Message Digest Travels With Message Patents (Class 713/181)
-
Patent number: 7526649Abstract: According to an embodiment of the invention, a method and apparatus for session key exchange are described. An embodiment of a method comprises requesting a service for a platform; certifying the use of the service for one or more acceptable configurations of the platform; and receiving a session key for a session of the service, the service being limited to the one or more acceptable configurations of the platform.Type: GrantFiled: December 30, 2003Date of Patent: April 28, 2009Assignee: Intel CorporationInventors: Willard M. Wiseman, David W. Grawrock, Ernie Brickell, Matthew D. Wood, Joseph F. Cihula
-
Patent number: 7523306Abstract: A system and method for generating a message integrity code, MIC, for a MAC protocol data unit in a wireless local area network, WLAN, operating according to the IEEE 802.11 standard. A MAC service data unit, MSDU, sequence control sequence number, SN, input to the MIC algorithm is suppressed, e.g. set to all zeros, when calculating the MIC. Only the fragment number, FN, portion of the sequence control is included in calculation of the MIC. The MIC may therefore be calculated before an actual SN has been determined. All MPDUs include sequential packet numbers, PNs. A station receiving MPDUs checks the PNs of MPDUs having the same SN, and rejects messages which do not have a proper sequential set of PNs.Type: GrantFiled: November 21, 2003Date of Patent: April 21, 2009Assignee: Texas Instruments IncorporatedInventor: Jie Liang
-
Patent number: 7519825Abstract: The invention is an automated system that works in the data center of certification offices connected to the internet which enables a member of the any of the certification offices to certify his document electronically from a distance using a computer connected to the internet, digital pad, an electronic pen and a printer.Type: GrantFiled: January 17, 2005Date of Patent: April 14, 2009Assignee: House of Development LLCInventor: Mohammed Alawi Geoffrey
-
Patent number: 7519822Abstract: This disclosure provides a method and apparatus for processing descriptive statements. More particularly, this disclosure provides a way of quickly and reliably signing and authenticating RDF statements without requiring a data sort. By using a commutative hashing function that combines multiple independent hashes, ideally one per serialized statement, signing and verifying can each be completed without a data sort; inclusion of an “extra” identifier, e.g., the total number of RDF statements, may enhance the security of the signed statements by helping minimize exposure to potential attackers. The disclosure also describes how to later add additional statements to an existing signature and hash using an incremental process.Type: GrantFiled: March 10, 2004Date of Patent: April 14, 2009Assignee: Hewlett-Packard Development Company, L.P.Inventors: Craig P. Sayers, Alan H. Karp
-
Patent number: 7519819Abstract: A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.Type: GrantFiled: May 29, 2002Date of Patent: April 14, 2009Assignee: Digimarc CorporatinoInventors: Brett Alan Bradley, Brett T. Hannigan, John Kennedy Barr
-
Publication number: 20090094461Abstract: An information processing apparatus of the present invention converts user authentication information based on a second one-way function into a second converted value if authentication with a first converted value obtained by converting the user authentication information based on the first one-way function is successful.Type: ApplicationFiled: October 3, 2008Publication date: April 9, 2009Applicant: CANON KABUSHIKI KAISHAInventor: Yuu Tamura
-
Patent number: 7516496Abstract: An authorized client communication system seeking access to a host communication system may be identified by locating a memory segment within the client communication system that stores client software used to access the host computer system. The memory segment then is examined to determine whether the client software stored in the memory segment corresponds to client software for an official client communication, system. Communications from the client communication system are terminated when the client software in the memory segment is determined to diverge from software for an official client communication system.Type: GrantFiled: September 1, 2005Date of Patent: April 7, 2009Assignee: AOL LLCInventors: Robert G. Watkins, Andrew L. Wick
-
Patent number: 7512972Abstract: A method and apparatus for digital content access control comprises determining the occurrence of a synchronization event that triggers synchronization of information used by one or more content provisioners to create an authenticated digital content request that is based at least in part on a digital content request comprising a request for digital content with information used by one or more content repositories to validate the authenticated digital content request and to return the digital content based at least in part on the validation. The method also comprises determining the information in response to the sychronization event and sending the information to at least one of the group comprising the one or more content provisioners and the one or more content repositories.Type: GrantFiled: September 13, 2002Date of Patent: March 31, 2009Assignee: Sun Microsystems, Inc.Inventors: Eduard de Jong, Aaron Cooley, Jon Bostrom
