisco Technology, Inc.
    Inventors: Bryan C. Turner, John Toebes
  • Publication number: 20100082994
    Abstract: A method for implementing electronic seal is disclosed. The method includes: storing seal data of an electronic seal, a digital certificate, electronic signature program and a private key of a sealer in an external portable apparatus; performing a Hash conversion to a file to be sealed and the seal data of the electronic seal to generate a data digest, wherein the file to be sealed is a layout file; sealing, in the portable apparatus, the data digest using the private key of the sealer and the electronic signature program to generate an electronic signature result; and combining the file to be sealed, the seal data of the electronic seal, the digital certificate and the electronic signature result to generate a seal combination file.
    Type: Application
    Filed: November 20, 2009
    Publication date: April 1, 2010
    Inventors: Donglin Wang, Ningsheng Liu
  • Patent number: 7685428
    Abstract: An information stream (media stream) can be “bookmarked” with event markers to note points in time in the information stream of occurrences of interesting events. Repeat occurrences of an event are noted with the same event marker. The events of interest need not be a priori determined. In fact, unexpected events can be readily noted.
    Type: Grant
    Filed: August 14, 2003
    Date of Patent: March 23, 2010
    Assignee: Ricoh Company, Ltd.
    Inventor: Kurt Piersol
  • Patent number: 7685429
    Abstract: To generate and verify signature data using a known signature algorithm whose safety is ensured from the viewpoint of calculation quantity and ensuring the authenticity thereof over a long time period. A message to be signed is transmitted, a padding-data item is added to the message, and a signature-data item of the message with the padding-data item added thereto is generated by using a hash function and a public-key cryptosystem. The addition step and the generation step are performed a predetermined number of times by using the signature-data item, as the padding-data item, and the signature-data items generated the predetermined number of times and the padding-data items added the predetermined number of times are externally transmitted with the message.
    Type: Grant
    Filed: September 29, 2005
    Date of Patent: March 23, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yuji Suga
  • Patent number: 7685422
    Abstract: An information processing apparatus has an authentication/key exchange unit, a round trip time measuring unit, a common key transmitter, a contents key transmitter and a contents transmitter. The round trip time measuring unit sends a round trip time measuring request generated to the communication apparatus through the first communication connection to measure the round trip time, and check whether the measured round trip time is within a predetermined time and whether a transmitting source of the round trip request response is the communication apparatus sharing the first key. The common key transmitter encrypts a second key used for contents transmission by using the first key and transmits the encrypted second key through the first communication connection when the round trip time measuring unit succeeds in the checking.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: March 23, 2010
    Assignee: Kabushiki Kaisha Toshiba
    Inventors: Hiroshi Isozaki, Takashi Kokubo, Koji Kanazawa
  • Patent number: 7680269
    Abstract: A method ciphers a standardized stream of compressed audio or video data, wherein at least one part of the bits of data packets delimited by two consecutive synchronization markers is ciphered by pseudo-random stream.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: March 16, 2010
    Assignee: STMicroelectronics S.A.
    Inventors: Jean Nicolai, William Orlando
  • Patent number: 7676678
    Abstract: A method for signing a data package uses a signing apparatus, the signing apparatus having a binary identification code comprises the step of providing a set of node keys and a check value for the data package and the step of determining a signature block having a plurality of signature fields. In addition, the method comprises the step of providing the binary identification code of the signing apparatus and the signature block in order to sign the data package.
    Type: Grant
    Filed: December 14, 2005
    Date of Patent: March 9, 2010
    Assignee: Nero AG
    Inventor: Andreas Eckleder
  • Patent number: 7672460
    Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.
    Type: Grant
    Filed: January 24, 2005
    Date of Patent: March 2, 2010
    Assignee: NEC Corporation
    Inventors: Jun Furukawa, Kazue Sako
  • Publication number: 20100049986
    Abstract: To achieve high safety, large-sized nonlinear permutation is employed; however, the larger permutation processing is, the more the period of time required for the processing is, which hence is not efficient. There is provided a hash value generation method or a hash value generator which has the following aspects and which is highly safe and is capable of executing processing at a high speed. 1. As a message insertion method, there is employed a linear conversion in which the insertion message affects all subblocks. 2. An internal state is divided into a plurality of subblocks, and nonlinear permutation is conducted in each subblock unit. 3. Additionally, the linear conversion of item 1 above may be configured such that each subblock of the internal state affects the subblocks of the output.
