Message Digest Travels With Message Patents (Class 713/181)
  • Patent number: 8332645
    Abstract: A method and apparatus for repeated communication sessions between a sender (e.g., RFID tag) and a receiver (RFID reader) that employs a proactive information security scheme is based on the assumption that the information exchanged during at least one of every n successive communication sessions is not exposed to an adversary. The sender and the receiver maintain a vector of n entries that is repeatedly refreshed by pairwise XORING entries, with a new vector of n entries that is randomly chosen by the sender and sent to the receiver as a part of each communication session. Also, a computational secure scheme based on the information secure scheme is employed to ensure that even in the case that the adversary listens to all the information exchanges, the communication between the sender and the receiver is secure. In particular, the scheme can be used in the domain of remote controls (e.g., for cars).
    Type: Grant
    Filed: September 11, 2007
    Date of Patent: December 11, 2012
    Assignees: Yeda Research and Development Co. Ltd, Sami Shamoon College of Engineering, Shlomi Dolev
    Inventors: Shlomi Dolev, Marina Kopeetsky, Adi Shamir
  • Patent number: 8332950
    Abstract: A product mark including a public key certificate issued with respect to an information-recording-medium manufacturing entity or information-recording-medium manufacturing equipment, and an encrypted volume ID calculated by computation based on a product-mark-associated value such as a hash value generated on the basis of the product mark, and a volume ID as an identifier set with respect to a given set of discs to be manufactured, are generated. The product mark and the encrypted volume ID are set as information for generating a key used for decryption of encrypted content, and recorded onto a disc by a reflective-film-removal recording method. Due to this configuration, the product mark and the encrypted volume ID as key generating information cannot be read from a pirated disc produced by physically copying a pit pattern on the basis of a legitimate commercial disc, thereby making it possible to prevent unauthorized reproduction or use of content.
    Type: Grant
    Filed: March 1, 2006
    Date of Patent: December 11, 2012
    Assignee: Sony Corporation
    Inventors: Satoshi Kitani, Seiji Kobayashi
  • Patent number: 8327148
    Abstract: A mobile system, a service system, and a key authentication method to manage a key in a local wireless communication are provided. The mobile system and the service system may generate a hash value with respect to a public key of the service system using an identical hash function, and output a result corresponding to the hash value.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: December 4, 2012
    Assignee: Samsung Electronics Co., Ltd.
    Inventors: Eunah Kim, Jeong Hyun Yi, Won Keun Kong
  • Patent number: 8327131
    Abstract: A target machine can be verified prior to being granted access to a resource on a network by interrogating and analyzing digests of various elements of the target machine. The digests can be collected into an integrity report and provided to a Trust Scoring Service. The Trust Scoring Service receives the integrity report and compares the digests with signatures stored in a signature database. A trust score certificate can then be issued to the target machine. The Trust Scoring Service can include a Score Evaluation Server which can interact with a Kerberos Authentication Server and a Ticket Granting Server to embed a trust score within a Kerberos Ticket to enforce a richer set of access policies. The integrity of a web server can be verified and a Trust Score Certificate Logo can be displayed on a corresponding home page of a merchant. By clicking on the Trust Score Certificate Logo, a user can verify the integrity of the merchant's web servers prior to completing a transaction with the merchant.
    Type: Grant
    Filed: July 11, 2007
    Date of Patent: December 4, 2012
    Assignee: Harris Corporation
    Inventors: Thomas Parasu Hardjono, David Maurits Bleckmann, William Wyatt Starnes, Bradley Douglas Andersen
  • Patent number: 8327125
    Abstract: In a method for securing content in a system containing a security processor configured to control access to the content by a main processor, in which main processor being configured to send heartbeats to the security processor, a determination as to whether at least one heartbeat was received within a predicted time interval is made and in response to a determination that at least one heartbeat was not received with the predicted time interval, access to the content by the main processor is ceased.
    Type: Grant
    Filed: December 28, 2009
    Date of Patent: December 4, 2012
    Assignee: General Instrument Corporation
    Inventors: Jiang Zhang, Kun-Pei P. Chen, Alexander Medvinsky
  • Patent number: 8327147
    Abstract: The present invention relates electronic receipts. There is provided a method for generating an electronic receipt in a communication system providing a public key infrastructure, the method comprising the steps of receiving by a second party a request message from a first party, the request message comprising a transaction request and a first public key based on a secret owned by the first party and wherein the secret is associated with at least the secret of a further public key of the first party, electronically signing at least part of the request message with a second public key assigned to the second party to issue the electronic receipt, and providing the electronic receipt to the first party.
