Images List Premium Download Classic

Digital Signature

Digital Signature-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Mutual authentication with symmetric secrets and signatures
Amazon Technologies, Inc.
November 30, 2017 - N°20170346819

A client and server negotiate a secure communication channel using a pre-shared key where the server, at the time the negotiation initiates, lacks access to the pre-shared key. The server obtains the pre-shared key from another server that shares a secret with the client. A digital signature or other authentication information generated by the client may be used to enable ...
Technologies for token-based authentication and authorization of distributed computing resources
Vantiv, Llc
November 30, 2017 - N°20170346807

Technologies for token-based access authorization to an application program interface (api) include an access management server to receive a service request message from an application executed by a remote computing device. The service request message includes a digitally signed license token previously generated by the access management server and distributed to the remote computing device. The service request message also ...
Method and system for efficient distribution of configuration data utilizing permissioned blockchain technology
Mastercard International Incorporated
November 30, 2017 - N°20170346693

A method for propagating configuration data using a blockchain includes: storing a blockchain comprised of a plurality of blocks, each being comprised of a block header having a timestamp and one or more configuration transactions; receiving one or more configuration data items; generating a new configuration transaction for each configuration data item; hashing a most recent block identified based on ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and system for an efficient consensus mechanism for permssioned blockchains using bloom filters and ...
Mastercard International Incorporated
November 30, 2017 - N°20170344987

A method for addition of a block to a permissioned blockchain using efficient consensus includes: storing a blockchain; receiving transaction messages having transaction values from consensus nodes; generating a merkle root for the transactions messages using transaction references; generating a proposed block header having the merkle root and a hash of the header of the most recently added block in ...
Secure domain name system
Neustar, Inc.
November 23, 2017 - N°20170339122

A method and system for authenticating answers to domain name system (dns) queries originating from recursive dns servers are provided. A verification component provides a verification that a dns query originated from the recursive dns server. An authoritative dns server receives the query via a network, such as the internet, and provides an answer to the query to an authentication ...
Implicit rsa certificates
Arris Enterprises Llc
November 23, 2017 - N°20170338958

A secure digital communications method is provided in which a certificate authority generates an improved rsa key pair having a modulus, a public key exponent, a public key, and a private key. The public key exponent can contain descriptive attributes and a digital signature. The digital signature can be responsive to the descriptive attributes and the modulus. A secure session ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Digital signature authentication
Hewlett-packard Development Company, L.p.
November 16, 2017 - N°20170330046

Digital signature authentication systems and methods are disclosed. An example method of authenticating a digital signature extracted from a high resolution image includes comparing an extracted signature from an image to a reference signature. The example method also includes authenticating the extracted signature against the reference signature according to one of a plurality of different authentication protocols.
Digital signature with custom fingerprint
Hewlett-packard Development Company, L.p.
November 16, 2017 - N°20170329948

Computer method that allows you to uniquely identify the holder of the digital signature with custom imprint filed with the certifying authority. It is constituted by imprint of fingertip or the owner fingers signature and biographical data of the same and characterized by the use of the fingertip finger or fingers, for taking impressions comparable that originally deposited at the ...
Dnssec signing server
Verisign, Inc.
November 09, 2017 - N°20170324724

Systems and methods for performing dnssec signing are described in which digital signature operations may be performed by a network accessible signing server that is configured to interact with a separate client application. Exemplary methods may include receiving a signing request at the signing server from the client application to sign first data. The signing server may determine an active ...
Storage device tampering detection
Seagate Technology Llc
November 09, 2017 - N°20170323121

Apparatus (400, 500) and method (200, 220, 240, 260, 280, 300) for detecting unauthorized tampering with a data storage device (100, 110, 140, 520). In some embodiments, the data storage device has a housing (112, 142) and a memory (192) supported by the housing. A first identifier value (202a, 222a, 242a, 262a, 282a, 306a) is stored on an external surface of the housing and a second identifier value (202b, 222b, 242b, 262b, 282b, 306b) is ...
Systems and methods for secure communications over broadband datalinks
Seagate Technology Llc
November 02, 2017 - N°20170317975