    Type: Application
    Filed: February 9, 2009
    Publication date: February 25, 2010
    Inventors: Dai WATANABE, Hisayoshi SATO
  • Patent number: 7668315
    Abstract: Methods and apparatus are presented for providing local authentication of subscribers travelling outside their home systems. A subscriber identification token 230 provides authentication support by generating a signature 370 based upon a key that is held secret from a mobile unit 220. A mobile unit 220 that is programmed to wrongfully retain keys from a subscriber identification token 230 after a subscriber has removed his or her token is prevented from subsequently accessing the subscriber's account.
    Type: Grant
    Filed: May 22, 2001
    Date of Patent: February 23, 2010
    Assignee: QUALCOMM Incorporated
    Inventors: Roy F. Quick, Jr., Gregory G. Rose
  • Patent number: 7660421
    Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: February 9, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
  • Publication number: 20100031051
    Abstract: The invention comprises a method of authenticating and encrypting a client-server communication, comprising the steps of: a) generating a first one-time password (OTP1) and a second one-time password (OTP2) from a cryptographic token; b) generating an encryption key (K_ENC) and a MAC key (K_MAC) based on OTP2; c) preparing and protecting the client data using K_ENC and K_MAC; d) sending a request message from the client to the server, the request message containing the protected client data, a cryptographic token identifier (TID) and OTP1; e) validating OTP1 at the server, and generating OTP2 at the server upon successful validation; f) deriving K_ENC and K_MAC from OTP2 at the server; g) processing the request message and generating result data h) encrypting the result data using K_ENC and creating a digest using K_MAC; i) sending the encrypted result data to the client; and i) decrypting the result data at the client using K_ENC and verifying the authenticity of the result data using K_MAC.
    Type: Application
    Filed: February 8, 2008
    Publication date: February 4, 2010
    Inventors: Salah E. MACHANI, Konstantin TESLENKO
  • Publication number: 20100031052
    Abstract: There are provided a low power SHA-1 hash algorithm apparatus having a low power structure and optimized to a trusted platform module (TPM) applied to a mobile trusted computing environment and a low power keyed-hash message authentication code (HMAC) encryption apparatus using the low power SHA-1 hash algorithm apparatus, the HMAC encryption apparatus including: a key padder padding key data for HMAC algorithm; an XOR operator XOR operating the padded key data and a padding constant; a data connector connecting a text to be encrypted, to data obtained by the XOR operating; a data padder padding the connected data; an SHA-1 hash algorithm part performing an SHA-1 hash algorithm on the padded data; a data selector selecting and applying one of a result of the SHA-1 hash algorithm and the text to be encrypted, to the data connector; and a controller controlling operations of the key padder, data connector, and data padder, a sequence of performing a hash algorithm of the SHA-1 hash algorithm part, and storing a
    Type: Application
    Filed: April 15, 2008
    Publication date: February 4, 2010
    Applicant: Electronics & Telecommunications Research Institute
    Inventors: Moo Seop Kim, Young Sae Kim, Young Soo Park, Ji Man Park, Sung Ik Jun, Jong Soo Jang
  • Patent number: 7653814
    Abstract: Systems and methods and computer programs for verifying the authenticity and integrity of hyperlink addresses and files that are accessible by means of these hyperlink addresses. A system and a method are disclosed for authenticating a file such as an HTML document hyperlinked to a graphic object such as a digital image or to a graphic icon. The hyperlink network address (e.g., the URL of the hyperlink on the Internet) is encoded on a first portion of the graphic object. Checking information such as a MAC digital signature and the hyperlinked file are encoded into a second portion of the same graphic object. In accordance with another aspect of the invention, a system and a method are disclosed for verifying the authenticity and integrity of a hyperlink and a file when this hyperlink is activated.
    Type: Grant
    Filed: December 10, 2002
    Date of Patent: January 26, 2010
    Assignee: International Business Machines Corporation
    Inventor: Fernando Incertis Carro
  • Patent number: 7650499
    Abstract: An encryption apparatus divides input original data into one or more data blocks. The size of each data block is an integer multiple of the bank size of a non-volatile memory equipped in a decryption apparatus. The encryption apparatus generates authentication data from this data block. The encryption apparatus generates encrypted data after it combines the authentication data to the data block. On the other hand, a decryption apparatus executes reverse processes to decrypt original data, and writes it in a non-volatile memory.