    Type: Grant
    Filed: August 20, 2009
    Date of Patent: December 4, 2012
    Assignee: International Business Machines Corporation
    Inventors: Elsie van Herrewegen, Jan Camenisch
  • Patent number: 8321680
    Abstract: Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
    Type: Grant
    Filed: December 9, 2010
    Date of Patent: November 27, 2012
    Assignee: QUALCOMM Incorporated
    Inventors: Alexander Gantman, Aram Perez, Gregory G. Rose, Laurence G. Lundblade, Matthew W. Hohfeld, Michael W. Paddon, Oliver Michaelis, Ricardo Jorge Lopez
  • Patent number: 8321949
    Abstract: In general, one aspect of the subject matter described in this specification can be embodied in a system that includes a network-based information server system; and a computer operable to interact with a user interface device and operable to perform operations including: receiving from the network-based information server system status information corresponding to software applications, the status information including black-list information and phoenix-list information; updating a local cache, retained by the computer, with the status information received from the network-based information server system; generating an identifier for a software application, using a digital certificate and a hash value, when the software application is launched on the computer; checking the identifier for the software application against the status information; and notifying a user of the computer when a match is found during the checking.
    Type: Grant
    Filed: August 29, 2008
    Date of Patent: November 27, 2012
    Assignee: Adobe Systems Incorporated
    Inventors: Mitch Green, Luis Polanco, James Lewin McGregor, Oliver Goldman
  • Publication number: 20120297199
    Abstract: In accordance with a broad aspect, a method is provided to securely configure a computing device. A configuration indication is received into the computing device, including receiving a digital signature generated based on the configuration indication. Generation of the digital signature accounts for a unique identifier nominally associated with the computing device. The received configuration indication may be verified to be authentic including processing the unique identifier, the received configuration indication and the received digital signature. The computing device may be operated or interoperated with in accordance with the received configuration indication. In one example, a service interoperates with the computing device. For example, the computing device may be a portable media player, and the service may provide media to the computing device based on a capacity indication of the configuration indication.
    Type: Application
    Filed: June 22, 2012
    Publication date: November 22, 2012
    Inventors: Christopher R. Wysocki, Alan Ward
  • Patent number: 8316235
    Abstract: A method for the manipulation-proof transmission of data from a transmitter to a receiver, a test part being generated in the transmitter from the data using a secret key and communicated together with the data to the receiver, where a verification test part is generated from the received data using the same secret key and is compared to the received test part. Before the generation of the test part, the data are nonlinearly compressed using at least one feedback shift register. In addition, a device for the manipulation-proof transmission of data.
    Type: Grant
    Filed: February 5, 2010
    Date of Patent: November 20, 2012
    Assignee: Robert Bosch GmbH
    Inventors: Eberhard Boehl, Michael Boehl, Paulius Duplys
  • Patent number: 8312278
    Abstract: An access authentication method applying to IBSS network involves the following steps of: 1) performing authentication role configuration for network entities; 2) authenticating an authentication entity and a request entity that have been performed the authentication role configuration via an authentication protocol; and 3) after finishing the authentication, the authentication entity and the request entity perform the key negotiation, wherein, the message integrity check field and protocol synchronization lock-in field are added in a key negotiation message. The access authentication method applying to IBSS network provided by the invention has the advantages of the better safeness and the higher execution efficiency.
    Type: Grant
    Filed: October 30, 2008
    Date of Patent: November 13, 2012
    Assignee: China Iwncomm Co., Ltd.
    Inventors: Manxia Tie, Jun Cao, Xiaolong Lai, Jiandong Li, Liaojun Pang, Zhenhai Huang
  • Patent number: 8312551
    Abstract: A method is provided for tamper detection of a transmitted signal. The method is comprised of generating a first digital data signal having a first data rate. The method is also comprised of generating a second digital data signal having a second data rate. The method is further comprised of concurrently transmitting the first digital data signal at a first carrier frequency using a first modulation format and the second digital data signal at a second carrier frequency using a second modulation format. The method includes selecting the second carrier frequency and a bandwidth of the second digital data signal so that the second digital data signal is contained within a frequency spectrum defined by a bandwidth of the first digital data signal. The method also includes verifying an integrity of the first digital data signal at a remote receiver based on defection at the remote receiver of the second digital data signal. A system (100) is also provided for generating a tamper-protected transmitted signal.
