Message Digest Travels With Message Patents (Class 713/181)
  • Patent number: 7526649
    Abstract: According to an embodiment of the invention, a method and apparatus for session key exchange are described. An embodiment of a method comprises requesting a service for a platform; certifying the use of the service for one or more acceptable configurations of the platform; and receiving a session key for a session of the service, the service being limited to the one or more acceptable configurations of the platform.
    Type: Grant
    Filed: December 30, 2003
    Date of Patent: April 28, 2009
    Assignee: Intel Corporation
    Inventors: Willard M. Wiseman, David W. Grawrock, Ernie Brickell, Matthew D. Wood, Joseph F. Cihula
  • Patent number: 7523306
    Abstract: A system and method for generating a message integrity code, MIC, for a MAC protocol data unit in a wireless local area network, WLAN, operating according to the IEEE 802.11 standard. A MAC service data unit, MSDU, sequence control sequence number, SN, input to the MIC algorithm is suppressed, e.g. set to all zeros, when calculating the MIC. Only the fragment number, FN, portion of the sequence control is included in calculation of the MIC. The MIC may therefore be calculated before an actual SN has been determined. All MPDUs include sequential packet numbers, PNs. A station receiving MPDUs checks the PNs of MPDUs having the same SN, and rejects messages which do not have a proper sequential set of PNs.
    Type: Grant
    Filed: November 21, 2003
    Date of Patent: April 21, 2009
    Assignee: Texas Instruments Incorporated
    Inventor: Jie Liang
  • Patent number: 7519825
    Abstract: The invention is an automated system that works in the data center of certification offices connected to the internet which enables a member of the any of the certification offices to certify his document electronically from a distance using a computer connected to the internet, digital pad, an electronic pen and a printer.
    Type: Grant
    Filed: January 17, 2005
    Date of Patent: April 14, 2009
    Assignee: House of Development LLC
    Inventor: Mohammed Alawi Geoffrey
  • Patent number: 7519822
    Abstract: This disclosure provides a method and apparatus for processing descriptive statements. More particularly, this disclosure provides a way of quickly and reliably signing and authenticating RDF statements without requiring a data sort. By using a commutative hashing function that combines multiple independent hashes, ideally one per serialized statement, signing and verifying can each be completed without a data sort; inclusion of an “extra” identifier, e.g., the total number of RDF statements, may enhance the security of the signed statements by helping minimize exposure to potential attackers. The disclosure also describes how to later add additional statements to an existing signature and hash using an incremental process.
    Type: Grant
    Filed: March 10, 2004
    Date of Patent: April 14, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Craig P. Sayers, Alan H. Karp
  • Patent number: 7519819
    Abstract: A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.
    Type: Grant
    Filed: May 29, 2002
    Date of Patent: April 14, 2009
    Assignee: Digimarc Corporatino
    Inventors: Brett Alan Bradley, Brett T. Hannigan, John Kennedy Barr
  • Publication number: 20090094461
    Abstract: An information processing apparatus of the present invention converts user authentication information based on a second one-way function into a second converted value if authentication with a first converted value obtained by converting the user authentication information based on the first one-way function is successful.
    Type: Application
    Filed: October 3, 2008
    Publication date: April 9, 2009
    Applicant: CANON KABUSHIKI KAISHA
    Inventor: Yuu Tamura
  • Patent number: 7516496
    Abstract: An authorized client communication system seeking access to a host communication system may be identified by locating a memory segment within the client communication system that stores client software used to access the host computer system. The memory segment then is examined to determine whether the client software stored in the memory segment corresponds to client software for an official client communication, system. Communications from the client communication system are terminated when the client software in the memory segment is determined to diverge from software for an official client communication system.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: April 7, 2009
    Assignee: AOL LLC
    Inventors: Robert G. Watkins, Andrew L. Wick
  • Patent number: 7512972
    Abstract: A method and apparatus for digital content access control comprises determining the occurrence of a synchronization event that triggers synchronization of information used by one or more content provisioners to create an authenticated digital content request that is based at least in part on a digital content request comprising a request for digital content with information used by one or more content repositories to validate the authenticated digital content request and to return the digital content based at least in part on the validation. The method also comprises determining the information in response to the sychronization event and sending the information to at least one of the group comprising the one or more content provisioners and the one or more content repositories.