    Type: Grant
    Filed: July 7, 2005
    Date of Patent: January 19, 2010
    Assignee: Canon Kabushiki Kaisha
    Inventor: Hirotaka Ittogi
  • Patent number: 7649990
    Abstract: An apparatus arranged to accept digital data as an input and to process the data according to one of either the Secure Hash Algorithm (SHA-1) or Message Digest (MD5) algorithm to produce a fixed length output word. The apparatus includes a plurality of rotational registers for storing data, one of the registers arranged to receive the input data, and data stores for initialization of some of the plurality of registers according to whether the SHA-1 or MD5 algorithm is used. The data stores include fixed data relating to SHA-1 and MD5 operation. Also included is a plurality of dedicated combinatorial logic circuits arranged to perform logic operations on data stored in selected ones of the plurality of registers.
    Type: Grant
    Filed: October 21, 2002
    Date of Patent: January 19, 2010
    Assignee: STMicroelectronics Asia Pacific Pte. Ltd.
    Inventors: Bernard Plessier, Ming-Kiat Yap
  • Patent number: 7647624
    Abstract: Techniques are provided for preserving and managing identities within an audit log. Initial entries into a log do not include an explicit and direct reference to an agent that performs a transaction; rather, the agent acquires a temporary transaction identity for the transaction and an indirect reference to the transaction identity is written to the log while the transaction is pending. Once the transaction completes a direct reference to the transaction identity is written to the log, the identity of agent remains transparent until the identity of the agent expires, if at all.
    Type: Grant
    Filed: November 30, 2005
    Date of Patent: January 12, 2010
    Assignee: Novell, Inc.
    Inventors: Lloyd Leon Burch, Stephen R. Carter, Douglas G. Earl
  • Patent number: 7647498
    Abstract: Authentication of two devices in communication with a third device is achieved where the first and second devices each possess a shared secret value. The authentication includes communication of authentication values from the first device to the second device using the third device. Similarly, there is communication of values from the second device to the first device using the third device. The third device retains the communicated values. The values are calculated to permit the third device to authenticate the first and second devices without the third device receiving the shared secret value. The authentication may be used to establish a communications channel between the first and the second devices.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: January 12, 2010
    Assignee: Research In Motion Limited
    Inventors: Michael K. Brown, Herbert A. Little, Dinah L. M. Davis
  • Patent number: 7647504
    Abstract: A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table. If an entry is found, the data store is accessed using the hashed access information, but if an entry is not found, another look-up table corresponding to another information type may be tried or the input access information permuted and retried.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: January 12, 2010
    Assignee: United States Postal Service
    Inventors: James D. Wilson, Robert F. Snapp, David J. Payne, Edgar H. Gillock, II
  • Patent number: 7647630
    Abstract: A method for authorizing information flows based on security information associated with information objects is provided. A hash key is generated based on an information object and a lookup operation is performed in a hash table based on the hash key. A determination is made whether an entry in the hash table at an index corresponding to the hash key identifies a labelset for the information object. A labelset, identifying a sensitivity of the information object, is stored in the entry at the index corresponding to the hash key for the information object if a labelset for the information object is not identified in the entry in the hash table. Information flows involving the information object are authorized based on a lookup of the labelset associated with the information object in the hash table. The hash table may be a multidimensional hash table.
    Type: Grant
    Filed: December 15, 2005
    Date of Patent: January 12, 2010
    Assignee: International Business Machines Corporation
    Inventors: Diana J. Arroyo, George R. Blakley, III, Damir A. Jamsek, Sridhar R. Muppidi, Kimberly D. Simon, Ronald B. Williams
  • Publication number: 20100005307
    Abstract: A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security.
    Type: Application
    Filed: August 4, 2008
    Publication date: January 7, 2010
    Inventor: Devi PRASHANTH
  • Patent number: 7644270
    Abstract: A system to validate a request for web services which includes a digital certificate is provided. The system includes a first certification authority that provides a public encryption key and a certificate revocation list in response to requests. The system also includes a certification revocation list component that determines whether a digital certificate is named in the certification revocation list, a certificate verification component that determines whether a digital certificate is valid, a plurality of verifier components that determine the validity of a request for web services and each of which operates in accordance with a different one of a plurality of OASIS Web Services Security versions. The system also includes a management component to determine the version of the OASIS Web Service Security version of the web services request and to select an appropriate verifier component.