    Type: Grant
    Filed: February 15, 2007
    Date of Patent: November 13, 2012
    Assignee: Harris Corporation
    Inventor: David B. Chester
  • Publication number: 20120284524
    Abstract: A system and method for data encryption/decryption and authentication using a relatively long security sequence number (SSN). The SSN is used both to encrypt data and to compute a message integrity code (MIC). However, the entire SSN need not be transmitted from sender device to receiver device. For example, only the lowest order octet of the SSN is transmitted to the receiver device. The receiver device computes the entire SSN based on the received portion.
    Type: Application
    Filed: May 3, 2012
    Publication date: November 8, 2012
    Applicant: TEXAS INSTRUMENTS INCORPORATED
    Inventor: Jin-Meng HO
  • Publication number: 20120284523
    Abstract: An improved MAC aggregation technique is disclosed that yields an aggregate MAC much shorter than the concatenation of constituent MACs while achieving improved resilience to denial-of-service (DoS) attacks. The aggregate MAC is constructed in a manner wherein upon instance of channel impairments or malicious attack (e.g., from a rogue node or man-in-the-middle attacker), only a portion of the aggregate MAC will include corrupted data, at least a portion of the aggregate MAC thereby including valid verifiable data. A source of corruption of the aggregate MAC may be ascertained based on indicia of which constituent MACs are included in the valid portion; and constituent MACs that are wholly included in the valid portion may be declared valid.
    Type: Application
    Filed: September 20, 2011
    Publication date: November 8, 2012
    Applicant: Alcatel-Lucent USA Inc.
    Inventors: Vladimir Y. Kolesnikov, Wonsuck Lee
  • Publication number: 20120284525
    Abstract: A method and apparatus for cross validation of data using multiple subsystems are described. According to one embodiment of the invention, a computer comprises a first subsystem and a second subsystem; and a memory, the memory comprising a first memory region and a second memory region, the first memory region being associated with the first subsystem and a second memory region being associated with the second subsystem; upon start up of the computer, the first subsystem to validate the second memory region and the second subsystem to validate the first memory region.
    Type: Application
    Filed: July 16, 2012
    Publication date: November 8, 2012
    Inventors: David Durham, Travis Schluessler, Raj Yavatkar, Vincent Zimmer, Carey Smith
  • Publication number: 20120284522
    Abstract: There is provided a method of securing multimedia data for streaming over a network comprising receiving the multimedia data from a server, transforming the multimedia data into secure multimedia data using a security key associated with the multimedia data, storing the security key associated with the multimedia data, streaming the secure multimedia data to the destination server. The method further comprises receiving decoding solution requests associated with the multimedia data from one or more multimedia players for playing the multimedia data and transmitting the security key associated with the multimedia data to each of the multimedia players.
    Type: Application
    Filed: May 6, 2011
    Publication date: November 8, 2012
    Applicant: DISNEY ENTERPRISES, INC.
    Inventors: Jason E. Lewis, Ryan D. Christianson
  • Publication number: 20120278629
    Abstract: Systems and methods for providing a battery module 110 with secure identity information and authentication of the identity of the battery 110 by a host 120. In one embodiment, the system for providing a battery module with secure identity information includes: (1) a tamper resistant processing environment 200 located within the battery module 110 and (2) a key generator configured to generate a key based on an identity of the battery module 110 and cause the key to be stored within the tamper resistant processing environment 200.
    Type: Application
    Filed: July 11, 2012
    Publication date: November 1, 2012
    Applicant: TEXAS INSTRUMENTS INCORPORATED
    Inventors: Narendar Shankar, Erdal Paksoy, Todd Vanyo
  • Patent number: 8301896
    Abstract: Multi-level file digests for electronic files are disclosed. A top level digest represents a single digest for the associated electronic file. Lower level digests represent digests for portions of the associated electronic file. The top level digest is derived from the lower level digests. The top level digest is useful for facilitating rapid comparison to determine whether electronic files are the same. In one embodiment, electronic files are encrypted with a block encryption scheme, and digests are efficiently calculated and stored on a block-by-block basis. Advantageously, when modifications to an encrypted electronic file occurs, only those modified blocks need to be processed to undergo decryption and re-encryption to determine the appropriate digest.
    Type: Grant
    Filed: April 23, 2010
    Date of Patent: October 30, 2012
    Assignee: Guardian Data Storage, LLC
    Inventors: Michael Frederick Kenrich, Yevgeniy Gutnik
  • Patent number: 8291471
    Abstract: Methods, computer program products and systems for protecting a document from access by one or more users based on one or more document access rules. In one embodiment, the method includes creating a data set representing the one or more document access rules, storing the document and the associated data set, determining and storing a key for opening the document when one or more document access rules from the data set are met, and releasing the key to open the document to one or more users in response to a request from a user which meets one or more document access rules, thereby enabling the user to access the document.
