Digital Signature

Digital Signature-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).

Image View List View Download All PDFs Archive

loading
NEW Generating enhanced digital signatures for artifacts
May 25, 2017 - N°20170149568

A system comprises a memory, interface, and processor. The system is operable to store a plurality of attestations, where at least one of the plurality of attestations comprise a reason statement for signing an artifact. The system is further operable to display at least one of the plurality of attestations and receive a first selection of a first attestation. The ...
NEW System and method for validating configuration data values associated with software applications
May 25, 2017 - N°20170147313

Systems and methods are provided for application software system installation in a user device wherein the desired app includes app configuration data to be entered by the intended user through a user interface. An app configuration data validation processor verifies that the user has correctly entered the desired app configuration data. When the user requests an install of the desired ...
Service-to-service digital path tracing
Amazon Technologies, Inc.
May 18, 2017 - N°20170142097

A service receives from a sender service a digital message and a corresponding trace, which includes an ordered set of digital signatures of one or more services that participated in causing the service to receive the digital message. The trace may further specify an ordering of the one or more services, which may be generated according to the order of ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Certificate exchange mechanism for wireless networking
Redline Communications Inc.
May 11, 2017 - N°20170134170

A wireless communications system comprises a sector controller that includes a wireless transmitter, and a mobile subscriber station that includes a wireless receiver, and a memory. The wireless transmitter continuously transmitting frames. Each frame comprising a control field and the control field comprising a portion of an encryption certificate associated with the sector controller. The wireless receiver receives each frame ...
Verification lineage tracking and transfer control of data sets
Guardtime Ip Holdings Limited
May 04, 2017 - N°20170126702

Whenever users receive or transfer a copy of any of a set of documents, prior verification of the document is enforced by an administrative system, which associates verification metadata with the copy. As each copy is itself copied, possibly modified, and transferred, updated verification metadata is included with the previous verification metadata to form a verification lineage chain, which can ...
Key management for privacy-ensured conferencing
Cisco Technology, Inc.
May 04, 2017 - N°20170126406

In one embodiment, a device in a network establishes a trust relationship between the device and a key management service. The device receives keying information from the key management service based on the established trust relationship. The device applies a digital signature to media data for a conference using the keying information, whereby the device is designated as a speaker ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems and methods for cryptography using folding unit computations
Numecent Holdings, Inc.
April 27, 2017 - N°20170118017

The systems and methods described herein provide computationally effective ways to calculate cryptography key pairs for a variety of cryptography applications, including but not limited to encryption/decryption systems, digital signature systems, encrypting file systems, etc. In various implementations, a cryptography key computation system identifies an encryption function, such as an elliptical curve function, that is used as the basis ...
Method and system for secure bidirection communication for industrial devices
Abb Schweiz Ag
April 20, 2017 - N°20170111452

A method and system for establishing bidirectional remote communication between a remote service portal and a plurality of drives is described. The method and system use a bidirectional remote communication interface for bidirectional remote communication that comprises a network adaptor for installing a client server connected to the drives and configured for bi-directional secure data exchange and handling the drive ...
Providing forward secrecy in a terminating ssl/tls connection proxy using ephemeral diffie-hellman key exchange
Akamai Technologies, Inc.
April 20, 2017 - N°20170111179

An infrastructure delivery platform provides a proxy service as an enhancement to the tls/ssl protocol to off-load to an external server the generation of a digital signature, the digital signature being generated using a private key that would otherwise have to be maintained on a terminating server. Using this service, instead of digitally signing (using the private key) ȁ...
Vehicle system and authentication method
Toyota Jidosha Kabushiki Kaisha
April 20, 2017 - N°20170111177

Provided is a vehicle system constituted by a master ecu and a general ecu. The general ecu attaches a digital signature to transmission data including the data (for example, a digest value of a program) and transmits the transmission data to the master ecu. The master ecu verifies the digital signature and the data and, when both the digital signature ...
Security token for certificate authentication and driving method therefor
Keypair Co., Ltd.
March 30, 2017 - N°20170093585

The present invention relates to a security token for certificate authentication and a driving method thereof. The security token for certificate authentication, according to the present invention, comprises a security chip comprising: a key pair generation module for generating a pair of a private key and a public key for an authentication certificate; a digital signature module for generating a ...
Digital signature-over-voice for caller id verification
International Business Machines Corporation
March 16, 2017 - N°20170078482

In an approach to caller id verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital ...
Digital signature-over-voice for caller id verification
International Business Machines Corporation
March 16, 2017 - N°20170078466

In an approach to caller id verification by digital signature, a computing device receives authenticating information associated with a caller. The computing device creates a call record based on the authenticating information. The computing device retrieves additional information associated with the caller. The computing device updates the call record based on the additional information. The computing device retrieves a digital ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Controlling access by code
Blackberry Limited
March 16, 2017 - N°20170076071

A novel code signing system, computer readable media, and method are provided. The code signing method includes receiving a code signing request from a requestor in order to gain access to one or more specific application programming interfaces (apis). A digital signature is provided to the requestor. The digital signature indicates authorization by a code signing authority for code of ...
Method and apparatus for distributing software updates
At&t Intellectual Property I, Lp
March 16, 2017 - N°20170075677

Aspects of the subject disclosure may include, for example, a first network device receiving from a second network device a software, the first network device adjusting operations at the first network device according to the software, the first network device providing a digital signature to the software to generate an adjusted software where the digital signature indicates that the first ...
Verification of data set components using digitally signed probabilistic data structures
Amazon Technologies, Inc.
March 09, 2017 - N°20170070492

A computer system encodes a plurality of components of a data set into a probabilistic data structure and digitally signs the probabilistic data structure. The computer system provides the digital signature for the probabilistic data structure and the probabilistic data structure to various entities. An entity can verify an individual component of the data set within the probabilistic data structure ...
Digital signature service system based on hash function and method thereof
Markany Inc.
March 09, 2017 - N°20170070350

Disclosed is a digital signature service system and method based on a hash function in which a main agent, who requires the generation of a digital signature, does not personally generate the digital signature, and wherein digital signatures may be simultaneously and stably generated for large-scale data such as multiple electronic documents and digital data using a hash function and ...
Signature verification for data set components using probabilistic data structures
Amazon Technologies, Inc.
March 09, 2017 - N°20170070349

A computer system stores a probabilistic data structure generated based at least in part on a plurality of digital signatures generated based at least in part on a plurality of components of a data set. The computer system receives a digital signature for verification. An entry can verify the digital signature within the probabilistic data structure by verifying the digital ...
System and method of mixed multivariate digital signature
South China University Of Technology
March 09, 2017 - N°20170070348

A system of mixed multivariate digital signature is disclosed. The system includes a signature module configured to sign a message to be signed, and a verification module configured to verify a signature. The signature module includes a data input/output port, a single-pole double-throw switch, a processor, an affine transformation component, a random generator, a linear equations solving component, and ...
Method and device for multi-user cluster identity authentication
Alibaba Group Holding Limited
March 02, 2017 - N°20170063554

Embodiments of the present invention provide methods and devices for multi-user cluster identity authentication, where a key set of a user cluster device is managed using a processor, the key set and an identification code of the key set are distributed to the user cluster device, and when the user cluster device makes a request to access a certain service ...
Secure digital signature apparatus and methods
Alibaba Group Holding Limited
March 02, 2017 - N°20170063550

The invention is a secure digital signature device which generates digital signature key pairs using a hardware random number generator. It transmits public keys to one or more smart devices and signs bit strings at the request of smart devices without exposing private keys. Requests for signatures from smart devices are not fulfilled unless the user takes action on the ...