-
Patent number: 7512802Abstract: The present invention provides an application authentication system capable of authenticating an application on a terminal device, which does not have a secure information concealing area, by a secure device. In an application authentication system in which a secure device 10 fitted to a terminal device 30 that has no secure information concealing area authenticates an application 31 stored in the terminal device, the secure device 10 authenticates an application running means 33 stored in an unwritable area 302 of the terminal device, and also authenticates the application based on a process applied to the application 31 by the application running means to request an access to the secure device. Since the terminal authentication by the secure device and the application authentication executed within the terminal device are coupled in combination, the secure device can authenticate the application operated on the terminal device without the secure information concealing area.Type: GrantFiled: February 27, 2004Date of Patent: March 31, 2009Assignee: Panasonic CorporationInventor: Atsushi Minemura
-
Patent number: 7512975Abstract: A system and method to validate security credentials using hardware is provided. The system includes a credential validation module to recalculate security credentials received in a datagram and to determine if the security credentials are valid. The system also includes a parser to extract the security credentials from the payload data of the received datagram, and a memory to store validated credentials for further use.Type: GrantFiled: August 16, 2002Date of Patent: March 31, 2009Assignee: Intel CorporationInventor: Selim Aissi
-
Patent number: 7512794Abstract: An authentication process is performed by receiving a challenge and retrieving stored seed values. A response is generated based on the challenge and the seed values.Type: GrantFiled: June 24, 2004Date of Patent: March 31, 2009Assignee: Intersil Americas Inc.Inventor: Chung Y. Kwok
-
Patent number: 7509496Abstract: In a communication system (1), a header comprising information, preferably being related with a device-type associated commitment, is additionally provided with a signature for that information. The signature guarantees the authenticity of the header information. The signature is tamper-resistantly created in a first device (20), preferably based on at least tamper-resistant device-type specific information of the first device (20). The header information and the signature are communicated to a content provider (10), where the signature is verified before accepting the device-type associated commitment to be valid. Such signatures can preferably be used in systems using HTTP or SMTP.Type: GrantFiled: February 18, 2004Date of Patent: March 24, 2009Assignee: Telefonaktiebolaget LM Ericsson (publ)Inventors: Robert Skog, Peter Stark
-
Patent number: 7508945Abstract: Method and system wherein that once the input data sequence (X) and the control block (K) have been supplied, the method and system generates always a sequence of randomized-encrypted data (A) which is an encrypted sequence of random numbers. The method and system randomize-encrypt the data sequence (X) in a corrective way generating the proposed randomized-encrypted text sequence (AP). The randomness verifier (603) validates the randomization of the proposed randomized-encrypted text sequence (AP). If the proposed randomized-encrypted text sequence (AP) is random, it is supplied as randomized-encrypted text sequence (A); if it is not random, the method and system randomize-encrypt the data sequence (X) in a different corrective way again. The iteration is repeated until it is encrypted and at random the proposed randomized-encrypted text sequence (AP).Type: GrantFiled: October 27, 1999Date of Patent: March 24, 2009Inventor: Angel José Ferre Herrero
-
Patent number: 7500106Abstract: A method for identifying, authenticating and authorizing a user of protected data, in particular a use of protected in an automation system, whereby the user is identified by the user ID input by them in an input field in a login area, this input user ID is combined with a password input by the user and transferred with a one-way encryption function to a system ID which authenticates the user, at least this system ID is transferred in an access identifier from the login area to a protected area and the user is authorized by this transferred access identifier to obtain access to protected data in the protected area.Type: GrantFiled: October 22, 2004Date of Patent: March 3, 2009Assignee: Siemens AktiengesellschaftInventor: Harald Herberth
-