    Type: Grant
    Filed: May 10, 2004
    Date of Patent: January 5, 2010
    Assignee: Sprint Communications Company L.P.
    Inventors: Vijaykumar Cherukumudi, David Fultz, Shrikant Jannu
  • Publication number: 20090327738
    Abstract: A mechanism for making increased amounts of firmware available to a computer pre-boot is discussed. To increase the amount of firmware available pre-boot, a design decision is made during the build process as to which segments of the firmware need to be placed on the ROM part and which segments of the firmware can be located elsewhere. The segments of the firmware that are stored remotely from the ROM are referred to as “virtual ROM modules”. Each of the virtual ROM modules is assigned a generated unique identifier, and a “message digest” is constructed for each module using an algorithm such as MD5 or SHA-1. In the software build of the ROM image, the message digest-unique identifier pair created for each Virtual ROM module is used as a logical pointer for the virtual module. Additionally, a search path variable is placed into the ROM image in non-volatile storage. The search path provides for one or more locations in which to look for the Virtual ROM modules, and may be updated at a later point in time.
    Type: Application
    Filed: September 2, 2009
    Publication date: December 31, 2009
    Applicant: INSYDE SOFTWARE CORPORATION
    Inventor: Rex A. FLYNN
  • Publication number: 20090327736
    Abstract: Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.
    Type: Application
    Filed: December 6, 2005
    Publication date: December 31, 2009
    Applicant: Cisco Technology, Inc.
    Inventors: Nancy Cam-Winget, Mark Krischer, Robert B. O'Hara, JR.
  • Publication number: 20090327737
    Abstract: Techniques are described for ensuring data integrity and authentication of received messages. One technique includes sending a request from a first module to a second module in which the request includes a first portion that is a shared secret encrypted with a public key, obtaining by the second module a private key from a secure and trusted information store, such as a license information store, including license information or other application specific information for the first module, using the private key to decrypt the first portion and obtain the shared secret, sending a response from the second module to the first module in which the response includes authentication data and at least one data item used with the shared secret to determine the authentication data, and performing by the first module verification processing to verify the authentication data included in the response.
    Type: Application
    Filed: June 26, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Wen-Pin Scott Hsu, Tarik Soulami, Mark Zagorski, Ning Zhang, Brian Perlman
  • Patent number: 7640433
    Abstract: The present invention is a MILS network system employing functional separation of messages without customized switches. The MILS network system may maintain separation of data while eliminating a requirement of full message encryption. In an embodiment of the invention, a function may be employed whereby a keyed digest of a message is created. The function may receive a message and a key, and may emit a keyed digest value. The key may be representative of a particular level of security, thus promoting the separation of data. Messages may include an embedded keyed digest when sent through a switch to a MILS node. At the MILS node, the keyed digest may be recalculated, if it matches, the message may be passed to a host.
    Type: Grant
    Filed: January 28, 2005
    Date of Patent: December 29, 2009
    Assignee: Rockwell Collins, Inc.
    Inventors: James A. Marek, Sung J. Kim
  • Publication number: 20090319792
    Abstract: A method for a server to initiate resynchronization with an access terminal, when synchronization has been lost, that cannot be exploited by attackers is provided. The server may provide the access terminal with a secret key that is only known to the access terminal and the server. The access terminal may store the secret key in a secure storage device to prevent the secret key from being hacked. If the server determines that synchronization has been lost, the server may send a resynchronization message to the access terminal with the secret key attached. The access terminal retrieves the stored secret key from the secure memory device and compares it to the secret key attached to the resynchronization message. If there is a match, the access terminal may initiate a secure communication link with the server to reestablish synchronization.
    Type: Application
    Filed: June 9, 2008
    Publication date: December 24, 2009
    Applicant: QUALCOMM INCORPORATED
    Inventors: Philip Michael Hawkes, Andreas K. Wachter, Michael Paddon
  • Patent number: 7636840
    Abstract: A method and system for secure communication and control in a fueling environment. In one aspect, the fueling environment with secure communication comprises a fuel dispenser and at least one node communicable coupled with the fuel dispenser. The fuel dispenser is operable to generate a first public key and a first private key associated with the fuel dispenser and publish the first public key within the fueling environment. The fuel dispenser is further operable to authenticate a particular one of the nodes using, at least in part, a second public key associated with the particular node and the first public and the first private keys. The fuel dispenser may then dynamically generate a run-time symmetric key using, at least in part, the first private key and the second public key and communicate data associated with the fueling environment to the authenticated node, with the data encrypted using the symmetric key.
