Message Digest Travels With Message Patents (Class 713/181)
-
Patent number: 6848048Abstract: A method and apparatus for providing verifiable digital signatures. In one embodiment, a method includes converting, on a computer system, digital data representative of a document into a predetermined format, and applying the predetermined format and a viewer program to a hash function to mathematically operate on the predetermined format and the viewer program and provide a message digest. The viewer program is used for viewing the predetermined format that is a representation of the document. The method further includes encrypting the message digest using a private key to provide a digital signature. In one embodiment, the predetermined format is a bitmap representation of the document. Moreover, in one embodiment, the method further includes incorporating a file in the digital signature, where the file includes one or more parameters specifying an environment of the computer system at the time of creation of the digital signature.Type: GrantFiled: October 13, 2000Date of Patent: January 25, 2005Assignee: Litronic Inc.Inventor: William S. Holmes
-
Patent number: 6842628Abstract: A method for transmitting verified notification messages from a service provider to a PID (personal information device) user. The method includes the step of registering a plurality of users and providing each of the users with respective public and private encryption keys. A message is then received from a first user of the plurality of users. The received message is signed with the first user's private encryption key. A signature of the message is verified by using the first user's public encryption key. The authority of the first user to transmit notification messages is then verified. The message is then resigned with the second user's private encryption key and transmitted to at least a second user of the plurality of users, wherein the second user verifies the signature by using the second user's public encryption key.Type: GrantFiled: August 31, 2001Date of Patent: January 11, 2005Assignee: palmONe, Inc.Inventors: Greg Arnold, Fermin Soriano
-
Patent number: 6839846Abstract: A file may be transferred from one processor-based system to another. The file may include executable binary data together with an integrated digital signature. Each time a receiving processor-based system boots, the digital signature is automatically applied to the payload to ensure its authenticity. If the file is determined during the boot process to be corrupted, it may be automatically deleted and replaced with a predecessor file that may be maintained on the receiving system.Type: GrantFiled: January 3, 2001Date of Patent: January 4, 2005Assignee: Intel CorporationInventors: Richard P. Mangold, Edward B. Shin, Mark Gross
-
Publication number: 20040268134Abstract: A security device, a key device and a program protection system and method capable of coping with copy protection evading software or the modification of a board. A comparison is made between a security code unique to a game program which is obtained from a prestored key code and a security code obtained by generating a random number by using a game program stored in a storage device as an initial value. When they disagree, the operation of the function module is stopped. The copy protection is executed by hardware. By integrally forming the hardware and the function module, it is possible to cope with copy protection evading software or the modification of a board.Type: ApplicationFiled: May 5, 2004Publication date: December 30, 2004Applicant: NAMCO LIMITEDInventor: Norio Sasaki
-
Patent number: 6836845Abstract: A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization.Type: GrantFiled: June 30, 2000Date of Patent: December 28, 2004Assignee: Palm Source, Inc.Inventors: Robert Lennie, Carl Chen, Gabe Dalbec
-
Publication number: 20040255125Abstract: To provide an embedded information/alteration detection apparatus as well as an embedded information/alteration detection method, and a computer-readable record medium storing an embedded information/alteration detection program therein, which can embed and read out information without any change in the “significance” and “quality” of represented data. In an embedded information apparatus, a plurality of structural data are sorted on the basis of a first rule, a message digest is calculated for a sorted result, and the sorted result is further sorted on the basis of a second rule that is different from the first rule by using a calculated result as a key. In an information alteration detection apparatus, a plurality of structural data are sorted on the basis of a first rule, a message digest is calculated for a sorted result, and the sorted result is further sorted on the basis of a second rule by using a calculated result as a key.Type: ApplicationFiled: March 24, 2004Publication date: December 16, 2004Applicant: SEIKO EPSON CORPORATIONInventor: Hiroshi Hasegawa
-