Patent number: 7500105Abstract: A security system in which wireless transmitting security devices use a hybrid or dual encoding methodology, wherein a first part of a data message is encoded in a return-to-zero (RZ) format and a second part of the data message is encoded in a non-return-to-zero (NRZ) format, thereby increasing error detection and correction. In a first aspect of the invention, status information is included in the first part of the message and redundant status information is included in the second part of the message. In a second aspect of the invention, message sequence information is included in the second part of the message to avoid processing of stale or out-of-sequence messages.Type: GrantFiled: July 13, 2004Date of Patent: March 3, 2009Assignee: Honeywell International Inc.Inventor: Thomas Schmit
-
Patent number: 7499548Abstract: A user terminal can be authenticated by an access point based on one message. In one embodiment, the present invention includes the access point receiving a message containing a shared secret encrypted with an access point public key, a user terminal certificate, and an authenticator string demonstrating possession by the user terminal of a user terminal private key. The access point can decrypt the shared secret using the private key of the access point paired with its private key. The access point can then authenticate the user terminal by checking the authenticator string using a user terminal public key included in the user terminal certificate to verify possession of the user terminal private key by the user terminal.Type: GrantFiled: June 24, 2003Date of Patent: March 3, 2009Assignee: Intel CorporationInventors: Branislav N. Meandzija, Mithat Can Dogan, Marc C. Goldburg, Christopher R. Uhlik
-
Publication number: 20090049305Abstract: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.Type: ApplicationFiled: October 24, 2008Publication date: February 19, 2009Inventors: Steven A. Bade, Ryan Charles Catherman, James Patrick Hoff, William Lee Terrel
-
Patent number: 7493661Abstract: A method and apparatus for transferring a message securely from a sender to a recipient over a network and includes at each transfer: creating a message; retrieving the public key of the recipient from an external key server just prior to sending the message; signing the message using the private key of the sender; encrypting the signed message using a public key encryption algorithm and the public key of the recipient producing an encrypted signed message; generating an E-mail message addressed to the recipient; attaching the encrypted signed message as an attachment to the E-mail message; and, transmitting the E-mail message to the recipient.Type: GrantFiled: July 1, 2004Date of Patent: February 17, 2009Assignee: Zix CorporationInventors: Gary G. Liu, David P. Cook
-
Patent number: 7490237Abstract: A process for requesting authentication includes transmitting a hash digest formed from first client-specific data together with second client specific data and receiving, in response to transmitting, an indication of acceptance when the hash digest and second client-specific data correspond to a valid client authentication request.Type: GrantFiled: June 27, 2003Date of Patent: February 10, 2009Assignee: Microsoft CorporationInventors: Dinarte R. Morais, Ling Tony Chen, Mark D. VanAntwerp, Boyd C. Multerer, Gary A. Thompson
-
Patent number: 7490127Abstract: Concurrent recipient resolution and certificate acquisition. If a client-entered input data may be resolved without further client input, the server resolves the input data into a recipient entry that has an associated routing address. The server then transmits a response to the client that includes the associated full display name, routing address and certificate. If the server determines that the recipient entry cannot be resolved without further input from the client, the server identifies a number of possible recipient entries, and for each possible recipient generates a token, which is then communicated to the client. The server receives a subsequent request from the client identifying a selected one of the possible associated recipients using the associated token. The server then acquires a certificate associated with the selected recipient using the token, and then sends the certificate to the client.Type: GrantFiled: June 13, 2003Date of Patent: February 10, 2009Assignee: Microsoft CorporationInventors: Jorge Pereira, Karim Michel Batthish, Roy Williams
-
Patent number: 7490241Abstract: A method for time stamping a digital document is disclosed. The document originator creates a time stamp receipt using the document and the current time. The time stamp receipt is submitted to a time stamping authority having a trusted clock. The time stamping authority validates the time stamp receipt by comparing the time value specified in the time stamp receipt to the current time. If the time value specified in the time stamp receipt is within a predetermined time window, the time stamping authority cryptographically binds the time value and document, or the time value and some representation of the document, e.g., by signing the time stamp receipt with its private signature key.Type: GrantFiled: December 10, 1999Date of Patent: February 10, 2009Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Allen Roginsky, Nevenko Zunic, Stephen M. Matyas, Jr.