    Type: Grant
    Filed: September 13, 2002
    Date of Patent: March 31, 2009
    Assignee: Sun Microsystems, Inc.
    Inventors: Eduard de Jong, Aaron Cooley, Jon Bostrom
  • Patent number: 7512802
    Abstract: The present invention provides an application authentication system capable of authenticating an application on a terminal device, which does not have a secure information concealing area, by a secure device. In an application authentication system in which a secure device 10 fitted to a terminal device 30 that has no secure information concealing area authenticates an application 31 stored in the terminal device, the secure device 10 authenticates an application running means 33 stored in an unwritable area 302 of the terminal device, and also authenticates the application based on a process applied to the application 31 by the application running means to request an access to the secure device. Since the terminal authentication by the secure device and the application authentication executed within the terminal device are coupled in combination, the secure device can authenticate the application operated on the terminal device without the secure information concealing area.
    Type: Grant
    Filed: February 27, 2004
    Date of Patent: March 31, 2009
    Assignee: Panasonic Corporation
    Inventor: Atsushi Minemura
  • Patent number: 7512975
    Abstract: A system and method to validate security credentials using hardware is provided. The system includes a credential validation module to recalculate security credentials received in a datagram and to determine if the security credentials are valid. The system also includes a parser to extract the security credentials from the payload data of the received datagram, and a memory to store validated credentials for further use.
    Type: Grant
    Filed: August 16, 2002
    Date of Patent: March 31, 2009
    Assignee: Intel Corporation
    Inventor: Selim Aissi
  • Patent number: 7512794
    Abstract: An authentication process is performed by receiving a challenge and retrieving stored seed values. A response is generated based on the challenge and the seed values.
    Type: Grant
    Filed: June 24, 2004
    Date of Patent: March 31, 2009
    Assignee: Intersil Americas Inc.
    Inventor: Chung Y. Kwok
  • Patent number: 7509496
    Abstract: In a communication system (1), a header comprising information, preferably being related with a device-type associated commitment, is additionally provided with a signature for that information. The signature guarantees the authenticity of the header information. The signature is tamper-resistantly created in a first device (20), preferably based on at least tamper-resistant device-type specific information of the first device (20). The header information and the signature are communicated to a content provider (10), where the signature is verified before accepting the device-type associated commitment to be valid. Such signatures can preferably be used in systems using HTTP or SMTP.
    Type: Grant
    Filed: February 18, 2004
    Date of Patent: March 24, 2009
    Assignee: Telefonaktiebolaget LM Ericsson (publ)
    Inventors: Robert Skog, Peter Stark
  • Patent number: 7508945
    Abstract: Method and system wherein that once the input data sequence (X) and the control block (K) have been supplied, the method and system generates always a sequence of randomized-encrypted data (A) which is an encrypted sequence of random numbers. The method and system randomize-encrypt the data sequence (X) in a corrective way generating the proposed randomized-encrypted text sequence (AP). The randomness verifier (603) validates the randomization of the proposed randomized-encrypted text sequence (AP). If the proposed randomized-encrypted text sequence (AP) is random, it is supplied as randomized-encrypted text sequence (A); if it is not random, the method and system randomize-encrypt the data sequence (X) in a different corrective way again. The iteration is repeated until it is encrypted and at random the proposed randomized-encrypted text sequence (AP).
    Type: Grant
    Filed: October 27, 1999
    Date of Patent: March 24, 2009
    Inventor: Angel José Ferre Herrero
  • Patent number: 7500106
    Abstract: A method for identifying, authenticating and authorizing a user of protected data, in particular a use of protected in an automation system, whereby the user is identified by the user ID input by them in an input field in a login area, this input user ID is combined with a password input by the user and transferred with a one-way encryption function to a system ID which authenticates the user, at least this system ID is transferred in an access identifier from the login area to a protected area and the user is authorized by this transferred access identifier to obtain access to protected data in the protected area.