    Type: Grant
    Filed: March 4, 2005
    Date of Patent: December 22, 2009
    Assignee: Dresser, Inc.
    Inventor: Weiming Tang
  • Patent number: 7636857
    Abstract: A data processing system ciphers and transfers data between a first memory unit and a second memory unit, such as, for example, between a share memory architecture (SMA) static random access memory (SRAM) and a double data rate (DDR) synchronous dynamic random access memory (SDRAM). The system includes a ciphering engine and a data-mover controller. The data-mover controller includes at least one register having a field that specifies whether or not the transferred data should be ciphered. If the field specifies that the transferred data should be ciphered, the field also specifies the type of ciphering that is to be performed, such as a third generation partnership project (3GPP) standardized confidentially cipher algorithm “f8” or integrity cipher algorithm “f9”.
    Type: Grant
    Filed: June 28, 2004
    Date of Patent: December 22, 2009
    Assignee: InterDigital Technology Corporation
    Inventors: Edward L. Hepler, Robert G. Gazda
  • Publication number: 20090313475
    Abstract: A system for verifying the security of communications between a set of nodes via a high-bandwidth, insecure communications channel. A number of embodiments are described for enabling authenticated communication between the nodes in an environment wherein there is a high bandwidth Dolev-Yao network amongst the nodes and non-spoofable, low-bandwidth empirical channels between each pair of nodes.
    Type: Application
    Filed: November 3, 2006
    Publication date: December 17, 2009
    Applicant: ISIS INNOVATION LIMITED
    Inventors: Andrew William Roscoe, Long Hoang Nguyen
  • Publication number: 20090307482
    Abstract: Methods and apparatus for securely transmitting sensitive information to a remote device at the request of an application program are provided. The application program generates a request to a secure channel provider to make a transmission to a remote device. A first message is passed from the from the application program to the secure channel provider containing insertion point codes indicating locations within the first message where the sensitive information should be inserted. Sensitive information is obtained from a source outside of the application program and the sensitive information is inserted into the first message at the locations in the first message indicated by the insertion point codes to form a second message containing the sensitive information. The second message is encrypted and this encrypted message is transmitted to the remote device. The sensitive information is unaccessed by the application program during the execution of the method.
    Type: Application
    Filed: May 29, 2007
    Publication date: December 10, 2009
    Inventor: Daniel McCann
  • Patent number: 7630493
    Abstract: Techniques for generating a private portion of a split private key of an asymmetric key pair are provided. Multiple factors upon which the private portion of the split private key is based are received. Each of these multiple factors is under control of a user associated with the asymmetric key pair. Multiple cryptographic operations are then performed using the received multiple factors to generate the private portion.
    Type: Grant
    Filed: February 14, 2005
    Date of Patent: December 8, 2009
    Assignee: TriCipher, Inc.
    Inventors: Ravinderpal Singh Sandhu, Brett Jason Schoppert, Ravi Ganesan, Mihir Bellare, Colin Joseph deSa
  • Publication number: 20090300364
    Abstract: An apparatus and a method for an authentication protocol. In one embodiment, a client requests for an authentication challenge from a server. The server generates the authentication challenge and sends it to the client. The authentication challenge includes the authentication context identifier, a random string, a timestamp, and a signature value. The client computes a salt value based on a username and the authentication context identifier from the authentication challenge. The signature value is computed based on the authentication context identifier, the random string, and the timestamp. The client computes a hashed password value based on the computed salt value, and a message authentication code based on the hashed password value and the random string. The client sends a response to the server. The response includes the username, the message authentication code, the random string, the timestamp, and the signature value.
    Type: Application
    Filed: May 29, 2008
    Publication date: December 3, 2009
    Inventor: James Paul Schneider
  • Publication number: 20090300362
    Abstract: A public key cryptographic system and method is provided for a password or any other predefined personal secret information that defeats key factoring and spoofing attacks. The method adopts a new technique of encrypting a password or any predefined secret information by a numeric function of itself, replacing the fixed public key of the conventional RSA encryption. The whole process involving key generation, encryption, decryption and password handling is discussed in detail. Mathematical and cryptanalytical proofs of defeating factoring and spoofing attacks are furnished.