-
Patent number: 7487360Abstract: A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization.Type: GrantFiled: November 26, 2003Date of Patent: February 3, 2009Assignee: PalmSource, Inc.Inventors: Robert Lennie, Carl Chen, Gabe Dalbec
-
Publication number: 20090031138Abstract: A method for secure and reliable authentication in a communication system. In an embodiment, the authentication method includes performing authentication of a user utilizing Extensible Authentication Protocol (EAP), and transmitting a result indication message to the user. The result indication message can include additional information for security and reliability. The method also includes receiving an acknowledgement message from the user. The acknowledgement message is sent by the user for confirming the reception of the result indication. In an embodiment, the method also includes retransmitting the result indication message if the acknowledgement message is not received within a predetermined time. The additional information for security and reliability can include Message Authentication Code (MAC) and time interval information. The additional information for security and reliability can also include a security/reliability flag.Type: ApplicationFiled: April 30, 2008Publication date: January 29, 2009Applicant: FutureWei Technologies, Inc.Inventor: Madjid F. Nakhjiri
-
Patent number: 7480796Abstract: A system for authenticating data of interest includes a digest locator engine capable to locate a first and a second digest result in a data file, including a set of data; a first digest creator capable to create, using a first digest function, a first digest of the set of data, the first digest function being identical to a digest function used to create the first digest result; a second digest creator capable to create, using a second digest function that is incompatible with the first digest function, a second digest of the set of data, the second digest function being identical to a second digest function used to create the second digest result; and a digest comparator engine, communicatively coupled to the digest locator, first digest creator and the second digest creator, capable to compare the first and second created digests with the first and second located digest results respectively.Type: GrantFiled: March 19, 2002Date of Patent: January 20, 2009Assignee: Kwan Sofware Engineering, Inc.Inventor: John Man Kwong Kwan
-
Patent number: 7480804Abstract: An architecture for a distributed data processing system comprises a system-level service processor along with one or more node-level service processors; each are uniquely associated with a node, and each is extended to comprise any components that are necessary for operating the nodes as trusted platforms, such as a TPM and a CRTM in accordance with the security model of the Trusted Computing Group. These node-level service processors then inter-operate with the system-level service processor, which also contains any components that are necessary for operating the system as a whole as a trusted platform. A TPM within the system-level service processor aggregates integrity metrics that are gathered by the node-level service processors, thereafter reporting integrity metrics as requested, e.g., to a hypervisor, thereby allowing a large distributed data processing system to be validated as a trusted computing environment while allowing its highly parallelized initialization process to proceed.Type: GrantFiled: April 29, 2004Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Steven A. Bade, Ryan Charles Catherman, James Patrick Hoff, William Lee Terrell
-
Publication number: 20090019288Abstract: Systems and methods for secure file writes after a catastrophic event are allowed over an unauthenticated channel in a serverless distributed file system if an authenticator accompanies the secure file writes. The authenticator can be a power-of-attorney certificate with time limitations, a vector of message authenticated code, or a single message authenticator with secured with a secret shared among members of the serverless distributed file system. The serverless distributed file system includes at least 3f+1 participating computer members, with f representing a number of faults tolerable by the system. The group requires at least one authenticator for file creation and file uploads. Any changes to files stored among the members can be made over an unauthenticated channel if the file changes are secured by the authenticator and the group is able to verify the authenticator.Type: ApplicationFiled: September 22, 2008Publication date: January 15, 2009Applicant: Microsoft CorporationInventors: Miguel Oom Temudo de Castro, Atul Adya, John R. Douceur, William J. Bolosky
-