    Type: Grant
    Filed: April 6, 2009
    Date of Patent: October 16, 2012
    Assignee: International Business Machines Corporation
    Inventors: Sandro Piccinini, Luigi Pichetti, Marco Secchi, Antonio Secomandi
  • Patent number: 8285993
    Abstract: A method for distributing a shared secret key among a plurality of nodes is described. Each node establishes a secret key, the number of nodes being more than two nodes. A node distributes by a ring protocol executing over computer network connections an encrypted version of the secret key of each node to other nodes of the plurality of nodes. Each node decrypts the secret keys of other nodes so that each node has the secret key of other nodes. Each node combines the secret keys of other nodes to form a shared secret key available to other nodes.
    Type: Grant
    Filed: April 22, 2011
    Date of Patent: October 9, 2012
    Assignee: NetApp, Inc.
    Inventors: Ananthan Subramanian, Robert Jan Sussland, Lawrence Wen-Hao Chang
  • Patent number: 8285999
    Abstract: With the widespread use of the distributed systems comes the need to secure such systems against a wide variety of threats. Recent security mechanisms are grossly inadequate in authenticating the program executions at the clients or servers, as the clients, servers and the executing programs themselves can be compromised after the clients and servers pass the authentication phase. A generic framework is provided for authenticating remote executions on a potentially untrusted remote server—essentially validating that what is executed at the server on behalf of the client is actually the intended program. Details of a prototype Linux implementation are also described, along with some optimization techniques for reducing the run-time overhead of the present scheme. The performance overhead of this technique varies generally from 7% to 24% for most benchmarks, as seen from the actual remote execution of SPEC benchmarks.
    Type: Grant
    Filed: December 6, 2009
    Date of Patent: October 9, 2012
    Assignee: The Research Foundation of State University of New York
    Inventors: Kanad Ghose, Erdem Aktas
  • Patent number: 8281120
    Abstract: Sending signed e-mail messages. An output data stream is created for streaming a signed e-mail message, and streamed attachment data is read. In response to receiving a portion of the read streamed attachment data, the received portion of the attachment data is digested to generate a digest value, and the received portion of the attachment data is sent to a mail server via the output data stream. The received portion of the attachment data is smaller than the size of the attachment data. The digest value is updated as additional portions of the streamed attachment data are received and digested. In response to sending all attachment data to the mail server, a signer generates the signature data by signing the digest value using a signer's private key, and the generated signature data is sent to the mail server via the output stream.
    Type: Grant
    Filed: August 14, 2009
    Date of Patent: October 2, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yeongtau Louis Tsao
  • Patent number: 8275126
    Abstract: An apparatus for hash cryptography has a hardware structure that is capable of providing both secure hash algorithm (SHA)-1 hash calculation and SHA-256 hash calculation. The apparatus for hash cryptography generates a plurality of first message data corresponding to a plurality of first rounds when the SHA-1 hash calculation is performed and generates a plurality of second message data corresponding to a plurality of second rounds when the SHA-256 hash calculation is performed by using one memory, one first register, one XOR calculator, and one OR calculator, calculates a message digest by the SHA-1 hash calculation by using the plurality of first message data when the SHA-1 hash calculation is performed, and calculates a message digest by the SHA-256 by using the plurality of second message data when the SHA-256 hash calculation is performed.
    Type: Grant
    Filed: September 25, 2009
    Date of Patent: September 25, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Moo Seop Kim, Young Soo Park, Ji Man Park, Young Sae Kim, Hong Il Ju, Sung Ik Jun
  • Patent number: 8271804
    Abstract: An information processing device creates a hash value from an event log every time the event occurs. The information processing device generates a digital signature by encrypting the hash value with its own private key. The device transmits the signature-bound event log obtained by binding the digital signature with the event log to a log management apparatus. The log management apparatus decrypts the hash value from the event log of the received signature-bound log information using a device public key. The apparatus also generates a new hash value from the event log verifies the coincidence of the decrypted hash value and the new hash value, and authenticates signature-bound event logs for which this coincidence has been verified. The apparatus stores signature-bound event logs that have been authenticated. Every time an event occurs, the device transmits an event log bound with a digital signature that is created using its private key.