    Type: Grant
    Filed: October 22, 2004
    Date of Patent: March 3, 2009
    Assignee: Siemens Aktiengesellschaft
    Inventor: Harald Herberth
  • Patent number: 7500105
    Abstract: A security system in which wireless transmitting security devices use a hybrid or dual encoding methodology, wherein a first part of a data message is encoded in a return-to-zero (RZ) format and a second part of the data message is encoded in a non-return-to-zero (NRZ) format, thereby increasing error detection and correction. In a first aspect of the invention, status information is included in the first part of the message and redundant status information is included in the second part of the message. In a second aspect of the invention, message sequence information is included in the second part of the message to avoid processing of stale or out-of-sequence messages.
    Type: Grant
    Filed: July 13, 2004
    Date of Patent: March 3, 2009
    Assignee: Honeywell International Inc.
    Inventor: Thomas Schmit
  • Patent number: 7499548
    Abstract: A user terminal can be authenticated by an access point based on one message. In one embodiment, the present invention includes the access point receiving a message containing a shared secret encrypted with an access point public key, a user terminal certificate, and an authenticator string demonstrating possession by the user terminal of a user terminal private key. The access point can decrypt the shared secret using the private key of the access point paired with its private key. The access point can then authenticate the user terminal by checking the authenticator string using a user terminal public key included in the user terminal certificate to verify possession of the user terminal private key by the user terminal.
    Type: Grant
    Filed: June 24, 2003
    Date of Patent: March 3, 2009
    Assignee: Intel Corporation
    Inventors: Branislav N. Meandzija, Mithat Can Dogan, Marc C. Goldburg, Christopher R. Uhlik
  • Publication number: 20090049305
    Abstract: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.
    Type: Application
    Filed: October 24, 2008
    Publication date: February 19, 2009
    Inventors: Steven A. Bade, Ryan Charles Catherman, James Patrick Hoff, William Lee Terrel
  • Patent number: 7493661
    Abstract: A method and apparatus for transferring a message securely from a sender to a recipient over a network and includes at each transfer: creating a message; retrieving the public key of the recipient from an external key server just prior to sending the message; signing the message using the private key of the sender; encrypting the signed message using a public key encryption algorithm and the public key of the recipient producing an encrypted signed message; generating an E-mail message addressed to the recipient; attaching the encrypted signed message as an attachment to the E-mail message; and, transmitting the E-mail message to the recipient.
    Type: Grant
    Filed: July 1, 2004
    Date of Patent: February 17, 2009
    Assignee: Zix Corporation
    Inventors: Gary G. Liu, David P. Cook
  • Patent number: 7490237
    Abstract: A process for requesting authentication includes transmitting a hash digest formed from first client-specific data together with second client specific data and receiving, in response to transmitting, an indication of acceptance when the hash digest and second client-specific data correspond to a valid client authentication request.
    Type: Grant
    Filed: June 27, 2003
    Date of Patent: February 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Dinarte R. Morais, Ling Tony Chen, Mark D. VanAntwerp, Boyd C. Multerer, Gary A. Thompson
  • Patent number: 7490127
    Abstract: Concurrent recipient resolution and certificate acquisition. If a client-entered input data may be resolved without further client input, the server resolves the input data into a recipient entry that has an associated routing address. The server then transmits a response to the client that includes the associated full display name, routing address and certificate. If the server determines that the recipient entry cannot be resolved without further input from the client, the server identifies a number of possible recipient entries, and for each possible recipient generates a token, which is then communicated to the client. The server receives a subsequent request from the client identifying a selected one of the possible associated recipients using the associated token. The server then acquires a certificate associated with the selected recipient using the token, and then sends the certificate to the client.