    Type: Application
    Filed: March 12, 2009
    Publication date: December 3, 2009
    Inventor: Cheman Shaik
  • Patent number: 7627753
    Abstract: Authenticity of digital data, security policies, and usage of game software are enforced on a game console. When the software is secured prior to distribution on media, a private key is used to encrypt a header digest that includes a digest of each section of the software and information specifying a region, a rating, and media type of the software. A hashing algorithm is applied to produce the digests. On the game console, a public key is used to decrypt the header digest for comparison to a hash of the header. A digest of each section of digital data is computed and compared to the corresponding digest in the header to authenticate the data. The console will not execute the software unless the parameters in the header information match those stored in the console and the computed digests for each section match those in the header on the medium.
    Type: Grant
    Filed: March 19, 2002
    Date of Patent: December 1, 2009
    Assignee: Microsoft Corporation
    Inventors: Jon Marcus Randall Whitten, Tracy Clayton Sharpe, Yasser B. Asmi, Jonathan E. Lange, Christopher Michael Pirich, Jonathan Gerald Thomason
  • Patent number: 7627764
    Abstract: An arrangement is provided for performing MD5 digesting. The arrangement includes apparatuses and methods that pipeline the MD5 digesting process to produce a 128 bit digest for an input message of any arbitrary length.
    Type: Grant
    Filed: June 25, 2004
    Date of Patent: December 1, 2009
    Assignee: Intel Corporation
    Inventors: Kamal J. Koshy, Jaroslaw J. Sydir, Wajdi K. Feghali
  • Patent number: 7627906
    Abstract: A service discovery system including a client terminal and a service providing device which provides data or a function to the client terminal, including: a service request unit which generates a message requesting a service of the service providing device; a communication unit which sends the message generated by the service request unit to the service providing device and which receives from the service providing device a problem imposing a load on the client terminal; and a solution unit which solves the problem.
    Type: Grant
    Filed: August 26, 2005
    Date of Patent: December 1, 2009
    Assignee: NTT DoCoMo, Inc.
    Inventors: Tomohiro Nakagawa, Motoharu Miyake, Hiroshi Inamura
  • Patent number: 7627765
    Abstract: A document management apparatus includes a hash generator that generates a hash value based on digital document data stored in a database, a communication unit that inputs time information, and a microfilm writer that performs processing to record a converted document data, converted to image data based on the digital document data, on a microfilm, and record a document ID as identification information of the converted document data recorded on the microfilm, the hash value, and the time information, on the microfilm.
    Type: Grant
    Filed: May 31, 2005
    Date of Patent: December 1, 2009
    Assignee: Fuji Xerox Co., Ltd.
    Inventors: Osamu Nakamura, Mitsuru Aonuma
  • Patent number: 7624434
    Abstract: A system for providing security in a computing network. The system has a server for distributing policies to be implemented by firewall devices in the network. The firewall devices provide hardware implemented firewalls to communication devices making network connections. The system has logic to allow a connection to be made to the network via a communication device at a node provided the firewall device is at that node. Therefore, the firewall device must be in the system for a connection to be established via the communication device. Additionally, the system is configured to cause data transferred by the communication device to be processed by the firewall.
    Type: Grant
    Filed: March 1, 2002
    Date of Patent: November 24, 2009
    Assignee: 3Com Corporation
    Inventors: Peter M. Rigstad, John Y. Yoon, Mark Farahar, Barani Subbiah, Brant D. Thomsen, David E. Richmond, Vered Maor Semel, Earl Bryner
  • Patent number: 7624272
    Abstract: An integrity signature may provide information about a platform used to create a digital signature. The value of a digital signature may be related to the integrity and trustworthiness of the platform on which it is created. Signed platform integrity information provides a measure of trust regarding the platform used to create the digital signature. The integrity signature may be created separately from a document signature, or a combined integrity and document signature may be provided.
    Type: Grant
    Filed: March 31, 2003
    Date of Patent: November 24, 2009
    Assignee: Intel Corporation
    Inventors: Willard M. Wiseman, David W. Grawrock