Patent number: 7478243Abstract: In a serverless distributed file system, the writer of a file can provide file authentication information to a verifying machine without having to compute a new digital signature every time a written file is closed. Periodically, the writer compiles a list of the hash values of all files that have been written over a recent interval, computes a hash of the list, and signs the hash. This signed list of hash values is known as a manifest, akin to a shipping manifest that enumerates the items in a shipment. The advantage of using a signed manifest is that the writer need only perform a single signature computation in order to authenticate the writes to multiple files, rather than having to compute a separate signature for each file, as it would if a signature were embedded in each file.Type: GrantFiled: March 21, 2001Date of Patent: January 13, 2009Assignee: Microsoft CorporationInventors: William J. Bolosky, Atul Adya, John R. Douceur
-
Patent number: 7464267Abstract: A system and method for establishing a shared secret media key between each of a caller endpoint and a callee endpoint for securing a real time media channel comprises: i) establishing a caller authenticated signaling session with the caller endpoint using a caller shared secret authentication key and a symmetric encryption algorithm; and ii) establishing a callee authenticated signaling session with the callee endpoint using a callee shared secret authentication key and the symmetric encryption algorithm. A caller public value is received from the caller endpoint through the caller authenticated signaling session and sent to the callee endpoint through the callee authenticated signaling session. The caller public value is a public value of a pair of values generated by the caller endpoint and useful for calculating a shared secret media key.Type: GrantFiled: November 1, 2004Date of Patent: December 9, 2008Assignee: Innomedia Pte Ltd.Inventors: Yuesheng Zhu, Chih-Ping Lee
-
Patent number: 7461257Abstract: A system (50, 150) for assisting a user (14) to determine whether a hyperlink (152) to a target uniform resource locator (URL) is spoofed. A computerized system having a display unit is provided and logic (158) therein listens for activation of the hyperlink (152) in a message (154). The logic (158) extracts an originator identifier (102) and encrypted data from the hyperlink (152), and decrypts the encrypted data into decrypted data based on the originator identifier (102). The logic (158) determines whether the hyperlink (152) includes the originator identifier (102) and the encrypted data decrypts successfully. Responsive to this it then presents a confirmation of authentication conveying the name of the owner and the domain name of the target URL on the display unit, and it redirects the user (14) to the target URL. Otherwise, it presents a warning dialog to the user (14) on the display unit.Type: GrantFiled: September 21, 2004Date of Patent: December 2, 2008Assignee: Proofpoint, Inc.Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
-
Patent number: 7457955Abstract: Atrusted branded email method and apparatus in one aspect detects branded electronic messages and performs validation before it is sent to a recipient. In another aspect, an electronic messages is branded by embedding branding assets and validation signatures. Algorithms that generate validation signatures are dynamically selected to further strengthen the security aspects. Branding assets are presented to a user using a distinct indicia that represents to the user that the branding assets are secure.Type: GrantFiled: January 13, 2005Date of Patent: November 25, 2008Assignee: Brandmail Solutions, Inc.Inventors: Harish Seshadri, Noel Ruane
-
Patent number: 7457958Abstract: A system (50, 150) for assisting a user (14) to determine whether an email (18) comes from a purported originator (16). A computerized system having a display unit is provided. Logic (54) in the computerized system determines whether the email (18) includes an authenticity mark (52) including an originator identifier (102) and encrypted data (104). Logic (54) in the computerized system then decrypts the encrypted data (104) into decrypted data (108-14), based on the originator identifier (102). Logic (54) in the computerized system then presents to the user (14), on the display, whether the email (18) includes the authenticity mark (52), whether the encrypted data (104) decrypts successfully, and information based on the authenticity mark (52) and the decrypted data (108-14).Type: GrantFiled: September 21, 2004Date of Patent: November 25, 2008Assignee: Proofprint, Inc.Inventors: Terry M. Olkin, Jeffrey C. Olkin, Jahanshah Moreh
-
Patent number: 7457959Abstract: In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the content of the data item, determining a digital fingerprint of the data item, and storing the data item on the storage device at a location or locations associated with the digital fingerprint. In a second aspect, the method comprises determining a digital fingerprint of the data item, testing for whether the data item is already stored in the repository by comparing the digital fingerprint of the data item to the digital fingerprints of data items already in storage in the repository, and challenging a client that is attempting to deposit a data item already stored in the repository, to ascertain that the client has the full data item.Type: GrantFiled: January 7, 2004Date of Patent: November 25, 2008Assignee: Burnside Acquisition, LLCInventors: Norman H. Margolus, Thomas F. Knight, Jr.