    Type: Grant
    Filed: June 13, 2003
    Date of Patent: February 10, 2009
    Assignee: Microsoft Corporation
    Inventors: Jorge Pereira, Karim Michel Batthish, Roy Williams
  • Patent number: 7490241
    Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt using the document and the current time. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority validates the time stamp receipt by comparing the time value specified in the time stamp receipt to the current time. If the time value specified in the time stamp receipt is within a predetermined time window, the time stamping authority cryptographically binds the time value and document, or the time value and some representation of the document, e.g., by signing the time stamp receipt with its private signature key.
    Type: Grant
    Filed: December 10, 1999
    Date of Patent: February 10, 2009
    Assignee: International Business Machines Corporation
    Inventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
  • Patent number: 7487360
    Abstract: A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization.
    Type: Grant
    Filed: November 26, 2003
    Date of Patent: February 3, 2009
    Assignee: PalmSource, Inc.
    Inventors: Robert Lennie, Carl Chen, Gabe Dalbec
  • Publication number: 20090031138
    Abstract: A method for secure and reliable authentication in a communication system. In an embodiment, the authentication method includes performing authentication of a user utilizing Extensible Authentication Protocol (EAP), and transmitting a result indication message to the user. The result indication message can include additional information for security and reliability. The method also includes receiving an acknowledgement message from the user. The acknowledgement message is sent by the user for confirming the reception of the result indication. In an embodiment, the method also includes retransmitting the result indication message if the acknowledgement message is not received within a predetermined time. The additional information for security and reliability can include Message Authentication Code (MAC) and time interval information. The additional information for security and reliability can also include a security/reliability flag.
    Type: Application
    Filed: April 30, 2008
    Publication date: January 29, 2009
    Applicant: FutureWei Technologies, Inc.
    Inventor: Madjid F. Nakhjiri
  • Patent number: 7480796
    Abstract: A system for authenticating data of interest includes a digest locator engine capable to locate a first and a second digest result in a data file, including a set of data; a first digest creator capable to create, using a first digest function, a first digest of the set of data, the first digest function being identical to a digest function used to create the first digest result; a second digest creator capable to create, using a second digest function that is incompatible with the first digest function, a second digest of the set of data, the second digest function being identical to a second digest function used to create the second digest result; and a digest comparator engine, communicatively coupled to the digest locator, first digest creator and the second digest creator, capable to compare the first and second created digests with the first and second located digest results respectively.
    Type: Grant
    Filed: March 19, 2002
    Date of Patent: January 20, 2009
    Assignee: Kwan Sofware Engineering, Inc.
    Inventor: John Man Kwong Kwan
  • Patent number: 7480804
    Abstract: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Steven A. Bade, Ryan Charles Catherman, James Patrick Hoff, William Lee Terrell
  • Publication number: 20090019288
    Abstract: Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an authenticator accompanies the secure file writes. The authenticator can be a power-of-attorney certificate with time limitations, a vector of message authenticated code, or a single message authenticator with secured with a secret shared among members of the serverless distributed file system. The serverless distributed file system includes at least 3f+1 participating computer members, with f representing a number of faults tolerable by the system. The group requires at least one authenticator for file creation and file uploads. Any changes to files stored among the members can be made over an unauthenticated channel if the file changes are secured by the authenticator and the group is able to verify the authenticator.
    Type: Application
    Filed: September 22, 2008
    Publication date: January 15, 2009
    Applicant: Microsoft Corporation
    Inventors: Miguel Oom Temudo de Castro, Atul Adya, John R. Douceur, William J. Bolosky
  • Patent number: 7478243
    Abstract: In a serverless distributed file system, the writer of a file can provide file authentication information to a verifying machine without having to compute a new digital signature every time a written file is closed. Periodically, the writer compiles a list of the hash values of all files that have been written over a recent interval, computes a hash of the list, and signs the hash. This signed list of hash values is known as a manifest, akin to a shipping manifest that enumerates the items in a shipment. The advantage of using a signed manifest is that the writer need only perform a single signature computation in order to authenticate the writes to multiple files, rather than having to compute a separate signature for each file, as it would if a signature were embedded in each file.