Patent number: 6832316Abstract: A technique for integrating message authentication with encryption and decryption is disclosed. Intermediate internal states of the decryption operation are used to generate a validation code that can be used to detect manipulation of the encrypted data. The technique is optimized with respect to processing time, execution space for code and runtime data, and buffer usage. The technique is generally applicable to a variety of block ciphers, including TEA, Rijndael, DES, RC5, and RC6.Type: GrantFiled: January 6, 2000Date of Patent: December 14, 2004Assignee: Intertrust Technologies, Corp.Inventor: W. Olin Sibert
-
Publication number: 20040250082Abstract: A terminal of a user as an issuer of electronic information calculates a Digest value for a content and sends this Digest value and a key ID of the issuer user to an authentication center server device. The authentication center server device searches a key storage for a secret key corresponding to this key ID, generates a signature value by encrypting the Digest value with this secret key and responds the signature value to the user terminal. The user terminal forms an undersigned content by attaching the received signature value and key ID to signature object electronic information, and issues this content to a recipient. The terminal of the recipient user calculates a Digest value for the content in the undersigned content, and sends this Digest value, the signature value and the attachment key ID to the authentication center server device.Type: ApplicationFiled: March 26, 2004Publication date: December 9, 2004Applicant: FUJITSU LIMITEDInventors: Tao Li, Junichi Koizumi, Hiroki Katoh, Tatsuhiro Miyazaki
-
Publication number: 20040250071Abstract: An electronic data storage system stores electronic data with attaching an electronic signature, and output the electronic data along with the attached electronic signature, which decreases the operation costs with a simple operation. By using a public key-based signature, a third party can verify the data, and by using a secret check code, the electronic signature at registration is always valid without risk of falsification. Also by attaching an electronic signature at access, the validity of the stored data is assured, and a third party can verify the data. By using all of these features, the verification by a third party becomes possible over the long term. In this way the long term storage of electronic data is implemented.Type: ApplicationFiled: January 30, 2004Publication date: December 9, 2004Inventors: Yasuyuki Higashiura, Takumi Kishino, Keizo Sato, Shoki Kadowaki, Seigo Kotani
-
Patent number: 6829640Abstract: A method and system for determining whether first and second byte streams are different. The method and system are very well suited for identifying and approximately quantifying changes to Web sites. Generally, the method comprises the steps of providing a first a k1 byte long sequence of characters ci for i values from i=1 to k1; providing a second a k2 byte long sequence of characters cj for j values from j=1 to k2; and computing a modulo arithmetic operation on said i values, and computing said modulo arithmetic operation on said j values. A value N1 is computed according to a formula that combines said modulo operation on i and each said character ci for i=1 to k1 using arithmetic or logical operations; and a value N2 is computed according to said formula by combining said modulo arithmetic operation on j and each said character cj for j=1 to j=k2. These N1 and N2 values are then compared to determine whether the first and second byte sequences are different.Type: GrantFiled: December 23, 1999Date of Patent: December 7, 2004Assignee: International Business Machines CorporationInventor: Paul A. Duncan
-
Patent number: 6826686Abstract: A secure method for changing a password to a new password when the passwords are being transmitted over a network is presented. The present invention does not require the use of any additional keys (such as symmetric keys or public/private key pairs) to protect the password exchanges. Moreover, the present solution does not require the use of any encryption algorithms (such as DES, RC4/RC5, etc.), it only requires the use of a collision-resistant hash function.Type: GrantFiled: April 14, 2000Date of Patent: November 30, 2004Assignee: International Business Machines CorporationInventors: Mohammad Peyravian, Nevenko Zunic
-
Patent number: 6826546Abstract: A method and system are provided for facilitating the purchase of a license for a downloaded file of a copyrighted work. In one embodiment, a method for licensing a digital copy of a copyrighted work includes determining an identity of the digital copy by using at least one computer program, calculating a fee for a license for the digital copy by the at least one computer program. The step of calculating includes the step of measuring at least one metric of the digital copy. A license is then provided for the copy after receiving payment of the fee.Type: GrantFiled: October 26, 2000Date of Patent: November 30, 2004Assignee: IdeaFlood, Inc.Inventor: Gary Stephen Shuster
-