    Type: Grant
    Filed: September 17, 2008
    Date of Patent: September 18, 2012
    Assignee: Brother Kogyo Kabushiki Kaisha
    Inventor: Yasuhiro Kudo
  • Patent number: 8272060
    Abstract: A system (200) detects transmission of potentially malicious packets. The system (200) receives, or otherwise observes, packets and generates hash values based on variable-sized blocks of the packets. The system (200) then compares the generated hash values to hash values associated with prior packets. The system (200) determines that one of the received packets is a potentially malicious packet when one or more of the generated hash values associated with the received packet match one or more of the hash values associated with the prior packets.
    Type: Grant
    Filed: April 18, 2010
    Date of Patent: September 18, 2012
    Assignee: Stragent, LLC
    Inventors: Walter Clark Milliken, William Timothy Strayer, Stephen Douglas Milligan, Luis Sanchez, Craig Partridge
  • Patent number: 8266440
    Abstract: An information processing apparatus of the present invention converts user authentication information based on a second one-way function into a second converted value if authentication with a first converted value obtained by converting the user authentication information based on the first one-way function is successful.
    Type: Grant
    Filed: October 3, 2008
    Date of Patent: September 11, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Yuu Tamura
  • Patent number: 8266676
    Abstract: A client platform can be verified prior to being granted access to a resource or service on a network by validating individual hardware and software components of the client platform. Digests are generated for the components of the client platform. The digests can be collected into an integrity report. An authenticator entity receives the integrity report and compares the digests with digests stored in either a local signature database, a global signature database in an integrity authority, or both. Alternatively, the digests can be collected and stored on a portable digest-collector dongle. Once digests are either validated or invalidated, an overall integrity/trust score can be generated. She overall integrity/trust score can be used to determine whether the client platform should be granted access to the resource on the network using a policy.
    Type: Grant
    Filed: December 8, 2006
    Date of Patent: September 11, 2012
    Assignee: Harris Corporation
    Inventors: Thomas Parasu Hardjono, David Maurits Bleckmann, William Wyatt Starnes, Bradley Douglas Andersen
  • Patent number: 8261327
    Abstract: With the proliferation of wireless devices, seamless authentication of devices at distributed locations (e.g., so-called Wi-Fi hotspots) may be essential for convenient use of various devices at these locations. Previous methods for authentication relied on an account-based method using a username and a password inputted from a user. This method may be awkward for mass-distribution of devices. Various embodiments disclosed may provide an authorization client that communicates with one or more servers that relies on client software and message authentication codes for authorization of network access.
    Type: Grant
    Filed: July 14, 2008
    Date of Patent: September 4, 2012
    Assignee: Wayport, Inc.
    Inventors: James D. Keeler, John R. Melendez
  • Patent number: 8261085
    Abstract: According to some implementations methods, apparatus and systems are provided involving the use of processors having at least one core with a security component, the security component adapted to read and verify data within data blocks stored in a L1 instruction cache memory and to allow the execution of data block instructions in the core only upon the instructions being verified by the use of a cryptographic algorithm.
    Type: Grant
    Filed: September 26, 2011
    Date of Patent: September 4, 2012
    Assignee: Media Patents, S.L.
    Inventor: Álvaro Fernández Gutiérrez
  • Patent number: 8261084
    Abstract: A data processing device for playing back a digital work reduces the processing load involved in verification by using only a predetermined number of encrypted units selected randomly from multiple encrypted units constituting encrypted contents recorded on a DVD. In addition, the data processing device improves the accuracy of detecting unauthorized contents by randomly selecting a predetermined number of encrypted units every time the verification is performed.
    Type: Grant
    Filed: January 21, 2011
    Date of Patent: September 4, 2012
    Assignee: Panasonic Corporation
    Inventors: Masao Nonaka, Yuichi Futa, Toshihisa Nakano, Kaoru Yokota, Motoji Ohmori, Masaya Miyazaki, Masaya Yamamoto, Kaoru Murase, Senichi Onoda
  • Patent number: 8255692
    Abstract: Field devices used to measure process parameters can also function as a data historian by storing process data and associated time stamps. In response to a request for stored process data, the field device uses a cipher and a secret method to generate an encrypted validation string that is provided along with unencrypted information including the process data and time stamps. A validation service that maintains a secure database of field devices and their associated ciphers and secret methods can validate the unencrypted information by using the validation string.
    Type: Grant
    Filed: July 11, 2008
    Date of Patent: August 28, 2012
    Assignee: Rosemount Inc.