-
Publication number: 20080288780Abstract: Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of encrypted data is validated (e.g., by checking for data transfer errors), the encrypted data may be pipelined to a decryption engine as it is received, thus allowing decryption to begin prior to validation. In some cases, the decryption engine may be notified of data transfer errors detected during the validation process, in order to prevent reporting false security violations.Type: ApplicationFiled: June 19, 2008Publication date: November 20, 2008Inventors: BRUCE L. BEUKEMA, Robert A. Drehmel, William E. Hall, Jamie R. Kuesel, Gilad Pivonia, Robert A. Shearer
-
Patent number: 7451315Abstract: Data input from multiple sites are collected and shared, using identifiers to maintain a link to sensitive portions of the data that were collected, without initially sharing the sensitive data. Unique record identifiers and parsed structure data information (PSD-Info) are used in connection with a checksum when sharing information without disclosing all of the sensitive data. Any shared subset data and the PSD-Info are encrypted with a private key and transmitted to a data recipient, who decrypts the information with a public key, verifying the identity of the sender. If later agreed by the parties, the sensitive data can be similarly transmitted. Maintaining a link between the shared information and the sensitive data that are withheld for confidential and privacy reasons provides proof for audit purposes, without disclosing the withheld data.Type: GrantFiled: May 19, 2004Date of Patent: November 11, 2008Assignee: University of WashingtonInventor: Marc D. Coltrera
-
Patent number: 7447904Abstract: The invention includes systems and methods for maintaining control of an electronic record, which may have transferable value, wherein a user may add digital signature information to a single unique authoritative copy of the electronic record held in a repository without compromising the uniqueness of the authoritative electronic record. Provided the digital signature information is valid, an authoritative electronic record may be amended to include multiple digital signatures, while continuing to be a single unique authoritative electronic record.Type: GrantFiled: October 13, 2006Date of Patent: November 4, 2008Assignee: Compass Technology Management, Inc.Inventors: Brian D. Boggs, Peter J. Natale, Scott G. Ainsworth, Charles F. Hawkins, Donald J. Plaster
-
Patent number: 7447903Abstract: A user has two asymmetric crypto-keys, the first having a first private key and the second having a second private key, both of which are split into a first private key portion corresponding to a password of the user and to a computation. However, the computation of the first private key portion of the first and the second private keys have different levels of complexity. First and second messages from the user encrypted with the first private key portion of, respectively, the first private key and the second private key, are received centrally. A second private key portion of, respectively, the first private key and the second private key is applied to the received first and the received second messages, as applicable, to authenticate the user at, respectively, a first level of authentication security and a second level of authentication security which is greater than the first level.Type: GrantFiled: June 22, 2006Date of Patent: November 4, 2008Assignee: TriCipher, Inc.Inventors: Ravi Sandhu, Colin deSa, Karuna Ganesan
-
Patent number: 7444523Abstract: A integrity control system uses the address bits to enable encryption and/or protection of data stored in a system memory. The encryption and protection mechanisms are coupled to the CPU by way of a data bus and to the memory by way of a data bus. An address bus that determines the location of data to be stored or retrieved from system memory has a plurality of address lines. At least one of the address lines enabling the encryption mechanism to encrypt data before storage in the memory and to decrypt data after retrieval from memory. Another address line enables the protection mechanism to generate a hash of the data. The hash is stored and used to determine whether data has been altered while stored in system memory.Type: GrantFiled: August 27, 2004Date of Patent: October 28, 2008Assignee: Microsoft CorporationInventors: Dinarte R. Morais, Jeffrey A. Andrews
-
Patent number: 7437554Abstract: A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization.Type: GrantFiled: June 2, 2004Date of Patent: October 14, 2008Assignee: PalmSource, Inc.Inventors: Greg A. Arnold, Robert Lennie, Carl Chen, Gabe Dalbec
-
Patent number: 7436966Abstract: A secure approach for sending a original message from a sender to a receiver. The sender may encrypt the original message by performing an XOR (or XNOR) operation of the original message and a first random message (same size as original message) on a bit by basis to generate a second message. The receiver may also perform an XOR of the second message with a locally generated second random message. The resulting message is sent to the sender system. The sender system may again perform XOR operation of the received message and the first random message, and send the resulting message to receiver. The receiver may perform XOR operation on the received output to generate the original message sent by the sender. Other technologies such as digital signatures and key pairs (public key infrastructure) may be used in each communication between the sender and receiver to further enhance security.Type: GrantFiled: August 21, 2002Date of Patent: October 14, 2008Assignee: International Business Machines CorporationInventor: Devi Prashanth