Publication number: 20040230805Abstract: Secure communication between a keyboard and a component, such as a piece of software running on a computer. A first initial value is known to both the keyboard and the component. The keyboard and the component exchange nonces. The keyboard and the component each compute a second initial value and a third initial value based on the nonces and the first initial value. Both the keyboard and the component perform the same computation, so that the keyboard and the component each have the same second and third initial values. The keyboard encrypts keystrokes destined for the component using CBC-3DES based on the key and the second initial value, and also creates a message authentication code for each keystroke using CBC-3DESMAC based on the key and the third initial value. The component decrypts and verifies the keystrokes using the key and the second and third initial values.Type: ApplicationFiled: May 2, 2003Publication date: November 18, 2004Inventors: Marcus Peinado, Josh Benaloh
-
Patent number: 6816968Abstract: This invention concerns a consumable authentication protocol for validating the existence of an untrusted authentication chip, as well as ensuring that the authentication chip lasts only as long as the consumable. In a further aspect it concerns a consumable authentication system for the protocol. A trusted authentication chip has a test function; and the untrusted authentication chip has a read function to test data from the trusted chip, including a random number and its signature, encrypted using a first key, by comparing the decrypted signature with a signature calculated from the decrypted random number. In the event that the two signatures match, it returns a data message and an encrypted version of the data message in combination with the random number, encrypted using the second key.Type: GrantFiled: February 15, 2000Date of Patent: November 9, 2004Assignee: Silverbrook Research Pty LtdInventor: Simon Robert Walmsley
-
Patent number: 6804780Abstract: A computer-based method for generating a Downloadable ID to identify a Downloadable, including obtaining a Downloadable that includes one or more references to software components required by the Downloadable, fetching at least one software component identified by the one or more references, and performing a function on the Downloadable and the fetched software components to generate a Downloadable ID. A system and a computer-readable storage medium are also described and claimed.Type: GrantFiled: March 30, 2000Date of Patent: October 12, 2004Assignee: Finjan Software, Ltd.Inventor: Shlomo Touboul
-
Patent number: 6792539Abstract: The present invention provides a data processing method and apparatus capable of shortening the processing time required when editing previously encrypted track data. An example of a transfer of audio track data between a portable player and a storage device is provided. The track data is comprised of one or more parts, each of which in turn is comprised of a series of data blocks. Each block of the track data is encrypted prior to transfer using a block key. The block keys are determined in such a manner that subsequent editing of the track data which results in redistribution of the parts does not require full decryption of the data.Type: GrantFiled: March 14, 2000Date of Patent: September 14, 2004Assignee: Sony CorporationInventors: Tateo Oishi, Ryuji Ishiguro, Takumi Okaue, Nobuyuki Kihara, Teppei Yokota
-
Patent number: 6792538Abstract: An information generating apparatus for generating output information to be outputted is provided with: an error correcting code adding device for adding an error correction code, which is used for an error correction of the output information when the output information is outputted, to the output information to thereby generate the output information having the error correction code; and a replacing device for replacing a part of the output information having the error correction code, which is generated by the error correcting code adding device, with identification information indicating that the output information to be outputted is not illegally copied to thereby generate the partially replaced output information.Type: GrantFiled: June 30, 1999Date of Patent: September 14, 2004Assignee: Pioneer Electronic CorporationInventors: Kazuo Kuroda, Kazuyuki Yoshida
-
Publication number: 20040172542Abstract: The present invention provides an application authentication system capable of authenticating an application on a terminal device, which does not have a secure information concealing area, by a secure device. In an application authentication system in which a secure device 10 fitted to a terminal device 30 that has no secure information concealing area authenticates an application 31 stored in the terminal device, the secure device 10 authenticates an application running means 33 stored in an unwritable area 302 of the terminal device, and also authenticates the application based on a process applied to the application 31 by the application running means to request an access to the secure device. Since the terminal authentication by the secure device and the application authentication executed within the terminal device are coupled in combination, the secure device can authenticate the application operated on the terminal device without the secure information concealing area.Type: ApplicationFiled: February 27, 2004Publication date: September 2, 2004Applicant: Matsushita Electric Industrial Co., Ltd.Inventor: Atsushi Minemura
-