    Inventors: Scott Gregory Holm-Hansen, Dirk Willy Bauschke, Scott Andrew Johansen, Khoi Minh Nguyen
  • Patent number: 8255703
    Abstract: A method for performing a hash operation, including providing an atomic hash instruction that directs a microprocessor to perform a the hash operation and to indicate whether the hash operation has been interrupted by an interrupting event; translating the atomic hash instruction into first and second micro instructions; via a hash unit, first executing the first micro instructions to accomplish the hash operation according to the hash mode; and via an integer unit, second executing the second micro instructions in parallel with the first executing to test a bit in a flags register, to update text pointer registers, and to process interrupts during execution of the hash operation. The atomic hash instruction has an opcode field, configured to prescribe the hash operation, and a hash mode field, configured to prescribe that the microprocessor accomplish the hash operation according to a one of a plurality of hash modes.
    Type: Grant
    Filed: January 20, 2011
    Date of Patent: August 28, 2012
    Assignee: VIA Technologies, Inc.
    Inventors: Thomas A. Crispin, G. Glenn Henry, Terry Parks
  • Patent number: 8250475
    Abstract: Icon integrity is managed. A notification for a selected icon is received and a determination is made whether a set of properties exists for the selected icon. Responsive to determining the existence and verification of the authenticity of the set of properties, the computer implemented method analyzes the set of properties to determine permission and authentication and responsive to determining the permission and authentication, allows execution of an executable function associated with the icon.
    Type: Grant
    Filed: December 14, 2007
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Nadeem Malik, Katherine June Pearsall
  • Patent number: 8250288
    Abstract: A flash memory storage system including a controller and a flash memory chip is provided, wherein the controller is disposed with a rewritable non-volatile memory. When the controller writes a security data into the flash memory chip, the controller randomly generates a data token and generates a message digest according to the security data and the data token by using a one-way hash function, wherein the data token and the message digest are respectively stored in the rewritable non-volatile memory and the flash memory chip. Subsequently, when the controller reads the security data from the flash memory chip, the controller determinates whether the security data is falsified according to the data token and the message digest respectively stored in the rewritable non-volatile memory and the flash memory chip. Thereby, the security data in the flash memory chip can be effectively protected.
    Type: Grant
    Filed: January 14, 2009
    Date of Patent: August 21, 2012
    Assignee: Phison Electronics Corp.
    Inventor: Ching-Wen Chang
  • Patent number: 8250627
    Abstract: One embodiment provides a computer-implemented method for transaction authorization within a security service. The computer-implemented method intercepts a request by a security service, wherein a transaction identifier is cached to form a cached transaction identifier, and requests the requester to authenticate to form an authentication request. The computer-implemented method further determines whether the requester was authenticated, and responsive to a determination the requester was authenticated, receives authentication information, including an associated transaction identifier. The request is intercepted and the cached transaction identifier inserted.
    Type: Grant
    Filed: July 28, 2008
    Date of Patent: August 21, 2012
    Assignee: International Business Machines Corporation
    Inventors: Scott Anthony Exton, Benjamin Brewer Harmon, Christopher John Hockings, Paul William Jensen
  • Patent number: 8250369
    Abstract: The invention relates to methods and apparatuses for acquiring a physical measurement, and for creating a cryptographic certification of that measurement, such that its value and time can be verified by a party that was not necessarily present at the measurement. The certified measurement may also include corroborative information for associating the actual physical measurement process with the certified measurement. Such corroborative information may reflect the internal or external state of the measurement certification device, as well as witness identifiers of any persons that may have been present at the measurement acquisition and certification. The certification may include a signal receiver to receive timing signals from a satellite or other external source. The external timing signals may be used to generate the time included in the certified measurement, or could be used to determine the location of the measurement certification device for inclusion in the certified measurement.
    Type: Grant
    Filed: June 24, 2009
    Date of Patent: August 21, 2012
    Assignee: Walker Digital, LLC
    Inventors: Jay S. Walker, Bruce Schneier, James A. Jorasch
  • Patent number: 8250370
    Abstract: A media access control (MAC) security apparatus including an encryption/decryption engine and an authentication engine. The encryption/decryption engine is configured to generate encrypted data based on received packets. The authentication engine is configured to perform authentication in response to the encrypted data. The encryption/decryption engine includes an advanced encryption standard (AES) engine configured to form cryptographic primitives. The AES engine is configured to enter a reduced power consumption state for part of a period during which the encryption/decryption engine is generating encrypted data based on the received packets.
    Type: Grant
    Filed: October 12, 2010
    Date of Patent: August 21, 2012
    Assignee: Marvell International Ltd.
