Images List Premium Download Classic

Digital Signature

Digital Signature-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Verifying a network configuration
Hewlett Packard Enterprise Development Lp
August 03, 2017 - N°20170222878

Examples relate to verifying a network configuration. In one example, a computing device may: receive, from a verifier, a request for attestation of a current network configuration of the computing device; identify network configuration rules, each network configuration rule specifying an action to be taken by the computing device in response to receiving a particular type of network traffic; generate, ...
Security chip and application processor
Samsung Electronics Co., Ltd.
July 27, 2017 - N°20170214662

A security chip and an application processor may be included in a device configured to engage in encrypted communications with an external client, including public key infrastructure communications, in an environment where a certificate authority is absent. The security chip may provide the application processor with a device public key from among a pair of device keys related to public ...
Signed application cards
Quixey, Inc.
July 20, 2017 - N°20170207915

A device displays signed application cards. The device receives a card object that includes: an application function identifier that identifies an application function of a native application, a digital signature, and a certificate that comprises a public key. The device verifies the authenticity of the digital signature with the public key in the certificate. The device determines that the certificate ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Remote control of secure installations
Waterfall Security Solutions Ltd.
July 13, 2017 - N°20170201379

Communication apparatus includes a one-way, hardware-actuated data relay, which includes a first hardware interface configured to receive a command from a communications network and a second hardware interface configured to convey the received command to a protected destination when the relay is actuated. A decoder includes a third hardware interface configured to receive a digital signature for the command from ...
Method for generating a digital signature
Bundesdruckerei Gmbh
July 13, 2017 - N°20170201376

Method for generating a digital signature for a digital content using a computer and trustworthy signature hardware connected thereto for data exchange, includes generating a message digest from the digital content by an application executed on the computer; generating descriptive data relating to the electronic digital signature; transmitting the message digest and the descriptive data to the trustworthy signature hardware; ...
Hypervisor and virtual machine protection
International Business Machines Corporation
July 13, 2017 - N°20170200000

A computer-implemented method, according to one embodiment, includes receiving a request for a hypervisor to run a virtual machine; determining, using a processor, whether the virtual machine is authorized to run using a data structure having metadata about properties of the virtual machine; determining, using the processor, whether the hypervisor is authorized to run the virtual machine using a digital ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for distributed trust authentication
Duo Security, Inc.
July 06, 2017 - N°20170195123

A method for distributed trust authentication of one or more users attempting to access one or more service providers operating on a network includes performing primary authentication of a user using a first authentication factor, generating a first partial digital signature for a first authentication response to the primary authentication, performing secondary authentication of the user using a second authentication ...
Method, device and article to test digital circuits
Stmicroelectronics (grenoble 2) Sas
July 06, 2017 - N°20170192053

A digital circuit includes a scan chain which loads data into and unloads data from the digital circuit. Checking circuitry is coupled to the scan chain and generates a first digital signature based on data indicative of a pre-testing status of the digital circuit as the data is unloaded from the digital circuit via the scan chain. When testing is ...
Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
Wistaria Trading Ltd
June 29, 2017 - N°20170187729

Disclosed herein are methods and systems for transmitting streams of data. The present invention also relates to generating packet watermarks and packet watermark keys. The present invention also relates to a computerized system for packaging data for transmission to a user. The system may utilize computer code to generate a bandwidth rights certificate that may include: at least one cryptographic ...
Systems and methods for segment integrity and authenticity for adaptive streaming
Futurewei Technologies, Inc.
June 22, 2017 - N°20170180138

System and method embodiments are provided for segment integrity and authenticity for adaptive streaming. In an embodiment, the method includes receiving at a data processing system a segment of a media stream, determining, with the data processing system, a digest or a digital signature for the segment, and comparing, with the data processing system, the digest/digital signature to a ...
Providing security in an intelligent electronic device
Electro Industries/gauge Tech
June 22, 2017 - N°20170180137