Patent number: 6785816Abstract: Methods and systems for secured configuration data for a programmable device. One or more memory devices store configuration data that includes one or more configuration bitstreams and associated authentication tags for each configuration bitstream. Each authentication tag is created using the associated configuration bitstream. A programmable device operably connected to the one or more memory devices receives one of the configuration bitstreams. The programmable device uses the associated authentication tag of the configuration bitstream to verify that the configuration bitstream is authentic. The programmable device loads the configuration bitstream if the one of the configuration bitstream is authentic, or may discard it otherwise.Type: GrantFiled: May 1, 2000Date of Patent: August 31, 2004Assignee: Nokia CorporationInventors: Tommi Kivimaki, Tero Karkkainen
-
Patent number: 6778667Abstract: A cryptography unit having a cipher unit and a hash unit coupled in parallel for simultaneous ciphering and hashing. The cipher unit implements a cipher algorithm that operates on a data block having a first predetermined size M. The hash unit implements a hash algorithm on a data block having a second predetermined size N. Buffers of a size Q, where Q is an integer multiple of M and N, are employed to receive the input data into the present invention. A security unit that ensures that the cipher unit and the hash unit operate on the same data block of size Q is also provided.Type: GrantFiled: December 30, 1999Date of Patent: August 17, 2004Assignee: Intel CorporationInventors: Ashutosh Bakhle, Derek L. Davis
-
Patent number: 6763460Abstract: A method of transmitting information data from a sender to a receiver via a transcoder is proposed. The information data comprises confidential information data which is encrypted and non-confidential information data. Security information and transcoding-type information is sent together with the partly encrypted information data to the transcoder which uses the security information and transcoding-type information during a transcoding step. The encrypted confidential information data is thereby transcoded without using its content while the non-confidential information data is transcoded, having access to its content.Type: GrantFiled: July 13, 1999Date of Patent: July 13, 2004Assignee: International Business Machines CorporationInventors: Stefan G. Hild, Luke J. O'Connor
-
Publication number: 20040123102Abstract: A method of authenticating a message (111) received via a transmission channel (108) using a Message Authentication Code (MAC).Type: ApplicationFiled: October 24, 2003Publication date: June 24, 2004Inventors: Christian Gehrmann, Rolf Blom
-
Patent number: 6754824Abstract: A telecommunications system and method is disclosed for implementing a message authentication code (MAC) for transmitted digital information signals. Digital information signals typically include an error detecting code, such as a Cyclic Redundancy Check (CRC) code, to ensure reliable delivery of the information. In order to verify the identity of the sending node, the CRC code can be modulated by a sequence known only to the participating nodes. Thus, the CRC code not only provides an error detecting function, but also serves as a message authentication code.Type: GrantFiled: October 8, 1999Date of Patent: June 22, 2004Assignee: Telefonaktiebolaget L M Ericsson (Publ)Inventors: Joakim Persson, Ben Smeets
-
Patent number: 6754825Abstract: A method and apparatus for authenticating and authorizing online transactions. An authentication cookie is transmitted to a client system. The authentication cookie includes a user encryption key and an encrypted buffer that contains user identification data and a profile code. Subsequent requests for the particular service use the authentication cookie to generate a query that includes the encrypted buffer and user identification data entered by the user. Portions of the query are encrypted using the user encryption key. Queries received at each authentication and authorization server are authenticated by reconstructing the user encryption key using information transmitted in the clear and decrypting the query using both the reconstructed user encryption key and the secret key. The user identification data entered by the user is then compared with the user identification data in the encrypted buffer for further authentication. The profile code is analyzed for determining authorization.Type: GrantFiled: June 30, 2000Date of Patent: June 22, 2004Assignee: Palm Source, Inc.Inventors: Robert Lennie, Carl Chen, Gabe Dalbec
-
Patent number: 6748538Abstract: A platform featuring memory which contains a plurality of software components and a manifest which includes a digest of each of the plurality of the software components and a processor which is coupled to the memory. The processor executes a hash function to produce the manifest and to verify integrity of the plurality of software components by re-computing digests of the plurality of software components and comparing the computed digests with the digests of the manifest.Type: GrantFiled: November 3, 1999Date of Patent: June 8, 2004Assignee: Intel CorporationInventors: Keen W. Chan, Nai-Chi M. Chu