    Type: Grant
    Filed: March 21, 2001
    Date of Patent: January 13, 2009
    Assignee: Microsoft Corporation
    Inventors: William J. Bolosky, Atul Adya, John R. Douceur
  • Patent number: 7464267
    Abstract: A system and method for establishing a shared secret media key between each of a caller endpoint and a callee endpoint for securing a real time media channel comprises: i) establishing a caller authenticated signaling session with the caller endpoint using a caller shared secret authentication key and a symmetric encryption algorithm; and ii) establishing a callee authenticated signaling session with the callee endpoint using a callee shared secret authentication key and the symmetric encryption algorithm. A caller public value is received from the caller endpoint through the caller authenticated signaling session and sent to the callee endpoint through the callee authenticated signaling session. The caller public value is a public value of a pair of values generated by the caller endpoint and useful for calculating a shared secret media key.
    Type: Grant
    Filed: November 1, 2004
    Date of Patent: December 9, 2008
    Assignee: Innomedia Pte Ltd.
    Inventors: Yuesheng Zhu, Chih-Ping Lee
  • Patent number: 7461257
    Abstract: A system (50, 150) for assisting a user (14) to determine whether a hyperlink (152) to a target uniform resource locator (URL) is spoofed. A computerized system having a display unit is provided and logic (158) therein listens for activation of the hyperlink (152) in a message (154). The logic (158) extracts an originator identifier (102) and encrypted data from the hyperlink (152), and decrypts the encrypted data into decrypted data based on the originator identifier (102). The logic (158) determines whether the hyperlink (152) includes the originator identifier (102) and the encrypted data decrypts successfully. Responsive to this it then presents a confirmation of authentication conveying the name of the owner and the domain name of the target URL on the display unit, and it redirects the user (14) to the target URL. Otherwise, it presents a warning dialog to the user (14) on the display unit.
    Type: Grant
    Filed: September 21, 2004
    Date of Patent: December 2, 2008
    Assignee: Proofpoint, Inc.
    Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
  • Patent number: 7457955
    Abstract: Atrusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages is branded by embedding branding assets and validation signatures. Algorithms that generate validation signatures are dynamically selected to further strengthen the security aspects. Branding assets are presented to a user using a distinct indicia that represents to the user that the branding assets are secure.
    Type: Grant
    Filed: January 13, 2005
    Date of Patent: November 25, 2008
    Assignee: Brandmail Solutions, Inc.
    Inventors: Harish Seshadri, Noel Ruane
  • Patent number: 7457958
    Abstract: A system (50, 150) for assisting a user (14) to determine whether an email (18) comes from a purported originator (16). A computerized system having a display unit is provided. Logic (54) in the computerized system determines whether the email (18) includes an authenticity mark (52) including an originator identifier (102) and encrypted data (104). Logic (54) in the computerized system then decrypts the encrypted data (104) into decrypted data (108-14), based on the originator identifier (102). Logic (54) in the computerized system then presents to the user (14), on the display, whether the email (18) includes the authenticity mark (52), whether the encrypted data (104) decrypts successfully, and information based on the authenticity mark (52) and the decrypted data (108-14).
    Type: Grant
    Filed: September 21, 2004
    Date of Patent: November 25, 2008
    Assignee: Proofprint, Inc.
    Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
  • Patent number: 7457959
    Abstract: In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the content of the data item, determining a digital fingerprint of the data item, and storing the data item on the storage device at a location or locations associated with the digital fingerprint. In a second aspect, the method comprises determining a digital fingerprint of the data item, testing for whether the data item is already stored in the repository by comparing the digital fingerprint of the data item to the digital fingerprints of data items already in storage in the repository, and challenging a client that is attempting to deposit a data item already stored in the repository, to ascertain that the client has the full data item.
    Type: Grant
    Filed: January 7, 2004
    Date of Patent: November 25, 2008
    Assignee: Burnside Acquisition, LLC
    Inventors: Norman H. Margolus, Thomas F. Knight, Jr.
  • Publication number: 20080288780
    Abstract: Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of encrypted data is validated (e.g., by checking for data transfer errors), the encrypted data may be pipelined to a decryption engine as it is received, thus allowing decryption to begin prior to validation. In some cases, the decryption engine may be notified of data transfer errors detected during the validation process, in order to prevent reporting false security violations.