-
Patent number: 7434070Abstract: Access control to data processing means, such as a smart card, is made secure by simulating a comparison block by block of part of a secret code with part of a presented code through a block-by-block comparison of part of the presented code and part of a determined number when the presented code is found to be erroneous. Each time the card is used, a constant number of operations are applied to the presented code and at least for part of the secret code, and at most for a complementary part to the determined number, thus avoiding different signatures of power consumption for different presented codes.Type: GrantFiled: June 21, 2001Date of Patent: October 7, 2008Assignee: GemplusInventors: Pascal Moitrel, Johan Pascal
-
Patent number: 7424617Abstract: An electronic points system that allows consumers to redeem online those points that were earned offline is described. In one implementation, the offline-online points system is applied to a soft drink bottle caps program. A soft drink company is sponsoring a promotions program where certain bottle caps are worth so many points. A consumer buys a soft drink bottle at a local store. The lucky consumer discovers that he is the beneficiary of a winning bottle cap, and in particular, a bottle cap that is worth N points. Instead of redeeming this winning bottle cap in the traditional way, the consumer logs onto the soft drink company's website and registers his bottle cap code. Thereafter, after registration, the consumer can redeem these points for any merchandise that is available for purchase with these points at any participating company's online store.Type: GrantFiled: December 31, 2003Date of Patent: September 9, 2008Assignee: Yahoo! Inc.Inventors: Eric Boyd, Arturo Bejar, Anil Pal, David Roman
-
Patent number: 7415612Abstract: An image decrypting apparatus derives spectral reflectance of the face of an original on the basis of obtained original image data, built-in light source data and basis function data, and obtains weighted coefficients of each pixel as object color component data. The apparatus stores a file including the basis function data used at the time of obtaining the spectral reflectance as a key file, and stores a file including the object color component data as an encrypted file. From each of the key file and the encrypted file, the original image data cannot be reproduced. By using the key file and the encrypted file in a correct combination, the original image data can be reproduced. In such a manner, the original image data can be protected.Type: GrantFiled: May 1, 2003Date of Patent: August 19, 2008Assignee: Minolta Co., Ltd.Inventor: Fumiko Uchino
-
Patent number: 7412462Abstract: In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the content of the data item, determining a digital fingerprint of the data item, and storing the data item on the storage device at a location or locations associated with the digital fingerprint. In a second aspect, the method comprises determining a digital fingerprint of the data item, testing for whether the data item is already stored in the repository by comparing the digital fingerprint of the data item to the digital fingerprints of data items already in storage in the repository, and challenging a client that is attempting to deposit a data item already stored in the repository, to ascertain that the client has the full data item.Type: GrantFiled: February 16, 2001Date of Patent: August 12, 2008Assignee: Burnside Acquisition, LLCInventors: Norman H. Margolus, Thomas F. Knight, Jr., Jered J. Floyd, Sam Hartman, George E. Homsy, II
-
Patent number: 7412063Abstract: Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster that include receiving in the content server from the network device a key management block for the cluster, a unique data token for the cluster, and an encrypted cluster id and calculating a binding key for the cluster in dependence upon the key management block for the cluster, the unique data token for the cluster, and the encrypted cluster id. In typical embodiments, calculating a binding key includes calculating a management key from the key management block for the cluster; calculating a content server device key from the management key and the content server device id; decrypting the encrypted cluster id with the content server device key; and calculating the binding key with the management key, the unique data token for the cluster, and the cluster id.Type: GrantFiled: March 31, 2004Date of Patent: August 12, 2008Assignee: International Business Machines CorporationInventors: Eunjin Jung, Amal Ahmed Shaheen
-