-
Publication number: 20040103286Abstract: A method of validating an encrypted message comprises:Type: ApplicationFiled: November 17, 2003Publication date: May 27, 2004Inventors: Felix Egmont Geiringer, Daniel Shelton
-
Patent number: 6742121Abstract: In a system for authenticating a downloaded software object, a technique is provided to determine whether a failed authentication resulted from a suspect downloaded object or a suspect signature for the downloaded object which was communicated separately. A secret compact transformation function that operates on the signature is used to generate a value indicative of the signature at the software object transmission facility. The inverse function is used at the user terminal, such as a television set-top box, which receives the downloaded software object. Multiple transmission of the value can be provided for redundancy. The system is particularly useful in analyzing actual or attempted attacks on the security of the software object download scheme.Type: GrantFiled: September 2, 1999Date of Patent: May 25, 2004Assignee: General Instrument CorporationInventor: Reem Safadi
-
Patent number: 6728879Abstract: A transaction processing system writes log records containing transaction information into a log file in blocks of multiple disk sectors in size. The system writes a cryptographic hash result of the log block's data into a header portion of the log block. The system uses the cryptographic hash result to identify an active run of the log blocks that contains current log records of the transaction processing system. The system truncates a prefix of log blocks from the active run by modifying a part of the log block so as to invalidate the written cryptographic hash result of the log block.Type: GrantFiled: June 2, 1999Date of Patent: April 27, 2004Assignee: Microsoft CorporationInventor: Robert G. Atkinson
-
Publication number: 20040078576Abstract: A pseudo-random number generator comprises:Type: ApplicationFiled: November 17, 2003Publication date: April 22, 2004Inventor: Felix Egmont Geitinger
-
Publication number: 20040059926Abstract: An electronic device has a plurality of selectable capabilities. The capabilities may include CPU speed, NIC speed, various protocols, or, in general, any parameters, characteristics or features which a user might desire to have in the electronic device. The device receives a key, such as from an external licensing authority, and the key specifies which capabilities the device should use to configure itself. The user may have to pay the licensing authority for the key. The electronic device thus can be configured into any one of a plurality of capabilities without having to change any hardware—the user simply purchases a key commensurate with a capability desired by the user.Type: ApplicationFiled: September 20, 2002Publication date: March 25, 2004Applicant: Compaq Information Technology Group, L.P.Inventors: Michael F. Angelo, B. Tod Cox, David L. Kasperson
-
Publication number: 20040059925Abstract: A secure memory device which can be used for multi-application smart cards for secure identification in data transfer, or for component verification in a computer system, without the requirement of an internal microprocessor. The secure memory device features a dual authentication protocol in which the memory and host authenticate each other. The secure memory device also includes an encrypted password feature, as well as using stream encryption to encrypt the data.Type: ApplicationFiled: September 20, 2002Publication date: March 25, 2004Inventors: Jean P. Benhammou, Vincent C. Colnot, David J. Moore
-
Patent number: 6711680Abstract: A method and system for generating messages from which it can be verified that a variable does not exceed a predetermined limit. The message can be a postal indicium. A message originator, which can be a postage metering system, receives a message in the form R−k(T), where R is a trapdoor function, K is an integer equal to the limit, and T is a plain text, from a data processing center which maintains the inverse function R−1 in secrecy. The message originator computes Sm=Rm(R−k(T), where m is a current value of the variable, and incorporates Sm into the message. A verifier verifies that m<K by confirming that Rk−m(Sm)=T. The verifier cannot compute Rk−m(Sm) for m<K since it does not have R−1. For the same reason the originator cannot compute R−k′(T), k′>K, from R−k(T).Type: GrantFiled: December 9, 1999Date of Patent: March 23, 2004Assignee: Pitney Bowes Inc.Inventor: Robert A Cordery
-
Publication number: 20040054911Abstract: Mobile terminal having virus resistant security module architecture. An embedded security module can control the presentation of information on a display by controlling access to display memory. In some embodiments, the security module is also provided with an interface to enable it to handle user input function as well. In this way, the presentation of transaction information and receipt of user input can be substantially isolated from the main, control microprocessor of the terminal for enhanced security, especially protection against resident viruses. In addition, the security module can copy display data into the authentication and/or authorization message that is returned by the terminal to the base station. The return of the display data provides an extra, secure confirmation of the transaction.Type: ApplicationFiled: August 30, 2002Publication date: March 18, 2004Inventors: Sandeep Chennakeshu, William O. Camp