    Inventors: Guy T. Hutchison, Awais B. Nemat
  • Patent number: 8245045
    Abstract: The present description refers in particular to example computer-implemented methods, example computer program products, and example computer systems for automatically generating or verifying a digital signature for a message. The message may be representable in a hierarchical tree structure. An example computer-implemented method may comprise: selecting, from a message MT, a sub-message M to be signed, the sub-message M comprising at least one element; generating a well-formed context CMt for the sub-message M, wherein the well-formed context CMt defines a derivation path to the element in the message MT at a time t, the element being marked [M] in the well-formed context CMt; generating a message digest ?M from the sub-message M and a context digest ?C from the well-formed context CMt; and generating a signature S by applying a secret key SA of a user A to the message digest ?M and to the context digest ?C.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: August 14, 2012
    Assignee: SAP AG
    Inventors: Azzedine Benameur, Smriti Kumar Sinha, Paul El Khoury
  • Patent number: 8245048
    Abstract: An authentication method is disclosed herein. The method includes: by a server, using a Trigger message nonce to generate a Trigger message, and sending the generated Trigger message to a client so that the client can extract the Trigger message nonce; after determining that the Trigger message nonce is valid, using the Trigger message nonce to generate a digest, and authenticating the Trigger message generated by using the Trigger message nonce; after the authentication succeeds, sending a session request to the server indicated by the Trigger message, where the session request carries a session ID. The corresponding system, server and client are disclosed herein. The present invention makes the authentication process more secure through the client and the server based on the DS or DM protocol.
    Type: Grant
    Filed: October 11, 2011
    Date of Patent: August 14, 2012
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xiaoqian Chai, Hongtao Gao, Kepeng Li, Linyi Tian
  • Patent number: 8230229
    Abstract: A system for verifying the security of communications between a set of nodes via a high-bandwidth, insecure communications channel. A number of embodiments are described for enabling authenticated communication between the nodes in an environment wherein there is a high bandwidth Dolev-Yao network amongst the nodes and non-spoofable, low-bandwidth empirical channels between each pair of nodes.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: July 24, 2012
    Assignee: ISIS Innovation Limited
    Inventors: Andrew William Roscoe, Long Hoang Nguyen
  • Patent number: 8230219
    Abstract: Authentication methods are provided that allow for superior security, power consumption, and resource utilization over existing authentication methods. By computing only two hashes of a shared secret password for each protocol run, the methods described in this disclosure dramatically reduce the computational power needed to perform authentication. Similarly, by exchanging these hashes bitwise or piecewise for verification, rather than performing new hashes including each bit of the password separately, the methods described in this disclosure reveal less information about the password being authenticated than existing methods. The methods described in this disclosure also allow for authentication using fewer messages and with lower latency, reducing the amount of operational power used in the authentication process.
    Type: Grant
    Filed: August 12, 2009
    Date of Patent: July 24, 2012
    Assignee: Texas Instruments Incorporated
    Inventor: Jin-Meng Ho
  • Patent number: 8230215
    Abstract: In a vehicle-to-vehicle communication network utilizing PKI security methods to protect communications and in which the PKI encryption utilizes a Certificate Authority having both a private key and a publicly distributed key, a method for allocating multiple certificates for each vehicle which are assigned to each vehicle in the communication network. The method includes the step of assigning a unique secret key k to each vehicle in the communication network. The Certificate Authority then creates a plurality of public key and private key encryption pairs for each vehicle and each encryption pair is associated with an index i. A plurality of certificates are then created with one certificate for each value of the index. A revocation list comprising the secret keys is maintained by the Certificate Authority so that all encryption pairs assigned to a particular vehicle may be revoked by the secret key k corresponding to that vehicle.
    Type: Grant
    Filed: April 11, 2008
    Date of Patent: July 24, 2012
    Assignees: Toyota Motor Engineering & Manufacturing North America, Inc., The Board of Trustees, University of Illinois at Urbana-Champaign
    Inventors: Kenneth P. Laberteaux, Yih-Chun Hu, Jason Haas
  • Patent number: 8225101
    Abstract: A method and apparatus for cross validation of data using multiple subsystems are described. According to one embodiment of the invention, a computer comprises a first subsystem and a second subsystem; and a memory, the memory comprising a first memory region and a second memory region, the first memory region being associated with the first subsystem and a second memory region being associated with the second subsystem; upon start up of the computer, the first subsystem to validate the second memory region and the second subsystem to validate the first memory region.