    Type: Application
    Filed: June 19, 2008
    Publication date: November 20, 2008
    Inventors: BRUCE L. BEUKEMA, Robert A. Drehmel, William E. Hall, Jamie R. Kuesel, Gilad Pivonia, Robert A. Shearer
  • Patent number: 7451315
    Abstract: Data input from multiple sites are collected and shared, using identifiers to maintain a link to sensitive portions of the data that were collected, without initially sharing the sensitive data. Unique record identifiers and parsed structure data information (PSD-Info) are used in connection with a checksum when sharing information without disclosing all of the sensitive data. Any shared subset data and the PSD-Info are encrypted with a private key and transmitted to a data recipient, who decrypts the information with a public key, verifying the identity of the sender. If later agreed by the parties, the sensitive data can be similarly transmitted. Maintaining a link between the shared information and the sensitive data that are withheld for confidential and privacy reasons provides proof for audit purposes, without disclosing the withheld data.
    Type: Grant
    Filed: May 19, 2004
    Date of Patent: November 11, 2008
    Assignee: University of Washington
    Inventor: Marc D. Coltrera
  • Patent number: 7447904
    Abstract: The invention includes systems and methods for maintaining control of an electronic record, which may have transferable value, wherein a user may add digital signature information to a single unique authoritative copy of the electronic record held in a repository without compromising the uniqueness of the authoritative electronic record. Provided the digital signature information is valid, an authoritative electronic record may be amended to include multiple digital signatures, while continuing to be a single unique authoritative electronic record.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: November 4, 2008
    Assignee: Compass Technology Management, Inc.
    Inventors: Brian D. Boggs, Peter J. Natale, Scott G. Ainsworth, Charles F. Hawkins, Donald J. Plaster
  • Patent number: 7447903
    Abstract: A user has two asymmetric crypto-keys, the first having a first private key and the second having a second private key, both of which are split into a first private key portion corresponding to a password of the user and to a computation. However, the computation of the first private key portion of the first and the second private keys have different levels of complexity. First and second messages from the user encrypted with the first private key portion of, respectively, the first private key and the second private key, are received centrally. A second private key portion of, respectively, the first private key and the second private key is applied to the received first and the received second messages, as applicable, to authenticate the user at, respectively, a first level of authentication security and a second level of authentication security which is greater than the first level.
    Type: Grant
    Filed: June 22, 2006
    Date of Patent: November 4, 2008
    Assignee: TriCipher, Inc.
    Inventors: Ravi Sandhu, Colin deSa, Karuna Ganesan
  • Patent number: 7444523
    Abstract: A integrity control system uses the address bits to enable encryption and/or protection of data stored in a system memory. The encryption and protection mechanisms are coupled to the CPU by way of a data bus and to the memory by way of a data bus. An address bus that determines the location of data to be stored or retrieved from system memory has a plurality of address lines. At least one of the address lines enabling the encryption mechanism to encrypt data before storage in the memory and to decrypt data after retrieval from memory. Another address line enables the protection mechanism to generate a hash of the data. The hash is stored and used to determine whether data has been altered while stored in system memory.
    Type: Grant
    Filed: August 27, 2004
    Date of Patent: October 28, 2008
    Assignee: Microsoft Corporation
    Inventors: Dinarte R. Morais, Jeffrey A. Andrews
  • Patent number: 7437554
    Abstract: A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization.
    Type: Grant
    Filed: June 2, 2004
    Date of Patent: October 14, 2008
    Assignee: PalmSource, Inc.
    Inventors: Greg A. Arnold, Robert Lennie, Carl Chen, Gabe Dalbec
  • Patent number: 7436966
    Abstract: A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security.
    Type: Grant
    Filed: August 21, 2002
    Date of Patent: October 14, 2008
    Assignee: International Business Machines Corporation
    Inventor: Devi Prashanth
  • Patent number: 7434070
    Abstract: Access control to data processing means, such as a smart card, is made secure by simulating a comparison block by block of part of a secret code with part of a presented code through a block-by-block comparison of part of the presented code and part of a determined number when the presented code is found to be erroneous. Each time the card is used, a constant number of operations are applied to the presented code and at least for part of the secret code, and at most for a complementary part to the determined number, thus avoiding different signatures of power consumption for different presented codes.