-
Publication number: 20040054912Abstract: A header object for a data file is comprised of sub-objects which specify properties of the data stream and contains information needed to properly verify and interpret the information within the data object. In order to allow the protection of any set of sub-objects without requiring that the sub-objects follow any specific ordering, a new sub-object is introduced which includes region specifiers identifying regions within sub-objects and verification information for those regions. This new sub-object in the header object allows the modification of non-protected regions and reorganization of sub-objects in a header without invalidating verification information.Type: ApplicationFiled: September 4, 2002Publication date: March 18, 2004Inventors: Daniel Adent, Cory West, Pratul Dublish, Clifford P. Strom, Brian D. Crites
-
Publication number: 20040054925Abstract: Protecting a host network from a flood-type denial of service attack by performing statistical analysis of data packets in the network. The statistical analysis comprises comparing evaluated items in the data packets to threshold values and detecting the attack when the statistical items exceed the threshold value. A countermeasure can be initiated to protect the host network from the attack.Type: ApplicationFiled: September 13, 2002Publication date: March 18, 2004Applicant: Cyber Operations, LLCInventors: James K. Etheridge, Richard N. Anton
-
Publication number: 20040054907Abstract: A computing platform (10) protects system firmware (30) using a manufacturer certificate (36). The manufacturer certificate binds the system firmware (30) to the particular computing platform (10). The manufacturer certificate may also store configuration parameters and device identification numbers. A secure run-time platform data checker (200) and a secure run-time checker (202) check the system firmware during operation of the computing platform (10) to ensure that the system firmware (30) or information in the manufacturer certificate (36) has not been altered. Application software files (32) and data files (34) are bound to the particular computing device (10) by a platform certificate (38). A key generator may be used to generate a random key and an encrypted key may be generated by encrypting the random key using a secret identification number associated with the particular computing platform (10). Only the encrypted key is stored in the platform certificate (36).Type: ApplicationFiled: July 14, 2003Publication date: March 18, 2004Inventors: Alain Chateau, Jerome Azema, Constantin Haidamous
-
Publication number: 20040049682Abstract: A method and system for efficiently retrieving secured data by securely pre-processing provided access information, provides data store security based on only a single piece of access information, which is generally public, such as the proper name of a business or individual that is used to retrieve mailing address information. The access information is hashed for access to a secured data store and efficient access and low data storage for permutations of input access information are provided by verifying the presence of an entry for the hashed access information in a look-up table. If an entry is found, the data store is accessed using the hashed access information, but if an entry is not found, another look-up table corresponding to another information type may be tried or the input access information permuted and retried.Type: ApplicationFiled: June 11, 2003Publication date: March 11, 2004Inventors: James D. Wilson, Robert F. Snapp, David J. Payne, Edgar H. Gillock
-
Publication number: 20040044899Abstract: One embodiment of the present invention provides a system that facilitates uploading content from a client to a server. Upon receiving content, the client divides the content into smaller data-blocks of a predetermined size. Once the content has been divided, the client computes a codeword for each data-bock. Next, the client computes a composite codeword for the set of codewords by computing a function of the set of codewords. The client also computes a content identifier for the content to differentiate the content from other content. Once this is done, the client sends the composite codeword and the content identifier to the server, and receives a response from the server indicating whether or not the content is present on the server. If the content is not present on the server, the client sends the content to the server.Type: ApplicationFiled: August 27, 2002Publication date: March 4, 2004Inventor: Bruce Gaya
-