    Type: Grant
    Filed: July 14, 2009
    Date of Patent: July 17, 2012
    Assignee: Intel Corporation
    Inventors: David Durham, Travis Schluessler, Raj Yavatkar, Vincent Zimmer, Carey Smith
  • Patent number: 8222994
    Abstract: Techniques to provide automatic reminders are described. A mobile computing device may comprise a memo database and a memo application. The memo application may be arranged to set a memo reminder value for a memo, store the memo with the memo reminder value in the memo database, and provide a memo reminder for the memo with the memo reminder value. Other embodiments may be described and claimed.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: July 17, 2012
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventor: Richard Bryan Sagar
  • Patent number: 8225412
    Abstract: If the signatures of all documents in a binder document are verified when the binder document is verified, some types of documents stored in the binder document may affect the result of the verification of the binder document. When verification of a binder is performed, it is determined, for each document in the binder document, whether the document is a verification target document or not. On the basis of the result of verification of a document determined as a verification target, the result of verification of the binder document is outputted.
    Type: Grant
    Filed: May 27, 2008
    Date of Patent: July 17, 2012
    Assignee: Canon Kabushiki Kaisha
    Inventor: Ryutaro Watanabe
  • Patent number: 8223973
    Abstract: Each participant apparatus (103) encrypts a plaintext by using a secret key of secret key cryptography, encrypts the encryption key by a public key, and sends the plaintext and public key to a substitution/decryption apparatus (112). With this processing, the limitation on the length of a ciphertext to be processed can be eliminated. In this invention, a verifiable proof text using a public key by each substitution/decryption apparatus is verified by a verification apparatus (109) by using the public key. If one of a plurality of organizations to decrypt and shuffle ciphertexts has not correctly executed the operation, a third party can specify it and prove that the specified organization is unauthorized.
    Type: Grant
    Filed: January 8, 2010
    Date of Patent: July 17, 2012
    Assignee: NEC Corporation
    Inventors: Jun Furukawa, Kazue Sako
  • Patent number: 8219817
    Abstract: A document verification system and method verifies that a content of two documents match based on comparison of an authentication signature generated from each of the documents. The documents may be electronic text documents and may be transformed representations of each other through imaging, printing or image processing. Authentication signatures can be encrypted to enhance security and identify document sources. An authentication signature can be generated for an entirety or portions of the document. Multiple authentication signatures may be generated for each document for selected document regions. The authentication signature can be stored electronically or in hard copy and can be machine-readable to be automatically interpreted by a machine.
    Type: Grant
    Filed: November 13, 2006
    Date of Patent: July 10, 2012
    Assignee: Dialogic Corporation
    Inventors: James Filreis, Eric Burger
  • Patent number: 8218759
    Abstract: A method for encrypting data includes receiving a block of plaintext for a data set at one or more computers, acquiring a cryptographic key for the data set, generating an initialization vector for the block of plaintext based on the block of plaintext, and encrypting the block of plaintext using the cryptographic key and the initialization vector.
    Type: Grant
    Filed: April 17, 2009
    Date of Patent: July 10, 2012
    Assignee: Oracle America, Inc.
    Inventors: Darren James Moffat, James P. Hughes
  • Patent number: 8218763
    Abstract: A method for electronically storing and retrieving at a later date a true copy of a document stored on a remote storage device comprises: sending a document in electronic format from a document owner's computing device to a store entity for storing the document; generating a digest of the document while the document is at the store entity by applying a hash function to the document; signing the digest electronically with a key while said document is at the store entity; generating a receipt that includes the digest and the key; sending the receipt to the document owner; and verifying, at the document owner's computing device, that the received receipt corresponds to the document sent from the owner's computing device.
    Type: Grant
    Filed: April 22, 2009
    Date of Patent: July 10, 2012
    Assignee: International Business Machines Corporation
    Inventor: John G. Rooney
  • Patent number: 8219804
    Abstract: Techniques are provided for securely managing, using smart cards, the usage of a peripheral device. In one embodiment, both the peripheral device and the smart card have digital certificates and a means for authenticating each other. Each device requires authentication of the other device before access to the device's resources is granted. In one embodiment of the invention, the smart card executes a local Java application for managing usage data. The application provides quota and prior usage data to the peripheral device, and updates on the smart card usage data provided by the peripheral device. The usage data on the smart card is used to limit, audit, or track access to resources and operations on the peripheral device. In another embodiment, the authentication and usage management functions of the smart card is implemented on a remote server.
    Type: Grant
    Filed: September 13, 2007
    Date of Patent: July 10, 2012
    Assignee: Ricoh Company, Ltd.
    Inventor: Jiang Hong