    Type: Grant
    Filed: June 21, 2001
    Date of Patent: October 7, 2008
    Assignee: Gemplus
    Inventors: Pascal Moitrel, Johan Pascal
  • Patent number: 7424617
    Abstract: An electronic points system that allows consumers to redeem online those points that were earned offline is described. In one implementation, the offline-online points system is applied to a soft drink bottle caps program. A soft drink company is sponsoring a promotions program where certain bottle caps are worth so many points. A consumer buys a soft drink bottle at a local store. The lucky consumer discovers that he is the beneficiary of a winning bottle cap, and in particular, a bottle cap that is worth N points. Instead of redeeming this winning bottle cap in the traditional way, the consumer logs onto the soft drink company's website and registers his bottle cap code. Thereafter, after registration, the consumer can redeem these points for any merchandise that is available for purchase with these points at any participating company's online store.
    Type: Grant
    Filed: December 31, 2003
    Date of Patent: September 9, 2008
    Assignee: Yahoo! Inc.
    Inventors: Eric Boyd, Arturo Bejar, Anil Pal, David Roman
  • Patent number: 7415612
    Abstract: An image decrypting apparatus derives spectral reflectance of the face of an original on the basis of obtained original image data, built-in light source data and basis function data, and obtains weighted coefficients of each pixel as object color component data. The apparatus stores a file including the basis function data used at the time of obtaining the spectral reflectance as a key file, and stores a file including the object color component data as an encrypted file. From each of the key file and the encrypted file, the original image data cannot be reproduced. By using the key file and the encrypted file in a correct combination, the original image data can be reproduced. In such a manner, the original image data can be protected.
    Type: Grant
    Filed: May 1, 2003
    Date of Patent: August 19, 2008
    Assignee: Minolta Co., Ltd.
    Inventor: Fumiko Uchino
  • Patent number: 7412462
    Abstract: In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the content of the data item, determining a digital fingerprint of the data item, and storing the data item on the storage device at a location or locations associated with the digital fingerprint. In a second aspect, the method comprises determining a digital fingerprint of the data item, testing for whether the data item is already stored in the repository by comparing the digital fingerprint of the data item to the digital fingerprints of data items already in storage in the repository, and challenging a client that is attempting to deposit a data item already stored in the repository, to ascertain that the client has the full data item.
    Type: Grant
    Filed: February 16, 2001
    Date of Patent: August 12, 2008
    Assignee: Burnside Acquisition, LLC
    Inventors: Norman H. Margolus, Thomas F. Knight, Jr., Jered J. Floyd, Sam Hartman, George E. Homsy, II
  • Patent number: 7412063
    Abstract: Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster that include receiving in the content server from the network device a key management block for the cluster, a unique data token for the cluster, and an encrypted cluster id and calculating a binding key for the cluster in dependence upon the key management block for the cluster, the unique data token for the cluster, and the encrypted cluster id. In typical embodiments, calculating a binding key includes calculating a management key from the key management block for the cluster; calculating a content server device key from the management key and the content server device id; decrypting the encrypted cluster id with the content server device key; and calculating the binding key with the management key, the unique data token for the cluster, and the cluster id.
    Type: Grant
    Filed: March 31, 2004
    Date of Patent: August 12, 2008
    Assignee: International Business Machines Corporation
    Inventors: Eunjin Jung, Amal Ahmed Shaheen
  • Patent number: 7411957
    Abstract: A system and method is provided for automatically identifying and removing malicious data packets, such as denial-of-service (DoS) packets, in an intermediate network node before the packets can be forwarded to a central processing unit (CPU) in the node. The CPU's processing bandwidth is therefore not consumed identifying and removing the malicious packets from the system memory. As such, processing of the malicious packets is essentially “off-loaded” from the CPU, thereby enabling the CPU to process non-malicious packets in a more efficient manner. Unlike prior implementations, the invention identifies malicious packets having complex encapsulations that can not be identified using traditional techniques, such as ternary content addressable memories (TCAM) or lookup tables.