Apparatuses, systems, and methods for providing security in an intelligent electronic device (ied) are provided. In one aspect of the present disclosure, an ied is provided including at least one processor that receives a communication via a communication interface, the communication including an unencrypted file and a digital signature. The at least one processor decrypts the digital signature to obtain ...
Security hardening for a wi-fi router
T-mobile, Usa, Inc.
June 22, 2017 - N°20170180135

A method and system of securing the firmware of a router. Upon determining that a received digital message does not have integrity or the digital signature of the received digital message is not correct, the digital message is ignored or discarded. Otherwise the digital message is decrypted and a new firmware extracted therefrom. The existing firmware is then flashed with ...
Method and system for blockchain variant using digital signatures
Mastercard International Incorporated
June 22, 2017 - N°20170180134

A method for using digital signatures for signing blockchain transactions includes: generating a domain key pair comprising a domain private key and a domain public key, wherein the domain public key is signed after generation; receiving a plurality of member public keys, wherein each member public key is received from an associated member of a blockchain network and is a ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Mic verification method in d2d communications and d2d communications system
Xi'an Coolpad Software Scientific Co., Ltd.
June 08, 2017 - N°20170164189

An mic verification method in d2d communications and a d2d communications system include: a monitoring ue receives a discovery announcement message from an announcing ue, in which the discovery announcement message carries a 32-bit mic, and the mic is a signature value obtained when the announcing ue conducts, by using a private key, a digital signature on a ...
Secure token distribution
Xi'an Coolpad Software Scientific Co., Ltd.
June 08, 2017 - N°20170163629

A method for utilizing a registration authority to facilitate a certificate signing request is disclosed. In at least one embodiment, a registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ...
Method for loading a computer resource into an electronic device, corresponding electronic module and computer ...
Ingenico Group
June 08, 2017 - N°20170163428

A method for loading an information-processing resource by a device having a processor and a random-access memory having the steps of: obtaining at least one address corresponding to at least one block of data within which the resource is at least partially recorded; and for said at least one previously obtained current address: loading a current block of data as ...
Adding privacy to standard credentials
Microsoft Technology Licensing, Llc
June 08, 2017 - N°20170163421

Standardized digital signature schemes (e. G., rivest-shamir-adleman (rsa), digital signature algorithm (dsa), elliptical curve digital signature algorithm (ec-dsa), etc.) may be employed to prove authenticity of a message containing credentials. Proving possession of valid credentials may be performed using a combination of garbled circuits with message authentication codes (macs) and proof of knowledge protocols (e. G., sigma protocol, schnorr protocol, ...
System and method for partner key management
Jpmorgan Chase Bank, N.a.
June 08, 2017 - N°20170161737

A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the partner key management (pkm) protocol provides an improved alternative to traditional public key infrastructure (pki), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the pkm ...
Imaging supply
Hewlett-packard Development Company, L.p.
June 08, 2017 - N°20170160685

In one example, an imaging supply includes a container to contain an imaging material, a first memory on the container, and a second memory on the container different from the first memory. The first memory stores an indication that signed data is stored in the second memory and the second memory stores a digital signature to authenticate the imaging supply ...
Methods and apparatus to provide for efficient and secure software updates
Intel Corporation
June 01, 2017 - N°20170155514

In a method for validating software updates, a data processing system contains a current version of a software component. The data processing system saves at least first and second current advance keys (aks). After saving the current aks, the data processing system receives an update package for a new version of the software component. The data processing system extracts a ...
System for generating employee confirmation signature pages
Intel Corporation
June 01, 2017 - N°20170154341

A system is provided for generating confirmation signature pages for employees to evidence confirming events. The system comprises a physical unique identifier for each of the employees and an information handling system. The unique identifier may be an rfid tag. The information handling system comprises association means to uniquely associate each employee's digital signature with the employee's physical unique identifier. ...
Loading