Systems and methods for secure communications over broadband datalinks are provided. In certain implementations, a system for providing secure communications through a communication link includes a first communication unit that includes a processing unit that is configured to execute code that causes the first communication unit to verify messages with a firewall as they are received by the first communication ...
Systems, methods and apparatuses for secure time management
Seagate Technology Llc
November 02, 2017 - N°20170317838

The systems, methods and apparatuses described herein provide a computing environment that includes secure time management. An apparatus according to the present disclosure may comprise a non-volatile storage to store a synchronization time and a processor. The processor may be configured to generate a request for a current time, transmit the request to a trusted timekeeper, receive a digitally signed ...
Key exchange through partially trusted third party
Amazon Technologies, Inc.
October 26, 2017 - N°20170310652

A system may transmit, to a first entity, data to indicate an association between the first entity and a public key, wherein the public key is to be used to establish a cryptographically protected communications session between the first entity and a second entity, receive the data in response to a request to verify the association, and transmit, to the ...
Digital Signature Patent Pack
Download + patent application PDFs
Digital Signature Patent Applications
Download + Digital Signature-related PDFs
For professional research & prior art discovery
inventor
  • + full patent PDF documents of Digital Signature-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Cryptographic security functions based on anticipated changes in dynamic minutiae
Battelle Energy Alliance, Llc
October 19, 2017 - N°20170302634

Dynamic key cryptography validates mobile device users to cloud services by uniquely identifying the user's electronic device using a very wide range of hardware, firmware, and software minutiae, user secrets, and user biometric values found in or collected by the device. Processes for uniquely identifying and validating the device include: selecting a subset of minutia from a plurality of minutia ...
Power management and security for wireless modules in "machine-to-machine" communications
Battelle Energy Alliance, Llc
October 19, 2017 - N°20170302447

Methods and systems are provided for power management and security for wireless modules in “machine-to-machine” communications. A wireless module operating in a wireless network and with access to the internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (plmn) that supports wireless wide area network technology ...
Format conversion of digitally signed files
Re-sec Technologies Ltd.
October 12, 2017 - N°20170295022

A method for file conversion that includes receiving a first file in a computer; wherein the first file is of a first format; wherein the computer has a memory having a boot sector, a quarantine sector and a non-quarantine sector; storing the first file at the quarantine sector; wherein the quarantine sector is isolated from the boot sector and the ...
Method and system for managing personal information within independent computer systems and digital networks
Vchain Technology Limited
October 05, 2017 - N°20170286717

A system and method for reliably and securely recording and storing all attributes of personal identification, for the identification and authorization of individual identity as well as attributes relating to it and personal data including but not limited to individual's physical description, bank details, travel history, etc. (the “personally identifiable information “pii”). Pii can ...
Tpm 2.0 platform hierarchy authentication after uefi post
Lenovo Enterprise Solutions (singapore) Pte. Ltd.
October 05, 2017 - N°20170286705

A method of accessing a trusted platform module in a computing device is disclosed. The method includes storing a platform authorization key in a memory of the computing device that includes the trusted platform module. The platform authorization key includes permitting access to the trusted platform module. The method includes obtaining a digital signature in response to the computing device ...
Systems and methods for inference of malware labels in a graph database
Avast Software S.r.o.
October 05, 2017 - N°20170286677

Systems and methods are described which integrate file properties that in conventional systems has been considered weaker evidence of malware and analyzes the information to produce reliable results. Properties such as file paths, file names, source domains, ip protocol asns, section checksums, digital signatures that are not always present and not always reliable can be integrated into the classification process ...
System for adaptation of multiple digital signatures in a distributed network
Bank Of America Corporation
September 28, 2017 - N°20170280315

The present invention provides for managing communication of data from internet-connected devices, such as those devices within an iot environment. Specifically, the invention provides automated determination of which devices are communicating to which third-party entities and, in some embodiments, the type of data being communicated to such third-party entities. Once such information is known, the third-party entity can be automatically ...
Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing ...
International Business Machines Corporation
September 28, 2017 - N°20170279610

Exposure of sensitive information to users is controlled using a first security token containing user identity and user credentials to represent the user who requests services, and a second security token containing two other identities, one identifying the token issuer and the other identifying the owning process. When requesting services, the token-owning process sends a security token to indicate who ...
Loading