Publication number: 20040034781Abstract: A technique for identifying digital object using a digital watermark. The technique includes the steps of encrypting a message derived from source data on the digital object, to obtain an encrypted message digest (S); deriving a watermark from the encrypted message digest (S); and incorporating the watermark into the source data. The encryption is preferably done with a public key encryption system. The message to be encrypted can be obtained via performing a hash function on the source data on the digital object to obtain a message digest (M). The message digest (M) is the message encrypted with the signature encryption key to obtain the encrypted message digest (S). The watermark is resistant to cropping, scaling, and truncation.Type: ApplicationFiled: August 7, 2003Publication date: February 19, 2004Inventor: Balas K. Natarajan
-
Publication number: 20040030886Abstract: In a security system having wireless transmitters, a wireless receiver module, and a control panel processing signals sent from the transmitters to the receiver module, the present invention is a method of prefiltering the received wireless signals by first generating a prefiltering map by the control panel. For each of the transmitters in the security system, an algorithm such as a hashing function is performed on the identification number of each transmitter enrolled in the system with the control panel. The results of the algorithm are stored in a prefiltering map, which is then sent to the receiver module(s). For each wireless message received from a transmitter, the receiver module extracts from the message the identification number of the transmitter that transmitted the message. The receiver module then performs the algorithm on the extracted identification number, and then compares the result against the prefiltering map.Type: ApplicationFiled: August 7, 2002Publication date: February 12, 2004Inventor: Richard H. Hinkson
-
Patent number: 6688983Abstract: A client computer, server computer, network ranking system, network ranking method, task processing method and recording medium is provided allowing even experienced players to keep a feeling of tension and allowing even beginners to have chances to be ranked high. It is possible to set to only one the number of times the play result of a computer game issued as a task from the server computer 14 to each client computer 10, etc. can be registered for one day. This allows even experienced players to experience a feeling of tension that no retry is possible. On the other hand, this also allows beginners to maintain their interest in the computer game because their play results, however low they may be, also have chances to be ranked high.Type: GrantFiled: March 27, 2001Date of Patent: February 10, 2004Assignee: Namco, Ltd.Inventor: Hideo Yoshizawa
-
Publication number: 20040025026Abstract: A method for generating a password that produces a different password for each system from a single password provided by a user. The present techniques enable users to remember one password string from which appropriate system-specific password strings are derived. A system according to the present teachings obtains a user password, generates a combined password by combining the user password with a system name for a system to be accessed, and then generates a system-specific password for the system to be accessed from the combined password using a one-way hash that conforms to a well-defined specification.Type: ApplicationFiled: August 2, 2002Publication date: February 5, 2004Inventors: Alan H. Karp, Daryl T. Poe
-
Publication number: 20040025034Abstract: In a method of publishing creative content to at least one local digital display device, a first unit of the creative content is stored on a first portable digital storage medium in an encrypted format. The digital replication is encrypted with a selected one of a plurality of private encryption keys. The first portable digital storage medium is transferred to the local digital display device. A preselected public key is entered into the local digital display device. The preselected public key corresponds to the selected one of the plurality of private encryption keys. At least a portion of the first unit of the creative content is decrypted by employing the public encryption key using a public key/private key decryption algorithm. The portion of the creative content is displayed on the local digital display device.Type: ApplicationFiled: March 11, 2003Publication date: February 5, 2004Inventors: Mark A. Alessi, Alberto Gabriel Mendoza Padial, HL Courtland Whited, Jennifer Phelan Hernandez, James A. Stikeleather
-
Publication number: 20040025019Abstract: Cryptographic communication system including a sender terminal for encrypting and transmitting a message, a recipient terminal for receiving and decrypting the encrypted message, an agent terminal for decrypting the message in place of the recipient terminal, and a conversion server for supporting the agent terminal to decrypt the message. The sender terminal encrypts the message using a public key of the recipient terminal. Using a public key of the conversion server, a predetermined restricted condition, and a secret key for decryption of the message, the recipient terminal generates a delegation key allowing decryption of the message under the restricted condition and passes the delegation key to the agent terminal. The conversion server validates a power of the agent terminal to decrypt the message based on the information contained in the delegation key from the agent terminal. The agent terminal then decrypts the message with validation of the conversion server.Type: ApplicationFiled: June 3, 2003Publication date: February 5, 2004Applicant: International Business Machines CorporationInventors: Yuji Watanabe, Masayuki Numao