    Type: Grant
    Filed: March 26, 2004
    Date of Patent: August 12, 2008
    Assignee: Cisco Technology, Inc.
    Inventors: John Kenneth Stacy, Trevor Garner, Martin W. Hughes, William R. Lee
  • Publication number: 20080189552
    Abstract: A header object for a data file is comprised of sub-objects which specify properties of the data stream and contains information needed to properly verify and interpret the information within the data object. In order to allow the protection of any set of sub-objects without requiring that the sub-objects follow any specific ordering, a new sub-object is introduced which includes region specifiers identifying regions within sub-objects and verification information for those regions. This new sub-object in the header object allows the modification of non-protected regions and reorganization of sub-objects in a header without invalidating verification information.
    Type: Application
    Filed: April 7, 2008
    Publication date: August 7, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Daniel Adent, Cory West, Pratul Dublish, Clifford P. Strom, Brian D. Crites
  • Patent number: 7409545
    Abstract: A method and system is disclosed for utilizing an ephemeral encryption or decryption agent so as to preclude access by the ephemeral encryption agent or decryption agent, respectively, to the information being ephemerally encrypted or decrypted. To preclude access by the ephemeral encryption agent, a blinding function is applied to the information prior to forwarding such information to the encryption agent for encryption. To preclude access to the information by the ephemeral decryption agent, a blinding function is applied to the encrypted information prior to forwarding the encrypted information to the decryption agent for decryption. Once the information has been returned, the information is unblinded, leaving an encrypted or decrypted message respectively.
    Type: Grant
    Filed: September 18, 2003
    Date of Patent: August 5, 2008
    Assignee: Sun MicroSystems, Inc.
    Inventor: Radia J. Perlman
  • Patent number: 7409555
    Abstract: A system and method are presented for assuring electronic documents containing active content. Aspects of the system and method are directed to storing a copy of input data called by the active content in a first invocation of the electronic document, then, on subsequent invocations of the electronic document, using the stored copy of the input data instead of calling for input data from the computing environment. In this way, the output from the subsequent invocations of the electronic document are the same as the output from the first invocation of the electronic document.
    Type: Grant
    Filed: February 10, 2003
    Date of Patent: August 5, 2008
    Assignee: Red Hat, Inc.
    Inventor: Alan Cox
  • Patent number: 7409558
    Abstract: Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of encrypted data is validated (e.g., by checking for data transfer errors), the encrypted data may be pipelined to a decryption engine as it is received, thus allowing decryption to begin prior to validation. In some cases, the decryption engine may be notified of data transfer errors detected during the validation process, in order to prevent reporting false security violations.
    Type: Grant
    Filed: September 2, 2004
    Date of Patent: August 5, 2008
    Assignee: International Business Machines Corporation
    Inventors: Bruce L. Beukema, Robert A. Drehmel, William E. Hall, Jamie R. Kuesel, Gilad Pivonia, Robert A. Shearer
  • Patent number: 7406600
    Abstract: A key fragment generator accepts a key string, such as from a key string generator, and produces a plurality of key fragments that can be entered by a human with a lower likelihood of error than if the human attempted to enter the original key string. A key defragmenter accepts a plurality of entered key fragments, reconstitutes the original key string from the entered key fragments and, optionally, provides the reconstituted key string to a software package or other license manager. The key fragment generator can produce “friendly” key fragments that are easier for humans to read and enter than the arbitrary character strings that characterize typical key strings. The key fragment generator can produce “error-detectable” key fragments. If an error-detectable key fragment is entered incorrectly, the key defragmenter can generate an error message and permit a user to enter the key fragment again. The key fragment generator can produce “error-correctable” key fragments.
    Type: Grant
    Filed: July 30, 2003
    Date of Patent: July 29, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: William J. Thomas, Kenneth J. Geer, Chris D. Hyser