Patent number: 7411957Abstract: A system and method is provided for automatically identifying and removing malicious data packets, such as denial-of-service (DoS) packets, in an intermediate network node before the packets can be forwarded to a central processing unit (CPU) in the node. The CPU's processing bandwidth is therefore not consumed identifying and removing the malicious packets from the system memory. As such, processing of the malicious packets is essentially “off-loaded” from the CPU, thereby enabling the CPU to process non-malicious packets in a more efficient manner. Unlike prior implementations, the invention identifies malicious packets having complex encapsulations that can not be identified using traditional techniques, such as ternary content addressable memories (TCAM) or lookup tables.Type: GrantFiled: March 26, 2004Date of Patent: August 12, 2008Assignee: Cisco Technology, Inc.Inventors: John Kenneth Stacy, Trevor Garner, Martin W. Hughes, William R. Lee
-
Publication number: 20080189552Abstract: A header object for a data file is comprised of sub-objects which specify properties of the data stream and contains information needed to properly verify and interpret the information within the data object. In order to allow the protection of any set of sub-objects without requiring that the sub-objects follow any specific ordering, a new sub-object is introduced which includes region specifiers identifying regions within sub-objects and verification information for those regions. This new sub-object in the header object allows the modification of non-protected regions and reorganization of sub-objects in a header without invalidating verification information.Type: ApplicationFiled: April 7, 2008Publication date: August 7, 2008Applicant: MICROSOFT CORPORATIONInventors: Daniel Adent, Cory West, Pratul Dublish, Clifford P. Strom, Brian D. Crites
-
Patent number: 7409545Abstract: A method and system is disclosed for utilizing an ephemeral encryption or decryption agent so as to preclude access by the ephemeral encryption agent or decryption agent, respectively, to the information being ephemerally encrypted or decrypted. To preclude access by the ephemeral encryption agent, a blinding function is applied to the information prior to forwarding such information to the encryption agent for encryption. To preclude access to the information by the ephemeral decryption agent, a blinding function is applied to the encrypted information prior to forwarding the encrypted information to the decryption agent for decryption. Once the information has been returned, the information is unblinded, leaving an encrypted or decrypted message respectively.Type: GrantFiled: September 18, 2003Date of Patent: August 5, 2008Assignee: Sun MicroSystems, Inc.Inventor: Radia J. Perlman
-
Patent number: 7409555Abstract: A system and method are presented for assuring electronic documents containing active content. Aspects of the system and method are directed to storing a copy of input data called by the active content in a first invocation of the electronic document, then, on subsequent invocations of the electronic document, using the stored copy of the input data instead of calling for input data from the computing environment. In this way, the output from the subsequent invocations of the electronic document are the same as the output from the first invocation of the electronic document.Type: GrantFiled: February 10, 2003Date of Patent: August 5, 2008Assignee: Red Hat, Inc.Inventor: Alan Cox
-
Patent number: 7409558Abstract: Methods and apparatus for reducing the impact of latency associated with decrypting encrypted data are provided. Rather than wait until an entire packet of encrypted data is validated (e.g., by checking for data transfer errors), the encrypted data may be pipelined to a decryption engine as it is received, thus allowing decryption to begin prior to validation. In some cases, the decryption engine may be notified of data transfer errors detected during the validation process, in order to prevent reporting false security violations.Type: GrantFiled: September 2, 2004Date of Patent: August 5, 2008Assignee: International Business Machines CorporationInventors: Bruce L. Beukema, Robert A. Drehmel, William E. Hall, Jamie R. Kuesel, Gilad Pivonia, Robert A. Shearer
-
Patent number: 7406600Abstract: A key fragment generator accepts a key string, such as from a key string generator, and produces a plurality of key fragments that can be entered by a human with a lower likelihood of error than if the human attempted to enter the original key string. A key defragmenter accepts a plurality of entered key fragments, reconstitutes the original key string from the entered key fragments and, optionally, provides the reconstituted key string to a software package or other license manager. The key fragment generator can produce “friendly” key fragments that are easier for humans to read and enter than the arbitrary character strings that characterize typical key strings. The key fragment generator can produce “error-detectable” key fragments. If an error-detectable key fragment is entered incorrectly, the key defragmenter can generate an error message and permit a user to enter the key fragment again. The key fragment generator can produce “error-correctable” key fragments.Type: GrantFiled: July 30, 2003Date of Patent: July 29, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: William J. Thomas, Kenneth J. Geer, Chris D. Hyser