-
Publication number: 20040019793Abstract: An encryption apparatus performs high-speed and secure signature creation and verification. In the encryption apparatus, at least a shift register group composed of shift registers for retaining values for arithmetic operations for generating a hash value for use in public-key-cryptosystem encryption processing, and shift registers for capturing a resultant hash value, and a shift register group composed of shift registers for retaining values for arithmetic operations for performing public-key-cryptosystem encryption processing and shift registers for capturing an arithmetic result are used for each other. Hardware components to be operated are changed in a time-sharing manner in accordance with a processing mode.Type: ApplicationFiled: July 15, 2003Publication date: January 29, 2004Applicant: Sony CorporationInventor: Hideo Sato
-
Publication number: 20040015697Abstract: What has been disclosed is a system and method for authentication of JPEG image data prior to transmission to an intended recipient which enables the recipient to ascertain whether the received image file originated from a known identified source or whether the contents of the file have been altered in some fashion prior to receipt. In accordance to the present invention, to encode verification information a unique hashing function is derived from a first section of image data contained in the JPEG compressed image in such a way that any changes subsequently made to said first section of image data would be reflected in a different hashing function being derived therefrom. An integrity checking number is produced from the first section's derived hashing function. The integrity checking number is subsequently encrypted into a signature string. The signature string is then embedded into a next section of the image data. The process is repeated until all sections of image data have been processed.Type: ApplicationFiled: July 22, 2002Publication date: January 22, 2004Applicant: Xerox CorporationInventor: Ricardo L. de Queiroz
-
Publication number: 20040010683Abstract: A method and system for authenticating a message is described, in which the message contains a network address, at least a portion of which is a digital fingerprint. Embedded in the message is data, such as a code, that indicates the size of the digital fingerprint. A device receiving the message uses the size data and, for example, the public key of the sender to attempt to reproduce the digital fingerprint. If successful, the device receiving the message verifies the identity of the sender.Type: ApplicationFiled: September 12, 2002Publication date: January 15, 2004Applicant: Microsoft CorporationInventor: Christian Huitema
-
Publication number: 20040006701Abstract: A set of procedures is described which permit signing digital audio recordings by means of private keys, and which permit later authentication of such recordings, for example in a courtroom, in a way that is well suited to comprehension by non-technical personnel. Importantly, the explanation leading to such comprehension does not enable the creation of tampered recordings that would appear to be authentic. The procedures call for signing by trusted and disinterested third parties and for distributing hardware tokens storing various keys and key pairs. The format of the digital audio recordings permits playback on conventional equipment and also on equipment having cryptographic capabilities for authentication.Type: ApplicationFiled: April 7, 2003Publication date: January 8, 2004Applicant: ADVANCED DECISIONS INC.Inventors: Roman Kresina, Michael Landino
-
Publication number: 20040001595Abstract: A system and method are described supporting secure implementations of 3DES and other strong cryptographic algorithms. A secure key block having control, key, and hash fields safely stores or transmits keys in insecure or hostile environments. The control field provides attribute information such as the manner of using a key, the algorithm to be implemented, the mode of use, and the exportability of the key. A hash algorithm is applied across the key and control for generating a hash field that cryptographically ties the control and key fields together. Improved security is provided because tampering with any portion of the key block results in an invalid key block. The work factor associated with any manner of attack is sufficient to maintain a high level of security consistent with the large keys and strong cryptographic algorithms supported.Type: ApplicationFiled: June 28, 2002Publication date: January 1, 2004Applicant: Compaq Information technologies Group, L.P.Inventors: Dale W. Hopkins, Susan Langford, Larry Hines, Ching-Hsuan Chen
-
Publication number: 20030233570Abstract: One or more portions of a digital object are authenticated using verification information contained in a unique persistent identifier for the object as a whole.Type: ApplicationFiled: April 2, 2003Publication date: December 18, 2003Inventors: Robert E. Kahn, Patrice Lyons